File name:

Butterfly On Desktop_1.0.exe

Full analysis: https://app.any.run/tasks/30de92f9-30df-41e3-952f-972a8a85271a
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: December 05, 2023, 02:55:33
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
stealer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

B0A46BDCEEC5B9BEE139749A207EF7F8

SHA1:

279D59A3DD772D97F47F9516C897B3DD42F742C0

SHA256:

78FE70328471CC2149EF0DF79215F10CB53C4D32DD4193F39C50ABBD9EAB2EEF

SSDEEP:

196608:wjPllBkm9+zoSfSOspbLik8S6sB0UzXFNfj+ugK:wj9Im9+MISOgbLikn6L4X/hH

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Butterfly On Desktop_1.0.exe (PID: 2524)
      • Butterfly On Desktop_1.0.exe (PID: 2988)
    • Actions looks like stealing of personal data

      • Butterfly On Desktop_1.0.exe (PID: 2524)
      • Butterfly On Desktop_1.0.exe (PID: 2988)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • Butterfly On Desktop_1.0.exe (PID: 2524)
      • Butterfly On Desktop_1.0.exe (PID: 2988)
    • The process drops C-runtime libraries

      • Butterfly On Desktop_1.0.exe (PID: 2524)
      • Butterfly On Desktop_1.0.exe (PID: 2988)
    • Reads the Internet Settings

      • Butterfly On Desktop_1.0.exe (PID: 2524)
      • Butterfly On Desktop_1.0.exe (PID: 2988)
      • sipnotify.exe (PID: 1692)
    • The process creates files with name similar to system file names

      • Butterfly On Desktop_1.0.exe (PID: 2524)
      • Butterfly On Desktop_1.0.exe (PID: 2988)
    • Reads the Windows owner or organization settings

      • Butterfly On Desktop_1.0.exe (PID: 2524)
      • Butterfly On Desktop_1.0.exe (PID: 2988)
    • Checks Windows Trust Settings

      • Butterfly On Desktop_1.0.exe (PID: 2524)
      • Butterfly On Desktop_1.0.exe (PID: 2988)
    • Reads security settings of Internet Explorer

      • Butterfly On Desktop_1.0.exe (PID: 2524)
      • Butterfly On Desktop_1.0.exe (PID: 2988)
    • Reads settings of System Certificates

      • Butterfly On Desktop_1.0.exe (PID: 2524)
      • Butterfly On Desktop_1.0.exe (PID: 2988)
      • sipnotify.exe (PID: 1692)
    • Adds/modifies Windows certificates

      • Butterfly On Desktop_1.0.exe (PID: 2524)
    • Searches for installed software

      • Butterfly On Desktop_1.0.exe (PID: 2524)
      • Butterfly On Desktop_1.0.exe (PID: 2988)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 1152)
      • cmd.exe (PID: 3632)
    • Starts CMD.EXE for commands execution

      • Butterfly On Desktop_1.0.exe (PID: 2524)
      • Butterfly On Desktop_1.0.exe (PID: 2988)
    • Get information on the list of running processes

      • cmd.exe (PID: 1152)
      • cmd.exe (PID: 3632)
    • Executing commands from a ".bat" file

      • Butterfly On Desktop_1.0.exe (PID: 2524)
      • Butterfly On Desktop_1.0.exe (PID: 2988)
    • The process executes via Task Scheduler

      • ctfmon.exe (PID: 1504)
      • sipnotify.exe (PID: 1692)
  • INFO

    • Reads the computer name

      • Butterfly On Desktop_1.0.exe (PID: 2524)
      • wmpnscfg.exe (PID: 2908)
      • Butterfly On Desktop_1.0.exe (PID: 2988)
      • IMEKLMG.EXE (PID: 1300)
      • wmpnscfg.exe (PID: 2264)
      • wmpnscfg.exe (PID: 2308)
      • IMEKLMG.EXE (PID: 148)
    • Checks supported languages

      • Butterfly On Desktop_1.0.exe (PID: 2524)
      • Butterfly On Desktop_1.0.exe (PID: 2988)
      • wmpnscfg.exe (PID: 2908)
      • IMEKLMG.EXE (PID: 148)
      • IMEKLMG.EXE (PID: 1300)
      • wmpnscfg.exe (PID: 2264)
      • wmpnscfg.exe (PID: 2308)
    • Reads the machine GUID from the registry

      • Butterfly On Desktop_1.0.exe (PID: 2524)
      • Butterfly On Desktop_1.0.exe (PID: 2988)
    • Create files in a temporary directory

      • Butterfly On Desktop_1.0.exe (PID: 2524)
      • Butterfly On Desktop_1.0.exe (PID: 2988)
    • Reads Environment values

      • Butterfly On Desktop_1.0.exe (PID: 2524)
      • Butterfly On Desktop_1.0.exe (PID: 2988)
    • Reads product name

      • Butterfly On Desktop_1.0.exe (PID: 2524)
      • Butterfly On Desktop_1.0.exe (PID: 2988)
    • Creates files or folders in the user directory

      • Butterfly On Desktop_1.0.exe (PID: 2524)
      • Butterfly On Desktop_1.0.exe (PID: 2988)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 2908)
      • Butterfly On Desktop_1.0.exe (PID: 2988)
      • IMEKLMG.EXE (PID: 1300)
      • IMEKLMG.EXE (PID: 148)
      • wmpnscfg.exe (PID: 2264)
      • wmpnscfg.exe (PID: 2308)
    • Process checks are UAC notifies on

      • IMEKLMG.EXE (PID: 1300)
      • IMEKLMG.EXE (PID: 148)
    • Reads security settings of Internet Explorer

      • sipnotify.exe (PID: 1692)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:03:28 17:40:28+02:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 4022784
InitializedDataSize: 2968064
UninitializedDataSize: -
EntryPoint: 0x3d807e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.1.2.6582
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileVersion: 1.1.2.6582
ProductVersion: 1
Comments: -
CompanyName: Drive Software Company
FileDescription: Software Installation
InternalName: -
LegalCopyright: ITNT SRL
LegalTrademarks: -
OriginalFileName: GenericSetup.exe
ProductName: Butterfly On Desktop
AssemblyVersion: 1.1.2.6582
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
110
Monitored processes
18
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start butterfly on desktop_1.0.exe wmpnscfg.exe no specs cmd.exe no specs tasklist.exe no specs find.exe no specs timeout.exe no specs butterfly on desktop_1.0.exe cmd.exe no specs tasklist.exe no specs find.exe no specs timeout.exe no specs ctfmon.exe no specs sipnotify.exe imeklmg.exe no specs imeklmg.exe no specs wmpnscfg.exe no specs wmpnscfg.exe no specs butterfly on desktop_1.0.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
148"C:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXE" /SetPreload /KOR /LogC:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Office IME 2010
Exit code:
1
Version:
14.0.4734.1000
Modules
Images
c:\program files\common files\microsoft shared\ime14\shared\imeklmg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\userenv.dll
684find /I "2524"C:\Windows\System32\find.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (grep) Utility
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\find.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
844"C:\Users\admin\Desktop\Butterfly On Desktop_1.0.exe" C:\Users\admin\Desktop\Butterfly On Desktop_1.0.exeexplorer.exe
User:
admin
Company:
Drive Software Company
Integrity Level:
MEDIUM
Description:
Software Installation
Exit code:
3221226540
Version:
1.1.2.6582
Modules
Images
c:\users\admin\desktop\butterfly on desktop_1.0.exe
c:\windows\system32\ntdll.dll
1004find /I "2988"C:\Windows\System32\find.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (grep) Utility
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\find.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1152C:\Windows\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\H2OCleanup.bat""C:\Windows\System32\cmd.exeButterfly On Desktop_1.0.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1300"C:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXE" /SetPreload /JPN /LogC:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Office IME 2010
Exit code:
1
Version:
14.0.4734.1000
Modules
Images
c:\program files\common files\microsoft shared\ime14\shared\imeklmg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\userenv.dll
1504C:\Windows\System32\ctfmon.exe C:\Windows\System32\ctfmon.exetaskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CTF Loader
Exit code:
1073807364
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ctfmon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msctfmonitor.dll
c:\windows\system32\msctf.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
1692C:\Windows\system32\sipnotify.exe -LogonOrUnlockC:\Windows\System32\sipnotify.exe
taskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
sipnotify
Exit code:
0
Version:
6.1.7602.20480 (win7sp1_ldr_escrow.191010-1716)
Modules
Images
c:\windows\system32\sipnotify.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1936timeout 5C:\Windows\System32\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
timeout - pauses command processing
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\timeout.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
2264"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
13 311
Read events
13 186
Write events
125
Delete events
0

Modification events

(PID) Process:(2524) Butterfly On Desktop_1.0.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
Operation:writeName:PendingFileRenameOperations
Value:
\??\C:\Users\admin\AppData\Local\Temp\3354215998cc498efdf76f123473fe62\ServiceHide.dll
(PID) Process:(2524) Butterfly On Desktop_1.0.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2524) Butterfly On Desktop_1.0.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2524) Butterfly On Desktop_1.0.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2524) Butterfly On Desktop_1.0.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2524) Butterfly On Desktop_1.0.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\17F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2524) Butterfly On Desktop_1.0.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\8CF427FD790C3AD166068DE81E57EFBB932272D4
Operation:writeName:Blob
Value:
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
(PID) Process:(2524) Butterfly On Desktop_1.0.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\8CF427FD790C3AD166068DE81E57EFBB932272D4
Operation:writeName:Blob
Value:
0400000001000000100000004BE2C99196650CF40E5A9392A00AFEB27F000000010000002C000000302A060A2B0601040182370A030406082B0601050507030506082B0601050507030606082B06010505070307090000000100000054000000305206082B0601050507030206082B06010505070303060A2B0601040182370A030406082B0601050507030406082B0601050507030606082B0601050507030706082B0601050507030106082B060105050703080F0000000100000020000000FDE5F2D9CE2026E1E10064C0A468C9F355B90ACF85BAF5CE6F52D4016837FD940300000001000000140000008CF427FD790C3AD166068DE81E57EFBB932272D41D0000000100000010000000521B5F4582C1DCAAE381B05E37CA2D341400000001000000140000006A72267AD01EEF7DE73B6951D46C8D9F901266AB0B000000010000001800000045006E00740072007500730074002E006E0065007400000062000000010000002000000043DF5774B03E7FEF5FE40D931A7BEDF1BB2E6B42738C4E6D3841103D3AA7F339190000000100000010000000FA46CE7CBB85CFB4310075313A09EE05530000000100000041000000303F3020060A6086480186FA6C0A010230123010060A2B0601040182373C0101030200C0301B060567810C010330123010060A2B0601040182373C0101030200C07E000000010000000800000000C001B39667D6012000000001000000420400003082043E30820326A00302010202044A538C28300D06092A864886F70D01010B05003081BE310B300906035504061302555331163014060355040A130D456E74727573742C20496E632E31283026060355040B131F536565207777772E656E74727573742E6E65742F6C6567616C2D7465726D7331393037060355040B1330286329203230303920456E74727573742C20496E632E202D20666F7220617574686F72697A656420757365206F6E6C793132303006035504031329456E747275737420526F6F742043657274696669636174696F6E20417574686F72697479202D204732301E170D3039303730373137323535345A170D3330313230373137353535345A3081BE310B300906035504061302555331163014060355040A130D456E74727573742C20496E632E31283026060355040B131F536565207777772E656E74727573742E6E65742F6C6567616C2D7465726D7331393037060355040B1330286329203230303920456E74727573742C20496E632E202D20666F7220617574686F72697A656420757365206F6E6C793132303006035504031329456E747275737420526F6F742043657274696669636174696F6E20417574686F72697479202D20473230820122300D06092A864886F70D01010105000382010F003082010A0282010100BA84B672DB9E0C6BE299E93001A776EA32B895411AC9DA614E5872CFFEF68279BF7361060AA527D8B35FD3454E1C72D64E32F2728A0FF78319D06A808000451EB0C7E79ABF1257271CA3682F0A87BD6A6B0E5E65F31C77D5D4858D7021B4B332E78BA2D5863902B1B8D247CEE4C949C43BA7DEFB547D57BEF0E86EC279B23A0B55E250981632135C2F7856C1C294B3F25AE4279A9F24D7C6ECD09B2582E3CCC2C445C58C977A066B2A119FA90A6E483B6FDBD4111942F78F07BFF5535F9C3EF4172CE669AC4E324C6277EAB7E8E5BB34BC198BAE9C51E7B77EB553B13322E56DCF703C1AFAE29B67B683F48DA5AF624C4DE058AC64341203F8B68D946324A4710203010001A3423040300E0603551D0F0101FF040403020106300F0603551D130101FF040530030101FF301D0603551D0E041604146A72267AD01EEF7DE73B6951D46C8D9F901266AB300D06092A864886F70D01010B05000382010100799F1D96C6B6793F228D87D3870304606A6B9A2E59897311AC43D1F513FF8D392BC0F2BD4F708CA92FEA17C40B549ED41B9698333CA8AD62A20076AB59696E061D7EC4B9448D98AF12D461DB0A194647F3EBF763C1400540A5D2B7F4B59A36BFA98876880455042B9C877F1A373C7E2DA51AD8D4895ECABDAC3D6CD86DAFD5F3760FCD3B8838229D6C939AC43DBF821B653FA60F5DAAFCE5B215CAB5ADC6BC3DD084E8EA0672B04D393278BF3E119C0BA49D9A21F3F09B0B3078DBC1DC8743FEBC639ACAC5C21CC9C78DFF3B125808E6B63DEC7A2C4EFB8396CE0C3C69875473A473C293FF5110AC155401D8FC05B189A17F74839A49D7DC4E7B8A486F8B45F6
(PID) Process:(2988) Butterfly On Desktop_1.0.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
Operation:writeName:PendingFileRenameOperations
Value:
\??\C:\Users\admin\AppData\Local\Temp\3354215998cc498efdf76f123473fe62\ServiceHide.dll
(PID) Process:(2988) Butterfly On Desktop_1.0.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
36
Suspicious files
1
Text files
39
Unknown types
0

Dropped files

PID
Process
Filename
Type
2524Butterfly On Desktop_1.0.exeC:\Users\admin\AppData\Local\Temp\3354215998cc498efdf76f123473fe62\Ninject.dllexecutable
MD5:8DB691813A26E7D0F1DB5E2F4D0D05E3
SHA256:3043A65F11AC204E65BCA142FF4166D85F1B22078B126B806F1FECB2A315C701
2524Butterfly On Desktop_1.0.exeC:\Users\admin\AppData\Local\Temp\3354215998cc498efdf76f123473fe62\H2OModels.dllexecutable
MD5:E57646A871A04782FD546583A01D62B4
SHA256:F5138FE637E5B1B735FB2E54607147CEB973CC537AD07690EF1BCA27AC6DA4B5
2524Butterfly On Desktop_1.0.exeC:\Users\admin\AppData\Local\Temp\3354215998cc498efdf76f123473fe62\OfferSDK.dllexecutable
MD5:1105B8B33B0F019651566B87959512E2
SHA256:9A059883BEE5177723B1A971172010A349DB64C1DD60FCB3BBF190FE0E78BB07
2524Butterfly On Desktop_1.0.exeC:\Users\admin\AppData\Local\Temp\3354215998cc498efdf76f123473fe62\vcruntime140.dllexecutable
MD5:1A84957B6E681FCA057160CD04E26B27
SHA256:9FAEAA45E8CC986AF56F28350B38238B03C01C355E9564B849604B8D690919C5
2524Butterfly On Desktop_1.0.exeC:\Users\admin\AppData\Local\Temp\3354215998cc498efdf76f123473fe62\H2OServices.dllexecutable
MD5:046EDD0EE8296E611920786C4F25CD7A
SHA256:EED0EABB8ECBF5D30ABC0ED992F2EC2F28FA2E7D5588A090D357AF424A4DDD84
2524Butterfly On Desktop_1.0.exeC:\Users\admin\AppData\Local\Temp\3354215998cc498efdf76f123473fe62\H2OUtilities.dllexecutable
MD5:DE46930143BFC9B30F0F68EF2317A320
SHA256:FE4942CF5B5FDFD04E6AF4CDAA128FBADD35B9A4C6D7D6B4407A02CE55131932
2524Butterfly On Desktop_1.0.exeC:\Users\admin\AppData\Local\Temp\3354215998cc498efdf76f123473fe62\SciterWrapper.dllexecutable
MD5:6CBC4475B6AF8A6F68ED8696DF09FF2D
SHA256:51E42FF1D66F3042E512BE1DD60AC1C7B1A2A5307ACD191DFFCF24EF106C8970
2524Butterfly On Desktop_1.0.exeC:\Users\admin\AppData\Local\Temp\3354215998cc498efdf76f123473fe62\H2ODAL.dllexecutable
MD5:D7134E64BDCE2EA5FA7504781A57ADAA
SHA256:F28041AB9EDB612DA9E7C42BB4D940E69FB440D4CB786F969512E0B61E54E637
2524Butterfly On Desktop_1.0.exeC:\Users\admin\AppData\Local\Temp\3354215998cc498efdf76f123473fe62\HtmlAgilityPack.dllexecutable
MD5:17220F65BD242B6A491423D5BB7940C1
SHA256:23056F14EDB6E0AFC70224D65DE272A710B5D26E6C3B9FE2DFD022073050C59F
2524Butterfly On Desktop_1.0.exeC:\Users\admin\AppData\Local\Temp\3354215998cc498efdf76f123473fe62\ServiceHide.dllexecutable
MD5:26D7A9A819AD38801857D657DA7B43DA
SHA256:43BAD9C77F861C5CE0F622896A33DBD8C34157C004550CAC22CC97D3A4BA3052
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
13
DNS requests
4
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1692
sipnotify.exe
HEAD
200
23.197.138.118:80
http://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2JgkA?v=133462186471250000
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:138
whitelisted
2588
svchost.exe
239.255.255.250:1900
whitelisted
2524
Butterfly On Desktop_1.0.exe
104.18.68.73:443
h2oapi.adaware.com
CLOUDFLARENET
unknown
2524
Butterfly On Desktop_1.0.exe
104.17.8.52:443
flow.lavasoft.com
CLOUDFLARENET
shared
2988
Butterfly On Desktop_1.0.exe
104.18.68.73:443
h2oapi.adaware.com
CLOUDFLARENET
unknown
2988
Butterfly On Desktop_1.0.exe
104.17.8.52:443
flow.lavasoft.com
CLOUDFLARENET
shared
1692
sipnotify.exe
23.197.138.118:80
query.prod.cms.rt.microsoft.com
Akamai International B.V.
US
unknown
1092
svchost.exe
224.0.0.252:5355
unknown

DNS requests

Domain
IP
Reputation
h2oapi.adaware.com
  • 104.18.68.73
  • 104.18.67.73
unknown
www.google.com
  • 142.250.186.132
whitelisted
flow.lavasoft.com
  • 104.17.8.52
  • 104.17.9.52
whitelisted
query.prod.cms.rt.microsoft.com
  • 23.197.138.118
whitelisted

Threats

Found threats are available for the paid subscriptions
2 ETPRO signatures available at the full report
No debug info