Source: C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\SystemScannerSetup.exe (copy) |
ReversingLabs: Detection: 21% |
Source: C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\is-QSQJJ.tmp |
ReversingLabs: Detection: 21% |
Source: SwitchAutoSetup_v0.7.0.3.exe |
Virustotal: Detection: 19% |
Perma Link |
Source: SwitchAutoSetup_v0.7.0.3.exe |
ReversingLabs: Detection: 15% |
Source: C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\SystemScannerSetup.exe |
Code function: 5_2_00986A10 StrStrA,lstrlen,LocalAlloc,CryptUnprotectData,LocalAlloc,LocalFree,lstrlen, |
5_2_00986A10 |
Source: C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\SystemScannerSetup.exe |
Code function: 5_2_00990830 CryptBinaryToStringA,GetProcessHeap,RtlAllocateHeap,CryptBinaryToStringA,GetLastError,GetProcessHeap,HeapFree, |
5_2_00990830 |
Source: SwitchAutoSetup_v0.7.0.3.exe |
Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI |
Source: unknown |
HTTPS traffic detected: 204.79.197.222:443 -> 192.168.2.4:49719 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.4:49722 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 95.217.31.199:443 -> 192.168.2.4:49723 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 95.217.31.199:443 -> 192.168.2.4:49724 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 95.217.31.199:443 -> 192.168.2.4:49725 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 95.217.31.199:443 -> 192.168.2.4:49728 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 95.217.31.199:443 -> 192.168.2.4:49729 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 95.217.31.199:443 -> 192.168.2.4:49730 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 95.217.31.199:443 -> 192.168.2.4:49731 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 95.217.31.199:443 -> 192.168.2.4:49732 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 95.217.31.199:443 -> 192.168.2.4:49756 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 95.217.31.199:443 -> 192.168.2.4:49757 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 95.217.31.199:443 -> 192.168.2.4:49758 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 95.217.31.199:443 -> 192.168.2.4:49759 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 95.217.31.199:443 -> 192.168.2.4:49760 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 95.217.31.199:443 -> 192.168.2.4:49761 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 95.217.31.199:443 -> 192.168.2.4:49762 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 95.217.31.199:443 -> 192.168.2.4:49763 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 95.217.31.199:443 -> 192.168.2.4:49766 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 95.217.31.199:443 -> 192.168.2.4:49767 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 95.217.31.199:443 -> 192.168.2.4:49768 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 95.217.31.199:443 -> 192.168.2.4:49769 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 95.217.31.199:443 -> 192.168.2.4:49770 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 95.217.31.199:443 -> 192.168.2.4:49771 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 95.217.31.199:443 -> 192.168.2.4:49772 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 95.217.31.199:443 -> 192.168.2.4:49773 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 95.217.31.199:443 -> 192.168.2.4:49774 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 95.217.31.199:443 -> 192.168.2.4:49775 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 95.217.31.199:443 -> 192.168.2.4:49776 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 95.217.31.199:443 -> 192.168.2.4:49777 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 95.217.31.199:443 -> 192.168.2.4:49778 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 95.217.31.199:443 -> 192.168.2.4:49779 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 95.217.31.199:443 -> 192.168.2.4:49780 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 95.217.31.199:443 -> 192.168.2.4:49781 version: TLS 1.2 |
Source: SwitchAutoSetup_v0.7.0.3.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: |
Binary string: x64\ship\0\ietag.dll\bbtopt\ietagO.pdb source: is-2NH1K.tmp.3.dr |
Source: |
Binary string: D:\a\git-credential-manager\git-credential-manager\out\windows\GitLab.UI.Windows\obj\WindowsRelease\net472\GitLab.UI.pdbSHA256 source: is-MMEK3.tmp.3.dr |
Source: |
Binary string: t:\mso\x64\ship\0\ietag.pdb source: is-2NH1K.tmp.3.dr |
Source: |
Binary string: cryptosetup.pdbGCTL source: SystemScannerSetup.exe, 00000005.00000002.2415946862.000000000362D000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: cryptosetup.pdb source: SystemScannerSetup.exe, 00000005.00000002.2415946862.000000000362D000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: t:\mso\x64\ship\0\ietag.pdbx64\ship\0\ietag.dll\bbtopt\ietagO.pdbh source: is-2NH1K.tmp.3.dr |
Source: |
Binary string: D:\a\git-credential-manager\git-credential-manager\out\windows\GitLab.UI.Windows\obj\WindowsRelease\net472\GitLab.UI.pdb source: is-MMEK3.tmp.3.dr |
Source: |
Binary string: c:\zlib-dll\Release\isunzlib.pdb source: SwitchAutoSetup_v0.7.0.3.tmp, 00000001.00000003.1173004151.0000000002363000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.dr, _isdecmp.dll.3.dr |
Source: C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\SystemScannerSetup.exe |
Code function: 5_2_00402910 FindFirstFileW, |
5_2_00402910 |
Source: C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\SystemScannerSetup.exe |
Code function: 5_2_004069DF FindFirstFileW,FindClose, |
5_2_004069DF |
Source: C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\SystemScannerSetup.exe |
Code function: 5_2_00405D8E DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose, |
5_2_00405D8E |
Source: C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\SystemScannerSetup.exe |
Code function: 5_2_0098B6B0 FindFirstFileA,FindNextFileA,strlen,StrCmpCA,CopyFileA,Sleep,DeleteFileA,FindClose, |
5_2_0098B6B0 |
Source: C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\SystemScannerSetup.exe |
Code function: 5_2_00987210 ExpandEnvironmentStringsA,FindFirstFileA,FindNextFileA,strlen,StrCmpCA,CopyFileA,Sleep,CopyFileA,DeleteFileA,CopyFileA,DeleteFileA,memset,CopyFileA,DeleteFileA,memset,FindClose, |
5_2_00987210 |
Source: C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\SystemScannerSetup.exe |
Code function: 5_2_00993580 wsprintfA,FindFirstFileA,memset,memset,FindNextFileA,strlen,StrCmpCA,wsprintfA,wsprintfA,memset,lstrcat,strtok_s,strtok_s,memset,lstrcat,strtok_s,PathMatchSpecA,DeleteFileA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,FindClose, |
5_2_00993580 |
Source: C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\SystemScannerSetup.exe |
Code function: 5_2_009897B0 FindFirstFileA,FindNextFileA,strlen, |
5_2_009897B0 |
Source: C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\SystemScannerSetup.exe |
Code function: 5_2_009813F0 FindFirstFileA,FindClose,FindNextFileA,strlen,FindFirstFileA,DeleteFileA,FindNextFileA,CopyFileA,CopyFileA,DeleteFileA,FindClose, |
5_2_009813F0 |
Source: C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\SystemScannerSetup.exe |
Code function: 5_2_00988360 FindFirstFileA,CopyFileA,FindNextFileA,strlen,CopyFileA,FindClose, |
5_2_00988360 |
Source: C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\SystemScannerSetup.exe |
Code function: 5_2_00988C90 lstrcpy,lstrcat,FindFirstFileA,FindNextFileA,strlen,lstrcpy,memset,lstrcpy,CopyFileA,FindFirstFileA,FindNextFileA,strlen,lstrcpy,lstrcpy,CopyFileA,FindClose,FindClose,DeleteFileA, |
5_2_00988C90 |
Source: C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\SystemScannerSetup.exe |
Code function: 5_2_00995EB0 SHGetFolderPathA,wsprintfA,FindFirstFileA,_mbscpy,_splitpath,_mbscpy,strlen,isupper,wsprintfA,_mbscpy,strlen,SHFileOperation,FindClose, |
5_2_00995EB0 |
Source: C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\SystemScannerSetup.exe |
Code function: 5_2_0098ACD0 wsprintfA,FindFirstFileA,strlen,lstrlen,DeleteFileA,CopyFileA,FindClose, |
5_2_0098ACD0 |
Source: C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\SystemScannerSetup.exe |
Code function: 5_2_00994E70 wsprintfA,FindFirstFileA,DeleteFileA,FindNextFileA,strlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,CopyFileA,FindClose, |
5_2_00994E70 |
Source: C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\SystemScannerSetup.exe |
Code function: 5_2_00993FD0 wsprintfA,FindFirstFileA,FindNextFileA,strlen,FindClose, |
5_2_00993FD0 |
Source: C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\SystemScannerSetup.exe |
Code function: 5_2_00994950 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,strlen,FindClose,lstrlen,lstrlen, |
5_2_00994950 |
Source: C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\SystemScannerSetup.exe |
Code function: 5_2_00993AF0 GetLogicalDriveStringsA,memset,GetDriveTypeA,lstrlen, |
5_2_00993AF0 |
Source: C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\SystemScannerSetup.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\ |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\SystemScannerSetup.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\ |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\SystemScannerSetup.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\ |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\SystemScannerSetup.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\ |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\SystemScannerSetup.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\ |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\SystemScannerSetup.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\ |
Jump to behavior |
Source: Network traffic |
Suricata IDS: 2859378 - Severity 1 - ETPRO MALWARE Win32/Stealc/Vidar Stealer Host Details Exfil (POST) M2 : 192.168.2.4:49724 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49756 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49757 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49728 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49730 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2859636 - Severity 1 - ETPRO MALWARE Vidar/StealC CnC Exfil via SQL Database (POST) : 192.168.2.4:49730 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49758 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2859636 - Severity 1 - ETPRO MALWARE Vidar/StealC CnC Exfil via SQL Database (POST) : 192.168.2.4:49758 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49763 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2859636 - Severity 1 - ETPRO MALWARE Vidar/StealC CnC Exfil via SQL Database (POST) : 192.168.2.4:49763 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2049087 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M1 : 192.168.2.4:49726 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49729 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49731 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2859636 - Severity 1 - ETPRO MALWARE Vidar/StealC CnC Exfil via SQL Database (POST) : 192.168.2.4:49731 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49759 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2859636 - Severity 1 - ETPRO MALWARE Vidar/StealC CnC Exfil via SQL Database (POST) : 192.168.2.4:49759 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49732 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2859636 - Severity 1 - ETPRO MALWARE Vidar/StealC CnC Exfil via SQL Database (POST) : 192.168.2.4:49732 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2051831 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config M1 : 95.217.31.199:443 -> 192.168.2.4:49727 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49760 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2859636 - Severity 1 - ETPRO MALWARE Vidar/StealC CnC Exfil via SQL Database (POST) : 192.168.2.4:49760 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49762 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2859636 - Severity 1 - ETPRO MALWARE Vidar/StealC CnC Exfil via SQL Database (POST) : 192.168.2.4:49762 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2044247 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config : 95.217.31.199:443 -> 192.168.2.4:49726 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49767 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49770 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49768 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49771 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49775 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49761 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2859636 - Severity 1 - ETPRO MALWARE Vidar/StealC CnC Exfil via SQL Database (POST) : 192.168.2.4:49761 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49773 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49780 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49772 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49769 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49777 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49776 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49774 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49779 -> 95.217.31.199:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49766 -> 95.217.31.199:443 |
Source: Joe Sandbox View |
IP Address: 149.154.167.99 149.154.167.99 |
Source: Joe Sandbox View |
IP Address: 149.154.167.99 149.154.167.99 |
Source: Joe Sandbox View |
JA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4 |
Source: Joe Sandbox View |
JA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.189.173.27 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.189.173.27 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.189.173.27 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.189.173.27 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.189.173.27 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 131.253.33.254 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 131.253.33.254 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 131.253.33.254 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 131.253.33.254 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 131.253.33.254 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 131.253.33.254 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 131.253.33.254 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 131.253.33.254 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 131.253.33.254 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 131.253.33.254 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.189.173.27 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.189.173.27 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 2.23.77.188 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 2.23.77.188 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 52.113.196.254 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: C:\Users\user\AppData\Roaming\{A7F7D5A3-B325-4F57-929C-68BC253DBE9A}\SystemScannerSetup.exe |
Code function: 5_2_00982690 lstrlen,StrCmpCA,InternetOpenA,InternetConnectA,HttpOpenRequestA,InternetSetOptionA,GetProcessHeap,RtlAllocateHeap,memcpy,lstrlen,memcpy,lstrlen,memcpy,lstrlen,HttpSendRequestA,Sleep,HttpQueryInfoA,InternetReadFile,InternetReadFile,StrCmpCA,InternetCloseHandle,InternetCloseHandle, |
5_2_00982690 |
Source: global traffic |
HTTP traffic detected: GET /l793oy HTTP/1.1Host: t.meConnection: Keep-AliveCache-Control: no-cache |
Source: global traffic |
HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0Host: us.f.goldenloafuae.comConnection: Keep-AliveCache-Control: no-cache |
Source: global traffic |
HTTP traffic detected: GET /complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyA2KlwBX3mkFo30om9LUFYQhpqLoa_BNhE HTTP/1.1Host: www.google.comConnection: keep-aliveX-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEI0qDKAQig4coBCJOhywEInP7MAQiFoM0BCL7VzgEIgdbOAQjI3M4BCIrgzgEIruTOAQiG5c4BCIvlzgE=Sec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9 |
Source: global traffic |
HTTP traffic detected: GET /async/ddljson?async=ntp:2 HTTP/1.1Host: www.google.comConnection: keep-aliveSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9 |
Source: global traffic |
HTTP traffic detected: GET /async/newtab_ogb?hl=en-US&async=fixed:0 HTTP/1.1Host: www.google.comConnection: keep-aliveX-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEI0qDKAQig4coBCJOhywEInP7MAQiFoM0BCL7VzgEIgdbOAQjI3M4BCIrgzgEIruTOAQiG5c4BCIvlzgE=Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9 |
Source: global traffic |
HTTP traffic detected: GET /async/newtab_promos HTTP/1.1Host: www.google.comConnection: keep-aliveSec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptySec-Fetch-Storage-Access: activeUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9 |
Source: chrome.exe, 0000000C.00000002.1766891254.00000E5400995000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: %https://www.youtube.com/?feature=ytca equals www.youtube.com (Youtube) |
Source: chrome.exe, 0000000C.00000003.1676167786.00000E5401538000.00000004.00001000.00020000.00000000.sdmp, chrome.exe, 0000000C.00000003.1676249298.00000E54014B8000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: <!--_html_template_end_-->`}const FACEBOOK_APP_ID=738026486351791;class DoodleShareDialogElement extends CrLitElement{constructor(){super(...arguments);this.url={url:""}}static get is(){return"ntp-doodle-share-dialog"}static get styles(){return getCss$2()}render(){return getHtml$2.bind(this)()}static get properties(){return{title:{type:String},url:{type:Object}}}onFacebookClick_(){const url="https://www.facebook.com/dialog/share"+`?app_id=${FACEBOOK_APP_ID}`+`&href=${encodeURIComponent(this.url.url)}`+`&hashtag=${encodeURIComponent("#GoogleDoodle")}`;WindowProxy.getInstance().open(url);this.notifyShare_(DoodleShareChannel.kFacebook)}onTwitterClick_(){const url="https://twitter.com/intent/tweet"+`?text=${encodeURIComponent(`${this.title}\n${this.url.url}`)}`;WindowProxy.getInstance().open(url);this.notifyShare_(DoodleShareChannel.kTwitter)}onEmailClick_(){const url=`mailto:?subject=${encodeURIComponent(this.title)}`+`&body=${encodeURIComponent(this.url.url)}`;WindowProxy.getInstance().navigate(url);this.notifyShare_(DoodleShareChannel.kEmail)}onCopyClick_(){this.$.url.select();navigator.clipboard.writeText(this.url.url);this.notifyShare_(DoodleShareChannel.kLinkCopy)}onCloseClick_(){this.$.dialog.close()}notifyShare_(channel){this.fire("share",channel)}}customElements.define(DoodleShareDialogElement.is,DoodleShareDialogElement);let instance$3=null;function getCss$1(){return instance$3||(instance$3=[...[getCss$4()],css`:host{--ntp-logo-height:168px;display:flex;flex-direction:column;flex-shrink:0;justify-content:flex-end;min-height:var(--ntp-logo-height)}:host([doodle-boxed_]){justify-content:flex-end}#logo{forced-color-adjust:none;height:92px;width:272px}:host([single-colored]) #logo{-webkit-mask-image:url(icons/google_logo.svg);-webkit-mask-repeat:no-repeat;-webkit-mask-size:100%;background-color:var(--ntp-logo-color)}:host(:not([single-colored])) #logo{background-image:url(icons/google_logo.svg)}#imageDoodle{cursor:pointer;outline:0}#imageDoodle[tabindex='-1']{cursor:auto}:host([doodle-boxed_]) #imageDoodle{background-color:var(--ntp-logo-box-color);border-radius:20px;padding:16px 24px}:host-context(.focus-outline-visible) #imageDoodle:focus{box-shadow:0 0 0 2px rgba(var(--google-blue-600-rgb),.4)}#imageContainer{display:flex;height:fit-content;position:relative;width:fit-content}#image{max-height:var(--ntp-logo-height);max-width:100%}:host([doodle-boxed_]) #image{max-height:128px}#animation{height:100%;po |