Windows
Analysis Report
PlasmaSetup@LR_2.exe
Overview
General Information
Detection
Score: | 25 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 0% |
Signatures
Classification
- System is w10x64_ra
- PlasmaSetup@LR_2.exe (PID: 7028 cmdline:
"C:\Users\ user\Deskt op\PlasmaS etup@LR_2. exe" MD5: 3443898E0B0BD2A27C1BCEBFE41B702E)
- pbrowser.exe (PID: 6488 cmdline:
"C:\Plasma \pbrowser. exe" MD5: 0FFB6543E6E60C895920EFD6BB947630)
- pmanager.exe (PID: 4856 cmdline:
"C:\Plasma \pmanager. exe" MD5: 577686D8E6EDA9E05504BDD0A2E12BE7) - WerFault.exe (PID: 5564 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 4 856 -s 648 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- pmanager.exe (PID: 5076 cmdline:
"C:\Plasma \pmanager. exe" MD5: 577686D8E6EDA9E05504BDD0A2E12BE7) - WerFault.exe (PID: 5552 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 5 076 -s 624 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- pbrowser.exe (PID: 6004 cmdline:
"C:\Plasma \pbrowser. exe" MD5: 0FFB6543E6E60C895920EFD6BB947630)
- pmanager.exe (PID: 3916 cmdline:
"C:\Plasma \pmanager. exe" MD5: 577686D8E6EDA9E05504BDD0A2E12BE7) - WerFault.exe (PID: 1820 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 3 916 -s 620 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security | ||
JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security |
Click to jump to signature section
AV Detection |
---|
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: |
Source: | Process created: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | File created: |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: |
Source: | File source: | ||
Source: | File source: |
Source: | Static PE information: |
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: |
Source: | File read: |
Source: | Key opened: |
Source: | File read: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: |
Source: | Key value queried: |
Source: | File written: |
Source: | Window found: |
Source: | Window detected: |
Source: | Static file information: |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: |
Source: | Window / User API: | ||
Source: | Window / User API: | ||
Source: | Window / User API: |
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | Thread sleep count: | ||
Source: | Thread sleep count: | ||
Source: | Thread sleep count: | ||
Source: | Thread sleep count: | ||
Source: | Thread sleep count: | ||
Source: | Thread sleep count: |
Source: | File opened: |
Source: | File Volume queried: | ||
Source: | File Volume queried: |
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: |
Source: | Process queried: | ||
Source: | Process queried: | ||
Source: | Process queried: |
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 1 Process Injection | 1 Masquerading | OS Credential Dumping | 2 Security Software Discovery | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 Registry Run Keys / Startup Folder | 1 DLL Side-Loading | 3 Virtualization/Sandbox Evasion | LSASS Memory | 3 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 Registry Run Keys / Startup Folder | 1 Process Injection | Security Account Manager | 1 Application Window Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | 3 File and Directory Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | 22 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs | |||
0% | Virustotal | Browse | ||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
7% | ReversingLabs | |||
5% | Virustotal | Browse | ||
0% | ReversingLabs | |||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
52.182.143.212 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
20.189.173.21 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1579303 |
Start date and time: | 2024-12-21 14:26:42 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 30 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Sample name: | PlasmaSetup@LR_2.exe |
Detection: | SUS |
Classification: | sus25.winEXE@9/46@0/11 |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 52.182.143.212
- Excluded domains from analysis (whitelisted): fs.microsoft.com, ctldl.windowsupdate.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: C:\Plasma\pmanager.exe
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2691072 |
Entropy (8bit): | 2.5236960767869427 |
Encrypted: | false |
SSDEEP: | |
MD5: | E172FCCDBD2AE7137ECFC6ED8C0DC163 |
SHA1: | DAB22F8226C56ECDC3CC9E13E422C7399643A02C |
SHA-256: | 625BF3AD5AB727E9918C812FC2E1E79408A11946DF931EE100747AF91DB7BA77 |
SHA-512: | 885350E0E246EFDA677FD38D80A4CB5E60E948CDC58FC154FA82038FDFE82428A6CF50E6214C94AD0783DCB7DB1E261F8D00529814AC459E8A925C99E2AEDFB5 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6417 |
Entropy (8bit): | 5.880322326496533 |
Encrypted: | false |
SSDEEP: | |
MD5: | D534FCE9736A58549E4850BDFB8CA316 |
SHA1: | AD9601900E9D2C99435A5137FF02E70F32BB6C72 |
SHA-256: | 551B9941F1E1B39DC81F5C20BB7602237862DC026643AD0F09848CA73BF24427 |
SHA-512: | EEAEFBDD347B6F09E80B9BB9EDA154D2D6AF94589753086DA742FD6EE64A215C8D1EEC89884F62C4124AC327100E422C92218B94D9F07DF751E83B719769F93C |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6879 |
Entropy (8bit): | 5.3570613078483715 |
Encrypted: | false |
SSDEEP: | |
MD5: | 0E1234A7EA37A7881C8F9148DABD45C6 |
SHA1: | E5F53E1184BFDE14CC4B21169783738B1BD7D0D1 |
SHA-256: | 6A634AEA1156345CC401C5AFAAB1E5907B158DA76ED85B0031078567EC1E93FC |
SHA-512: | 0B421135F0E0E6AA19433B093DEECEFEF9BE537DE08B901193BDABE83BD6E998A9750465E04A0C4D291CA32D214FD6D74B22E0DA60BCE75C27BDE4BC5854154B |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 757 |
Entropy (8bit): | 5.058778046111236 |
Encrypted: | false |
SSDEEP: | |
MD5: | A33EB4D5FE1F920301C55E6085EDBE4D |
SHA1: | 5E74F825B40B4F7B22897BBE5EDC3AF04DF95486 |
SHA-256: | 8728F982D19B6B4217272C96603C252F8276E7EABC0F3C876EF178FC8B6E3C34 |
SHA-512: | 9261FDEFBB64EA7E5D30CB7C1B7B3DCDDBC841161B1E1EBB2890F1A21EB8F58412503D573D0FC99FCA47134B3A8869FF7874D44E47232A911ED0FE2C3D1F5E14 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 5564 |
Entropy (8bit): | 3.0942332331108044 |
Encrypted: | false |
SSDEEP: | |
MD5: | 9A9F5FAD1FB0C573AEA5E9EE1A2ADBAC |
SHA1: | EAE61C5FFAEC94DC2659C6B428BFE56D87B24DD0 |
SHA-256: | 3EDB79A4A683A68E11179D8DFDC73C917122BF9AD6C2D4656805F7C61AA4E450 |
SHA-512: | 457B00BA14000CCD3B168B1B22074EEB984510E1B4A3D3E9456BD262A79DDAC84A4465EA97366B30230C87A5D130BFE7CE4DC72519C86DB8E4EFC2F355FF75C8 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 46 |
Entropy (8bit): | 4.447262499441209 |
Encrypted: | false |
SSDEEP: | |
MD5: | FC29AF24D943C5310D45F20385D325A6 |
SHA1: | 79BAE63BF7961BB23F1608129AEC7A54683F4C89 |
SHA-256: | 355B52961A7EA01A691FCE3ED033EC8C6ECCBE41C728500320FA464A3E86A527 |
SHA-512: | 552971F6EC861DB322B9C70BB669F12186327DEB7D30C81F64BB7054830A6BEAA0665267238FBFE4590F45DF0F63765BFCC5429929F08BECECE14DA8F5937C56 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 7151 |
Entropy (8bit): | 5.540409986482806 |
Encrypted: | false |
SSDEEP: | |
MD5: | BBEBA1EEDDCE8E8FA541EBC0D4A6345B |
SHA1: | 97006D0E0BFD23D09DE9C37207E9CC6FF800D16E |
SHA-256: | 669778D94CE77B919285DB7DB43B5498782E4C8E949BB758D3786750A4714317 |
SHA-512: | B390572CE3630BC73F16A6FAC4E527CD9A05808734731E89E12DD1682019CE1B48967598F0A020903D8D2767A63B251787E1502999CAD3A96636786CB2187D8C |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 742 |
Entropy (8bit): | 5.222374336592148 |
Encrypted: | false |
SSDEEP: | |
MD5: | 43DC7F1E23E9E63573CEE3D965FDC56B |
SHA1: | 3B02C56C5D1CE373B8CA66FCBE40EBDA1A89B090 |
SHA-256: | C3C4818F3C8BF7FA0B95047BBA6353EB742610293EE08931CF3676885E85C251 |
SHA-512: | 6AB7D32088A4E080A44ED34B46A96EFDF79EAF480DAFC460F0F98783E1633A2A037268735A9B59EC0E123B841A38EC58D2B87FB24F357B8E5537714E61DDD0C6 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 7133 |
Entropy (8bit): | 6.059987175339898 |
Encrypted: | false |
SSDEEP: | |
MD5: | 3CE6FC79ABF71199E374C43E6357C7CE |
SHA1: | DBAA15260E6F9A6AB92FEF9863BE9CF4EADA5696 |
SHA-256: | 6BD1483B23EB3B7446B1BABC3B0C7CEA3990072B23CB73326CA6CAD5C638ACF0 |
SHA-512: | D68F82181B060BCEEB17E36E75E51631BF14922CB9BEBC24BC3BCD75E581EBCDA6403BDD070E2DEF51CBB4579EF863B8EFAE4028FBA8D3A77570318A54D8A199 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 733 |
Entropy (8bit): | 5.563450964599332 |
Encrypted: | false |
SSDEEP: | |
MD5: | 5C7CDF2091389247FCE1FF3A048F6E26 |
SHA1: | CE247D56F02805E15540A8378AD1208942CABED9 |
SHA-256: | 9788C1FCA6ECEC810EB50C90CE425648870D604EC8F61F6E199B3321D1F85606 |
SHA-512: | BCCCBFDC5B1E7404F7342A35D159646709D29773E6F7201B63E8549E73E7BCBADE2B82BDA69D942A30A018E888022775A791ABFF0C3F522B1E6355C71C7AADCC |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 349696 |
Entropy (8bit): | 7.889860562202818 |
Encrypted: | false |
SSDEEP: | |
MD5: | 1DBE55284443373424CDACDFE05743D6 |
SHA1: | 86CE06DFB160EDE7637052B5A98218BBCF7C774F |
SHA-256: | 68581C13221CF66A403D205D73E1B8D0484826B1BA7C56E1B5788052FBB6205E |
SHA-512: | BC39EDA19CA0309685F3315C2AA5B8D159F59E5E520FF09B95DB6A8B178ADD8B8B3EE35FC93DEF90806D944E41DBDE9BC2A082BA314EEFDF7BC72F2647977084 |
Malicious: | true |
Antivirus: |
|
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 755 |
Entropy (8bit): | 5.638874228476603 |
Encrypted: | false |
SSDEEP: | |
MD5: | 8CF8283B22DEC5FBB208CE7956229BD7 |
SHA1: | AAEE9C841A5015505224CF176252C73427017DA1 |
SHA-256: | 2DE3473101F2581EEB2954BA3370DF5680D11C165E4DD6C00EA42D8C9D149AB4 |
SHA-512: | 51D4E3EAE346C05E8EE51CCC886A4C1A6F8A91DD264A0B60A709B13E223179B747BE8D052BD1128E1C8FCA183BD21183A009B70EC739EBAE7D3792AF59DC95AD |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 822 |
Entropy (8bit): | 5.570684659130369 |
Encrypted: | false |
SSDEEP: | |
MD5: | 28A877653797AD125534DFE741D63D01 |
SHA1: | 952458208ABC20C587B2FDAB964A4790BE0529D3 |
SHA-256: | D8862B48DAA870A825DC051E58C4A643DFBEAF671F57CE70C3955C90024DEF4F |
SHA-512: | 9CD7C860D063471C2F25109624BBFF328AE41FCB8C8A0761C52207B69B322C5D2B146328A6C004D585880B4B6B87804951A7B2868E14F8B6EFCB1AEB0DB194F7 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 572 |
Entropy (8bit): | 5.163277985600022 |
Encrypted: | false |
SSDEEP: | |
MD5: | B2F07009CD2DE818857AA08A7E2C938F |
SHA1: | F851986606807B559D4405FA172DE892F8BD63CB |
SHA-256: | A1AF951605377D9ECCB3056B6491B0907A56669C55C339ABBEBFEF11AAF6E5FB |
SHA-512: | E09CC04D86DB5B9931448B42684FE3172DCEBBBE479EF35E555E8FA161F73777C5DADFA7105B738A149B720AF3D131C454B0B6350AC6AA5E48A35A53B2F090C8 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 739 |
Entropy (8bit): | 5.4110535983438695 |
Encrypted: | false |
SSDEEP: | |
MD5: | F00DA3892F8B9742D99EAC1C70158430 |
SHA1: | 72BE1A8A42BA878BD1C16BD1A17C1A8CF448065E |
SHA-256: | 103E7E284CFAC2CF7AA291C29C91522F7D16379CA5C119C6B03BE5083402601A |
SHA-512: | 9670192174B1F55686A0949639BD24700E32029D70F2DDF9698AA3AB49F0411287AADB43D62D75CFB45B051BF06452BB1A49BE0A57EA2DABA90A2CF359AFA6B0 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 571 |
Entropy (8bit): | 5.398277713799248 |
Encrypted: | false |
SSDEEP: | |
MD5: | 67D86D099C83137CBC23AC9C17535D73 |
SHA1: | F6915DD33D71B5E28A3BC764B98424F0CC6BD2E1 |
SHA-256: | D64B555B14182CD54AF01D955D3C68B7A453953EC78252C380E1E9B9A92B0579 |
SHA-512: | 9B902CF3319BC955451EC7E4AFFA9E09E644BD6B8ABFD6FD69413A0F52A19E70A69C5BE6D8CA7F01A2806444E99DC7EEA2A3658F204CF34067A588188CEABD23 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 713 |
Entropy (8bit): | 5.426060333101416 |
Encrypted: | false |
SSDEEP: | |
MD5: | 6C06D40B6EC4FD517AC2E36965429007 |
SHA1: | 56EA2FA79765F895AE5CC48091EA0498BB434A73 |
SHA-256: | 859418D6AE870AE963703733B4A0B65EE4EBC2C1204213675F95CD4C5CB5C5BF |
SHA-512: | D2506FDB39A5CA586BC1C72D5A7E1F243C194733E04F9ED265DA1ADAAE24F49CEBFB4280E1BB863C3DB0A2EE36732271E0C33C6D845786ABADC75345690879A8 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 451 |
Entropy (8bit): | 5.2186599537103096 |
Encrypted: | false |
SSDEEP: | |
MD5: | FE876A19B96F046C4CB009D677B288A8 |
SHA1: | D05A509569DC2D2D99905E81C4073448E491843F |
SHA-256: | 57AB2AE2C711A7FFABC6D01806EA21A228A00FB7629816FFBA0A69ECB97FE875 |
SHA-512: | EDF89E7E2B817DC65DBC0208E70DD9FF7A832523BA4DEC6D2B70B2B5BDFC0D27C177C347255B0413799DB4C9795C979D665DC15092AC764100EB1792129028D1 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Plasma\pbrowser.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 35 |
Entropy (8bit): | 4.185867302411998 |
Encrypted: | false |
SSDEEP: | |
MD5: | AD37BA1B24D45F617F2CEA42F6475140 |
SHA1: | 7D18AE15779B4E7EC0422316A09B0C08B5A5962A |
SHA-256: | 9F005EDAF5E4EDA2C2C0E4F028219A12AFD30D7C13F163BC730B48FA7DC707FC |
SHA-512: | E9E5906FAE179CE5255C817B31325C55289CD8A89F0E91565A96CE9879A7963E68E529032DD02BE6AACAE1C0E558E90A42820144E605E4E72FE664B6DC81CC4F |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 551936 |
Entropy (8bit): | 7.902328491086365 |
Encrypted: | false |
SSDEEP: | |
MD5: | 0FFB6543E6E60C895920EFD6BB947630 |
SHA1: | 6D4EBD4954023F1EA69D10C22030179E710BDEC5 |
SHA-256: | F86EA20D2063B492544C73A9FE6DE0A8271EE4C292125D9CA9642FD6F70A77C4 |
SHA-512: | 1D715D1F05FB04FE6F3D474682D71955E37217055E3FB613E2D4050F6998386DECC399C7962A14DA1D2EBCB3CB61682D00C542A76C185EF06F2106D2B3DEB035 |
Malicious: | true |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 647168 |
Entropy (8bit): | 7.90042787345556 |
Encrypted: | false |
SSDEEP: | |
MD5: | 577686D8E6EDA9E05504BDD0A2E12BE7 |
SHA1: | 1B6297F85D5B1BE66763CF7C500722567E476BAD |
SHA-256: | CCC528548CF832C745701474EDA4C355815A05484EF96EFF630751451D1CC43D |
SHA-512: | 771C40D8C4D51F7D0456C893C92329F715F8B46B8BEA04FDC323192CB5D0798376893B323623AB04BA1F4865891B825E8D29075838104A6BB94F283FEFE44B82 |
Malicious: | true |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 183808 |
Entropy (8bit): | 7.890078496563441 |
Encrypted: | false |
SSDEEP: | |
MD5: | 0E8CC8043E564DCD1C3E101969DAAC69 |
SHA1: | 2382A93AC0E30CBB30199128AA51C7FE56D6AF43 |
SHA-256: | 50264F34F96540084F166A97199E726B203C11476E908F4D74D0458445E8B611 |
SHA-512: | 2C7862F97D8AE6481C3396FC2E0F11129D13742F7B1C1DEDA781FB5094D66744543F0509E599C10BBE6EA19D270250A73273C7D966C8890B4A1FEDA2B4FB6CAD |
Malicious: | true |
Antivirus: |
|
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 54755 |
Entropy (8bit): | 6.648903312012475 |
Encrypted: | false |
SSDEEP: | |
MD5: | CACF354184D563CCBABAC0EE6BA7F396 |
SHA1: | A3FC140B51B5061FBBAE406C23EA860E4969A7D9 |
SHA-256: | B76549696E8D925594E0802B697ABA7E8C5CD15D3940A30CAA572F6629B6AE9A |
SHA-512: | AB64548287002A0B6E9A94C92C9F7C23372068D3467CEDFB6EE0189AA8EB4B83DB1D47D93F133DC72B5837FAEEE6E508BAE4B5938AD5644C93BDE522BB3BCF05 |
Malicious: | true |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 584 |
Entropy (8bit): | 4.26168795897989 |
Encrypted: | false |
SSDEEP: | |
MD5: | 8B924E5590FCC395A818CF360783C666 |
SHA1: | F1B223FC951C84BDA48791C460AD9374E9F22BF5 |
SHA-256: | D39F1C40ABB042EDE08E307176EF905C749BA1FEA99C97FE091EE487D6DF6FA9 |
SHA-512: | E0857AEDBA90CBC74CAD959AF39E442444B3DA9F9D2087D92B0FD0FF5DB7F5AC40EFE9FE2A7D0355AB39048D4C24CD77438BCD91ABC7F45838BF20F39B468B7E |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_pmanager.exe_8fbfe26353771c42d2099f513f03c31e2638e2_78c312fa_105b4730-6843-4b6e-ac83-c949d0250b84\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.8308802266007018 |
Encrypted: | false |
SSDEEP: | |
MD5: | 99D223C28A8EDEEB4E2664AEE795924B |
SHA1: | D8CFBFD918D79D0D1B6E5778401CAB68E1859D7A |
SHA-256: | 20D38DC9288FD4892B4578561ED9E36E2299C2FEDEDE7B55AAA20E872909F7D3 |
SHA-512: | 05BEF7F282A04ACC4FB8437F44A7FF576EA8C83D9639E851C42C536775FF7550FFC2BD5B36711B715BA46D24C06184ADE8A5758EA619EEF5DAB27263BFCA3808 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_pmanager.exe_8fbfe26353771c42d2099f513f03c31e2638e2_78c312fa_15d6b9e6-acb0-424a-ac38-5fdc254995e6\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.8242898852883839 |
Encrypted: | false |
SSDEEP: | |
MD5: | 1102822F809142499913FAEE68B44095 |
SHA1: | 387338419FC75E69BD6EA966D4EA9F2A28FD28AC |
SHA-256: | 4933469A8C47B0D9254CB72CE12DC0BD4C558BF111F3D1CD16168456C21E8AF8 |
SHA-512: | ED2AD2F01DFF073BBF8F755C3498669D97CCADDF69976F61D95E4A742FDB74278DF127069E1941342E77BAD62851D3EE008709B2C7E24781B6A5FF074203B724 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_pmanager.exe_8fbfe26353771c42d2099f513f03c31e2638e2_78c312fa_c2afb5d5-c6fd-4afc-b662-586a033862a7\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.8242457482071189 |
Encrypted: | false |
SSDEEP: | |
MD5: | FD0480ADE0B78837663EF73D9BFB5ADE |
SHA1: | 941594E346A42EE1C03C98AEEBC716AA36EB272B |
SHA-256: | 241E45FC14279062F8C504CC8D2DD830483574039FA23966A5E8DCEE446E9028 |
SHA-512: | 56227D56A96A2BC8EDB933580E1CA0C395F476F832C06BE646F06E5E25065D08FFD3A64BC8BF36358B20202044090D6760032930544106F7F4AFC75C621B562C |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 51450 |
Entropy (8bit): | 2.012621643788533 |
Encrypted: | false |
SSDEEP: | |
MD5: | B82D3368558420699FB6BC0135915241 |
SHA1: | AAE24DA4E1094C9F963525D0153BF7200C33A853 |
SHA-256: | F55736D8B8DBAF48E899215DC2E21BE3B13D721D9E734660E8A90A871C448CF4 |
SHA-512: | 34AE916CA444A2D54F50176E6F70D5CACECB23EB179C89B8B3FD44D9D58DC7BF3C46ADE891E4897D883898071B94203DF99691AB430E21E3DF13020120560391 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8306 |
Entropy (8bit): | 3.6932881701567353 |
Encrypted: | false |
SSDEEP: | |
MD5: | A97E41A8C2737D4A79B8E6BF13765AFC |
SHA1: | 01C2A027FD32282B1D5A3D4CA2690A93DBA12003 |
SHA-256: | 34417CC3C58E748855A45BEA183625AD14D6A54D69C5ECEC8B3298C3E1A9A739 |
SHA-512: | B4DD96C3244BE0BF0357B52F44ED0A8044A9147FD9BBC9578A7C8A6B8325CE0B1C60FF32E37700F848DD3D0D836FAC09F1C4412647048B69F235B8C833E0E991 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4585 |
Entropy (8bit): | 4.45291914842677 |
Encrypted: | false |
SSDEEP: | |
MD5: | EE31E16D1203354331D6594E939EDEC2 |
SHA1: | B1EC47E5FA96339C3F336C68FF70E587CC0ED56A |
SHA-256: | 100A3C2FB9B4E4CC110B1423EF245E8805737C2DB506C71F32D070AC221EA1CB |
SHA-512: | 58408F78FED56406198A51F07E36B194910B69D4DFAED6CDBE310914156D04D86B4BB4F9B1756FAB28A0C9BEC4757CE8C749FA860E178B419275F45406CCDD74 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 51362 |
Entropy (8bit): | 2.003353822741746 |
Encrypted: | false |
SSDEEP: | |
MD5: | 22041767487AC81618362A019FF581BF |
SHA1: | F74E1D721C30317749BB6B151CBEC1BC3BECD945 |
SHA-256: | 70E0BDBD908D2626A4FFA618E390CB55323DD2172ACAFBFDCCF3FFC2D98AD93A |
SHA-512: | 981DD71ADD3B4CB244C40E70838E4BE94EFF84F89B45055A3EE49A63E285CAAB41D5877AFEEF53165985BACB4B1900B3D12527D0BF2012306B2E270FD397FF37 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8310 |
Entropy (8bit): | 3.6926277561563774 |
Encrypted: | false |
SSDEEP: | |
MD5: | 7B654EB0837462817FB123F7DCB296B8 |
SHA1: | 667DB14EAC97B7250EC30D0DD9DCA750E71E257E |
SHA-256: | 80E36FECD1C5FD51F51C0605EB0AFE7776CF0D17631A2A9178C9D039D9A227F5 |
SHA-512: | AF8FF002D57D0764643860DD73CF44B3D696FF7E847D82FEC780B7467EA54DE6773C204BB391D43CB8F4E45ED62988560E57A360697A0AB41E93BB7745F34302 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4585 |
Entropy (8bit): | 4.452801253856559 |
Encrypted: | false |
SSDEEP: | |
MD5: | A878535ABFE887190C06B733FCC5ACD5 |
SHA1: | 24630B3A0E7C3A637142A61FD69F6058F6E8753E |
SHA-256: | D73334945A4CC54D0CDFECB70F54ED13C20D836C2A01315CED622211D4593A0A |
SHA-512: | 5A696E1EB5441D88A3ACBFAC42841F3111D694B2019B63B54BCFDB844789A37CF265071802CA8AA6EBA6AA91816EF345FAB70050607C1B65747135172E3A37AD |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 51778 |
Entropy (8bit): | 2.005155544649473 |
Encrypted: | false |
SSDEEP: | |
MD5: | AE9F837013F7ED9DB7EA7FC73BE73641 |
SHA1: | C025E48AF179C5A5C3A4D65DC1502A658E531AE6 |
SHA-256: | 4203840D01D1888665A5CADC3E0461D83A3EA477CECD8990ABC97BCF76A67167 |
SHA-512: | D4C4D52EE261BEF9C131531A45C7E91051996467913EEB1F6E0D253BD74C735CDFE51E23444E10411C9E1FF4CF0D1E09E19C8BC9B0D725F8CE0DEC66DFF81940 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8306 |
Entropy (8bit): | 3.693619131953418 |
Encrypted: | false |
SSDEEP: | |
MD5: | B4DF0D3903C731E85799AE1B02DB2C97 |
SHA1: | 732E120199CC853DF41BDDE35D6C805370E427D9 |
SHA-256: | 88482A7CD7D2B1AE3F152318D236DDB0236C90C216E57723E4F4009895731E2C |
SHA-512: | 849E0F65E80CF27933B6072E6E53782EFB859880C8061F50005CE3F635B44B95449D8A958795A34EB4456A4D645DCA0BDA7A0AA1E9FE03C4BAF2BD57328ECB62 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4585 |
Entropy (8bit): | 4.4512488322320625 |
Encrypted: | false |
SSDEEP: | |
MD5: | 42E7F51A07270A890632B980B82D9B29 |
SHA1: | BE58D8BCE13D96769E860D9D0933908309111035 |
SHA-256: | 7B7A8914CC98717A27B2E2831656A43BADF217A4DB17F3F19E1C31D09A783B77 |
SHA-512: | 109555E62344B4D3960DCAD5B9BC725C494C5E71F1BE8C5AF7A669A5AD6319E502F12C8C56FF875AFB533F6D7503A8825C9187436539D9CF756BD148369CBDD1 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 14336 |
Entropy (8bit): | 5.670858881405612 |
Encrypted: | false |
SSDEEP: | |
MD5: | F62D03FCB1473110E920A9BB2C701006 |
SHA1: | C48444EF2DAA60DCDF91F1645CD4ECD8E66545F7 |
SHA-256: | 17E2F205AF12D5A86638DC83C95FC69199C41AF2FA6DAEB1E91EC330F68C5372 |
SHA-512: | 701D531D405D08054D53298141D5BBD56E74DF7B22BCEA5F9F0E5C4407421EA0CA9617AA84E740DC1DC44E6D14E58852C1CA2087213CC2319F2DA44EAED0BC05 |
Malicious: | true |
Antivirus: |
|
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 5120 |
Entropy (8bit): | 4.0496414745318905 |
Encrypted: | false |
SSDEEP: | |
MD5: | C9AC0758CE8C10793D39655064C653CB |
SHA1: | 8BA1F9DFCC671B5102F5940DA67570C28252BC71 |
SHA-256: | 161D69C50E5C50D853FDA129B6F6F6BC241214B87D13A33BF93543E7E6886119 |
SHA-512: | 54A8C2DED9A42DE867C8A89A11701BCDB5D51AEA168C4F3FFE8991859CF26F15D478B6111C85732C1059EDBFD9408E42CA830706347A8AC87C5064E47D823349 |
Malicious: | true |
Antivirus: |
|
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | modified |
Size (bytes): | 549 |
Entropy (8bit): | 5.365896363256505 |
Encrypted: | false |
SSDEEP: | |
MD5: | 6BC3A03A4D2B934F8DF9B89AAD1F297D |
SHA1: | 2E907F8AB59FCC91D556D455C3F0DD88B1F64FA1 |
SHA-256: | BA10F15EE6D2C6939ABAD00D029EDCD8C75E0A409B70F518190F51974300873A |
SHA-512: | F48D25EC9DCDD2B0D555901F2BAA52C535557A8B88B2D285D3B4C41B4E62311E08BF37A42EB623BC31EAA210B2BD6E477912E19D12AB0169AA20DE39C49907EE |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 26494 |
Entropy (8bit): | 1.9568109962493656 |
Encrypted: | false |
SSDEEP: | |
MD5: | CBE40FD2B1EC96DAEDC65DA172D90022 |
SHA1: | 366C216220AA4329DFF6C485FD0E9B0F4F0A7944 |
SHA-256: | 3AD2DC318056D0A2024AF1804EA741146CFC18CC404649A44610CBF8B2056CF2 |
SHA-512: | 62990CB16E37B6B4EFF6AB03571C3A82DCAA21A1D393C3CB01D81F62287777FB0B4B27F8852B5FA71BC975FEAB5BAA486D33F2C58660210E115DE7E2BD34EA63 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 663 |
Entropy (8bit): | 4.4364559222111595 |
Encrypted: | false |
SSDEEP: | |
MD5: | A5AE8B2C607D146CEA1EE680C3A5C25A |
SHA1: | B35A89F700065B3B79F0849EBB67290E81A41F39 |
SHA-256: | 6E92E41AE1FC60B5C152CF50C92BE2029C1DFAC9696477D169BD5C8CB388D5F5 |
SHA-512: | 6A9A60118406222D3445B343CEACEC4FB568B442C45740912CBC891E321A10D9A37155120A806BF9DBE7ECCD730CAEB06948C4193DACF60547B712058B763B26 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 663 |
Entropy (8bit): | 4.426419516646913 |
Encrypted: | false |
SSDEEP: | |
MD5: | FAABD6D432BA62D5F219BA0BF9FB3FD5 |
SHA1: | 6AAEF0BF92AC54DC17D2C307607D8EA6B3AB562A |
SHA-256: | F079DFEF4847C5D25228C4A840CEAF8E6C587D70A563127F8AB170AB051D73D6 |
SHA-512: | 6D951BB843507AFFA0349A8C1F2D483998D335D836C9B474CD44A6CCCB8665BFFD2AD30C8F3FDEE7F83457F8DBBDC61C931301295BF96B8F6A918158ECD5D3E6 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Plasma\Uninstall.lnk
Download File
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 419 |
Entropy (8bit): | 2.5416169744431287 |
Encrypted: | false |
SSDEEP: | |
MD5: | 85F75995C1668699EFCA3689B18AAAAF |
SHA1: | BCF7A25E72C69FD4959A9A426891F3243BB5565D |
SHA-256: | C661ABFD6D4E5D360A591BD975980A400E3495CBFDF5DEAD8BC88C4C5520E172 |
SHA-512: | D60ACADED755BD3471018D744613B2165AD74200906473E0FEF23A886B49C6A21C3E936B6D05D081FA3F9424C0C64100B55DC36E2642B48D61BDD08DC4D81D2D |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 651 |
Entropy (8bit): | 4.397982843954605 |
Encrypted: | false |
SSDEEP: | |
MD5: | D22C9812CB97245A0E8A6B6FED0138C1 |
SHA1: | A95D84119D0016D7F8D4EEC824CB2C66CE2437A0 |
SHA-256: | 6461B752A9DDACFE71E25E00AFE5F915A00613CF90AF8CCB216FFB97A05D40CE |
SHA-512: | 92536FD3639729AD9AF8AF00C44C44694F39C2D6ABA6517D759380FE1A16F4C123FECE29BB40F45009DE9AB862F10E3D0A2231D3D73C5B1EA69FECEEEBDA1316 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 627 |
Entropy (8bit): | 4.518430890238079 |
Encrypted: | false |
SSDEEP: | |
MD5: | B56FB70EB43918AC88B8BF849DADF845 |
SHA1: | F37224A2F49190CEEF600B6388FB11BAD3C2BF7C |
SHA-256: | C390A791A6DC1371C86758E3D1998EA1C834C9475A70D8C1DE72777EC68EEDE2 |
SHA-512: | 7684033183CC6B76290BC2C323BE55E628D62D0CDDC30A62110BCCFDE027185894C507D2750914E14332427C944E03C777EBA84C0197686E3991DE5DF73CE297 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\Desktop\PlasmaSetup@LR_2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 627 |
Entropy (8bit): | 4.497258580865349 |
Encrypted: | false |
SSDEEP: | |
MD5: | 93D864E617A5A6AB19987AA9572DBE61 |
SHA1: | C1CBE5C8A9BCDC10A8053925BDFF7DD71D03706B |
SHA-256: | 4CFAAC108F078528D2F67C141BC233244D0C81AF639490BD9D8C68EB284FA316 |
SHA-512: | E4D556E0E1F3A049D1DB69C1BAA1E7A7E36D021948FF1E112384E55FCC369994D4673F099A4ECA07595DB88852D20495334DCB7C4C66938261C4F375F5498063 |
Malicious: | false |
Reputation: | unknown |
Preview: |
File type: | |
Entropy (8bit): | 7.993629636667633 |
TrID: |
|
File name: | PlasmaSetup@LR_2.exe |
File size: | 2'046'487 bytes |
MD5: | 3443898e0b0bd2a27c1bcebfe41b702e |
SHA1: | 3d83edc844cb4c011e9a5a554fe99a6f128e21ca |
SHA256: | de4c90695da23b3ed3a399bf5cdc2e5f85f3c074180480b19fb54dcb0ece007f |
SHA512: | 3dbcf335693fef0c5694f93b6286be3b2908946ac92a86488e7990ae823f5ca11255202951c40db50d1f2f6d246db5f3b6affba154f7e3b4e7fd3b8a811f6f6b |
SSDEEP: | 49152:FSLjk6oZMTsCv8hv2Xduz2B5x+KdndUdo:ajlogsrhv2G2Bimnl |
TLSH: | C895339AF0EECCA2C195C07C2BB0AE753FBB91952220CD56BD50C67BC1651EF8631E58 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........uJ...$...$...$./.{...$...%.:.$.".y...$..7....$.f."...$.Rich..$.................PE..L......G.................\...........0..... |
Icon Hash: | 0771ccf8d84d2907 |
Entrypoint: | 0x4030ed |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
DLL Characteristics: | |
Time Stamp: | 0x47ACC8B7 [Fri Feb 8 21:25:11 2008 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 7fa974366048f9c551ef45714595665e |
Instruction |
---|
sub esp, 00000180h |
push ebx |
push ebp |
push esi |
xor ebx, ebx |
push edi |
mov dword ptr [esp+18h], ebx |
mov dword ptr [esp+10h], 00409158h |
xor esi, esi |
mov byte ptr [esp+14h], 00000020h |
call dword ptr [00407030h] |
push 00008001h |
call dword ptr [004070B0h] |
push ebx |
call dword ptr [0040727Ch] |
push 00000008h |
mov dword ptr [0042EC18h], eax |
call 00007FA814B6BA16h |
mov dword ptr [0042EB64h], eax |
push ebx |
lea eax, dword ptr [esp+34h] |
push 00000160h |
push eax |
push ebx |
push 00428F90h |
call dword ptr [00407158h] |
push 0040914Ch |
push 0042E360h |
call 00007FA814B6B6CDh |
call dword ptr [004070ACh] |
mov edi, 00434000h |
push eax |
push edi |
call 00007FA814B6B6BBh |
push ebx |
call dword ptr [0040710Ch] |
cmp byte ptr [00434000h], 00000022h |
mov dword ptr [0042EB60h], eax |
mov eax, edi |
jne 00007FA814B68F3Ch |
mov byte ptr [esp+14h], 00000022h |
mov eax, 00434001h |
push dword ptr [esp+14h] |
push eax |
call 00007FA814B6B1AEh |
push eax |
call dword ptr [0040721Ch] |
mov dword ptr [esp+1Ch], eax |
jmp 00007FA814B68F95h |
cmp cl, 00000020h |
jne 00007FA814B68F38h |
inc eax |
cmp byte ptr [eax], 00000020h |
je 00007FA814B68F2Ch |
cmp byte ptr [eax], 00000022h |
mov byte ptr [eax+eax+00h], 00000000h |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x74b0 | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x38000 | 0x4048 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x7000 | 0x28c | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x5b30 | 0x5c00 | c09c7c2846d45de61bda7a8f459949b0 | False | 0.6754840353260869 | data | 6.479127963844318 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x7000 | 0x129c | 0x1400 | 165e3e874dc59c8a96748c6f4d0f4207 | False | 0.4337890625 | data | 5.049042548670051 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x9000 | 0x25c58 | 0x400 | 604372cf99db98d6c5f18501018b4413 | False | 0.5791015625 | data | 4.7679245398499575 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x2f000 | 0x9000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x38000 | 0x4048 | 0x4200 | b16610257f22e96f6f473f1a934321e4 | False | 0.6151751893939394 | data | 5.827979327446954 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x382e0 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4224 | English | United States | 0.7213883677298312 |
RT_ICON | 0x39388 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 2688, 256 important colors | English | United States | 0.6751066098081023 |
RT_ICON | 0x3a230 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 1152, 256 important colors | English | United States | 0.7851985559566786 |
RT_ICON | 0x3aad8 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 320, 256 important colors | English | United States | 0.6560693641618497 |
RT_ICON | 0x3b040 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.8031914893617021 |
RT_ICON | 0x3b4a8 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 640 | English | United States | 0.3118279569892473 |
RT_ICON | 0x3b790 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 192 | English | United States | 0.36824324324324326 |
RT_DIALOG | 0x3b8b8 | 0x120 | data | English | United States | 0.5138888888888888 |
RT_DIALOG | 0x3b9d8 | 0x202 | data | English | United States | 0.4085603112840467 |
RT_DIALOG | 0x3bbe0 | 0xf8 | data | English | United States | 0.6290322580645161 |
RT_DIALOG | 0x3bcd8 | 0xee | data | English | United States | 0.6302521008403361 |
RT_GROUP_ICON | 0x3bdc8 | 0x68 | data | English | United States | 0.7115384615384616 |
RT_MANIFEST | 0x3be30 | 0x215 | XML 1.0 document, ASCII text, with very long lines (533), with no line terminators | English | United States | 0.575984990619137 |
DLL | Import |
---|---|
KERNEL32.dll | CompareFileTime, SearchPathA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, Sleep, GetTickCount, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, GetWindowsDirectoryA, SetFileTime, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, GetVersion, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GetModuleHandleA, LoadLibraryExA, GetProcAddress, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, WriteFile, ReadFile, MulDiv, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, GetTempPathA |
USER32.dll | EndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, OpenClipboard, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, ShowWindow |
GDI32.dll | SetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor, SelectObject |
SHELL32.dll | SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA, SHGetSpecialFolderLocation |
ADVAPI32.dll | RegQueryValueExA, RegSetValueExA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA |
COMCTL32.dll | ImageList_AddMasked, ImageList_Destroy, ImageList_Create |
ole32.dll | CoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance |
VERSION.dll | GetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |