Loading ...

Play interactive tourEdit tour

Analysis Report http://feedproxy.google.com/~r/rdgahz/~3/KxTOprzA7Go/databank.php?param1=param1&c=dfoster@edgewortheconomics.com

Overview

General Information

Sample URL:http://feedproxy.google.com/~r/rdgahz/~3/KxTOprzA7Go/databank.php?param1=param1&c=dfoster@edgewortheconomics.com
Analysis ID:433013
Infos:

Most interesting Screenshot:

Errors
  • URL not reachable

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

URL contains potential PII (phishing indication)

Classification

Analysis Advice

Joe Sandbox was unable to browse the URL (domain or webserver down or HTTPS issue), try to browse the URL again later
Uses HTTPS for network communication, use the 'Proxy HTTPS (port 443) to read its encrypted data' cookbook for further analysis

Process Tree

  • System is w10x64
  • iexplore.exe (PID: 5340 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 2416 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5340 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: http://feedproxy.google.com/~r/rdgahz/~3/KxTOprzA7Go/databank.php?param1=param1&c=dfoster@edgewortheconomics.comSample URL: PII: dfoster@edgewortheconomics.com
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
Source: unknownHTTPS traffic detected: 94.130.229.185:443 -> 192.168.2.3:49713 version: TLS 1.2
Source: unknownHTTPS traffic detected: 94.130.229.185:443 -> 192.168.2.3:49714 version: TLS 1.2
Source: unknownDNS traffic detected: queries for: ganbiya.com
Source: {5C0FE4AE-CAB2-11EB-90E4-ECF4BB862DED}.dat.1.dr, ~DFB95526EF5CC5F7CB.TMP.1.drString found in binary or memory: https://ganbiya.com/databank.php?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownHTTPS traffic detected: 94.130.229.185:443 -> 192.168.2.3:49713 version: TLS 1.2
Source: unknownHTTPS traffic detected: 94.130.229.185:443 -> 192.168.2.3:49714 version: TLS 1.2
Source: classification engineClassification label: unknown0.win@3/15@1/1
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\HighJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DF2B32E0794A59CB53.TMPJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5340 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5340 CREDAT:17410 /prefetch:2Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
http://feedproxy.google.com/~r/rdgahz/~3/KxTOprzA7Go/databank.php?param1=param1&c=dfoster@edgewortheconomics.com0%Avira URL Cloudsafe

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

SourceDetectionScannerLabelLink
ganbiya.com2%VirustotalBrowse

URLs

SourceDetectionScannerLabelLink
https://ganbiya.com/databank.php?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A0%Avira URL Cloudsafe

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
ganbiya.com
94.130.229.185
truefalseunknown

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
https://ganbiya.com/databank.php?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A{5C0FE4AE-CAB2-11EB-90E4-ECF4BB862DED}.dat.1.dr, ~DFB95526EF5CC5F7CB.TMP.1.drfalse
  • Avira URL Cloud: safe
unknown

Contacted IPs

  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Public

IPDomainCountryFlagASNASN NameMalicious
94.130.229.185
ganbiya.comGermany
24940HETZNER-ASDEfalse

General Information

Joe Sandbox Version:32.0.0 Black Diamond
Analysis ID:433013
Start date:11.06.2021
Start time:05:40:51
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 2m 20s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:browseurl.jbs
Sample URL:http://feedproxy.google.com/~r/rdgahz/~3/KxTOprzA7Go/databank.php?param1=param1&c=dfoster@edgewortheconomics.com
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:4
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:UNKNOWN
Classification:unknown0.win@3/15@1/1
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • URL browsing timeout or error
Warnings:
Show All
  • Exclude process from analysis (whitelisted): ielowutil.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 13.88.21.125, 168.61.161.212, 88.221.62.148, 172.217.18.78, 104.43.139.144, 20.82.209.183
  • Excluded domains from analysis (whitelisted): iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, skypedataprdcolcus17.cloudapp.net, skypedataprdcolcus16.cloudapp.net, www4.l.google.com, arc.msn.com, e11290.dspg.akamaiedge.net, go.microsoft.com, blobcollector.events.data.trafficmanager.net, go.microsoft.com.edgekey.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, feedproxy.google.com, skypedataprdcolwus15.cloudapp.net
  • Not all processes where analyzed, report is missing behavior information
Errors:
  • URL not reachable

Simulations

Behavior and APIs

No simulations

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5C0FE4AC-CAB2-11EB-90E4-ECF4BB862DED}.dat
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:Microsoft Word Document
Category:dropped
Size (bytes):30296
Entropy (8bit):1.860753893480666
Encrypted:false
SSDEEP:192:r7Z4ZxP2xGWx5tx1fxuuWMx/exXO0xpfxGZmX:rNY475nJYhJX5
MD5:470AA2DB2C38BAE717897682FE2FDE90
SHA1:856992925AC64A7D805D22F8498C1656168B2DF5
SHA-256:398E34D6021230D0E83013A2B27988A2C48E05AF032F736D6FC73CCF8C152B13
SHA-512:EE14F960509756019E0DF9D1DA45880E061644D3BD736CAD4CBD4C70C8139B35240BDECE9C1E2C5E86BA51D0A789004006DC3CD37547F3C3FC4C35B38DAABC35
Malicious:false
Reputation:low
Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{5C0FE4AE-CAB2-11EB-90E4-ECF4BB862DED}.dat
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:Microsoft Word Document
Category:dropped
Size (bytes):24452
Entropy (8bit):1.6862820236494278
Encrypted:false
SSDEEP:48:IwTGcpr77Gwpa/G4pQPGrapbSJGQpB+GHHpcnTGUp8dGzYpmgaGopx+z5LcktnxP:rpZ7VQR6TBSDjN2xWjM73aW0nxWu0g
MD5:24BC774BEFA94FE412FCBB71B16E14A6
SHA1:09E5D033266BC8367989CDB08A6EDD883690B02E
SHA-256:B766A403C6E5AB5EB9D3863EC84F3E3BFC283EF2FB9ED1ECE16B675AE18067AB
SHA-512:6DD1027B17C9B7947075034EE74CED946C5F8CACD520D7C21AA1D892C439C68647F400AEF1F9603232D393E9C5A1ACA96237852EAB2ECD7121BF175E6C93CCAD
Malicious:false
Reputation:low
Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{5C0FE4AF-CAB2-11EB-90E4-ECF4BB862DED}.dat
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:Microsoft Word Document
Category:dropped
Size (bytes):16984
Entropy (8bit):1.5668000035899838
Encrypted:false
SSDEEP:48:IwZoGcprbzGwpaOG4pQSGrapbSnGQpKJG7HpRNTGIpG:rZcZbtQu6UBSRAoTrA
MD5:394B442BCA432BF07443A7C9A405F2E9
SHA1:4967D8FC3E4D81D78663207A51EAA136CAA43C6C
SHA-256:D568BB86E93A6EFAC2E19546E3801978A57C0C1F03B7354780E0456A8D862CEA
SHA-512:DEE104670CD061998BF5CDE4DA0D6B353027742A7C5298B7CA8C401912BB5FB996C3BA6457082CE3DEAAB09D3A998ADE5A6057109B1A80C352B9ED1D2CAA302E
Malicious:false
Reputation:low
Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\ErrorPageTemplate[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
Category:downloaded
Size (bytes):2168
Entropy (8bit):5.207912016937144
Encrypted:false
SSDEEP:24:5+j5xU5k5N0ndgvoyeP0yyiyQCDr3nowMVworDtX3orKxWxDnCMA0da+hieyuSQK:5Q5K5k5pvFehWrrarrZIrHd3FIQfOS6
MD5:F4FE1CB77E758E1BA56B8A8EC20417C5
SHA1:F4EDA06901EDB98633A686B11D02F4925F827BF0
SHA-256:8D018639281B33DA8EB3CE0B21D11E1D414E59024C3689F92BE8904EB5779B5F
SHA-512:62514AB345B6648C5442200A8E9530DFB88A0355E262069E0A694289C39A4A1C06C6143E5961074BFAC219949102A416C09733F24E8468984B96843DC222B436
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/ErrorPageTemplate.css
Preview: .body..{...font-family: "Segoe UI", "verdana", "arial";...background-image: url(background_gradient.jpg);...background-repeat: repeat-x;...background-color: #E8EAEF;...margin-top: 20px;...margin-left: 20px;...color: #575757;..}....body.securityError..{...font-family: "Segoe UI", "verdana" , "Arial";...background-image: url(background_gradient_red.jpg);...background-repeat: repeat-x;...background-color: #E8EAEF;...margin-top: 20px;...margin-left: 20px;..}....body.tabInfo..{...background-image: none;...background-color: #F4F4F4;..}.. ..a..{...color: rgb(19,112,171);.font-size: 1em;...font-weight: normal;...text-decoration: none;...margin-left: 0px;...vertical-align: top;..}....a:link, a:visited..{...color: rgb(19,112,171);...text-decoration: none;...vertical-align: top;..}....a:hover..{...color: rgb(7,74,229);...text-decoration: underline;..}....p..{...font-size: 0.9em;..}.....h1 /* used for Title */..{...color: #4465A2;...font-size: 1.1em;...font-weight: normal;...vertical-align
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\bullet[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
Category:downloaded
Size (bytes):447
Entropy (8bit):7.304718288205936
Encrypted:false
SSDEEP:12:6v/71Cyt/JNTWxGdr+kZDWO7+4dKIv0b1GKuxu+R:/yBJNTqsSk9BTwE05su+R
MD5:26F971D87CA00E23BD2D064524AEF838
SHA1:7440BEFF2F4F8FABC9315608A13BF26CABAD27D9
SHA-256:1D8E5FD3C1FD384C0A7507E7283C7FE8F65015E521B84569132A7EABEDC9D41D
SHA-512:C62EB51BE301BB96C80539D66A73CD17CA2021D5D816233853A37DB72E04050271E581CC99652F3D8469B390003CA6C62DAD2A9D57164C620B7777AE99AA1B15
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/bullet.png
Preview: .PNG........IHDR...............ex....PLTE...(EkFRp&@e&@e)Af)AgANjBNjDNjDNj2Vv-Xz-Y{3XyC\}E_.2j.3l.8p.7q.;j.;l.Zj.\l.5o.7q.<..aw.<..dz.E...........1..@.7..~.....9..:.....A..B..E..9..:..a..c..b..g.#M.%O.#r.#s.%y.2..4..+..-..?..@..;..p..s...G..H..M.........z`....#tRNS................................../,....mIDATx^..C..`.......S....y'...05...|..k.X......*`.F.K....JQ..u.<.}.. ..[U..m....'r%.......yn.`.7F..).5..b..rX.T.....IEND.B`.
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\http_404[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:HTML document, UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
Category:downloaded
Size (bytes):6495
Entropy (8bit):3.8998802417135856
Encrypted:false
SSDEEP:48:up4d0yV4VkBXvLutC5N9J/1a5TI7kZ3GUXn3GFa7K083GJehBu01kptk7KwyBwpM:uKp6yN9JaKktZX36a7x05hwW7RM
MD5:F65C729DC2D457B7A1093813F1253192
SHA1:5006C9B50108CF582BE308411B157574E5A893FC
SHA-256:B82BFB6FA37FD5D56AC7C00536F150C0F244C81F1FC2D4FEFBBDC5E175C71B4F
SHA-512:717AFF18F105F342103D36270D642CC17BD9921FF0DBC87E3E3C2D897F490F4ECFAB29CF998D6D99C4951C3EABB356FE759C3483A33704CE9FCC1F546EBCBBC7
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/http_404.htm
Preview: .<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">....<html dir="ltr">.... <head>.. <link rel="stylesheet" type="text/css" href="ErrorPageTemplate.css">.... <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.... <title>HTTP 404 Not Found</title>.... <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="javascript:initHomepage(); expandCollapse('infoBlockID', true); initGoBack(); initMoreInfo('infoBlockID');">.... <table width="730" cellpadding="0" cellspacing="0" border="0">.... Error title -->.. <tr>.. <td id="infoIconAlign" width="60" align="left" valign="top" rowspan="2">.. <img src="info_48.png" id="infoIcon" alt="Info icon">..
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\info_48[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:PNG image data, 47 x 48, 8-bit/color RGBA, non-interlaced
Category:downloaded
Size (bytes):4113
Entropy (8bit):7.9370830126943375
Encrypted:false
SSDEEP:96:WNTJL8szf79M8FUjE39KJoUUuJPnvmKacs6Uq7qDMj1XPL:WNrzFoQSJPnvzs6rL
MD5:5565250FCC163AA3A79F0B746416CE69
SHA1:B97CC66471FCDEE07D0EE36C7FB03F342C231F8F
SHA-256:51129C6C98A82EA491F89857C31146ECEC14C4AF184517450A7A20C699C84859
SHA-512:E60EA153B0FECE4D311769391D3B763B14B9A140105A36A13DAD23C2906735EAAB9092236DEB8C68EF078E8864D6E288BEF7EF1731C1E9F1AD9B0170B95AC134
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/info_48.png
Preview: .PNG........IHDR.../...0.......#.....IDATx^...pUU..{....KB........!....F......jp.Q.......Vg.F..m.Q....{...,m.@.56D...&$d!.<..}....s..K9.....{............[./<..T..I.I..JR)).9.k.N.%.E.W^}....Po..............X..;.=.P......./...+...9./..s.....9..|.......*.7v.`..V.....-^.$S[[[......K..z......3..3....5 ...0.."/n/.c...&.{.ht..?....A..I{.n.....|....t......N}..%.v...:.E..i....`....a.k.mg.LX..fcFU.fO-..YEfd.}...~."......}l$....^.re..'^X..*}.?.^U.G..... .30...X......f[.l0.P`..KC...[..[..6....~..i..Q.|;x..T ..........s.5...n+.0..;...H#.2..#.M..m[^3x&E.Ya..\K..{[..M..g...yf0..~....M.]7..ZZZ:..a.O.G64]....9..l[..a....N,,.h......5...f*.y...}...BX{.G^...?.c.......s^..P.(..G...t.0.:.X.DCs.....]vf...py).........x..>-..Be.a...G...Y!...z...g.{....d.s.o.....%.x......R.W.....Z.b,....!..6Ub....U.qY(/v..m.a...4.`Qr\.E.G..a)..t..e.j.W........C<.1.....c..l1w....]3%....tR;.,..3..-.NW.5...t..H..h..D..b......M....)B..2J...)..o..m..M.t....wn./....+Wv....xkg..*..
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\down[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
Category:downloaded
Size (bytes):748
Entropy (8bit):7.249606135668305
Encrypted:false
SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
MD5:C4F558C4C8B56858F15C09037CD6625A
SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/down.png
Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\errorPageStrings[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
Category:downloaded
Size (bytes):4720
Entropy (8bit):5.164796203267696
Encrypted:false
SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
MD5:D65EC06F21C379C87040B83CC1ABAC6B
SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/errorPageStrings.js
Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\background_gradient[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1x800, frames 3
Category:downloaded
Size (bytes):453
Entropy (8bit):5.019973044227213
Encrypted:false
SSDEEP:6:3llVuiPjlXJYhg5suRd8PImMo23C/kHrJ8yA/NIeYoWg78C/vTFvbKLAh3:V/XPYhiPRd8j7+9LoIrobtHTdbKi
MD5:20F0110ED5E4E0D5384A496E4880139B
SHA1:51F5FC61D8BF19100DF0F8AADAA57FCD9C086255
SHA-256:1471693BE91E53C2640FE7BAEECBC624530B088444222D93F2815DFCE1865D5B
SHA-512:5F52C117E346111D99D3B642926139178A80B9EC03147C00E27F07AAB47FE38E9319FE983444F3E0E36DEF1E86DD7C56C25E44B14EFDC3F13B45EDEDA064DB5A
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/background_gradient.jpg
Preview: ......JFIF.....d.d......Ducky.......P......Adobe.d................................................................................................................................................. ...............W..............................................................Qa.................................?......%.....x......s...Z.......j.T.wz.6...X.@... V.3tM...P@.u.%...m..D.25...T...F.........p......A..........BP..qD.(.........ntH.@......h?..
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\databank[1].htm
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT)
Category:dropped
Size (bytes):283
Entropy (8bit):7.16769065262507
Encrypted:false
SSDEEP:6:Xt2pVBaajjW1WiHfSzXdjc11dPvyPGpnlBtcZy+dJ5BJvPnbS+:XEncaTiHfSDdi1dHyPsPtmdJjJvO+
MD5:71F9979E39C72BF96C0600B70C90D85D
SHA1:2F0F080683F1B66D5CB3FBC8E88D70C7676CCFFA
SHA-256:E4001D641F5CDB0FD8AE1C77D1495CEFAA73AC5C2EEDE1FABDD458484C1BBF51
SHA-512:25C2612711561096B7A62F62BFFF135D8A9A9891132704F1874298458FA2B42F46562E079352E590682D1FC249F9817C8735E5310C23EDFC72A8C2E3722AF07A
Malicious:false
Reputation:low
Preview: ..........mP.n.0.......D.$..."..JD."..Z..F.mdL...c....ewgfG...zS.^\.......t....7..$Js8.....W..?...y[mw..U..I...v...'...n..j..):......N.g...E.sc..!.Z.Mw..*.10...{.?.F|.j...="kF-Q_...'F .F.?....V&.E..l.Y..g.,.p@..S.%.J..{wF..W.A....xT.p.J*..az..z. ...)G.q....lJ...>.h..fp...
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\httpErrorPagesScripts[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
Category:downloaded
Size (bytes):12105
Entropy (8bit):5.451485481468043
Encrypted:false
SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
MD5:9234071287E637F85D721463C488704C
SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/httpErrorPagesScripts.js
Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
C:\Users\user\AppData\Local\Temp\~DF11EE74CB7DC9C1BE.TMP
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:data
Category:dropped
Size (bytes):25441
Entropy (8bit):0.27918767598683664
Encrypted:false
SSDEEP:24:c9lLh9lLh9lIn9lIn9lRx/9lRJ9lTb9lTb9lSSU9lSSU9laAa/9laA:kBqoxxJhHWSVSEab
MD5:AB889A32AB9ACD33E816C2422337C69A
SHA1:1190C6B34DED2D295827C2A88310D10A8B90B59B
SHA-256:4D6EC54B8D244E63B0F04FBE2B97402A3DF722560AD12F218665BA440F4CEFDA
SHA-512:BD250855747BB4CEC61814D0E44F810156D390E3E9F120A12935EFDF80ACA33C4777AD66257CCA4E4003FEF0741692894980B9298F01C4CDD2D8A9C7BB522FB6
Malicious:false
Reputation:low
Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Temp\~DF2B32E0794A59CB53.TMP
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:data
Category:dropped
Size (bytes):13029
Entropy (8bit):0.4806029066603241
Encrypted:false
SSDEEP:24:c9lLh9lLh9lIn9lIn9loxrF9loxR9lWxw9//97/4VCF:kBqoIx6xExw9n97P
MD5:4C718AF8AA6EBF954E3435381A654A0F
SHA1:1AF6279C473D7C33D36F37A4D6608F5D51B18065
SHA-256:E88532AE844A003753B75AB8A787421098E7B53E3B6F4715396C54F69C608127
SHA-512:FD7550BA12F1328B6312F7B1BB268795C3955AD2D4368A44F29649686F08483B541303740EEE79D3C79B92BA9433B4B94CB6BEB110EAAA79BED0E011DBF01EB5
Malicious:false
Reputation:low
Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Temp\~DFB95526EF5CC5F7CB.TMP
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:data
Category:dropped
Size (bytes):34645
Entropy (8bit):0.3979189113283259
Encrypted:false
SSDEEP:48:kBqoxKAuvScS+xvdcgIgb+z5LcktnxWulEmE1:kBqoxKAuvScS+xvdc/caW0nxWu6
MD5:9B3B0C0E3828CD86A62C26C359352619
SHA1:6ACC6F190BC78F4014047F3DD7B631CE8CFF457D
SHA-256:4AAED8431C79647BBAC930104E3278ACF41FE56811B84C256B38122F026B687E
SHA-512:9F6705989B3439197FE91032D0AF0DA1F8A09A647A28FD4B33B2DAF94E9DB744E224B3830EFD3CF4BA3C18B515DFF1799F74FE51AFF7096F7BB73A26E5B971B0
Malicious:false
Reputation:low
Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

Static File Info

No static file info

Network Behavior

Network Port Distribution

TCP Packets

TimestampSource PortDest PortSource IPDest IP
Jun 11, 2021 05:41:39.221121073 CEST49713443192.168.2.394.130.229.185
Jun 11, 2021 05:41:39.221245050 CEST49714443192.168.2.394.130.229.185
Jun 11, 2021 05:41:39.291754007 CEST4434971394.130.229.185192.168.2.3
Jun 11, 2021 05:41:39.291778088 CEST4434971494.130.229.185192.168.2.3
Jun 11, 2021 05:41:39.291953087 CEST49713443192.168.2.394.130.229.185
Jun 11, 2021 05:41:39.292018890 CEST49714443192.168.2.394.130.229.185
Jun 11, 2021 05:41:39.302639961 CEST49713443192.168.2.394.130.229.185
Jun 11, 2021 05:41:39.303450108 CEST49714443192.168.2.394.130.229.185
Jun 11, 2021 05:41:39.375498056 CEST4434971394.130.229.185192.168.2.3
Jun 11, 2021 05:41:39.375948906 CEST4434971494.130.229.185192.168.2.3
Jun 11, 2021 05:41:39.377762079 CEST4434971394.130.229.185192.168.2.3
Jun 11, 2021 05:41:39.377815008 CEST4434971394.130.229.185192.168.2.3
Jun 11, 2021 05:41:39.377857924 CEST4434971394.130.229.185192.168.2.3
Jun 11, 2021 05:41:39.377886057 CEST4434971394.130.229.185192.168.2.3
Jun 11, 2021 05:41:39.377887964 CEST49713443192.168.2.394.130.229.185
Jun 11, 2021 05:41:39.377913952 CEST4434971394.130.229.185192.168.2.3
Jun 11, 2021 05:41:39.377937078 CEST49713443192.168.2.394.130.229.185
Jun 11, 2021 05:41:39.378010035 CEST49713443192.168.2.394.130.229.185
Jun 11, 2021 05:41:39.379796982 CEST4434971494.130.229.185192.168.2.3
Jun 11, 2021 05:41:39.379853010 CEST4434971494.130.229.185192.168.2.3
Jun 11, 2021 05:41:39.379903078 CEST4434971494.130.229.185192.168.2.3
Jun 11, 2021 05:41:39.379934072 CEST4434971494.130.229.185192.168.2.3
Jun 11, 2021 05:41:39.379959106 CEST4434971494.130.229.185192.168.2.3
Jun 11, 2021 05:41:39.379981041 CEST49714443192.168.2.394.130.229.185
Jun 11, 2021 05:41:39.380156040 CEST49714443192.168.2.394.130.229.185
Jun 11, 2021 05:41:39.418067932 CEST49714443192.168.2.394.130.229.185
Jun 11, 2021 05:41:39.418169975 CEST49713443192.168.2.394.130.229.185
Jun 11, 2021 05:41:39.423887968 CEST49714443192.168.2.394.130.229.185
Jun 11, 2021 05:41:39.424027920 CEST49713443192.168.2.394.130.229.185
Jun 11, 2021 05:41:39.424103975 CEST49714443192.168.2.394.130.229.185
Jun 11, 2021 05:41:39.488620996 CEST4434971494.130.229.185192.168.2.3
Jun 11, 2021 05:41:39.488656044 CEST4434971494.130.229.185192.168.2.3
Jun 11, 2021 05:41:39.488692999 CEST49714443192.168.2.394.130.229.185
Jun 11, 2021 05:41:39.488709927 CEST49714443192.168.2.394.130.229.185
Jun 11, 2021 05:41:39.488929987 CEST4434971394.130.229.185192.168.2.3
Jun 11, 2021 05:41:39.488957882 CEST4434971394.130.229.185192.168.2.3
Jun 11, 2021 05:41:39.489011049 CEST49713443192.168.2.394.130.229.185
Jun 11, 2021 05:41:39.489056110 CEST49713443192.168.2.394.130.229.185
Jun 11, 2021 05:41:39.489579916 CEST49714443192.168.2.394.130.229.185
Jun 11, 2021 05:41:39.490068913 CEST49713443192.168.2.394.130.229.185
Jun 11, 2021 05:41:39.494277000 CEST4434971494.130.229.185192.168.2.3
Jun 11, 2021 05:41:39.494304895 CEST4434971394.130.229.185192.168.2.3
Jun 11, 2021 05:41:39.494357109 CEST49714443192.168.2.394.130.229.185
Jun 11, 2021 05:41:39.494386911 CEST49713443192.168.2.394.130.229.185
Jun 11, 2021 05:41:39.494457960 CEST4434971494.130.229.185192.168.2.3
Jun 11, 2021 05:41:39.494517088 CEST49714443192.168.2.394.130.229.185
Jun 11, 2021 05:41:39.604115963 CEST4434971394.130.229.185192.168.2.3
Jun 11, 2021 05:41:39.604154110 CEST4434971494.130.229.185192.168.2.3

UDP Packets

TimestampSource PortDest PortSource IPDest IP
Jun 11, 2021 05:41:30.411237001 CEST5062053192.168.2.38.8.8.8
Jun 11, 2021 05:41:30.463596106 CEST53506208.8.8.8192.168.2.3
Jun 11, 2021 05:41:31.536279917 CEST6493853192.168.2.38.8.8.8
Jun 11, 2021 05:41:31.590151072 CEST53649388.8.8.8192.168.2.3
Jun 11, 2021 05:41:32.762794018 CEST6015253192.168.2.38.8.8.8
Jun 11, 2021 05:41:32.826667070 CEST53601528.8.8.8192.168.2.3
Jun 11, 2021 05:41:34.056510925 CEST5754453192.168.2.38.8.8.8
Jun 11, 2021 05:41:34.107225895 CEST53575448.8.8.8192.168.2.3
Jun 11, 2021 05:41:35.084027052 CEST5598453192.168.2.38.8.8.8
Jun 11, 2021 05:41:35.134402037 CEST53559848.8.8.8192.168.2.3
Jun 11, 2021 05:41:36.267096043 CEST6418553192.168.2.38.8.8.8
Jun 11, 2021 05:41:36.330905914 CEST53641858.8.8.8192.168.2.3
Jun 11, 2021 05:41:37.470206976 CEST6511053192.168.2.38.8.8.8
Jun 11, 2021 05:41:37.532622099 CEST53651108.8.8.8192.168.2.3
Jun 11, 2021 05:41:37.852564096 CEST5836153192.168.2.38.8.8.8
Jun 11, 2021 05:41:37.912761927 CEST53583618.8.8.8192.168.2.3
Jun 11, 2021 05:41:38.705825090 CEST6349253192.168.2.38.8.8.8
Jun 11, 2021 05:41:38.777028084 CEST53634928.8.8.8192.168.2.3
Jun 11, 2021 05:41:39.152941942 CEST6083153192.168.2.38.8.8.8
Jun 11, 2021 05:41:39.216116905 CEST53608318.8.8.8192.168.2.3
Jun 11, 2021 05:41:39.433494091 CEST6010053192.168.2.38.8.8.8
Jun 11, 2021 05:41:39.486810923 CEST53601008.8.8.8192.168.2.3
Jun 11, 2021 05:41:41.377911091 CEST5319553192.168.2.38.8.8.8
Jun 11, 2021 05:41:41.437097073 CEST53531958.8.8.8192.168.2.3
Jun 11, 2021 05:41:42.322043896 CEST5014153192.168.2.38.8.8.8
Jun 11, 2021 05:41:42.373188019 CEST53501418.8.8.8192.168.2.3
Jun 11, 2021 05:41:45.548453093 CEST5302353192.168.2.38.8.8.8
Jun 11, 2021 05:41:45.600758076 CEST53530238.8.8.8192.168.2.3
Jun 11, 2021 05:41:47.090363979 CEST4956353192.168.2.38.8.8.8
Jun 11, 2021 05:41:47.141300917 CEST53495638.8.8.8192.168.2.3
Jun 11, 2021 05:41:50.307420969 CEST5135253192.168.2.38.8.8.8
Jun 11, 2021 05:41:50.366238117 CEST53513528.8.8.8192.168.2.3
Jun 11, 2021 05:41:55.287683964 CEST5934953192.168.2.38.8.8.8
Jun 11, 2021 05:41:55.338172913 CEST53593498.8.8.8192.168.2.3
Jun 11, 2021 05:41:56.299438000 CEST5708453192.168.2.38.8.8.8
Jun 11, 2021 05:41:56.357997894 CEST53570848.8.8.8192.168.2.3
Jun 11, 2021 05:41:57.236495972 CEST5882353192.168.2.38.8.8.8
Jun 11, 2021 05:41:57.286880016 CEST53588238.8.8.8192.168.2.3
Jun 11, 2021 05:41:58.149784088 CEST5756853192.168.2.38.8.8.8
Jun 11, 2021 05:41:58.200372934 CEST53575688.8.8.8192.168.2.3
Jun 11, 2021 05:41:59.073734999 CEST5054053192.168.2.38.8.8.8
Jun 11, 2021 05:41:59.126980066 CEST53505408.8.8.8192.168.2.3
Jun 11, 2021 05:42:02.360634089 CEST5436653192.168.2.38.8.8.8
Jun 11, 2021 05:42:02.432185888 CEST53543668.8.8.8192.168.2.3

DNS Queries

TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
Jun 11, 2021 05:41:39.152941942 CEST192.168.2.38.8.8.80x56e1Standard query (0)ganbiya.comA (IP address)IN (0x0001)

DNS Answers

TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
Jun 11, 2021 05:41:39.216116905 CEST8.8.8.8192.168.2.30x56e1No error (0)ganbiya.com94.130.229.185A (IP address)IN (0x0001)

HTTPS Packets

TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
Jun 11, 2021 05:41:39.377857924 CEST94.130.229.185443192.168.2.349713CN=ganbiya.com CN=R3, O=Let's Encrypt, C=US CN=ISRG Root X1, O=Internet Security Research Group, C=USCN=R3, O=Let's Encrypt, C=US CN=ISRG Root X1, O=Internet Security Research Group, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Sat May 29 23:26:47 CEST 2021 Fri Sep 04 02:00:00 CEST 2020 Wed Jan 20 20:14:03 CET 2021Fri Aug 27 23:26:47 CEST 2021 Mon Sep 15 18:00:00 CEST 2025 Mon Sep 30 20:14:03 CEST 2024771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,09e10692f1b7f78228b2d4e424db3a98c
CN=R3, O=Let's Encrypt, C=USCN=ISRG Root X1, O=Internet Security Research Group, C=USFri Sep 04 02:00:00 CEST 2020Mon Sep 15 18:00:00 CEST 2025
CN=ISRG Root X1, O=Internet Security Research Group, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Jan 20 20:14:03 CET 2021Mon Sep 30 20:14:03 CEST 2024
Jun 11, 2021 05:41:39.379903078 CEST94.130.229.185443192.168.2.349714CN=ganbiya.com CN=R3, O=Let's Encrypt, C=US CN=ISRG Root X1, O=Internet Security Research Group, C=USCN=R3, O=Let's Encrypt, C=US CN=ISRG Root X1, O=Internet Security Research Group, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Sat May 29 23:26:47 CEST 2021 Fri Sep 04 02:00:00 CEST 2020 Wed Jan 20 20:14:03 CET 2021Fri Aug 27 23:26:47 CEST 2021 Mon Sep 15 18:00:00 CEST 2025 Mon Sep 30 20:14:03 CEST 2024771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,09e10692f1b7f78228b2d4e424db3a98c
CN=R3, O=Let's Encrypt, C=USCN=ISRG Root X1, O=Internet Security Research Group, C=USFri Sep 04 02:00:00 CEST 2020Mon Sep 15 18:00:00 CEST 2025
CN=ISRG Root X1, O=Internet Security Research Group, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Jan 20 20:14:03 CET 2021Mon Sep 30 20:14:03 CEST 2024

Code Manipulations

Statistics

CPU Usage

Click to jump to process

Memory Usage

Click to jump to process

Behavior

Click to jump to process

System Behavior

General

Start time:05:41:36
Start date:11/06/2021
Path:C:\Program Files\internet explorer\iexplore.exe
Wow64 process (32bit):false
Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Imagebase:0x7ff737ad0000
File size:823560 bytes
MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

General

Start time:05:41:37
Start date:11/06/2021
Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
Wow64 process (32bit):true
Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5340 CREDAT:17410 /prefetch:2
Imagebase:0x1320000
File size:822536 bytes
MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

Disassembly

Reset < >