Windows
Analysis Report
VALUESearchUpdater.exe
Overview
General Information
Detection
Score: | 3 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 40% |
Signatures
Classification
- System is w10x64
- VALUESearchUpdater.exe (PID: 7432 cmdline:
"C:\Users\ user\Deskt op\VALUESe archUpdate r.exe" MD5: 4AB61EE925A3C1D719EBCE6214ECDB45)
- cleanup
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-31T19:46:16.967217+0100 | 2022930 | 1 | A Network Trojan was detected | 172.202.163.200 | 443 | 192.168.2.7 | 49746 | TCP |
2024-10-31T19:46:56.333467+0100 | 2022930 | 1 | A Network Trojan was detected | 172.202.163.200 | 443 | 192.168.2.7 | 49959 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-31T19:46:00.909051+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49703 | 3.36.251.235 | 443 | TCP |
2024-10-31T19:46:02.581513+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49704 | 3.36.251.235 | 443 | TCP |
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Key value queried: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 2 Command and Scripting Interpreter | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Masquerading | OS Credential Dumping | 1 Security Software Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Virtualization/Sandbox Evasion | LSASS Memory | 1 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | 3 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 DLL Side-Loading | Security Account Manager | 3 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 4 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 3 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
3% | ReversingLabs |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
valuesearch.co.kr | 3.36.251.235 | true | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | unknown | ||
false | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
3.36.251.235 | valuesearch.co.kr | United States | 8987 | AMAZONEXPANSIONGB | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1546345 |
Start date and time: | 2024-10-31 19:45:03 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 10s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 13 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | VALUESearchUpdater.exe |
Detection: | CLEAN |
Classification: | clean3.winEXE@1/1@1/1 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
- Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: VALUESearchUpdater.exe
Time | Type | Description |
---|---|---|
14:46:02 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
AMAZONEXPANSIONGB | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc | Browse |
| |
Get hash | malicious | LummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, XWorm | Browse |
| ||
Get hash | malicious | DarkComet, DarkTortilla, Neshta | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Process: | C:\Users\user\Desktop\VALUESearchUpdater.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 45 |
Entropy (8bit): | 4.430198929422622 |
Encrypted: | false |
SSDEEP: | 3:qV4QU1kSDKe9oIJb:q2/7Ke9jb |
MD5: | 57B18FB66E2CF4E1C6CEE32E1E50EA7B |
SHA1: | 15313913A1B58585C4B8BC4CAC52B84686FB1230 |
SHA-256: | 5A94C2E3A53717089E9BA1C06CAB35B31EE32EB0888C38407B1BABDE29A166EB |
SHA-512: | 9D46143594BA10FF86C8C7699741EDC4DD6937669AD29D6AB3239656939BDC47030CE61F82306CF19E588F13814DC834B42FA35CDF8C989EB15DB4C85D374907 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 6.668855895299851 |
TrID: |
|
File name: | VALUESearchUpdater.exe |
File size: | 3'151'872 bytes |
MD5: | 4ab61ee925a3c1d719ebce6214ecdb45 |
SHA1: | 42856c8176a27060ddc20d284187cd86183fdfb2 |
SHA256: | 9ad2b8535a844e9da74ab6d99bdc9b6f264ccb7e2fb1fcb143f7de46f2334156 |
SHA512: | e31349abb5a8b295870b7aab42b0477f927215e8129004381239265be37f16f68fec43f7757611b14cbbd1783db3a7edbd9fa55afde4fda1c8cd8f0cc536973f |
SSDEEP: | 49152:DovHkRO80l+J4diSroc8N7tXfJacep7MK5:DoPks80CpNxfJa9l |
TLSH: | 12E57E13B34A753ED46F1B3A6877E260983F76617A138D4BABF4084C8F395812D3A647 |
File Content Preview: | MZP.....................@...............................................!..L.!..This program must be run under Win32..$7....................................................................................................................................... |
Icon Hash: | a092ce62989cd8c8 |
Entrypoint: | 0x693ce0 |
Entrypoint Section: | .itext |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x66711C89 [Tue Jun 18 05:35:05 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 3dc1b665c8592d9fd7a15054c2c7aff4 |
Instruction |
---|
push ebp |
mov ebp, esp |
add esp, FFFFFFF0h |
mov eax, 0068947Ch |
call 00007F2389765F2Dh |
mov eax, dword ptr [0069E92Ch] |
mov eax, dword ptr [eax] |
call 00007F2389946A95h |
mov eax, dword ptr [0069E92Ch] |
mov eax, dword ptr [eax] |
mov dl, 01h |
call 00007F2389948A73h |
mov ecx, dword ptr [0069EAE8h] |
mov eax, dword ptr [0069E92Ch] |
mov eax, dword ptr [eax] |
mov edx, dword ptr [00688B20h] |
call 00007F2389946A87h |
mov eax, dword ptr [0069E92Ch] |
mov eax, dword ptr [eax] |
call 00007F2389946BDBh |
call 00007F238975E34Eh |
nop |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x2ab000 | 0x7b | .edata |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x2a6000 | 0x3860 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x2e6000 | 0x27800 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x2ae000 | 0x37d10 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x2ad000 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2a69b0 | 0x898 | .idata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x2aa000 | 0xee8 | .didata |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x290314 | 0x290400 | 3879a1729bf233d6c12d90130f773e3c | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.itext | 0x292000 | 0x1d34 | 0x1e00 | 42384be932bdfd3d6a84058aaa881788 | False | 0.5360677083333333 | data | 6.291846377379588 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.data | 0x294000 | 0xac64 | 0xae00 | 588b81580ba421427aba36f48e546c68 | False | 0.5552711925287356 | data | 6.188394974382231 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.bss | 0x29f000 | 0x6d24 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0x2a6000 | 0x3860 | 0x3a00 | 8f4a5149e5da43d5ae45a7d1bf6460d6 | False | 0.3211880387931034 | data | 5.145753577938233 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.didata | 0x2aa000 | 0xee8 | 0x1000 | 4ab86dbca4c9ab830cfe3e5576191f38 | False | 0.33154296875 | data | 4.263715688166435 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.edata | 0x2ab000 | 0x7b | 0x200 | 9ae030fd3bde19d9e91eaa5d09fdc2bf | False | 0.19921875 | data | 1.4913188767429284 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.tls | 0x2ac000 | 0x5c | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rdata | 0x2ad000 | 0x5d | 0x200 | d10b1e34149117b7858571e8c25b20bc | False | 0.189453125 | data | 1.3878006252217987 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x2ae000 | 0x37d10 | 0x37e00 | a7bb34f05a5fa1f273b3ce85220afd71 | False | 0.5833813968120806 | data | 6.729835525026279 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.rsrc | 0x2e6000 | 0x27800 | 0x27800 | d7010fc483fe468bb4f2c23c00ed43fa | False | 0.7530594837816456 | data | 7.209891921042113 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_CURSOR | 0x2e6bfc | 0x134 | Targa image data - Map 64 x 65536 x 1 +32 "\001" | English | United States | 0.38636363636363635 |
RT_CURSOR | 0x2e6d30 | 0x134 | data | English | United States | 0.4642857142857143 |
RT_CURSOR | 0x2e6e64 | 0x134 | data | English | United States | 0.4805194805194805 |
RT_CURSOR | 0x2e6f98 | 0x134 | data | English | United States | 0.38311688311688313 |
RT_CURSOR | 0x2e70cc | 0x134 | data | English | United States | 0.36038961038961037 |
RT_CURSOR | 0x2e7200 | 0x134 | data | English | United States | 0.4090909090909091 |
RT_CURSOR | 0x2e7334 | 0x134 | Targa image data - RGB 64 x 65536 x 1 +32 "\001" | English | United States | 0.4967532467532468 |
RT_ICON | 0x2e7468 | 0x528 | Device independent bitmap graphic, 16 x 32 x 32, image size 1280 | English | United States | 0.5371212121212121 |
RT_ICON | 0x2e7990 | 0x1428 | Device independent bitmap graphic, 32 x 64 x 32, image size 5120 | English | United States | 0.4312015503875969 |
RT_ICON | 0x2e8db8 | 0x2d28 | Device independent bitmap graphic, 48 x 96 x 32, image size 11520 | English | United States | 0.3768166089965398 |
RT_ICON | 0x2ebae0 | 0x1777a | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | English | United States | 0.9983354487006096 |
RT_STRING | 0x30325c | 0x33c | data | 0.34782608695652173 | ||
RT_STRING | 0x303598 | 0x428 | data | 0.3693609022556391 | ||
RT_STRING | 0x3039c0 | 0x4b0 | data | 0.365 | ||
RT_STRING | 0x303e70 | 0x364 | data | 0.33410138248847926 | ||
RT_STRING | 0x3041d4 | 0x414 | data | 0.40804597701149425 | ||
RT_STRING | 0x3045e8 | 0x10c | data | 0.6231343283582089 | ||
RT_STRING | 0x3046f4 | 0xcc | data | 0.6764705882352942 | ||
RT_STRING | 0x3047c0 | 0x2dc | data | 0.4562841530054645 | ||
RT_STRING | 0x304a9c | 0x35c | data | 0.3953488372093023 | ||
RT_STRING | 0x304df8 | 0x3f8 | data | 0.37893700787401574 | ||
RT_STRING | 0x3051f0 | 0x408 | data | 0.3943798449612403 | ||
RT_STRING | 0x3055f8 | 0x554 | data | 0.32111436950146627 | ||
RT_STRING | 0x305b4c | 0x364 | data | 0.3456221198156682 | ||
RT_STRING | 0x305eb0 | 0x274 | data | 0.31369426751592355 | ||
RT_STRING | 0x306124 | 0x478 | data | 0.4187062937062937 | ||
RT_STRING | 0x30659c | 0x494 | data | 0.3532423208191126 | ||
RT_STRING | 0x306a30 | 0x488 | data | 0.3887931034482759 | ||
RT_STRING | 0x306eb8 | 0x474 | data | 0.3201754385964912 | ||
RT_STRING | 0x30732c | 0x378 | data | 0.40765765765765766 | ||
RT_STRING | 0x3076a4 | 0x3a4 | data | 0.3369098712446352 | ||
RT_STRING | 0x307a48 | 0x43c | data | 0.36808118081180813 | ||
RT_STRING | 0x307e84 | 0x10c | data | 0.5410447761194029 | ||
RT_STRING | 0x307f90 | 0xcc | data | 0.6029411764705882 | ||
RT_STRING | 0x30805c | 0x214 | data | 0.5281954887218046 | ||
RT_STRING | 0x308270 | 0x40c | data | 0.36003861003861004 | ||
RT_STRING | 0x30867c | 0x384 | data | 0.3688888888888889 | ||
RT_STRING | 0x308a00 | 0x318 | data | 0.3787878787878788 | ||
RT_STRING | 0x308d18 | 0x300 | data | 0.3684895833333333 | ||
RT_RCDATA | 0x309018 | 0x10 | data | 1.5 | ||
RT_RCDATA | 0x309028 | 0x148b | PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced | English | United States | 1.0020916524054002 |
RT_RCDATA | 0x30a4b4 | 0x111e | PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced | English | United States | 1.0025102692834322 |
RT_RCDATA | 0x30b5d4 | 0xd8c | PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced | English | United States | 1.0031718569780854 |
RT_RCDATA | 0x30c360 | 0x7fc | data | 0.5024461839530333 | ||
RT_RCDATA | 0x30cb5c | 0x4 | data | English | United States | 3.0 |
RT_RCDATA | 0x30cb60 | 0x274 | Delphi compiled form 'TfmUpdater' | 0.6337579617834395 | ||
RT_GROUP_CURSOR | 0x30cdd4 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.25 |
RT_GROUP_CURSOR | 0x30cde8 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.25 |
RT_GROUP_CURSOR | 0x30cdfc | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x30ce10 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x30ce24 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x30ce38 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x30ce4c | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_ICON | 0x30ce60 | 0x3e | data | English | United States | 0.7741935483870968 |
RT_VERSION | 0x30cea0 | 0x23c | data | English | United States | 0.4597902097902098 |
RT_MANIFEST | 0x30d0dc | 0x70b | XML 1.0 document, ASCII text, with CRLF, LF line terminators | English | United States | 0.403771491957848 |
DLL | Import |
---|---|
winspool.drv | DocumentPropertiesW, ClosePrinter, OpenPrinterW, GetDefaultPrinterW, EnumPrintersW |
comctl32.dll | ImageList_GetImageInfo, FlatSB_SetScrollInfo, ImageList_DragMove, ImageList_Destroy, _TrackMouseEvent, ImageList_DragShowNolock, ImageList_Add, FlatSB_SetScrollProp, ImageList_GetDragImage, ImageList_Create, ImageList_EndDrag, ImageList_DrawEx, ImageList_SetImageCount, FlatSB_GetScrollPos, FlatSB_SetScrollPos, InitializeFlatSB, ImageList_Copy, FlatSB_GetScrollInfo, ImageList_Write, ImageList_DrawIndirect, ImageList_SetBkColor, ImageList_GetBkColor, ImageList_BeginDrag, ImageList_GetIcon, ImageList_Replace, ImageList_GetImageCount, ImageList_DragEnter, ImageList_GetIconSize, ImageList_SetIconSize, ImageList_Read, ImageList_DragLeave, ImageList_LoadImageW, ImageList_Draw, ImageList_Remove, ImageList_ReplaceIcon, ImageList_SetOverlayImage |
shell32.dll | Shell_NotifyIconW, SHAppBarMessage |
user32.dll | CopyImage, CreateWindowExW, GetMenuItemInfoW, SetMenuItemInfoW, DefFrameProcW, GetDCEx, PeekMessageW, MonitorFromWindow, GetDlgCtrlID, GetUpdateRect, SetTimer, WindowFromPoint, BeginPaint, RegisterClipboardFormatW, FrameRect, MapVirtualKeyW, IsWindowUnicode, RegisterWindowMessageW, FillRect, GetMenuStringW, DispatchMessageW, CreateAcceleratorTableW, SendMessageA, DefMDIChildProcW, EnumWindows, GetClassInfoW, ShowOwnedPopups, GetSystemMenu, GetScrollRange, GetScrollPos, SetScrollPos, GetActiveWindow, SetActiveWindow, DrawEdge, GetKeyboardLayoutList, LoadBitmapW, DrawFocusRect, EnumChildWindows, GetScrollBarInfo, ReleaseCapture, UnhookWindowsHookEx, LoadCursorW, GetCapture, SetCapture, CreatePopupMenu, ScrollWindow, ShowCaret, GetMenuItemID, GetLastActivePopup, CharLowerBuffW, GetSystemMetrics, SetWindowLongW, PostMessageW, DrawMenuBar, SetParent, IsZoomed, CharUpperBuffW, GetClientRect, IsChild, ClientToScreen, GetClipboardData, SetClipboardData, SetWindowPlacement, IsIconic, CallNextHookEx, GetMonitorInfoW, ShowWindow, CheckMenuItem, CharUpperW, DefWindowProcW, GetForegroundWindow, SetForegroundWindow, GetWindowTextW, EnableWindow, DestroyWindow, IsDialogMessageW, EndMenu, RegisterClassW, CharNextW, GetWindowThreadProcessId, RedrawWindow, GetDC, GetFocus, SetFocus, EndPaint, ReleaseDC, MsgWaitForMultipleObjectsEx, LoadKeyboardLayoutW, GetClassLongW, ActivateKeyboardLayout, GetParent, DrawTextW, SetScrollRange, MonitorFromRect, InsertMenuItemW, PeekMessageA, GetPropW, SetClassLongW, MessageBoxW, MessageBeep, SetPropW, RemovePropW, UpdateWindow, GetSubMenu, MsgWaitForMultipleObjects, DestroyMenu, DestroyIcon, SetWindowsHookExW, EmptyClipboard, IsWindowVisible, DispatchMessageA, UnregisterClassW, GetTopWindow, SendMessageW, AdjustWindowRectEx, DrawIcon, IsWindow, EnumThreadWindows, InvalidateRect, GetKeyboardState, DrawFrameControl, ScreenToClient, SetCursor, CreateIcon, CreateMenu, LoadStringW, CharLowerW, SetWindowPos, SetWindowRgn, GetMenuItemCount, RemoveMenu, GetSysColorBrush, GetKeyboardLayoutNameW, GetWindowDC, TranslateMessage, OpenClipboard, DrawTextExW, MapWindowPoints, EnumDisplayMonitors, CallWindowProcW, CloseClipboard, DestroyCursor, GetScrollInfo, SetWindowTextW, GetMessageExtraInfo, EnableScrollBar, GetSysColor, TrackPopupMenu, CopyIcon, DrawIconEx, PostQuitMessage, GetClassNameW, ShowScrollBar, EnableMenuItem, GetIconInfo, GetMessagePos, SetScrollInfo, GetKeyNameTextW, GetDesktopWindow, GetCursorPos, SetCursorPos, HideCaret, GetMenu, GetMenuState, SetMenu, SetRect, GetKeyState, FindWindowExW, MonitorFromPoint, ValidateRect, SystemParametersInfoW, LoadIconW, GetCursor, GetWindow, GetWindowLongW, GetWindowRect, InsertMenuW, KillTimer, WaitMessage, IsWindowEnabled, IsDialogMessageA, TranslateMDISysAccel, GetWindowPlacement, CreateIconIndirect, FindWindowW, DeleteMenu, GetKeyboardLayout |
version.dll | GetFileVersionInfoSizeW, VerQueryValueW, GetFileVersionInfoW |
oleaut32.dll | SafeArrayPutElement, GetErrorInfo, VariantInit, VariantClear, SysFreeString, SafeArrayAccessData, SysReAllocStringLen, SafeArrayCreate, SafeArrayGetElement, SysAllocStringLen, SafeArrayUnaccessData, SafeArrayPtrOfIndex, VariantCopy, SafeArrayGetUBound, SafeArrayGetLBound, VariantChangeType |
advapi32.dll | RegSetValueExW, RegConnectRegistryW, OpenThreadToken, RegQueryInfoKeyW, RegUnLoadKeyW, RegSaveKeyW, IsValidSid, RegReplaceKeyW, GetSidSubAuthority, GetTokenInformation, RegCreateKeyExW, GetSidSubAuthorityCount, RegLoadKeyW, RegEnumKeyExW, GetSidIdentifierAuthority, RegDeleteKeyW, RegOpenKeyExW, OpenProcessToken, RegDeleteValueW, RegFlushKey, RegEnumValueW, RegQueryValueExW, RegCloseKey, RegRestoreKeyW |
msvcrt.dll | memcpy, memset |
WTSAPI32.DLL | WTSUnRegisterSessionNotification, WTSRegisterSessionNotification |
winhttp.dll | WinHttpGetIEProxyConfigForCurrentUser, WinHttpSetTimeouts, WinHttpSetStatusCallback, WinHttpConnect, WinHttpReceiveResponse, WinHttpQueryAuthSchemes, WinHttpGetProxyForUrl, WinHttpReadData, WinHttpCloseHandle, WinHttpQueryHeaders, WinHttpOpenRequest, WinHttpAddRequestHeaders, WinHttpOpen, WinHttpWriteData, WinHttpSetCredentials, WinHttpQueryDataAvailable, WinHttpSetOption, WinHttpSendRequest, WinHttpQueryOption |
kernel32.dll | SetFileAttributesW, GetFileType, SetFileTime, QueryDosDeviceW, GetACP, CloseHandle, LocalFree, GetCurrentProcessId, SizeofResource, TerminateThread, QueryPerformanceFrequency, IsDebuggerPresent, FindNextFileW, GetFullPathNameW, VirtualFree, GetProcessHeap, ExitProcess, HeapAlloc, GetCPInfoExW, RtlUnwind, GetCPInfo, EnumSystemLocalesW, GetStdHandle, GetTimeZoneInformation, FileTimeToLocalFileTime, SystemTimeToTzSpecificLocalTime, GetModuleHandleW, FreeLibrary, TryEnterCriticalSection, HeapDestroy, FileTimeToDosDateTime, ReadFile, GetLastError, GetModuleFileNameW, SetLastError, GlobalAlloc, GlobalUnlock, FindResourceW, CreateThread, CompareStringW, MapViewOfFile, LoadLibraryA, GetVolumeInformationW, ResetEvent, MulDiv, FreeResource, GetDriveTypeW, GetVersion, RaiseException, MoveFileW, GlobalAddAtomW, FormatMessageW, SwitchToThread, GetExitCodeThread, GetCurrentThread, GetLogicalDrives, GetFileAttributesExW, LoadLibraryExW, LockResource, FileTimeToSystemTime, GetCurrentThreadId, UnhandledExceptionFilter, GlobalFindAtomW, VirtualQuery, VirtualQueryEx, GlobalFree, Sleep, EnterCriticalSection, SetFilePointer, LoadResource, SuspendThread, GetTickCount, GetFileSize, GlobalDeleteAtom, GetStartupInfoW, GetFileAttributesW, InitializeCriticalSection, GetThreadPriority, GetCurrentProcess, SetThreadPriority, GlobalLock, VirtualAlloc, GetCommandLineW, GetSystemInfo, LeaveCriticalSection, GetProcAddress, ResumeThread, GetLogicalDriveStringsW, GetVersionExW, VerifyVersionInfoW, HeapCreate, LCMapStringW, GetDiskFreeSpaceW, VerSetConditionMask, FindFirstFileW, GetUserDefaultUILanguage, GetConsoleOutputCP, UnmapViewOfFile, GetConsoleCP, lstrlenW, QueryPerformanceCounter, SetEndOfFile, HeapFree, WideCharToMultiByte, FindClose, MultiByteToWideChar, LoadLibraryW, SetEvent, GetLocaleInfoW, CreateFileW, SystemTimeToFileTime, EnumResourceNamesW, DeleteFileW, GetLocalTime, WaitForSingleObject, GetOEMCP, WriteFile, CreateFileMappingW, ExitThread, DeleteCriticalSection, GetDateFormatW, TlsGetValue, SetErrorMode, TzSpecificLocalTimeToSystemTime, IsValidLocale, TlsSetValue, CreateDirectoryW, GetSystemDefaultUILanguage, EnumCalendarInfoW, LocalAlloc, RemoveDirectoryW, CreateEventW, WaitForMultipleObjectsEx, GetThreadLocale, SetThreadLocale |
ole32.dll | IsEqualGUID, OleInitialize, CoInitializeEx, OleUninitialize, CoInitialize, CoCreateInstance, CoUninitialize, CoTaskMemFree, CoTaskMemAlloc |
gdi32.dll | Pie, SetBkMode, CreateCompatibleBitmap, GetEnhMetaFileHeader, RectVisible, AngleArc, SetAbortProc, SetTextColor, StretchBlt, RoundRect, RestoreDC, SetRectRgn, GetTextMetricsW, GetWindowOrgEx, CreatePalette, PolyBezierTo, CreateICW, CreateDCW, GetStockObject, CreateSolidBrush, Polygon, MoveToEx, PlayEnhMetaFile, Ellipse, StartPage, GetBitmapBits, StartDocW, AbortDoc, GetSystemPaletteEntries, GetEnhMetaFileBits, GetEnhMetaFilePaletteEntries, CreatePenIndirect, CreateFontIndirectW, PolyBezier, EndDoc, GetObjectW, GetWinMetaFileBits, SetROP2, GetEnhMetaFileDescriptionW, ArcTo, Arc, SelectPalette, ExcludeClipRect, MaskBlt, SetWindowOrgEx, EndPage, DeleteEnhMetaFile, Chord, SetDIBits, SetViewportOrgEx, CreateRectRgn, RealizePalette, SetDIBColorTable, GetDIBColorTable, CreateBrushIndirect, PatBlt, SetEnhMetaFileBits, Rectangle, SaveDC, DeleteDC, FrameRgn, BitBlt, GetDeviceCaps, GetTextExtentPoint32W, GetClipBox, IntersectClipRect, Polyline, CreateBitmap, SetWinMetaFileBits, CombineRgn, GetStretchBltMode, CreateDIBitmap, SetStretchBltMode, GetDIBits, CreateDIBSection, LineTo, GetRgnBox, EnumFontsW, CreateHalftonePalette, SelectObject, DeleteObject, ExtFloodFill, UnrealizeObject, CopyEnhMetaFileW, SetBkColor, CreateCompatibleDC, GetBrushOrgEx, GetCurrentPositionEx, GetTextExtentPointW, ExtTextOutW, SetBrushOrgEx, GetPixel, GdiFlush, SetPixel, EnumFontFamiliesExW, StretchDIBits, GetPaletteEntries |
Name | Ordinal | Address |
---|---|---|
__dbk_fcall_wrapper | 2 | 0x411ffc |
dbkFCallWrapperAddr | 1 | 0x6a2648 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-31T19:46:00.909051+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49703 | 3.36.251.235 | 443 | TCP |
2024-10-31T19:46:02.581513+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49704 | 3.36.251.235 | 443 | TCP |
2024-10-31T19:46:16.967217+0100 | 2022930 | ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow | 1 | 172.202.163.200 | 443 | 192.168.2.7 | 49746 | TCP |
2024-10-31T19:46:56.333467+0100 | 2022930 | ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow | 1 | 172.202.163.200 | 443 | 192.168.2.7 | 49959 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 31, 2024 19:45:59.904227972 CET | 49703 | 443 | 192.168.2.7 | 3.36.251.235 |
Oct 31, 2024 19:45:59.904268026 CET | 443 | 49703 | 3.36.251.235 | 192.168.2.7 |
Oct 31, 2024 19:45:59.904352903 CET | 49703 | 443 | 192.168.2.7 | 3.36.251.235 |
Oct 31, 2024 19:45:59.911545992 CET | 49703 | 443 | 192.168.2.7 | 3.36.251.235 |
Oct 31, 2024 19:45:59.911559105 CET | 443 | 49703 | 3.36.251.235 | 192.168.2.7 |
Oct 31, 2024 19:46:00.908987045 CET | 443 | 49703 | 3.36.251.235 | 192.168.2.7 |
Oct 31, 2024 19:46:00.909050941 CET | 49703 | 443 | 192.168.2.7 | 3.36.251.235 |
Oct 31, 2024 19:46:00.996491909 CET | 49703 | 443 | 192.168.2.7 | 3.36.251.235 |
Oct 31, 2024 19:46:00.996517897 CET | 443 | 49703 | 3.36.251.235 | 192.168.2.7 |
Oct 31, 2024 19:46:00.996870995 CET | 443 | 49703 | 3.36.251.235 | 192.168.2.7 |
Oct 31, 2024 19:46:01.050076008 CET | 49703 | 443 | 192.168.2.7 | 3.36.251.235 |
Oct 31, 2024 19:46:01.145409107 CET | 49703 | 443 | 192.168.2.7 | 3.36.251.235 |
Oct 31, 2024 19:46:01.191329956 CET | 443 | 49703 | 3.36.251.235 | 192.168.2.7 |
Oct 31, 2024 19:46:01.464137077 CET | 443 | 49703 | 3.36.251.235 | 192.168.2.7 |
Oct 31, 2024 19:46:01.464226007 CET | 443 | 49703 | 3.36.251.235 | 192.168.2.7 |
Oct 31, 2024 19:46:01.464277983 CET | 49703 | 443 | 192.168.2.7 | 3.36.251.235 |
Oct 31, 2024 19:46:01.565980911 CET | 49703 | 443 | 192.168.2.7 | 3.36.251.235 |
Oct 31, 2024 19:46:01.565993071 CET | 443 | 49703 | 3.36.251.235 | 192.168.2.7 |
Oct 31, 2024 19:46:01.566035032 CET | 49703 | 443 | 192.168.2.7 | 3.36.251.235 |
Oct 31, 2024 19:46:01.566039085 CET | 443 | 49703 | 3.36.251.235 | 192.168.2.7 |
Oct 31, 2024 19:46:01.574835062 CET | 49704 | 443 | 192.168.2.7 | 3.36.251.235 |
Oct 31, 2024 19:46:01.574882030 CET | 443 | 49704 | 3.36.251.235 | 192.168.2.7 |
Oct 31, 2024 19:46:01.574935913 CET | 49704 | 443 | 192.168.2.7 | 3.36.251.235 |
Oct 31, 2024 19:46:01.575126886 CET | 49704 | 443 | 192.168.2.7 | 3.36.251.235 |
Oct 31, 2024 19:46:01.575141907 CET | 443 | 49704 | 3.36.251.235 | 192.168.2.7 |
Oct 31, 2024 19:46:02.580996990 CET | 443 | 49704 | 3.36.251.235 | 192.168.2.7 |
Oct 31, 2024 19:46:02.581512928 CET | 49704 | 443 | 192.168.2.7 | 3.36.251.235 |
Oct 31, 2024 19:46:02.581549883 CET | 443 | 49704 | 3.36.251.235 | 192.168.2.7 |
Oct 31, 2024 19:46:02.582573891 CET | 49704 | 443 | 192.168.2.7 | 3.36.251.235 |
Oct 31, 2024 19:46:02.582580090 CET | 443 | 49704 | 3.36.251.235 | 192.168.2.7 |
Oct 31, 2024 19:46:02.901103020 CET | 443 | 49704 | 3.36.251.235 | 192.168.2.7 |
Oct 31, 2024 19:46:02.901211023 CET | 443 | 49704 | 3.36.251.235 | 192.168.2.7 |
Oct 31, 2024 19:46:02.901256084 CET | 49704 | 443 | 192.168.2.7 | 3.36.251.235 |
Oct 31, 2024 19:46:02.901603937 CET | 49704 | 443 | 192.168.2.7 | 3.36.251.235 |
Oct 31, 2024 19:46:02.901613951 CET | 443 | 49704 | 3.36.251.235 | 192.168.2.7 |
Oct 31, 2024 19:46:02.901639938 CET | 49704 | 443 | 192.168.2.7 | 3.36.251.235 |
Oct 31, 2024 19:46:02.901645899 CET | 443 | 49704 | 3.36.251.235 | 192.168.2.7 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 31, 2024 19:45:59.379789114 CET | 52102 | 53 | 192.168.2.7 | 1.1.1.1 |
Oct 31, 2024 19:45:59.898832083 CET | 53 | 52102 | 1.1.1.1 | 192.168.2.7 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Oct 31, 2024 19:45:59.379789114 CET | 192.168.2.7 | 1.1.1.1 | 0x940d | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Oct 31, 2024 19:45:59.898832083 CET | 1.1.1.1 | 192.168.2.7 | 0x940d | No error (0) | 3.36.251.235 | A (IP address) | IN (0x0001) | false | ||
Oct 31, 2024 19:45:59.898832083 CET | 1.1.1.1 | 192.168.2.7 | 0x940d | No error (0) | 3.39.130.246 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.7 | 49703 | 3.36.251.235 | 443 | 7432 | C:\Users\user\Desktop\VALUESearchUpdater.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-31 18:46:01 UTC | 209 | OUT | |
2024-10-31 18:46:01 UTC | 256 | IN | |
2024-10-31 18:46:01 UTC | 8 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.7 | 49704 | 3.36.251.235 | 443 | 7432 | C:\Users\user\Desktop\VALUESearchUpdater.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-31 18:46:02 UTC | 212 | OUT | |
2024-10-31 18:46:02 UTC | 177 | IN | |
2024-10-31 18:46:02 UTC | 45 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 14:45:58 |
Start date: | 31/10/2024 |
Path: | C:\Users\user\Desktop\VALUESearchUpdater.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x300000 |
File size: | 3'151'872 bytes |
MD5 hash: | 4AB61EE925A3C1D719EBCE6214ECDB45 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Reputation: | low |
Has exited: | true |