Windows
Analysis Report
171121_PDF.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64native
- 171121_PDF.exe (PID: 4656 cmdline:
"C:\Users\ user\Deskt op\171121_ PDF.exe" MD5: 60D8B8589BA8045361AE148EE76C7582) - ieinstal.exe (PID: 6972 cmdline:
"C:\Users\ user\Deskt op\171121_ PDF.exe" MD5: 7871873BABCEA94FBA13900B561C7C55) - ieinstal.exe (PID: 7000 cmdline:
"C:\Users\ user\Deskt op\171121_ PDF.exe" MD5: 7871873BABCEA94FBA13900B561C7C55)
- cleanup
{"Payload URL": "https://onedrive.live.com/downloa"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_GuLoader_2 | Yara detected GuLoader | Joe Security | ||
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
JoeSecurity_GuLoader_2 | Yara detected GuLoader | Joe Security | ||
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security |
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: |
Source: | File source: | ||
Source: | File source: |
Source: | Avira: |
Source: | Avira: |
Source: | Virustotal: | Perma Link | ||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | Avira: |
Source: | Static PE information: |
Networking |
---|
Source: | URLs: |
Source: | DNS query: |
Source: | ASN Name: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | DNS traffic detected: |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: | Windows user hook set: |
E-Banking Fraud |
---|
Source: | File source: | ||
Source: | File source: |
System Summary |
---|
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Section loaded: | ||
Source: | Section loaded: |
Source: | Static PE information: |
Source: | Virustotal: | ||
Source: | Metadefender: | ||
Source: | ReversingLabs: |
Source: | Static PE information: |
Source: | Key opened: |
Source: | Section loaded: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Key value queried: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Classification label: |
Source: | Mutant created: |
Data Obfuscation |
---|
Source: | File source: | ||
Source: | File source: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | File created: | Jump to dropped file |
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior |
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: |
Malware Analysis System Evasion |
---|
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Thread sleep count: | ||
Source: | Thread sleep time: |
Source: | Thread sleep count: |
Source: | Code function: |
Source: | Window / User API: | ||
Source: | Window / User API: |
Source: | System information queried: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Anti Debugging |
---|
Source: | Thread information set: | ||
Source: | Thread information set: |
Source: | Code function: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Process queried: | ||
Source: | Process queried: |
Source: | Code function: |
Source: | Code function: |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Memory written: |
Source: | Process created: | ||
Source: | Process created: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 112 Process Injection | 1 Masquerading | 11 Input Capture | 421 Security Software Discovery | Remote Services | 11 Input Capture | Exfiltration Over Other Network Medium | 1 Encrypted Channel | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | 1 DLL Side-Loading | 1 Registry Run Keys / Startup Folder | 23 Virtualization/Sandbox Evasion | LSASS Memory | 23 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 1 Archive Collected Data | Exfiltration Over Bluetooth | 1 Non-Application Layer Protocol | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | 1 DLL Side-Loading | 112 Process Injection | Security Account Manager | 1 Process Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | 21 Application Layer Protocol | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | 1 Obfuscated Files or Information | NTDS | 1 Application Window Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | 1 Software Packing | LSA Secrets | 2 System Information Discovery | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings | |
Replication Through Removable Media | Launchd | Rc.common | Rc.common | 1 DLL Side-Loading | Cached Domain Credentials | System Owner/User Discovery | VNC | GUI Input Capture | Exfiltration Over C2 Channel | Multiband Communication | Jamming or Denial of Service | Abuse Accessibility Features |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
60% | Virustotal | Browse | ||
17% | Metadefender | Browse | ||
68% | ReversingLabs | Win32.Trojan.Shelsy | ||
100% | Avira | TR/AD.Nekark.jinay | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | TR/AD.Nekark.jinay | ||
100% | Joe Sandbox ML | |||
60% | Virustotal | Browse | ||
17% | Metadefender | Browse | ||
68% | ReversingLabs | Win32.Trojan.Shelsy |
Source | Detection | Scanner | Label | Link | Download |
---|---|---|---|---|---|
100% | Avira | HEUR/AGEN.1107800 | Download File | ||
100% | Avira | TR/AD.Nekark.jinay | Download File |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
3% | Virustotal | Browse |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
olufem.ddns.net | 172.111.251.34 | true | true |
| unknown |
onedrive.live.com | unknown | unknown | false | high | |
d34m1w.bn.files.1drv.com | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
172.111.251.34 | olufem.ddns.net | United States | 9009 | M247GB | true |
Joe Sandbox Version: | 34.0.0 Boulder Opal |
Analysis ID: | 558240 |
Start date: | 23.01.2022 |
Start time: | 06:48:48 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 12m 15s |
Hypervisor based Inspection enabled: | false |
Report type: | light |
Sample file name: | 171121_PDF.exe |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301 |
Run name: | Suspected Instruction Hammering |
Number of analysed new started processes analysed: | 14 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@5/3@10/1 |
EGA Information: |
|
HDC Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe
- TCP Packets have been reduced to 100
- Excluded IPs from analysis (whitelisted): 20.82.19.171, 20.54.122.82, 13.107.42.13, 13.107.42.12
- Excluded domains from analysis (whitelisted): odc-web-brs.onedrive.akadns.net, client.wns.windows.com, bn-files.ha.1drv.com.l-0003.dc-msedge.net.l-0003.l-msedge.net, odc-web-geo.onedrive.akadns.net, odc-bn-files-brs.onedrive.akadns.net, ctldl.windowsupdate.com, wdcp.microsoft.com, arc.msn.com, wd-prod-cp.trafficmanager.net, odc-bn-files-geo.onedrive.akadns.net, ris.api.iris.microsoft.com, wd-prod-cp-eu-north-1-fe.northeurope.cloudapp.azure.com, l-0004.l-msedge.net, wdcpalt.microsoft.com, odwebpl.trafficmanager.net.l-0004.dc-msedge.net.l-0004.l-msedge.net, l-0003.l-msedge.net, wd-prod-cp-eu-west-2-fe.westeurope.cloudapp.azure.com, img-prod-cms-rt-microsoft-com.akamaized.net
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
Time | Type | Description |
---|---|---|
06:51:16 | Autostart | |
06:51:24 | Autostart |
Process: | C:\Program Files (x86)\Internet Explorer\ieinstal.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 112464 |
Entropy (8bit): | 6.100488610521297 |
Encrypted: | false |
SSDEEP: | 1536:OPtG0c3vhsblLAvTIpS1HP9CGZG48TdiwOeQqn4kFgGYglLg:X1JsblLAvI+FW48QwOen4Hi8 |
MD5: | 60D8B8589BA8045361AE148EE76C7582 |
SHA1: | 328A778D026AD6611BB295BF3A799B6499FC7C7C |
SHA-256: | 8F34D0008F07A4460C9EBC5A8D8A558A85979BD0112962EDDF9506DC5B627989 |
SHA-512: | 6D7AB39A3367D72D70E0CF8AF182FDF7B20100BE1159465CEBF5603C06BD485FFD0B5ACEE687AD029C1205C1CDADFBFE10002451B484CDE1746ED2C8814F58E7 |
Malicious: | true |
Antivirus: | |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\171121_PDF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 16384 |
Entropy (8bit): | 0.623084520004525 |
Encrypted: | false |
SSDEEP: | 12:rl3lKFQCb776fGZHbYS6TS63TXlYdl7HtllGXPuK9iUmTc:rbQylDVYdtNllG/uw7 |
MD5: | 23BC92D1C5A3C3698C8524B7CEB3F5D9 |
SHA1: | 199D2660FEA3F7310397A37A8C7C600E7A26D461 |
SHA-256: | 5A6730EB0987730B214A46DC814FE2071576A338B2210DECE2780AC6E3B45DD7 |
SHA-512: | 6FA7CAB689912B93C312D35E0E0F218E6138A3BCB8BC1B31CF0F80E4795C079F8589B879CCAC55C14262C710D4772A4067CCA4ED7890AED678EC988D113227DD |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files (x86)\Internet Explorer\ieinstal.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 228 |
Entropy (8bit): | 3.324676875990576 |
Encrypted: | false |
SSDEEP: | 3:rnls2PltX6cl5JWRal2Jl+7R0DAlBG4LNQblovDl9iGLilXIkl+Rf3zNQblovDlw:aiUU5YcIeeDAlybW/Ne5IRfebW/G |
MD5: | 4E974FEC547CB42D02EBEF1C4F168E6E |
SHA1: | 26C86768D963521FBB151F247A117B9C0EB1EBEA |
SHA-256: | 8A7CCD77EF7FE3C4C467A8A7F0BF4153058E5A60E4F9B54A5C4E52BCBAD5B155 |
SHA-512: | 32CDE6BB8AA11BDA151BE95FA4B15CB618461CB9ECB3AB36DB5D7574BA8DCCA1C7BFCCA8705C7E0E58847DD88F4D2A9405A692782FB344E896B6EB05495801EB |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 6.100488610521297 |
TrID: |
|
File name: | 171121_PDF.exe |
File size: | 112464 |
MD5: | 60d8b8589ba8045361ae148ee76c7582 |
SHA1: | 328a778d026ad6611bb295bf3a799b6499fc7c7c |
SHA256: | 8f34d0008f07a4460c9ebc5a8d8a558a85979bd0112962eddf9506dc5b627989 |
SHA512: | 6d7ab39a3367d72d70e0cf8af182fdf7b20100be1159465cebf5603c06bd485ffd0b5acee687ad029c1205c1cdadfbfe10002451b484cde1746ed2c8814f58e7 |
SSDEEP: | 1536:OPtG0c3vhsblLAvTIpS1HP9CGZG48TdiwOeQqn4kFgGYglLg:X1JsblLAvI+FW48QwOen4Hi8 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......................._.......................Rich............................PE..L....~.N.................`...P...............p....@ |
Icon Hash: | f2c2c29190d2c783 |
Entrypoint: | 0x401194 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED |
DLL Characteristics: | |
Time Stamp: | 0x4ED97EE6 [Sat Dec 3 01:44:06 2011 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | fca27436e553ec62bb2d0905390fd4e6 |
Signature Valid: | false |
Signature Issuer: | E=Bibaciousnessmnten3@Pinjerforhaa.Non, CN=Vrdiheftesgalets, OU=Formationsskridt, O=ptychoptery, L=Retrickedtrbesk, S=Linoxininvectivel5, C=LV |
Signature Validation Error: | A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider |
Error Number: | -2146762487 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 81C291A64F4EEAD3EB815B820975A11F |
Thumbprint SHA-1: | 3B9FB2B3310D80BB215D1F0A8A1B4C5CE397126F |
Thumbprint SHA-256: | 6E26EF48D70BCD9763606EA3E88539664649D7701B6F561892E318BB4DB04839 |
Serial: | 00 |
Instruction |
---|
push 00401A0Ch |
call 00007F9E9C9E4E03h |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
xor byte ptr [eax], al |
add byte ptr [eax], al |
inc eax |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [ecx+58h], al |
push FFFFFFBFh |
fadd st(0), st(7) |
int1 |
dec edi |
movsb |
jmp 00007F9E9C9E4E20h |
sbb al, 8Eh |
scasd |
inc edx |
aas |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add dword ptr [eax], eax |
add byte ptr [eax], al |
add byte ptr [eax], al |
loopne 00007F9E9C9E4DD8h |
or dword ptr [ebx], eax |
jnc 00007F9E9C9E4E87h |
bound ebp, dword ptr [edi+72h] |
imul ebp, dword ptr fs:[esi+00h], 20004108h |
or byte ptr [ecx+00h], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
dec esp |
xor dword ptr [eax], eax |
add dword ptr [edi+ebx*8-316D0720h], ecx |
xor eax, 8026BB49h |
nop |
dec edx |
and eax, 87C64A41h |
out E9h, al |
cmpsd |
pop eax |
rol dword ptr [edi-7Dh], 1 |
arpl word ptr [ebx+7Ah], dx |
arpl word ptr [edx], cx |
pop ss |
and byte ptr [edx], bh |
dec edi |
lodsd |
xor ebx, dword ptr [ecx-48EE309Ah] |
or al, 00h |
stosb |
add byte ptr [eax-2Dh], ah |
xchg eax, ebx |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
je 00007F9E9C9E4E15h |
add byte ptr [eax], al |
push ebx |
add eax, dword ptr [eax] |
add byte ptr [eax], al |
push cs |
add byte ptr [esi+4Fh], al |
inc esp |
inc ebp |
push edx |
inc ecx |
dec esp |
inc ebp |
push edx |
push ebx |
dec eax |
pop ecx |
inc esp |
push edx |
add byte ptr [42000701h], cl |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x16d14 | 0x28 | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x19000 | 0x2bca | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x1b000 | 0x750 | .rsrc |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x238 | 0x20 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x1000 | 0x90 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x15ffc | 0x16000 | False | 0.495827414773 | data | 6.39269902756 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
.data | 0x17000 | 0x17f8 | 0x1000 | False | 0.00634765625 | data | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
.rsrc | 0x19000 | 0x2bca | 0x3000 | False | 0.236735026042 | data | 3.87641922123 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
SET | 0x19724 | 0x24a6 | MS Windows icon resource - 3 icons, 24x24, 16 colors, 4 bits/pixel, 24x24, 8 bits/pixel | English | United States |
RT_ICON | 0x1943c | 0x2e8 | dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 4152326007, next used block 7370615 | ||
RT_GROUP_ICON | 0x19428 | 0x14 | data | ||
RT_VERSION | 0x19140 | 0x2e8 | data | English | United States |
DLL | Import |
---|---|
MSVBVM60.DLL | _CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, _adj_fdiv_m64, _adj_fprem1, __vbaHresultCheckObj, _adj_fdiv_m32, _adj_fdiv_m16i, _adj_fdivr_m16i, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, _adj_fpatan, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, _CIlog, _adj_fdiv_m32i, _adj_fdivr_m32i, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarSetVar, __vbaLateMemCallLd, _CIatan, __vbaR8IntI4, _allmul, _CItan, _CIexp, __vbaFreeObj |
Description | Data |
---|---|
Translation | 0x0409 0x04b0 |
LegalCopyright | ART |
InternalName | Brugstyveriscortic |
FileVersion | 1.00 |
CompanyName | ART |
LegalTrademarks | ART |
Comments | ART |
ProductName | ART |
ProductVersion | 1.00 |
FileDescription | Classic ART |
OriginalFilename | Brugstyveriscortic.exe |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | Protocol | SID | Message | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|---|---|---|
01/23/22-06:51:20.532714 | UDP | 254 | DNS SPOOF query response with TTL of 1 min. and no authority | 53 | 55429 | 1.1.1.1 | 192.168.11.20 |
01/23/22-06:52:21.635352 | UDP | 254 | DNS SPOOF query response with TTL of 1 min. and no authority | 53 | 53233 | 1.1.1.1 | 192.168.11.20 |
01/23/22-06:53:22.622846 | UDP | 254 | DNS SPOOF query response with TTL of 1 min. and no authority | 53 | 49426 | 1.1.1.1 | 192.168.11.20 |
01/23/22-06:54:24.546109 | UDP | 254 | DNS SPOOF query response with TTL of 1 min. and no authority | 53 | 53111 | 1.1.1.1 | 192.168.11.20 |
01/23/22-06:55:27.156616 | UDP | 254 | DNS SPOOF query response with TTL of 1 min. and no authority | 53 | 58328 | 1.1.1.1 | 192.168.11.20 |
01/23/22-06:56:29.782953 | UDP | 254 | DNS SPOOF query response with TTL of 1 min. and no authority | 53 | 49551 | 1.1.1.1 | 192.168.11.20 |
01/23/22-06:57:30.160630 | UDP | 254 | DNS SPOOF query response with TTL of 1 min. and no authority | 53 | 56088 | 1.1.1.1 | 192.168.11.20 |
01/23/22-06:58:37.645977 | UDP | 254 | DNS SPOOF query response with TTL of 1 min. and no authority | 53 | 49208 | 1.1.1.1 | 192.168.11.20 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 23, 2022 06:51:20.533876896 CET | 49801 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:20.703293085 CET | 6110 | 49801 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:21.213707924 CET | 49801 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:21.383318901 CET | 6110 | 49801 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:21.885405064 CET | 49801 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:22.051764965 CET | 6110 | 49801 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:22.557038069 CET | 49801 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:22.731542110 CET | 6110 | 49801 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:23.244467974 CET | 49801 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:23.417984962 CET | 6110 | 49801 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:24.441565990 CET | 49802 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:24.608980894 CET | 6110 | 49802 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:25.119052887 CET | 49802 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:25.303689957 CET | 6110 | 49802 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:25.806296110 CET | 49802 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:26.020940065 CET | 6110 | 49802 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:26.524879932 CET | 49802 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:26.728079081 CET | 6110 | 49802 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:27.243567944 CET | 49802 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:27.408804893 CET | 6110 | 49802 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:28.418706894 CET | 49805 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:28.582556009 CET | 6110 | 49805 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:29.086854935 CET | 49805 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:29.250814915 CET | 6110 | 49805 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:29.758615971 CET | 49805 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:29.926840067 CET | 6110 | 49805 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:30.430270910 CET | 49805 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:30.594449997 CET | 6110 | 49805 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:31.102112055 CET | 49805 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:31.266598940 CET | 6110 | 49805 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:32.277121067 CET | 49807 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:32.444715023 CET | 6110 | 49807 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:32.945451021 CET | 49807 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:34.009474993 CET | 6110 | 49807 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:34.523053885 CET | 49807 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:34.693078995 CET | 6110 | 49807 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:35.195008993 CET | 49807 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:35.362740040 CET | 6110 | 49807 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:35.866545916 CET | 49807 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:36.035017014 CET | 6110 | 49807 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:37.041501045 CET | 49809 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:37.218277931 CET | 6110 | 49809 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:37.725533009 CET | 49809 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:37.902740002 CET | 6110 | 49809 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:38.413064957 CET | 49809 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:38.606342077 CET | 6110 | 49809 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:39.115875006 CET | 49809 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:39.294013023 CET | 6110 | 49809 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:39.803375006 CET | 49809 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:40.790137053 CET | 6110 | 49809 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:41.813607931 CET | 49816 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:41.976222992 CET | 6110 | 49816 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:42.490164995 CET | 49816 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:42.656023026 CET | 6110 | 49816 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:43.161834002 CET | 49816 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:43.330912113 CET | 6110 | 49816 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:43.833558083 CET | 49816 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:44.019136906 CET | 6110 | 49816 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:44.520960093 CET | 49816 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:44.687252998 CET | 6110 | 49816 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:45.695609093 CET | 49817 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:46.133512020 CET | 6110 | 49817 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:46.645481110 CET | 49817 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:46.821264029 CET | 6110 | 49817 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:47.332819939 CET | 49817 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:47.505533934 CET | 6110 | 49817 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:48.020308018 CET | 49817 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:48.193583012 CET | 6110 | 49817 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:48.707468987 CET | 49817 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:48.885680914 CET | 6110 | 49817 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:49.897425890 CET | 49819 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:50.072941065 CET | 6110 | 49819 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:50.582212925 CET | 49819 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:50.824712992 CET | 6110 | 49819 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:51.332093000 CET | 49819 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:51.508572102 CET | 6110 | 49819 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:52.019186974 CET | 49819 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:52.200375080 CET | 6110 | 49819 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:52.706732988 CET | 49819 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:52.884602070 CET | 6110 | 49819 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:53.896095991 CET | 49820 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:54.061736107 CET | 6110 | 49820 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:54.565732002 CET | 49820 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:54.733727932 CET | 6110 | 49820 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:55.237365961 CET | 49820 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:55.405459881 CET | 6110 | 49820 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:55.909164906 CET | 49820 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:56.077308893 CET | 6110 | 49820 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:56.580893040 CET | 49820 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:56.749423027 CET | 6110 | 49820 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:57.754939079 CET | 49821 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:57.921236992 CET | 6110 | 49821 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:58.424160004 CET | 49821 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:59.050299883 CET | 6110 | 49821 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:51:59.564516068 CET | 49821 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:51:59.733380079 CET | 6110 | 49821 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:52:00.236265898 CET | 49821 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:52:00.405827999 CET | 6110 | 49821 | 172.111.251.34 | 192.168.11.20 |
Jan 23, 2022 06:52:00.907862902 CET | 49821 | 6110 | 192.168.11.20 | 172.111.251.34 |
Jan 23, 2022 06:52:01.073436022 CET | 6110 | 49821 | 172.111.251.34 | 192.168.11.20 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 23, 2022 06:51:15.569247007 CET | 60139 | 53 | 192.168.11.20 | 1.1.1.1 |
Jan 23, 2022 06:51:16.426620960 CET | 58460 | 53 | 192.168.11.20 | 1.1.1.1 |
Jan 23, 2022 06:51:20.520481110 CET | 55429 | 53 | 192.168.11.20 | 1.1.1.1 |
Jan 23, 2022 06:51:20.532713890 CET | 53 | 55429 | 1.1.1.1 | 192.168.11.20 |
Jan 23, 2022 06:52:21.624361992 CET | 53233 | 53 | 192.168.11.20 | 1.1.1.1 |
Jan 23, 2022 06:52:21.635351896 CET | 53 | 53233 | 1.1.1.1 | 192.168.11.20 |
Jan 23, 2022 06:53:22.609636068 CET | 49426 | 53 | 192.168.11.20 | 1.1.1.1 |
Jan 23, 2022 06:53:22.622845888 CET | 53 | 49426 | 1.1.1.1 | 192.168.11.20 |
Jan 23, 2022 06:54:24.533535004 CET | 53111 | 53 | 192.168.11.20 | 1.1.1.1 |
Jan 23, 2022 06:54:24.546108961 CET | 53 | 53111 | 1.1.1.1 | 192.168.11.20 |
Jan 23, 2022 06:55:27.144592047 CET | 58328 | 53 | 192.168.11.20 | 1.1.1.1 |
Jan 23, 2022 06:55:27.156615973 CET | 53 | 58328 | 1.1.1.1 | 192.168.11.20 |
Jan 23, 2022 06:56:29.771713018 CET | 49551 | 53 | 192.168.11.20 | 1.1.1.1 |
Jan 23, 2022 06:56:29.782953024 CET | 53 | 49551 | 1.1.1.1 | 192.168.11.20 |
Jan 23, 2022 06:57:30.148957014 CET | 56088 | 53 | 192.168.11.20 | 1.1.1.1 |
Jan 23, 2022 06:57:30.160629988 CET | 53 | 56088 | 1.1.1.1 | 192.168.11.20 |
Jan 23, 2022 06:58:37.633886099 CET | 49208 | 53 | 192.168.11.20 | 1.1.1.1 |
Jan 23, 2022 06:58:37.645977020 CET | 53 | 49208 | 1.1.1.1 | 192.168.11.20 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class |
---|---|---|---|---|---|---|---|
Jan 23, 2022 06:51:15.569247007 CET | 192.168.11.20 | 1.1.1.1 | 0xfa92 | Standard query (0) | A (IP address) | IN (0x0001) | |
Jan 23, 2022 06:51:16.426620960 CET | 192.168.11.20 | 1.1.1.1 | 0x6ad4 | Standard query (0) | A (IP address) | IN (0x0001) | |
Jan 23, 2022 06:51:20.520481110 CET | 192.168.11.20 | 1.1.1.1 | 0xe900 | Standard query (0) | A (IP address) | IN (0x0001) | |
Jan 23, 2022 06:52:21.624361992 CET | 192.168.11.20 | 1.1.1.1 | 0x2bb2 | Standard query (0) | A (IP address) | IN (0x0001) | |
Jan 23, 2022 06:53:22.609636068 CET | 192.168.11.20 | 1.1.1.1 | 0xf638 | Standard query (0) | A (IP address) | IN (0x0001) | |
Jan 23, 2022 06:54:24.533535004 CET | 192.168.11.20 | 1.1.1.1 | 0xf4b6 | Standard query (0) | A (IP address) | IN (0x0001) | |
Jan 23, 2022 06:55:27.144592047 CET | 192.168.11.20 | 1.1.1.1 | 0xaa66 | Standard query (0) | A (IP address) | IN (0x0001) | |
Jan 23, 2022 06:56:29.771713018 CET | 192.168.11.20 | 1.1.1.1 | 0x29fe | Standard query (0) | A (IP address) | IN (0x0001) | |
Jan 23, 2022 06:57:30.148957014 CET | 192.168.11.20 | 1.1.1.1 | 0x2c5e | Standard query (0) | A (IP address) | IN (0x0001) | |
Jan 23, 2022 06:58:37.633886099 CET | 192.168.11.20 | 1.1.1.1 | 0x9807 | Standard query (0) | A (IP address) | IN (0x0001) |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class |
---|---|---|---|---|---|---|---|---|---|
Jan 23, 2022 06:51:15.579026937 CET | 1.1.1.1 | 192.168.11.20 | 0xfa92 | No error (0) | odc-web-geo.onedrive.akadns.net | CNAME (Canonical name) | IN (0x0001) | ||
Jan 23, 2022 06:51:16.639554024 CET | 1.1.1.1 | 192.168.11.20 | 0x6ad4 | No error (0) | bn-files.fe.1drv.com | CNAME (Canonical name) | IN (0x0001) | ||
Jan 23, 2022 06:51:16.639554024 CET | 1.1.1.1 | 192.168.11.20 | 0x6ad4 | No error (0) | odc-bn-files-geo.onedrive.akadns.net | CNAME (Canonical name) | IN (0x0001) | ||
Jan 23, 2022 06:51:20.532713890 CET | 1.1.1.1 | 192.168.11.20 | 0xe900 | No error (0) | 172.111.251.34 | A (IP address) | IN (0x0001) | ||
Jan 23, 2022 06:52:21.635351896 CET | 1.1.1.1 | 192.168.11.20 | 0x2bb2 | No error (0) | 172.111.251.34 | A (IP address) | IN (0x0001) | ||
Jan 23, 2022 06:53:22.622845888 CET | 1.1.1.1 | 192.168.11.20 | 0xf638 | No error (0) | 172.111.251.34 | A (IP address) | IN (0x0001) | ||
Jan 23, 2022 06:54:24.546108961 CET | 1.1.1.1 | 192.168.11.20 | 0xf4b6 | No error (0) | 172.111.251.34 | A (IP address) | IN (0x0001) | ||
Jan 23, 2022 06:55:27.156615973 CET | 1.1.1.1 | 192.168.11.20 | 0xaa66 | No error (0) | 172.111.251.34 | A (IP address) | IN (0x0001) | ||
Jan 23, 2022 06:56:29.782953024 CET | 1.1.1.1 | 192.168.11.20 | 0x29fe | No error (0) | 172.111.251.34 | A (IP address) | IN (0x0001) | ||
Jan 23, 2022 06:57:30.160629988 CET | 1.1.1.1 | 192.168.11.20 | 0x2c5e | No error (0) | 172.111.251.34 | A (IP address) | IN (0x0001) | ||
Jan 23, 2022 06:58:37.645977020 CET | 1.1.1.1 | 192.168.11.20 | 0x9807 | No error (0) | 172.111.251.34 | A (IP address) | IN (0x0001) |
Click to jump to process
Start time: | 06:50:41 |
Start date: | 23/01/2022 |
Path: | C:\Users\user\Desktop\171121_PDF.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 112464 bytes |
MD5 hash: | 60D8B8589BA8045361AE148EE76C7582 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Visual Basic |
Yara matches: |
|
Reputation: | low |
Start time: | 06:50:56 |
Start date: | 23/01/2022 |
Path: | C:\Program Files (x86)\Internet Explorer\ieinstal.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xaa0000 |
File size: | 480256 bytes |
MD5 hash: | 7871873BABCEA94FBA13900B561C7C55 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Start time: | 06:50:57 |
Start date: | 23/01/2022 |
Path: | C:\Program Files (x86)\Internet Explorer\ieinstal.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xaa0000 |
File size: | 480256 bytes |
MD5 hash: | 7871873BABCEA94FBA13900B561C7C55 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | moderate |