Report - lom30.exe

Amadey RedLine stealer Gen1 Emotet SmokeLoader Generic Malware Malicious Library UPX Antivirus Malicious Packer .NET framework(MSIL) Confuser .NET Admin Tool (Sysinternals etc ...) PWS ScreenShot Javascript_Blob AntiDebug AntiVM PE File PE32
ScreenShot
Created 2023.11.03 12:23 Machine s1_win7_x6403
Filename lom30.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
6
Behavior Score
27.4
ZERO API file : clean
VT API (file)
md5 701ea7974b3f98830d636e93f836cfce
sha256 386402abb9c4543365036a460814bd9109ef3dde074e851f9770847064f8ccd7
ssdeep 24576:pyiEsEtfvjJX4ckrL/zEER15FaM6L11CTyb0lPnVDahS5K:cbRfv9X4/zEM5F6gAhS5
imphash 646167cce332c1c252cdcb1839e0cf48
impfuzzy 48:mPkNSpUOU4iLzNXMuM9a08vTL5wtV6x9KEl4LTrzUp5aSvd59E5o+RXpNuAC8tGg:ikmUZ4iLBXMuMc08vTLhsNeGmdM
  Network IP location

Signature (58cnts)

Level Description
danger The process powershell.exe wrote an executable file to disk which it then attempted to execute
danger Disables Windows Security features
danger Executed a process and injected code into it
watch A process performed obfuscation on information about the computer or sent it to a remote location indicative of CnC Traffic/Preperations.
watch Allocates execute permission to another process indicative of possible code injection
watch Attempts to create or modify system certificates
watch Attempts to disable Windows Auto Updates
watch Attempts to identify installed AV products by installation directory
watch Attempts to stop active services
watch Code injection by writing an executable or DLL to the memory of another process
watch Collects information about installed applications
watch Communicates with host for which no DNS query was performed
watch Detects Avast Antivirus through the presence of a library
watch Executes one or more WMI queries
watch Harvests credentials from local email clients
watch Harvests credentials from local FTP client softwares
watch Installs itself for autorun at Windows startup
watch Manipulates memory of a non-child process indicative of process injection
watch Network activity contains more than one unique useragent
watch One or more non-whitelisted processes were created
watch Potential code injection by writing to the memory of another process
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch Used NtSetContextThread to modify a thread in a remote process indicative of process injection
watch Uses suspicious command line tools or Windows utilities
notice A process attempted to delay the analysis task.
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice An application raised an exception which may be indicative of an exploit crash
notice An executable file was downloaded by the process explothe.exe
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a shortcut to an executable file
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops a binary and executes it
notice Drops an executable to the user AppData folder
notice Executes one or more WMI queries which can be used to identify virtual machines
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Queries for potentially installed applications
notice Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation
notice Sends data using the HTTP POST Method
notice Steals private information from local Internet browsers
notice Terminates another process
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Uses Windows utilities for basic Windows functionality
notice Yara rule detected in process memory
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info Command line console output was observed
info One or more processes crashed
info Queries for the computername
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path
info Tries to locate where the browsers are installed
info Uses Windows APIs to generate a cryptographic key

Rules (42cnts)

Level Name Description Collection
danger RedLine_Stealer_b_Zero RedLine stealer binaries (download)
danger RedLine_Stealer_m_Zero RedLine stealer memory
danger Win32_Trojan_Emotet_RL_Gen_Zero Win32 Trojan Emotet binaries (download)
danger Win32_Trojan_Emotet_RL_Gen_Zero Win32 Trojan Emotet binaries (upload)
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (download)
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (upload)
danger Win_Amadey_Zero Amadey bot binaries (download)
danger win_smokeloader_auto Detects win.smokeloader. binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Admin_Tool_IN_Zero Admin Tool Sysinternals binaries (download)
watch Antivirus Contains references to security software binaries (download)
watch ConfuserEx_Zero Confuser .NET binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
watch Win32_Trojan_PWS_Net_1_Zero Win32 Trojan PWS .NET Azorult binaries (download)
notice Generic_PWS_Memory_Zero PWS Memory memory
notice Javascript_Blob use blob(Binary Large Objec) javascript binaries (download)
notice ScreenShot Take ScreenShot memory
info anti_dbg Checks if being debugged memory
info CAB_file_format CAB archive file binaries (download)
info CAB_file_format CAB archive file binaries (upload)
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerException__SetConsoleCtrl (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info Is_DotNET_EXE (no description) binaries (download)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info JPEG_Format_Zero JPEG Format binaries (download)
info Microsoft_Office_File_Zero Microsoft Office File binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info PNG_Format_Zero PNG Format binaries (download)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (143cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://77.91.124.1/theme/Plugins/clip64.dll RU Foton Telecom CJSC 77.91.124.1 37036 malware
http://193.233.255.73/loghub/master RU OOO FREEnet Group 193.233.255.73 37500 mailcious
http://77.91.68.249/fuza/2.ps1 RU Foton Telecom CJSC 77.91.68.249 37524 mailcious
http://77.91.68.249/fuza/foto1661.exe RU Foton Telecom CJSC 77.91.68.249 37636 malware
http://77.91.68.249/fuza/tus.exe RU Foton Telecom CJSC 77.91.68.249 37637 malware
http://77.91.68.249/fuza/salo.exe RU Foton Telecom CJSC 77.91.68.249 malware
http://77.91.124.1/theme/Plugins/cred64.dll RU Foton Telecom CJSC 77.91.124.1 37037 mailcious
http://77.91.124.1/theme/index.php RU Foton Telecom CJSC 77.91.124.1 37040 mailcious
https://static.xx.fbcdn.net/rsrc.php/v3/ym/l/0,cross/V9SMX8ENNXW.css?_nc_x=Ij3Wp8lg5Kz US FACEBOOK 157.240.215.14 clean
https://community.cloudflare.steamstatic.com/public/shared/css/motiva_sans.css?v=GfSjbGKcNYaQ&l=english&_cdn=cloudflare US CLOUDFLARENET 172.64.145.151 clean
https://community.cloudflare.steamstatic.com/public/shared/fonts/MotivaSans-Regular.ttf?v=4.015 US CLOUDFLARENET 172.64.145.151 clean
https://community.cloudflare.steamstatic.com/public/shared/css/login.css?v=0H1th98etnSV&l=english&_cdn=cloudflare US CLOUDFLARENET 172.64.145.151 clean
https://accounts.google.com/InteractiveLogin?continue=https://accounts.google.com/&followup=https://accounts.google.com/&passive=1209600&ifkv=AVQVeyxxWA0Ljh5xWLEvAJ6NevMd7QB5iL9TprwZYNP8u-n9zXo51MmtGRn25Gjf78sQZ4KzK1Dc US GOOGLE 142.250.66.45 clean
https://community.cloudflare.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL&l=english&_cdn=cloudflare&load=effects,controls,slider,dragdrop US CLOUDFLARENET 172.64.145.151 clean
https://accounts.google.com/generate_204?NO7qPw US GOOGLE 142.250.66.45 clean
https://accounts.google.com/InteractiveLogin?continue=https://accounts.google.com/&followup=https://accounts.google.com/&passive=1209600&ifkv=AVQVeyyT4td1m_8jmCTuLflf4CGZrqIHYxNvv-75kjvDivr6JChBm-48E_vH0foop83wQC67d99m US GOOGLE 142.250.66.45 clean
https://community.cloudflare.steamstatic.com/public/shared/fonts/MotivaSans-Bold.ttf?v=4.015 US CLOUDFLARENET 172.64.145.151 clean
https://ssl.gstatic.com/images/branding/googlelogo/2x/googlelogo_color_74x24dp.png US GOOGLE 172.217.31.3 clean
https://accounts.google.com/v3/signin/identifier?continue=https%3A%2F%2Faccounts.google.com%2F&followup=https%3A%2F%2Faccounts.google.com%2F&ifkv=AVQVeyxVW6rLt9tLaC8ykc1nwAIgbdXX5n-L35f5sE1jqHcfiXjLMhDRqy2-fP8xGUFUaaXcJSrITA&passive=1209600&flowName=WebLi US GOOGLE 142.250.66.45 clean
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png US CLOUDFLARENET 172.64.145.151 clean
https://www.facebook.com/login US FACEBOOK 157.240.215.35 clean
https://community.cloudflare.steamstatic.com/public/shared/fonts/MotivaSans-LightItalic.ttf?v=4.015 US CLOUDFLARENET 172.64.145.151 clean
https://community.cloudflare.steamstatic.com/public/shared/fonts/MotivaSans-Thin.ttf?v=4.015 US CLOUDFLARENET 172.64.145.151 clean
https://static.xx.fbcdn.net/rsrc.php/v3/yU/r/O7nelmd9XSI.png US FACEBOOK 157.240.215.14 clean
https://accounts.google.com/InteractiveLogin?continue=https://accounts.google.com/&followup=https://accounts.google.com/&passive=1209600&ifkv=AVQVeyyidh94t-7_letWPwvjNQfl6I8TMheIR3px7R79ys-v-C3n_ey4IpHEeEFVPcsdPA92mVFQPw US GOOGLE 142.250.66.45 clean
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=8BlFIKwdZV37&l=english&_cdn=cloudflare US CLOUDFLARENET 172.64.145.151 clean
https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=E78TCC6Eu4d1&l=english&_cdn=cloudflare US CLOUDFLARENET 172.64.145.151 clean
https://community.cloudflare.steamstatic.com/public/css/skin_1/header.css?v=vh4BMeDcNiCU&l=english&_cdn=cloudflare US CLOUDFLARENET 172.64.145.151 clean
https://static.xx.fbcdn.net/rsrc.php/v3/yU/r/EhJ0QrY2FBP.js?_nc_x=Ij3Wp8lg5Kz US FACEBOOK 157.240.215.14 clean
https://accounts.google.com/generate_204?phWHLQ US GOOGLE 142.250.66.45 clean
https://accounts.google.com/generate_204?FM9MMw US GOOGLE 142.250.66.45 clean
https://www.epicgames.com/id/login US AMAZON-AES 54.175.89.124 clean
https://fonts.gstatic.com/s/roboto/v30/KFOmCnqEu92Fr1Mu4mxM.woff US GOOGLE 142.251.130.3 clean
https://www.youtube.com/img/desktop/supported_browsers/dinosaur.png US GOOGLE 142.251.220.78 clean
https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=KrKRjQbCfNh0&l=english&_cdn=cloudflare US CLOUDFLARENET 172.64.145.151 clean
https://www.youtube.com/img/desktop/supported_browsers/opera.png US GOOGLE 142.251.220.78 clean
https://community.cloudflare.steamstatic.com/public/shared/images/header/btn_header_installsteam_download.png?v=1 US CLOUDFLARENET 172.64.145.151 clean
https://community.cloudflare.steamstatic.com/public/shared/fonts/MotivaSans-Black.ttf?v=4.015 US CLOUDFLARENET 172.64.145.151 clean
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=3Pb1f2YLp788&l=english&_cdn=cloudflare US CLOUDFLARENET 172.64.145.151 clean
https://accounts.google.com/v3/signin/identifier?continue=https%3A%2F%2Faccounts.google.com%2F&followup=https%3A%2F%2Faccounts.google.com%2F&ifkv=AVQVeyz4A49MvhLj_r5ov_AJY5BYrTyapUBFfv7BWCcUgyCaE1ee8Ou4w4nAiEXlupUrsDguPr4bQw&passive=1209600&flowName=WebLi US GOOGLE 142.250.66.45 clean
https://community.cloudflare.steamstatic.com/public/shared/css/shared_global.css?v=Fd2aj_zaBVQV&l=english&_cdn=cloudflare US CLOUDFLARENET 172.64.145.151 clean
https://accounts.google.com/ US GOOGLE 142.250.66.45 clean
https://static.xx.fbcdn.net/rsrc.php/v3/y9/l/0,cross/eoEHQM4veKY.css?_nc_x=Ij3Wp8lg5Kz US FACEBOOK 157.240.215.14 clean
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&_cdn=cloudflare US CLOUDFLARENET 172.64.145.151 clean
https://accounts.google.com/v3/signin/identifier?continue=https%3A%2F%2Faccounts.google.com%2F&followup=https%3A%2F%2Faccounts.google.com%2F&ifkv=AVQVeyxHmAuJ7cTrlJwP83uTJIwZEOmrXGcYW_i0uz5KMlDH1JsRYBc2MmUHjR6ye20L2fYuNPufuw&passive=1209600&flowName=WebLi US GOOGLE 142.250.66.45 clean
https://accounts.google.com/v3/signin/identifier?continue=https%3A%2F%2Faccounts.google.com%2F&followup=https%3A%2F%2Faccounts.google.com%2F&ifkv=AVQVeyxa6sAB10RaHTDUTJBO3-eoyqwGJOMg6fq-JIxFpsnqcBSN8g6aim1IDWZ3iP__yBBnia-T&passive=1209600&flowName=WebLite US GOOGLE 142.250.66.45 clean
https://static-assets-prod.unrealengine.com/account-portal/static/static/js/3.520a7eda.chunk.js Unknown 18.64.8.109 clean
https://fbcdn.net/security/hsts-pixel.gif?c=2.5 US FACEBOOK 157.240.215.35 clean
https://static.xx.fbcdn.net/rsrc.php/v3/yp/r/gC0mb5XShS_.js?_nc_x=Ij3Wp8lg5Kz US FACEBOOK 157.240.215.14 clean
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=F9Ougyu-CyG3&l=english&_cdn=cloudflare US CLOUDFLARENET 172.64.145.151 clean
https://community.cloudflare.steamstatic.com/public/shared/fonts/MotivaSans-Light.ttf?v=4.015 US CLOUDFLARENET 172.64.145.151 clean
https://community.cloudflare.steamstatic.com/public/css/skin_1/home.css?v=-6qQi3rZclGf&l=english&_cdn=cloudflare US CLOUDFLARENET 172.64.145.151 clean
https://static.xx.fbcdn.net/rsrc.php/v3/yD/l/0,cross/OeVbDlggYtT.css?_nc_x=Ij3Wp8lg5Kz US FACEBOOK 157.240.215.14 clean
https://community.cloudflare.steamstatic.com/public/shared/fonts/MotivaSans-BoldItalic.ttf?v=4.015 US CLOUDFLARENET 172.64.145.151 clean
https://www.facebook.com/favicon.ico US FACEBOOK 157.240.215.35 clean
https://accounts.google.com/ServiceLogin?passive=1209600&continue=https%3A%2F%2Faccounts.google.com%2F&followup=https%3A%2F%2Faccounts.google.com%2F US GOOGLE 142.250.66.45 clean
https://accounts.google.com/_/bscframe US GOOGLE 142.250.66.45 clean
https://accounts.google.com/InteractiveLogin?continue=https://accounts.google.com/&followup=https://accounts.google.com/&passive=1209600&ifkv=AVQVeyy7hCYNnf-0YByYNzHXr3uFjshUMd78hOZpACYJ4Y7BQwyeDu8hhNuK6JppcoPONOvNupzDtw US GOOGLE 142.250.66.45 clean
https://accounts.google.com/generate_204?kjEEiA US GOOGLE 142.250.66.45 clean
https://community.cloudflare.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC&_cdn=cloudflare US CLOUDFLARENET 172.64.145.151 clean
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png US CLOUDFLARENET 172.64.145.151 clean
https://fonts.googleapis.com/css?family=Roboto:400,500 US GOOGLE 142.250.66.42 clean
https://fbsbx.com/security/hsts-pixel.gif?c=5 US FACEBOOK 157.240.215.35 clean
https://static.xx.fbcdn.net/rsrc.php/v3/yz/r/1jo5ZChBkzZ.js?_nc_x=Ij3Wp8lg5Kz US FACEBOOK 157.240.215.14 clean
https://static-assets-prod.unrealengine.com/account-portal/static/static/js/main.10a25667.chunk.js Unknown 18.64.8.109 clean
https://connect.facebook.net/security/hsts-pixel.gif US FACEBOOK 157.240.215.14 clean
https://community.cloudflare.steamstatic.com/public/css/globalv2.css?v=RL7hpFRFPE4A&l=english&_cdn=cloudflare US CLOUDFLARENET 172.64.145.151 clean
https://fonts.googleapis.com/css?family=YouTube+Sans:500 US GOOGLE 142.250.66.42 clean
https://www.youtube.com/img/desktop/supported_browsers/chrome.png US GOOGLE 142.251.220.78 clean
https://community.cloudflare.steamstatic.com/public/shared/fonts/MotivaSans-Medium.ttf?v=4.015 US CLOUDFLARENET 172.64.145.151 clean
https://www.youtube.com/img/desktop/supported_browsers/firefox.png US GOOGLE 142.251.220.78 clean
https://community.cloudflare.steamstatic.com/public/shared/css/buttons.css?v=uR_4hRD_HUln&l=english&_cdn=cloudflare US CLOUDFLARENET 172.64.145.151 clean
https://static.xx.fbcdn.net/rsrc.php/v3/yh/l/0,cross/RvHDSigkA0R.css?_nc_x=Ij3Wp8lg5Kz US FACEBOOK 157.240.215.14 clean
https://community.cloudflare.steamstatic.com/public/css/applications/community/main.css?v=eYJYuhv32ILn&l=english&_cdn=cloudflare US CLOUDFLARENET 172.64.145.151 clean
https://www.youtube.com/img/desktop/supported_browsers/yt_logo_rgb_light.png US GOOGLE 142.251.220.78 clean
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSvIAKtunfWg&l=english&_cdn=cloudflare US CLOUDFLARENET 172.64.145.151 clean
https://facebook.com/security/hsts-pixel.gif?c=3.2.5 US FACEBOOK 157.240.215.35 clean
https://www.youtube.com/img/desktop/supported_browsers/edgium.png US GOOGLE 142.251.220.78 clean
https://accounts.google.com/InteractiveLogin?continue=https://accounts.google.com/&followup=https://accounts.google.com/&passive=1209600&ifkv=AVQVeywosNhdGsuZdVCndGpS2K_jZJeHBslOkGyM_5Abhb0zccwpk0a_EpRThKNdW8KNTJvRtoAJFA US GOOGLE 142.250.66.45 clean
https://fonts.gstatic.com/s/youtubesans/v22/Qw3hZQNGEDjaO2m6tqIqX5E-AVS5_rSejo46_PCTRspJ0OosolrBEJL3HMXfxQASluL2m_dANVawBpSF.woff US GOOGLE 142.251.130.3 clean
https://static.xx.fbcdn.net/rsrc.php/v3/yS/l/0,cross/M8A8jLevlDW.css?_nc_x=Ij3Wp8lg5Kz US FACEBOOK 157.240.215.14 clean
https://static.xx.fbcdn.net/rsrc.php/v3/yN/l/0,cross/zSmMZJhuRfw.css?_nc_x=Ij3Wp8lg5Kz US FACEBOOK 157.240.215.14 clean
https://www.youtube.com/supported_browsers?next_url=https%3A%2F%2Fwww.youtube.com%2F US GOOGLE 142.250.204.46 clean
https://accounts.google.com/v3/signin/identifier?continue=https%3A%2F%2Faccounts.google.com%2F&followup=https%3A%2F%2Faccounts.google.com%2F&ifkv=AVQVeyyGAuzn9a3z76ZcjJ_86wbJSidIfjfS9TcjHJMFLojLQH0IkqpoTM2fbcuLmlU3nQm3iQjlHg&passive=1209600&flowName=WebLi US GOOGLE 142.250.66.45 clean
https://accounts.google.com/InteractiveLogin?continue=https://accounts.google.com/&followup=https://accounts.google.com/&passive=1209600&ifkv=AVQVeywa7Mm0Zk8Gm5Hb9kGiEkDrs_pgduAfwvBWsacz3D950CTr9Khe11ewNMaKJf4MaAiHmWs_ US GOOGLE 142.250.66.45 clean
https://static.xx.fbcdn.net/rsrc.php/v3/yx/l/0,cross/7O04Eyj-1fg.css?_nc_x=Ij3Wp8lg5Kz US FACEBOOK 157.240.215.14 clean
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png US CLOUDFLARENET 172.64.145.151 clean
https://accounts.google.com/v3/signin/identifier?continue=https%3A%2F%2Faccounts.google.com%2F&followup=https%3A%2F%2Faccounts.google.com%2F&ifkv=AVQVeyxVtPgesztclkUEaiZDNru1Lk12ZQXjId8z3gxpZ4pOLgUmGhg-fxuwVplGdjkIvsmeJrFYuA&passive=1209600&flowName=WebLi US GOOGLE 142.250.66.45 clean
https://community.cloudflare.steamstatic.com/public/shared/javascript/login.js?v=Vbm1kuHoXmMB&l=english&_cdn=cloudflare US CLOUDFLARENET 172.64.145.151 clean
https://accounts.google.com/generate_204?Mxmnvw US GOOGLE 142.250.66.45 clean
https://fonts.gstatic.com/s/roboto/v30/KFOlCnqEu92Fr1MmEU9fBBc-.woff US GOOGLE 142.251.130.3 clean
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016 US CLOUDFLARENET 172.64.145.151 clean
https://steamcommunity.com/openid/loginform/ US Akamai International B.V. 104.75.41.21 clean
https://community.cloudflare.steamstatic.com/public/shared/fonts/MotivaSans-RegularItalic.ttf?v=4.015 US CLOUDFLARENET 172.64.145.151 clean
https://static.xx.fbcdn.net/rsrc.php/v3/yB/r/Y0L6f5sxdIV.png US FACEBOOK 157.240.215.14 clean
https://community.cloudflare.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1 US CLOUDFLARENET 172.64.145.151 clean
https://static-assets-prod.unrealengine.com/account-portal/static/epic-favicon-96x96.png Unknown 18.64.8.109 clean
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b7af69.js?v=tSnvragsq7Tn&l=english&_cdn=cloudflare US CLOUDFLARENET 172.64.145.151 clean
https://static.xx.fbcdn.net/rsrc.php/y1/r/4lCu2zih0ca.svg US FACEBOOK 157.240.215.14 clean
https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0&_cdn=cloudflare US CLOUDFLARENET 172.64.145.151 clean
ssl.gstatic.com US GOOGLE 142.250.207.99 clean
www.facebook.com US FACEBOOK 157.240.215.35 clean
fbsbx.com US FACEBOOK 157.240.215.35 clean
community.cloudflare.steamstatic.com US CLOUDFLARENET 172.64.145.151 clean
www.paypal.com US FASTLY 151.101.193.21 clean
store.steampowered.com US AKAMAI-AS 23.40.44.77 clean
www.youtube.com US GOOGLE 172.217.31.142 mailcious
static.xx.fbcdn.net US FACEBOOK 157.240.215.14 clean
steamcommunity.com US Akamai International B.V. 104.76.78.101 mailcious
static-assets-prod.unrealengine.com Unknown 18.64.8.66 clean
fbcdn.net US FACEBOOK 157.240.215.35 clean
connect.facebook.net US FACEBOOK 157.240.215.14 clean
twitter.com US TWITTER 104.244.42.1 clean
accounts.google.com US GOOGLE 142.250.206.205 clean
fonts.gstatic.com US GOOGLE 142.250.207.99 clean
facebook.com US FACEBOOK 157.240.215.35 clean
www.google.com US GOOGLE 142.250.76.132 clean
fonts.googleapis.com US GOOGLE 142.250.207.106 clean
www.epicgames.com US AMAZON-AES 52.204.190.22 clean
142.251.130.3 US GOOGLE 142.251.130.3 clean
23.40.44.77 US AKAMAI-AS 23.40.44.77 clean
18.64.8.109 Unknown 18.64.8.109 clean
77.91.124.1 RU Foton Telecom CJSC 77.91.124.1 malware
193.233.255.73 RU OOO FREEnet Group 193.233.255.73 mailcious
146.75.49.21 Unknown 146.75.49.21 clean
104.244.42.129 US TWITTER 104.244.42.129 suspicious
104.94.217.48 Unknown 104.94.217.48 clean
142.250.204.46 US GOOGLE 142.250.204.46 clean
172.217.31.3 US GOOGLE 172.217.31.3 clean
142.251.220.78 US GOOGLE 142.251.220.78 clean
172.64.145.151 US CLOUDFLARENET 172.64.145.151 clean
77.91.124.86 RU Foton Telecom CJSC 77.91.124.86 clean
104.75.41.21 US Akamai International B.V. 104.75.41.21 mailcious
142.250.66.45 US GOOGLE 142.250.66.45 clean
157.240.215.35 US FACEBOOK 157.240.215.35 clean
77.91.68.249 RU Foton Telecom CJSC 77.91.68.249 malware
52.45.237.32 US AMAZON-AES 52.45.237.32 clean
157.240.215.14 US FACEBOOK 157.240.215.14 clean
104.76.78.101 US Akamai International B.V. 104.76.78.101 mailcious
216.58.200.228 US GOOGLE 216.58.200.228 clean
54.175.89.124 US AMAZON-AES 54.175.89.124 clean
18.64.8.127 Unknown 18.64.8.127 clean
142.250.66.42 US GOOGLE 142.250.66.42 clean

Suricata ids

PE API

IAT(Import Address Table) Library

ADVAPI32.dll
 0x40a000 GetTokenInformation
 0x40a004 RegDeleteValueA
 0x40a008 RegOpenKeyExA
 0x40a00c RegQueryInfoKeyA
 0x40a010 FreeSid
 0x40a014 OpenProcessToken
 0x40a018 RegSetValueExA
 0x40a01c RegCreateKeyExA
 0x40a020 LookupPrivilegeValueA
 0x40a024 AllocateAndInitializeSid
 0x40a028 RegQueryValueExA
 0x40a02c EqualSid
 0x40a030 RegCloseKey
 0x40a034 AdjustTokenPrivileges
KERNEL32.dll
 0x40a060 _lopen
 0x40a064 _llseek
 0x40a068 CompareStringA
 0x40a06c GetLastError
 0x40a070 GetFileAttributesA
 0x40a074 GetSystemDirectoryA
 0x40a078 LoadLibraryA
 0x40a07c DeleteFileA
 0x40a080 GlobalAlloc
 0x40a084 GlobalFree
 0x40a088 CloseHandle
 0x40a08c WritePrivateProfileStringA
 0x40a090 IsDBCSLeadByte
 0x40a094 GetWindowsDirectoryA
 0x40a098 SetFileAttributesA
 0x40a09c GetProcAddress
 0x40a0a0 GlobalLock
 0x40a0a4 LocalFree
 0x40a0a8 RemoveDirectoryA
 0x40a0ac FreeLibrary
 0x40a0b0 _lclose
 0x40a0b4 CreateDirectoryA
 0x40a0b8 GetPrivateProfileIntA
 0x40a0bc GetPrivateProfileStringA
 0x40a0c0 GlobalUnlock
 0x40a0c4 ReadFile
 0x40a0c8 SizeofResource
 0x40a0cc WriteFile
 0x40a0d0 GetDriveTypeA
 0x40a0d4 lstrcmpA
 0x40a0d8 SetFileTime
 0x40a0dc SetFilePointer
 0x40a0e0 FindResourceA
 0x40a0e4 CreateMutexA
 0x40a0e8 GetVolumeInformationA
 0x40a0ec ExpandEnvironmentStringsA
 0x40a0f0 GetCurrentDirectoryA
 0x40a0f4 FreeResource
 0x40a0f8 GetVersion
 0x40a0fc SetCurrentDirectoryA
 0x40a100 GetTempPathA
 0x40a104 LocalFileTimeToFileTime
 0x40a108 CreateFileA
 0x40a10c SetEvent
 0x40a110 TerminateThread
 0x40a114 GetVersionExA
 0x40a118 LockResource
 0x40a11c GetSystemInfo
 0x40a120 CreateThread
 0x40a124 ResetEvent
 0x40a128 LoadResource
 0x40a12c ExitProcess
 0x40a130 GetModuleHandleW
 0x40a134 CreateProcessA
 0x40a138 FormatMessageA
 0x40a13c GetTempFileNameA
 0x40a140 DosDateTimeToFileTime
 0x40a144 CreateEventA
 0x40a148 GetExitCodeProcess
 0x40a14c FindNextFileA
 0x40a150 LocalAlloc
 0x40a154 GetShortPathNameA
 0x40a158 MulDiv
 0x40a15c GetDiskFreeSpaceA
 0x40a160 EnumResourceLanguagesA
 0x40a164 GetTickCount
 0x40a168 GetSystemTimeAsFileTime
 0x40a16c GetCurrentThreadId
 0x40a170 GetCurrentProcessId
 0x40a174 QueryPerformanceCounter
 0x40a178 TerminateProcess
 0x40a17c SetUnhandledExceptionFilter
 0x40a180 UnhandledExceptionFilter
 0x40a184 GetStartupInfoW
 0x40a188 Sleep
 0x40a18c FindClose
 0x40a190 GetCurrentProcess
 0x40a194 FindFirstFileA
 0x40a198 WaitForSingleObject
 0x40a19c GetModuleFileNameA
 0x40a1a0 LoadLibraryExA
GDI32.dll
 0x40a058 GetDeviceCaps
USER32.dll
 0x40a1a8 SetWindowLongA
 0x40a1ac GetDlgItemTextA
 0x40a1b0 DialogBoxIndirectParamA
 0x40a1b4 ShowWindow
 0x40a1b8 MsgWaitForMultipleObjects
 0x40a1bc SetWindowPos
 0x40a1c0 GetDC
 0x40a1c4 GetWindowRect
 0x40a1c8 DispatchMessageA
 0x40a1cc GetDesktopWindow
 0x40a1d0 CharUpperA
 0x40a1d4 SetDlgItemTextA
 0x40a1d8 ExitWindowsEx
 0x40a1dc MessageBeep
 0x40a1e0 EndDialog
 0x40a1e4 CharPrevA
 0x40a1e8 LoadStringA
 0x40a1ec CharNextA
 0x40a1f0 EnableWindow
 0x40a1f4 ReleaseDC
 0x40a1f8 SetForegroundWindow
 0x40a1fc PeekMessageA
 0x40a200 GetDlgItem
 0x40a204 SendMessageA
 0x40a208 SendDlgItemMessageA
 0x40a20c MessageBoxA
 0x40a210 SetWindowTextA
 0x40a214 GetWindowLongA
 0x40a218 CallWindowProcA
 0x40a21c GetSystemMetrics
msvcrt.dll
 0x40a234 _controlfp
 0x40a238 ?terminate@@YAXXZ
 0x40a23c _acmdln
 0x40a240 _initterm
 0x40a244 __setusermatherr
 0x40a248 _except_handler4_common
 0x40a24c memcpy
 0x40a250 _ismbblead
 0x40a254 __p__fmode
 0x40a258 _cexit
 0x40a25c _exit
 0x40a260 exit
 0x40a264 __set_app_type
 0x40a268 __getmainargs
 0x40a26c _amsg_exit
 0x40a270 __p__commode
 0x40a274 _XcptFilter
 0x40a278 memcpy_s
 0x40a27c _vsnprintf
 0x40a280 memset
COMCTL32.dll
 0x40a03c None
Cabinet.dll
 0x40a044 None
 0x40a048 None
 0x40a04c None
 0x40a050 None
VERSION.dll
 0x40a224 GetFileVersionInfoA
 0x40a228 VerQueryValueA
 0x40a22c GetFileVersionInfoSizeA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure