Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Set-up.exe

Overview

General Information

Sample name:Set-up.exe
Analysis ID:1579084
MD5:0a711206f96133c8d28cd99b5910d705
SHA1:a100de5f4dc7a8faf50a5f6292f088c22e943303
SHA256:3e8ce55b21c44c397fe6080de6dec506f468c011c05808a72e8d8a64af090a46
Tags:exeuser-aachum
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files

Classification

  • System is w10x64
  • Set-up.exe (PID: 3216 cmdline: "C:\Users\user\Desktop\Set-up.exe" MD5: 0A711206F96133C8D28CD99B5910D705)
    • WerFault.exe (PID: 5748 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 920 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Set-up.exeReversingLabs: Detection: 34%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.9% probability
Source: Set-up.exe, 00000004.00000002.1631467486.000000000069D000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_2b52d774-c
Source: Set-up.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: Set-up.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: global trafficHTTP traffic detected: GET /ip HTTP/1.1Host: httpbin.orgAccept: */*
Source: Joe Sandbox ViewIP Address: 98.85.100.80 98.85.100.80
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /ip HTTP/1.1Host: httpbin.orgAccept: */*
Source: global trafficDNS traffic detected: DNS query: httpbin.org
Source: global trafficDNS traffic detected: DNS query: home.sevkx17vs.top
Source: Set-up.exeString found in binary or memory: http://.css
Source: Set-up.exeString found in binary or memory: http://.jpg
Source: Set-up.exeString found in binary or memory: http://home.sevkx17vs.top/WyoRLrMUJoZvgmxxFaXl17
Source: Set-up.exe, 00000004.00000002.1631977745.000000000122B000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000004.00000002.1631857785.00000000011C9000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000004.00000003.1580019209.0000000001223000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000004.00000003.1580070684.00000000011C9000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000004.00000002.1631451190.000000000069B000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: http://home.sevkx17vs.top/WyoRLrMUJoZvgmxxFaXl1733056027
Source: Set-up.exe, 00000004.00000002.1631977745.000000000122B000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000004.00000003.1580019209.0000000001223000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.sevkx17vs.top/WyoRLrMUJoZvgmxxFaXl17330560276963
Source: Set-up.exe, 00000004.00000002.1631451190.000000000069B000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: http://home.sevkx17vs.top/WyoRLrMUJoZvgmxxFaXl1733056027http://home.sevkx17vs.top/WyoRLrMUJoZvgmxxFa
Source: Set-up.exe, 00000004.00000002.1631977745.000000000122B000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000004.00000003.1580019209.0000000001223000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.sevkx17vs.top/WyoRLrMUJoZvgmxxFaXl1733056027lse
Source: Set-up.exeString found in binary or memory: http://html4/loose.dtd
Source: Amcache.hve.9.drString found in binary or memory: http://upx.sf.net
Source: Set-up.exeString found in binary or memory: https://curl.se/docs/alt-svc.html
Source: Set-up.exeString found in binary or memory: https://curl.se/docs/hsts.html
Source: Set-up.exeString found in binary or memory: https://curl.se/docs/http-cookies.html
Source: Set-up.exeString found in binary or memory: https://httpbin.org/ip
Source: Set-up.exeString found in binary or memory: https://httpbin.org/ipbefore
Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
Source: C:\Users\user\Desktop\Set-up.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 920
Source: Set-up.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: Set-up.exeBinary string: Lntdll.dllNtCreateFileNtDeviceIoControlFileNtCancelIoFileEx\Device\Afd
Source: classification engineClassification label: mal56.evad.winEXE@2/5@14/1
Source: C:\Users\user\Desktop\Set-up.exeMutant created: \Sessions\1\BaseNamedObjects\My_mutex
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3216
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\2abc9d8b-162a-4bc3-8f50-384953063d74Jump to behavior
Source: Set-up.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Set-up.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: Set-up.exeReversingLabs: Detection: 34%
Source: Set-up.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectorysystem_win32.c@
Source: Set-up.exeString found in binary or memory: in-addr.arpa
Source: Set-up.exeString found in binary or memory: 8L0123456789abcdefin-addr.arpaip6.arpa
Source: Set-up.exeString found in binary or memory: Unable to complete request for channel-process-startup
Source: Set-up.exeString found in binary or memory: JM[\Unable to allocate space for channel dataFailed allocating memory for channel type nameUnable to allocate temporary space for packetWould block sending channel-open requestUnable to send channel-open requestWould blockUnexpected errorUnexpected packet sizeChannel open failure (administratively prohibited)Channel open failure (connect failed)Channel open failure (unknown channel type)Channel open failure (resource shortage)Channel open failureUnable to allocate memory for setenv packetcancel-tcpip-forwardWould block sending forward requestUnable to send global-request packet for forward listen requestauth-agent-req@openssh.comauth-agent-reqcdChannel can not be reusedUnable to allocate memory for channel-process requestWould block sending channel requestUnable to send channel requestFailed waiting for channel successUnable to complete request for channel-process-startupUnexpected packet lengthUnable to allocate memory for signal nameWould block sending window adjustUnable to send transfer-window adjustment packet, deferringtransport readwould blockWe have already closed this channelEOF has already been received, data might be ignoredFailure while draining incoming flowUnable to send channel dataUnable to send EOF, but closing channel anywayWould block sending close-channelUnable to send close-channel request, but closing anywaysessionchannel.cUnable to allocate memory for direct-tcpip connectiondirect-tcpipUnable to allocate memory for direct-streamlocal connectiondirect-streamlocal@openssh.comQR0.0.0.0tcpip-forwardWould block sending global-request packet for forward listen requestUnknownUnable to allocate memory for listener queueUnable to complete request for forward-listenWould block waiting for packetChannel not foundcdenvWould block sending setenv requestUnable to send channel-request packet for setenv requestFailed getting response for channel-setenvUnable to complete request for channel-setenvcdWould block sending auth-agent requestUnable to send auth-agent requestFailed to request auth-agentUnable to complete request for auth-agentcdterm + mode lengths too largepty-reqWould block sending pty requestUnable to send pty-request packetFailed to require the PTY packageUnable to complete request for channel request-ptywindow-changeWould block sending window-change requestUnable to send window-change packetcdUnable to allocate memory for pty-requestx11-reqMIT-MAGIC-COOKIE-1Unable to get random bytes for x11-req cookie%02XWould block sending X11-req packetUnable to send x11-req packetwaiting for x11-req response packetUnable to complete request for channel x11-reqWould block sending EOFUnable to send EOF on channelReceiving channel window has been exhausted_libssh2_transport_read() bailed out!libssh2_channel_wait_closed() invoked when channel is not in EOF stateUnable to allocate memory for signal requestsignalWould block sending signal requestUnable to send signal packetecdsa-sha2-nistp256ecdsa-sha2-nistp384ecdsa-sha2-nistp521blocksize <= siz
Source: Set-up.exeString found in binary or memory: id-cmc-addExtensions
Source: Set-up.exeString found in binary or memory: set-addPolicy
Source: Set-up.exeString found in binary or memory: overflow:hidden;img src="http://addEventListenerresponsible for s.js"></script>
Source: unknownProcess created: C:\Users\user\Desktop\Set-up.exe "C:\Users\user\Desktop\Set-up.exe"
Source: C:\Users\user\Desktop\Set-up.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 920
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: winrnr.dllJump to behavior
Source: Set-up.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: Set-up.exeStatic file information: File size 8020992 > 1048576
Source: Set-up.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x4bba00
Source: Set-up.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x15f200
Source: Set-up.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x150a00
Source: Set-up.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: Set-up.exeStatic PE information: section name: .eh_fram
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: Set-up.exeBinary or memory string: PROCMON.EXE
Source: Set-up.exeBinary or memory string: X64DBG.EXE
Source: Set-up.exeBinary or memory string: WINDBG.EXE
Source: Set-up.exeBinary or memory string: SYSINTERNALSNUM_PROCESSORNUM_RAMNAMEALLFREEDRIVERSNUM_DISPLAYSRESOLUTION_XRESOLUTION_Y\*RECENT_FILESPROCESSESUPTIME_MINUTESC:\WINDOWS\SYSTEM32\VBOX*.DLL01VBOX_FIRSTSYSTEM\CONTROLSET001\SERVICES\VBOXSFVBOX_SECONDC:\USERS\PUBLIC\PUBLIC_CHECKWINDBG.EXEDBGWIRESHARK.EXEPROCMON.EXEX64DBG.EXEIDA.EXEDBG_SECDBG_THIRDYADROINSTALLED_APPSSOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALLSOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL%D%S\%SDISPLAYNAMEAPP_NAMEINDEXCREATETOOLHELP32SNAPSHOT FAILED.
Source: Set-up.exeBinary or memory string: WIRESHARK.EXE
Source: C:\Users\user\Desktop\Set-up.exe TID: 6812Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Set-up.exe TID: 6812Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: Amcache.hve.9.drBinary or memory string: VMware
Source: Amcache.hve.9.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.9.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.9.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.9.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.9.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.9.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.9.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.9.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Set-up.exe, 00000004.00000003.1307334374.0000000001007000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Y\MACHINE\SYSTEM\ControlSet001\Services\VBoxSFsion\Uninstall\{90160000-008C-0000-0000-0000000FF1CE}00000FF1CE}\REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90160000-008C-0000-0000-0000000FF1CE}
Source: Set-up.exeBinary or memory string: SYSINTERNALSNum_processorNum_ramnameallfreedriversNum_displaysresolution_xresolution_y\*recent_filesprocessesuptime_minutesC:\Windows\System32\VBox*.dll01vbox_firstSYSTEM\ControlSet001\Services\VBoxSFvbox_secondC:\USERS\PUBLIC\public_checkWINDBG.EXEdbgwireshark.exeprocmon.exex64dbg.exeida.exedbg_secdbg_thirdyadroinstalled_appsSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallSOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall%d%s\%sDisplayNameapp_nameindexCreateToolhelp32Snapshot failed.
Source: Amcache.hve.9.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.9.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.9.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.9.drBinary or memory string: vmci.sys
Source: Set-up.exeBinary or memory string: SYSTEM\ControlSet001\Services\VBoxSF
Source: Amcache.hve.9.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.9.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.9.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.9.drBinary or memory string: VMware20,1
Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.9.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.9.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.9.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.9.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.9.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.9.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.9.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.9.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.9.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
Source: Set-up.exe, 00000004.00000002.1632087787.00000000034B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll, {
Source: Amcache.hve.9.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\Set-up.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Set-up.exe, Set-up.exe, 00000004.00000002.1631467486.000000000069D000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: procmon.exe
Source: Amcache.hve.9.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.9.drBinary or memory string: msmpeng.exe
Source: Set-up.exe, Set-up.exe, 00000004.00000002.1631467486.000000000069D000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: wireshark.exe
Source: Amcache.hve.9.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.9.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.9.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
2
Virtualization/Sandbox Evasion
OS Credential Dumping121
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory2
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
Remote System Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets13
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Set-up.exe34%ReversingLabsWin32.Infostealer.Tinba
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
httpbin.org
98.85.100.80
truefalse
    high
    home.sevkx17vs.top
    unknown
    unknownfalse
      high
      NameMaliciousAntivirus DetectionReputation
      https://httpbin.org/ipfalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        https://curl.se/docs/hsts.htmlSet-up.exefalse
          high
          http://html4/loose.dtdSet-up.exefalse
            high
            https://httpbin.org/ipbeforeSet-up.exefalse
              high
              https://curl.se/docs/http-cookies.htmlSet-up.exefalse
                high
                http://home.sevkx17vs.top/WyoRLrMUJoZvgmxxFaXl1733056027lseSet-up.exe, 00000004.00000002.1631977745.000000000122B000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000004.00000003.1580019209.0000000001223000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  http://home.sevkx17vs.top/WyoRLrMUJoZvgmxxFaXl17330560276963Set-up.exe, 00000004.00000002.1631977745.000000000122B000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000004.00000003.1580019209.0000000001223000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    http://upx.sf.netAmcache.hve.9.drfalse
                      high
                      https://curl.se/docs/alt-svc.htmlSet-up.exefalse
                        high
                        http://.cssSet-up.exefalse
                          high
                          http://.jpgSet-up.exefalse
                            high
                            http://home.sevkx17vs.top/WyoRLrMUJoZvgmxxFaXl17Set-up.exefalse
                              unknown
                              http://home.sevkx17vs.top/WyoRLrMUJoZvgmxxFaXl1733056027http://home.sevkx17vs.top/WyoRLrMUJoZvgmxxFaSet-up.exe, 00000004.00000002.1631451190.000000000069B000.00000004.00000001.01000000.00000004.sdmpfalse
                                unknown
                                http://home.sevkx17vs.top/WyoRLrMUJoZvgmxxFaXl1733056027Set-up.exe, 00000004.00000002.1631977745.000000000122B000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000004.00000002.1631857785.00000000011C9000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000004.00000003.1580019209.0000000001223000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000004.00000003.1580070684.00000000011C9000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000004.00000002.1631451190.000000000069B000.00000004.00000001.01000000.00000004.sdmpfalse
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  98.85.100.80
                                  httpbin.orgUnited States
                                  11351TWC-11351-NORTHEASTUSfalse
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1579084
                                  Start date and time:2024-12-20 19:21:19 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 5m 11s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:15
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:Set-up.exe
                                  Detection:MAL
                                  Classification:mal56.evad.winEXE@2/5@14/1
                                  EGA Information:Failed
                                  HCA Information:Failed
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                  • Excluded IPs from analysis (whitelisted): 20.189.173.20, 13.107.246.63, 20.231.128.66, 4.175.87.197, 20.109.210.53
                                  • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                  • Execution Graph export aborted for target Set-up.exe, PID 3216 because there are no executed function
                                  • Not all processes where analyzed, report is missing behavior information
                                  • VT rate limit hit for: Set-up.exe
                                  TimeTypeDescription
                                  13:22:20API Interceptor6x Sleep call for process: Set-up.exe modified
                                  15:02:09API Interceptor1x Sleep call for process: WerFault.exe modified
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  98.85.100.80t3VyxF5MmA.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                    Pm81aa8zii.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                      avBx6p1FAX.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                        j6Nv9kUydV.exeGet hashmaliciousUnknownBrowse
                                          q79Pocl81P.exeGet hashmaliciousCryptbotBrowse
                                            28PCC9oa8s.exeGet hashmaliciousUnknownBrowse
                                              fnuFOEqg4j.exeGet hashmaliciousUnknownBrowse
                                                iuO4kwUi17.exeGet hashmaliciousUnknownBrowse
                                                  S0O8qbVwLk.exeGet hashmaliciousUnknownBrowse
                                                    QnYodX3dYf.exeGet hashmaliciousCryptbotBrowse
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      httpbin.orgfile.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, SystemBC, zgRATBrowse
                                                      • 98.85.100.80
                                                      t3VyxF5MmA.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                      • 98.85.100.80
                                                      KNkr78hyig.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                      • 34.226.108.155
                                                      Pm81aa8zii.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                      • 98.85.100.80
                                                      avBx6p1FAX.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                      • 98.85.100.80
                                                      Tsy9P2T9yF.exeGet hashmaliciousUnknownBrowse
                                                      • 34.226.108.155
                                                      kGxQbLOG7s.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                      • 34.226.108.155
                                                      j6Nv9kUydV.exeGet hashmaliciousUnknownBrowse
                                                      • 98.85.100.80
                                                      q79Pocl81P.exeGet hashmaliciousCryptbotBrowse
                                                      • 98.85.100.80
                                                      28PCC9oa8s.exeGet hashmaliciousUnknownBrowse
                                                      • 98.85.100.80
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      TWC-11351-NORTHEASTUSnshmips.elfGet hashmaliciousMiraiBrowse
                                                      • 69.204.90.210
                                                      t3VyxF5MmA.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                      • 98.85.100.80
                                                      Pm81aa8zii.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                      • 98.85.100.80
                                                      avBx6p1FAX.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                      • 98.85.100.80
                                                      nshkppc.elfGet hashmaliciousMiraiBrowse
                                                      • 98.67.105.53
                                                      mpsl.elfGet hashmaliciousMiraiBrowse
                                                      • 67.253.128.172
                                                      j6Nv9kUydV.exeGet hashmaliciousUnknownBrowse
                                                      • 98.85.100.80
                                                      q79Pocl81P.exeGet hashmaliciousCryptbotBrowse
                                                      • 98.85.100.80
                                                      28PCC9oa8s.exeGet hashmaliciousUnknownBrowse
                                                      • 98.85.100.80
                                                      fnuFOEqg4j.exeGet hashmaliciousUnknownBrowse
                                                      • 98.85.100.80
                                                      No context
                                                      No context
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):65536
                                                      Entropy (8bit):0.9315357846333469
                                                      Encrypted:false
                                                      SSDEEP:96:C/F3h9ss/hKoGhpJfZQXIDcQvc6QcEVcw3cE/9zp+HbHg/opAnQVHMDDWps8OfJg:Yb9sO0BU/Aj4ZrMso5wzuiFqZ24IO8y
                                                      MD5:8A38D18205972708D76CC4F54CF63456
                                                      SHA1:3AAE9372F039AE7270CC1D77D2B66F62DCF3F47F
                                                      SHA-256:FDD8B0725B322960448B140C3B01345740C3D9AD0ACF97F03CC0759EDB2B2338
                                                      SHA-512:CBCC92A0BE36D251BBF3B745A5200C820068F9D67456F7EBBF70484267D2B16CB8E2FF1C953112DD2D93ED79B81DB66614EF79D12971F36FCCFF4DBF5E41190D
                                                      Malicious:true
                                                      Reputation:low
                                                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.9.1.9.2.5.4.2.9.0.3.7.2.5.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.9.1.9.2.5.4.3.7.3.1.8.5.1.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.b.4.6.7.d.b.8.-.b.f.c.9.-.4.4.7.0.-.9.3.7.e.-.b.f.8.b.4.4.f.e.5.9.1.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.6.6.f.a.5.d.9.-.7.c.5.5.-.4.c.2.4.-.a.7.2.3.-.2.5.0.d.4.6.5.3.b.5.5.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.e.t.-.u.p...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.c.9.0.-.0.0.0.1.-.0.0.1.4.-.9.8.b.9.-.d.3.1.9.0.c.5.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.4.7.b.a.1.5.1.0.9.b.6.9.3.2.d.7.6.c.b.3.8.f.e.0.1.d.a.1.0.a.2.2.0.0.0.0.f.f.f.f.!.0.0.0.0.a.1.0.0.d.e.5.f.4.d.c.7.a.8.f.a.f.5.0.a.5.f.6.2.9.2.f.0.8.8.c.2.2.e.9.4.3.3.0.3.!.S.e.t.-.u.p...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4.
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:Mini DuMP crash report, 15 streams, Fri Dec 20 18:22:23 2024, 0x1205a4 type
                                                      Category:dropped
                                                      Size (bytes):52730
                                                      Entropy (8bit):2.2294545469261733
                                                      Encrypted:false
                                                      SSDEEP:384:Dqf9pxaLhAQ2+AMqcROp3do6J9o1BEALB19:Dqf3xaLmQ2+AMq/NALN
                                                      MD5:99997994E4E01A81561148C6BAF0935C
                                                      SHA1:6D4C55B203079335F9DF2C493BA02E2F077229E7
                                                      SHA-256:E20EB9D1AA8FE12C951465CF50C3DF1EBFD2B4CFBBE974B37B66FAB8B3E386FF
                                                      SHA-512:3CA671A2348E2F0C65D2B5832A33733643E51A17835976118F958FD75C4AAF1DA24E655E62556C651DD6596D26917C45B1F36AAB02A17BDEF657614AA01CF191
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:MDMP..a..... ........eg....................................................~/..........`.......8...........T............$..Z.......................................................................................................eJ..............GenuineIntel............T............eg.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):8324
                                                      Entropy (8bit):3.6930136994623513
                                                      Encrypted:false
                                                      SSDEEP:192:R6l7wVeJlU6IqW6YNSSU9MQ6gmf2bZprU89b3KsfO9m:R6lXJ26IqW6YISU9h6gmf2b13pf1
                                                      MD5:E41FCB5932D72AFE4FF1F5C94963E7A9
                                                      SHA1:20218C4FF383B321D1EB4193AF7E11A25A63805D
                                                      SHA-256:1F2B2A3348CEAADDD501FFDDA041D41D3D5D0E1EBD0AAAFDA7457D8CBDDCFD7B
                                                      SHA-512:F04D34F4CBFD76379FEBF58A1EFDC1E7E558E84F3BE4091C7CC8A63C66917FA1CD20E414F26B8B73ED82005EEDF5E13A11BB913D1B2242FFE459E6AED3C22CDB
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.2.1.6.<./.P.i.
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):4574
                                                      Entropy (8bit):4.4450917901881555
                                                      Encrypted:false
                                                      SSDEEP:48:cvIwWl8zsmJg77aI9U3WpW8VYfYm8M4JG5Fb+q8MD4URwkd:uIjf8I7uG7V/JmL4URwkd
                                                      MD5:0F7F80E7C47D6B41D52F2D9D81D75F95
                                                      SHA1:7C0E5F1D69499CF0E8394A459CC5A332A999A437
                                                      SHA-256:C50B446BAAC1082925C52A0DA5506B095D367CB79C4E0CFA9382A22AB4DB5964
                                                      SHA-512:D06B1EB3349A5E52BE252D75615B565DD5D60C94FC4594A63063E81757D05BBB980102ED172CA91A3CD49FBED5431877F68EA9E86771FAEB5E0DCB73A258F1D0
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="639925" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:MS Windows registry file, NT/2000 or above
                                                      Category:dropped
                                                      Size (bytes):1835008
                                                      Entropy (8bit):4.416609272532601
                                                      Encrypted:false
                                                      SSDEEP:6144:Wcifpi6ceLPL9skLmb0moSWSPtaJG8nAgex285i2MMhA20X4WABlGuNl5+:zi58oSWIZBk2MM6AFBHo
                                                      MD5:CD8B010FD9EB10A09B8AD18CC4BD6662
                                                      SHA1:85789549012E5DCD4186490D881BF85A146E6F9F
                                                      SHA-256:2229652DC82EDF88E2A820BA94BE549116BE23ED1E2B7C771104E93DEDB3AC8F
                                                      SHA-512:A36D0690494BBC39D64AAE52335419A0B1AAFA02CFF1A1A4B87C0166D1B41A0CBB312113575730CDD5B2D62A1D498A928179F285B33EEEBAD04612F61F6D8BF2
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:regfE...E....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.{...S..............................................................................................................................................................................................................................................................................................................................................@..(........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                      Entropy (8bit):5.780316844080178
                                                      TrID:
                                                      • Win32 Executable (generic) a (10002005/4) 99.53%
                                                      • InstallShield setup (43055/19) 0.43%
                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                      • DOS Executable Generic (2002/1) 0.02%
                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                      File name:Set-up.exe
                                                      File size:8'020'992 bytes
                                                      MD5:0a711206f96133c8d28cd99b5910d705
                                                      SHA1:a100de5f4dc7a8faf50a5f6292f088c22e943303
                                                      SHA256:3e8ce55b21c44c397fe6080de6dec506f468c011c05808a72e8d8a64af090a46
                                                      SHA512:03e63875a95e9d18d67635388611862a6694278038134a0e4ab8b23c43a41774b33f3dcc38181bd4af6491b66a7f91b478820b1bc7b14d31e42f20779b9a506a
                                                      SSDEEP:49152:Kucd9+zV4r7CLX0vDLhfFoGiux88wMKowWrpAXa9UWsnmWPh/pU02KbbgcPyzJsL:KumEwCLofapuG8nKjGGXx/qKxyz2
                                                      TLSH:10863B62EE8781F9C6C305715056B73F6E31AF009925CEB6CE91FB38C672A11E95E21C
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....WLg...............(..K..`z..2............K...@...........................z......hz...@... ............................
                                                      Icon Hash:00928e8e8686b000
                                                      Entrypoint:0x4014a0
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                                                      Time Stamp:0x674C57A4 [Sun Dec 1 12:33:40 2024 UTC]
                                                      TLS Callbacks:0x7890e0, 0x789090
                                                      CLR (.Net) Version:
                                                      OS Version Major:4
                                                      OS Version Minor:0
                                                      File Version Major:4
                                                      File Version Minor:0
                                                      Subsystem Version Major:4
                                                      Subsystem Version Minor:0
                                                      Import Hash:81fb24115d5dd0de51b609f733724901
                                                      Instruction
                                                      mov dword ptr [00B75658h], 00000001h
                                                      jmp 00007F47C8806286h
                                                      nop
                                                      mov dword ptr [00B75658h], 00000000h
                                                      jmp 00007F47C8806276h
                                                      nop
                                                      sub esp, 1Ch
                                                      mov eax, dword ptr [esp+20h]
                                                      mov dword ptr [esp], eax
                                                      call 00007F47C8B8DAE6h
                                                      cmp eax, 01h
                                                      sbb eax, eax
                                                      add esp, 1Ch
                                                      ret
                                                      nop
                                                      nop
                                                      nop
                                                      nop
                                                      nop
                                                      nop
                                                      nop
                                                      nop
                                                      push ebp
                                                      mov ebp, esp
                                                      push edi
                                                      push esi
                                                      push ebx
                                                      sub esp, 1Ch
                                                      mov dword ptr [esp], 00A1D000h
                                                      call dword ptr [00B779A0h]
                                                      sub esp, 04h
                                                      test eax, eax
                                                      je 00007F47C8806645h
                                                      mov ebx, eax
                                                      mov dword ptr [esp], 00A1D000h
                                                      call dword ptr [00B77A14h]
                                                      mov edi, dword ptr [00B779B4h]
                                                      sub esp, 04h
                                                      mov dword ptr [00B73028h], eax
                                                      mov dword ptr [esp+04h], 00A1D013h
                                                      mov dword ptr [esp], ebx
                                                      call edi
                                                      sub esp, 08h
                                                      mov esi, eax
                                                      mov dword ptr [esp+04h], 00A1D029h
                                                      mov dword ptr [esp], ebx
                                                      call edi
                                                      sub esp, 08h
                                                      mov dword ptr [008BD004h], eax
                                                      test esi, esi
                                                      je 00007F47C88065E3h
                                                      mov dword ptr [esp+04h], 00B7302Ch
                                                      mov dword ptr [esp], 00B6E104h
                                                      call esi
                                                      mov dword ptr [esp], 00401580h
                                                      call 00007F47C8806533h
                                                      lea esp, dword ptr [ebp-0Ch]
                                                      pop ebx
                                                      pop esi
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x7770000x2d90.idata
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x77c0000x32944.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x763b800x18.rdata
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x7778100x61c.idata
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x10000x4bb95c0x4bba00208ee3f134adf43b69a67c30c36c92fcunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .data0x4bd0000x15f0e40x15f200285b7fb19aef319dbda883243c6cf48cFalse0.015593015752936989dBase III DBT, version number 0, next free block index 10, 1st item "\332\301z"0.2354105461677066IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .rdata0x61d0000x1509a40x150a006bf79d96d546190ba9861bdbd1cff76fFalse0.4215087437337542data6.2741624061919605IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .eh_fram0x76e0000x4d300x4e00ea6b6163b2e313db72a4c17b4353d2e8False0.3192608173076923data4.906360631443924IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .bss0x7730000x31800x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .idata0x7770000x2d900x2e006233b460a75832b11085ba99742ae369False0.36795176630434784data5.450255772340319IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .CRT0x77a0000x300x200fe2a65d4187b984679c52ae93485940eFalse0.0625data0.2233456448570176IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .tls0x77b0000x80x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .reloc0x77c0000x329440x32a008f27117dabdb5f1ec1029eb3b39e39feFalse0.5072434413580247data6.6580607392142035IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      DLLImport
                                                      ADVAPI32.dllCryptAcquireContextA, CryptAcquireContextW, CryptCreateHash, CryptDecrypt, CryptDestroyHash, CryptDestroyKey, CryptEnumProvidersW, CryptExportKey, CryptGenRandom, CryptGetHashParam, CryptGetProvParam, CryptGetUserKey, CryptHashData, CryptReleaseContext, CryptSetHashParam, CryptSignHashW, DeregisterEventSource, RegCloseKey, RegEnumKeyExA, RegNotifyChangeKeyValue, RegOpenKeyExA, RegOpenKeyExW, RegQueryValueExA, RegisterEventSourceW, ReportEventW, SystemFunction036
                                                      bcrypt.dllBCryptGenRandom
                                                      CRYPT32.dllCertCloseStore, CertDuplicateCertificateContext, CertEnumCertificatesInStore, CertFindCertificateInStore, CertFreeCertificateContext, CertGetCertificateContextProperty, CertGetEnhancedKeyUsage, CertGetIntendedKeyUsage, CertOpenStore, CertOpenSystemStoreA, CertOpenSystemStoreW
                                                      GDI32.dllBitBlt, CreateCompatibleBitmap, CreateCompatibleDC, DeleteDC, DeleteObject, SelectObject
                                                      gdiplus.dllGdipGetImageEncoders, GdipGetImageEncodersSize, GdiplusShutdown, GdiplusStartup
                                                      IPHLPAPI.DLLConvertInterfaceIndexToLuid, ConvertInterfaceLuidToNameA, FreeMibTable, GetAdaptersAddresses, GetBestRoute2, GetUnicastIpAddressTable, if_indextoname, if_nametoindex
                                                      KERNEL32.dllAcquireSRWLockExclusive, CancelIo, CloseHandle, CompareFileTime, ConvertFiberToThread, ConvertThreadToFiberEx, CreateEventA, CreateFiberEx, CreateFileA, CreateFileMappingA, CreateIoCompletionPort, CreateMutexA, CreateSemaphoreW, CreateThread, CreateToolhelp32Snapshot, DeleteCriticalSection, DeleteFiber, EnterCriticalSection, ExpandEnvironmentStringsA, FindClose, FindFirstFileA, FindFirstFileW, FindNextFileW, FormatMessageW, FreeLibrary, GetACP, GetConsoleMode, GetCurrentProcessId, GetCurrentThreadId, GetDiskFreeSpaceExA, GetDriveTypeA, GetEnvironmentVariableA, GetEnvironmentVariableW, GetFileAttributesA, GetFileType, GetLastError, GetLogicalDriveStringsA, GetModuleFileNameA, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetNativeSystemInfo, GetOverlappedResult, GetProcAddress, GetProcessHeap, GetQueuedCompletionStatusEx, GetStartupInfoA, GetStdHandle, GetSystemDirectoryA, GetSystemInfo, GetSystemTime, GetSystemTimeAsFileTime, GetThreadLocale, GetTickCount64, GetTickCount, GetTimeZoneInformation, GetVersion, GetVersionExA, GlobalMemoryStatusEx, HeapAlloc, HeapFree, InitializeConditionVariable, InitializeCriticalSection, IsBadReadPtr, IsDBCSLeadByteEx, K32EnumProcesses, LeaveCriticalSection, LoadLibraryA, LoadLibraryW, MapViewOfFile, MoveFileExA, MultiByteToWideChar, OpenProcess, PeekNamedPipe, PostQueuedCompletionStatus, Process32First, Process32Next, QueryFullProcessImageNameA, QueryPerformanceCounter, QueryPerformanceFrequency, ReadConsoleA, ReadConsoleW, ReadFile, RegisterWaitForSingleObject, ReleaseSRWLockExclusive, ReleaseSemaphore, SetConsoleMode, SetFileCompletionNotificationModes, SetHandleInformation, SetLastError, SetUnhandledExceptionFilter, Sleep, SleepConditionVariableCS, SleepEx, SwitchToFiber, SystemTimeToFileTime, TlsAlloc, TlsGetValue, TlsSetValue, UnmapViewOfFile, UnregisterWait, VerSetConditionMask, VerifyVersionInfoW, VirtualAlloc, VirtualFree, VirtualLock, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WaitNamedPipeA, WakeAllConditionVariable, WakeConditionVariable, WideCharToMultiByte, WriteFile, lstrlenA
                                                      msvcrt.dll__mb_cur_max, __setusermatherr, _findclose, _fullpath, _lock, _strnicmp, _unlock, getc, islower, isxdigit, localeconv, ungetc, vfprintf, _findnext, _findfirst, _open
                                                      ole32.dllCreateStreamOnHGlobal
                                                      SHELL32.dllSHGetKnownFolderPath
                                                      api-ms-win-crt-convert-l1-1-0.dllatoi, mbstowcs, strtol, strtoll, strtoul, wcstombs
                                                      api-ms-win-crt-environment-l1-1-0.dll__p__environ, __p__wenviron, getenv
                                                      api-ms-win-crt-filesystem-l1-1-0.dll_fstat64, _stat64, _unlink
                                                      api-ms-win-crt-heap-l1-1-0.dll_set_new_mode, calloc, free, malloc, realloc
                                                      api-ms-win-crt-locale-l1-1-0.dllsetlocale
                                                      api-ms-win-crt-math-l1-1-0.dll_fdopen
                                                      api-ms-win-crt-private-l1-1-0.dllmemchr, memcmp, memcpy, memmove, strchr, strrchr, strstr, wcsstr
                                                      api-ms-win-crt-runtime-l1-1-0.dll_set_app_type, __p___argc, __p___argv, __p___wargv, __p__acmdln, __sys_errlist, __sys_nerr, _assert, _cexit, _configure_narrow_argv, _configure_wide_argv, _crt_at_quick_exit, _crt_atexit, _errno, _exit, _fpreset, _initialize_narrow_environment, _initialize_wide_environment, _initterm, _set_invalid_parameter_handler, abort, exit, raise, signal, strerror
                                                      api-ms-win-crt-stdio-l1-1-0.dll__acrt_iob_func, __p__commode, __p__fmode, __stdio_common_vfwprintf, __stdio_common_vsprintf, __stdio_common_vsscanf, __stdio_common_vswprintf, _fileno, _fseeki64, _lseeki64, _wfopen, _write, fclose, feof, ferror, fflush, fgets, fopen, fputc, fputs, fread, fseek, ftell, fwrite, rewind, setvbuf, _write, _setmode, _read, _open, _fileno, _close
                                                      api-ms-win-crt-string-l1-1-0.dll_strlwr_s, isspace, isupper, memset, strcat, strcmp, strcpy, strcspn, strlen, strncat, strncmp, strncpy, strpbrk, strspn, tolower, wcscat, wcscmp, wcscpy, wcslen, _wcsnicmp, _stricmp, _strdup, _strdup
                                                      api-ms-win-crt-time-l1-1-0.dll__daylight, __timezone, __tzname, _difftime32, _difftime64, _gmtime64, _mktime64, _time32, _time64, _tzset, strftime
                                                      api-ms-win-crt-utility-l1-1-0.dll_byteswap_uint64, bsearch, qsort, rand, srand
                                                      USER32.dllCharUpperA, EnumDisplayMonitors, EnumWindows, FindWindowA, GetDC, GetProcessWindowStation, GetSystemMetrics, GetUserObjectInformationW, GetWindowTextA, MessageBoxW, ReleaseDC, SendMessageA
                                                      WS2_32.dllWSACleanup, WSACloseEvent, WSACreateEvent, WSAEnumNetworkEvents, WSAEventSelect, WSAGetLastError, WSAIoctl, WSAResetEvent, WSASetEvent, WSASetLastError, WSAStartup, WSAStringToAddressW, WSAWaitForMultipleEvents, __WSAFDIsSet, accept, bind, closesocket, connect, gethostbyaddr, gethostbyname, gethostname, getpeername, getservbyname, getservbyport, getsockname, getsockopt, htonl, htons, inet_addr, inet_ntoa, ioctlsocket, listen, ntohl, ntohs, recv, recvfrom, select, send, sendto, setsockopt, shutdown, socket
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Dec 20, 2024 19:22:18.957201004 CET49701443192.168.2.798.85.100.80
                                                      Dec 20, 2024 19:22:18.957269907 CET4434970198.85.100.80192.168.2.7
                                                      Dec 20, 2024 19:22:18.957353115 CET49701443192.168.2.798.85.100.80
                                                      Dec 20, 2024 19:22:18.960345030 CET49701443192.168.2.798.85.100.80
                                                      Dec 20, 2024 19:22:18.960367918 CET4434970198.85.100.80192.168.2.7
                                                      Dec 20, 2024 19:22:20.702600956 CET4434970198.85.100.80192.168.2.7
                                                      Dec 20, 2024 19:22:20.705578089 CET49701443192.168.2.798.85.100.80
                                                      Dec 20, 2024 19:22:20.705609083 CET4434970198.85.100.80192.168.2.7
                                                      Dec 20, 2024 19:22:20.707108974 CET4434970198.85.100.80192.168.2.7
                                                      Dec 20, 2024 19:22:20.707191944 CET49701443192.168.2.798.85.100.80
                                                      Dec 20, 2024 19:22:20.754007101 CET49701443192.168.2.798.85.100.80
                                                      Dec 20, 2024 19:22:20.754195929 CET49701443192.168.2.798.85.100.80
                                                      Dec 20, 2024 19:22:20.754539013 CET4434970198.85.100.80192.168.2.7
                                                      Dec 20, 2024 19:22:20.803509951 CET49701443192.168.2.798.85.100.80
                                                      Dec 20, 2024 19:22:20.803553104 CET4434970198.85.100.80192.168.2.7
                                                      Dec 20, 2024 19:22:20.852282047 CET49701443192.168.2.798.85.100.80
                                                      Dec 20, 2024 19:22:21.464270115 CET4434970198.85.100.80192.168.2.7
                                                      Dec 20, 2024 19:22:21.464390039 CET4434970198.85.100.80192.168.2.7
                                                      Dec 20, 2024 19:22:21.464520931 CET49701443192.168.2.798.85.100.80
                                                      Dec 20, 2024 19:22:21.465939045 CET49701443192.168.2.798.85.100.80
                                                      Dec 20, 2024 19:22:21.465961933 CET4434970198.85.100.80192.168.2.7
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Dec 20, 2024 19:22:18.818094015 CET6401153192.168.2.71.1.1.1
                                                      Dec 20, 2024 19:22:18.818196058 CET6401153192.168.2.71.1.1.1
                                                      Dec 20, 2024 19:22:18.955976963 CET53640111.1.1.1192.168.2.7
                                                      Dec 20, 2024 19:22:18.956006050 CET53640111.1.1.1192.168.2.7
                                                      Dec 20, 2024 19:22:21.788666964 CET5802653192.168.2.71.1.1.1
                                                      Dec 20, 2024 19:22:21.788991928 CET5802653192.168.2.71.1.1.1
                                                      Dec 20, 2024 19:22:21.927551031 CET53580261.1.1.1192.168.2.7
                                                      Dec 20, 2024 19:22:21.930495977 CET53580261.1.1.1192.168.2.7
                                                      Dec 20, 2024 19:22:22.050260067 CET6317353192.168.2.71.1.1.1
                                                      Dec 20, 2024 19:22:22.050487041 CET6317353192.168.2.71.1.1.1
                                                      Dec 20, 2024 19:22:22.187427044 CET53631731.1.1.1192.168.2.7
                                                      Dec 20, 2024 19:22:22.188213110 CET53631731.1.1.1192.168.2.7
                                                      Dec 20, 2024 19:22:22.297065020 CET6317453192.168.2.71.1.1.1
                                                      Dec 20, 2024 19:22:22.297108889 CET6317453192.168.2.71.1.1.1
                                                      Dec 20, 2024 19:22:22.434087038 CET53631741.1.1.1192.168.2.7
                                                      Dec 20, 2024 19:22:22.434571981 CET53631741.1.1.1192.168.2.7
                                                      Dec 20, 2024 19:22:22.547135115 CET6317553192.168.2.71.1.1.1
                                                      Dec 20, 2024 19:22:22.547183037 CET6317553192.168.2.71.1.1.1
                                                      Dec 20, 2024 19:22:22.685813904 CET53631751.1.1.1192.168.2.7
                                                      Dec 20, 2024 19:22:22.685940027 CET53631751.1.1.1192.168.2.7
                                                      Dec 20, 2024 19:22:22.797512054 CET6317653192.168.2.71.1.1.1
                                                      Dec 20, 2024 19:22:22.797560930 CET6317653192.168.2.71.1.1.1
                                                      Dec 20, 2024 19:22:22.934973955 CET53631761.1.1.1192.168.2.7
                                                      Dec 20, 2024 19:22:22.934992075 CET53631761.1.1.1192.168.2.7
                                                      Dec 20, 2024 19:22:23.046468973 CET6317753192.168.2.71.1.1.1
                                                      Dec 20, 2024 19:22:23.046580076 CET6317753192.168.2.71.1.1.1
                                                      Dec 20, 2024 19:22:23.192181110 CET53631771.1.1.1192.168.2.7
                                                      Dec 20, 2024 19:22:23.194888115 CET53631771.1.1.1192.168.2.7
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Dec 20, 2024 19:22:18.818094015 CET192.168.2.71.1.1.10x6ae9Standard query (0)httpbin.orgA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:22:18.818196058 CET192.168.2.71.1.1.10xd55cStandard query (0)httpbin.org28IN (0x0001)false
                                                      Dec 20, 2024 19:22:21.788666964 CET192.168.2.71.1.1.10x2e31Standard query (0)home.sevkx17vs.topA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:22:21.788991928 CET192.168.2.71.1.1.10xf6dcStandard query (0)home.sevkx17vs.top28IN (0x0001)false
                                                      Dec 20, 2024 19:22:22.050260067 CET192.168.2.71.1.1.10xa00Standard query (0)home.sevkx17vs.topA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:22:22.050487041 CET192.168.2.71.1.1.10x376bStandard query (0)home.sevkx17vs.top28IN (0x0001)false
                                                      Dec 20, 2024 19:22:22.297065020 CET192.168.2.71.1.1.10x6614Standard query (0)home.sevkx17vs.topA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:22:22.297108889 CET192.168.2.71.1.1.10x1632Standard query (0)home.sevkx17vs.top28IN (0x0001)false
                                                      Dec 20, 2024 19:22:22.547135115 CET192.168.2.71.1.1.10xf13cStandard query (0)home.sevkx17vs.topA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:22:22.547183037 CET192.168.2.71.1.1.10xf0e3Standard query (0)home.sevkx17vs.top28IN (0x0001)false
                                                      Dec 20, 2024 19:22:22.797512054 CET192.168.2.71.1.1.10x6779Standard query (0)home.sevkx17vs.topA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:22:22.797560930 CET192.168.2.71.1.1.10x46dcStandard query (0)home.sevkx17vs.top28IN (0x0001)false
                                                      Dec 20, 2024 19:22:23.046468973 CET192.168.2.71.1.1.10x6851Standard query (0)home.sevkx17vs.topA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:22:23.046580076 CET192.168.2.71.1.1.10x55edStandard query (0)home.sevkx17vs.top28IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Dec 20, 2024 19:22:18.955976963 CET1.1.1.1192.168.2.70x6ae9No error (0)httpbin.org98.85.100.80A (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:22:18.955976963 CET1.1.1.1192.168.2.70x6ae9No error (0)httpbin.org34.226.108.155A (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:22:21.927551031 CET1.1.1.1192.168.2.70x2e31Name error (3)home.sevkx17vs.topnonenoneA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:22:21.930495977 CET1.1.1.1192.168.2.70xf6dcName error (3)home.sevkx17vs.topnonenone28IN (0x0001)false
                                                      Dec 20, 2024 19:22:22.187427044 CET1.1.1.1192.168.2.70xa00Name error (3)home.sevkx17vs.topnonenoneA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:22:22.188213110 CET1.1.1.1192.168.2.70x376bName error (3)home.sevkx17vs.topnonenone28IN (0x0001)false
                                                      Dec 20, 2024 19:22:22.434087038 CET1.1.1.1192.168.2.70x1632Name error (3)home.sevkx17vs.topnonenone28IN (0x0001)false
                                                      Dec 20, 2024 19:22:22.434571981 CET1.1.1.1192.168.2.70x6614Name error (3)home.sevkx17vs.topnonenoneA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:22:22.685813904 CET1.1.1.1192.168.2.70xf13cName error (3)home.sevkx17vs.topnonenoneA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:22:22.685940027 CET1.1.1.1192.168.2.70xf0e3Name error (3)home.sevkx17vs.topnonenone28IN (0x0001)false
                                                      Dec 20, 2024 19:22:22.934973955 CET1.1.1.1192.168.2.70x6779Name error (3)home.sevkx17vs.topnonenoneA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:22:22.934992075 CET1.1.1.1192.168.2.70x46dcName error (3)home.sevkx17vs.topnonenone28IN (0x0001)false
                                                      Dec 20, 2024 19:22:23.192181110 CET1.1.1.1192.168.2.70x55edName error (3)home.sevkx17vs.topnonenone28IN (0x0001)false
                                                      Dec 20, 2024 19:22:23.194888115 CET1.1.1.1192.168.2.70x6851Name error (3)home.sevkx17vs.topnonenoneA (IP address)IN (0x0001)false
                                                      • httpbin.org
                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.74970198.85.100.804433216C:\Users\user\Desktop\Set-up.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-12-20 18:22:20 UTC52OUTGET /ip HTTP/1.1
                                                      Host: httpbin.org
                                                      Accept: */*
                                                      2024-12-20 18:22:21 UTC224INHTTP/1.1 200 OK
                                                      Date: Fri, 20 Dec 2024 18:22:21 GMT
                                                      Content-Type: application/json
                                                      Content-Length: 31
                                                      Connection: close
                                                      Server: gunicorn/19.9.0
                                                      Access-Control-Allow-Origin: *
                                                      Access-Control-Allow-Credentials: true
                                                      2024-12-20 18:22:21 UTC31INData Raw: 7b 0a 20 20 22 6f 72 69 67 69 6e 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 0a 7d 0a
                                                      Data Ascii: { "origin": "8.46.123.189"}


                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:4
                                                      Start time:13:22:17
                                                      Start date:20/12/2024
                                                      Path:C:\Users\user\Desktop\Set-up.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\Set-up.exe"
                                                      Imagebase:0x80000
                                                      File size:8'020'992 bytes
                                                      MD5 hash:0A711206F96133C8D28CD99B5910D705
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:9
                                                      Start time:13:22:22
                                                      Start date:20/12/2024
                                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 920
                                                      Imagebase:0x680000
                                                      File size:483'680 bytes
                                                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      No disassembly