flash

Covid 19 bilgi yönetim sistemi.msi

Status: finished
Submission Time: 19.02.2021 12:30:09
Malicious
Spyware
Evader
ScreenConnect Tool

Comments

Tags

Details

  • Analysis ID:
    355327
  • API (Web) ID:
    612629
  • Analysis Started:
    19.02.2021 12:30:10
  • Analysis Finished:
    19.02.2021 12:42:28
  • MD5:
    1f365aa75ff0d2806a2269d238208593
  • SHA1:
    440ef2dfdd778ec159cd6babc60e2b70252d661f
  • SHA256:
    3dbe3682f5d3db8cd0d8c0586d3c345a458f274355a4dac2edd05f25092423a8
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports
New

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
60/100

IPs

IP Country Detection
51.77.118.172
France

Domains

Name IP Detection
server-ovh31150295-relay.screenconnect.com
51.77.118.172
instance-s6p2r4-relay.screenconnect.com
0.0.0.0

URLs

Name Detection
http://www.carterandcone.como.nV
http://www.fontbureau.com/designersG
http://www.fontbureau.com/designers/?
Click to see the 91 hidden entries
http://www.founder.com.cn/cn/bThe
http://www.jiyu-kobo.co.jp/XTj
https://dev.ditu.live.com/REST/v1/Routes/
http://www.jiyu-kobo.co.jp/jp/F
https://dev.virtualearth.net/REST/v1/Routes/Driving
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
http://www.fontbureau.com/designers?
http://www.fontbureau.comFzV
https://t0.tiles.ditu.live.com/tiles/gen
http://www.carterandcone.como.zV
http://www.jiyu-kobo.co.jp/.TTCSV
https://dev.virtualearth.net/REST/v1/Routes/Walking
http://www.tiro.com
http://www.fontbureau.com/designers
http://wixtoolset.org/news/
http://www.goodfont.co.kr
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
http://www.carterandcone.com
http://www.jiyu-kobo.co.jp/HLj
https://dev.ditu.live.com/mapcontrol/logging.ashx
http://www.sajatypeworks.com
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
http://www.jiyu-kobo.co.jp/jp/XTj
http://www.typography.netD
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
http://www.founder.com.cn/cn/cThe
http://www.galapagosdesign.com/staff/dennis.htm
http://fontfabrik.com
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
http://www.zhongyicts.com.cnwdthK
http://www.jiyu-kobo.co.jp/Y0/XTj
http://www.fontbureau.com/designerse
http://www.jiyu-kobo.co.jp/jp/j
http://www.galapagosdesign.com/DPlease
http://www.fonts.com
http://www.sandoll.co.kr
https://appexmapsappupdate.blob.core.windows.net
http://www.urwpp.deDPlease
http://www.zhongyicts.com.cn
http://www.carterandcone.comFBV
http://www.jiyu-kobo.co.jp/FTV
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://www.fontbureau.comFcnV
http://www.sakkal.com
http://www.bingmapsportal.com
http://www.sajatypeworks.comrBV
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
http://www.apache.org/licenses/LICENSE-2.0
http://www.fontbureau.com
http://www.jiyu-kobo.co.jp/.TTC
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
https://dev.virtualearth.net/REST/v1/Routes/
http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
http://en.wikipedia
http://www.jiyu-kobo.co.jp/F
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
http://www.carterandcone.comj
http://www.carterandcone.comi
https://%s.xboxlive.com
https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
https://dev.virtualearth.net/REST/v1/Locations
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
http://www.jiyu-kobo.co.jp/FSV
https://dev.virtualearth.net/mapcontrol/logging.ashx
http://www.carterandcone.coml
http://www.fontbureau.comj
http://www.fontbureau.com/designers/cabarga.htmlN
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
http://wixtoolset.org/releases/
http://www.founder.com.cn/cn
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
http://www.fontbureau.com/designers/frere-jones.html
https://dynamic.t
https://dev.virtualearth.net/REST/v1/Routes/Transit
http://www.jiyu-kobo.co.jp/
https://feedback.screenconnect.com/Feedback.axd
https://%s.dnet.xboxlive.com.
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
http://www.fontbureau.com/designers8
http://www.jiyu-kobo.co.jp/j
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
https://activity.windows.com
http://www.carterandcone.comcomj
http://www.fontbureau.com/designers/
https://dev.ditu.live.com/REST/v1/Locations
http://www.founder.com.cn/cn/YV
https://%s.dnet.xboxlive.com
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=

Dropped files

Name File Type Hashes Detection
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
#
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xff0ca065, page size 16384, DirtyShutdown, Windows version 10.0
#
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
#
Click to see the 12 hidden entries
C:\ProgramData\ScreenConnect Client (5c1b63d437ba59e3)\n1llp0rc.newcfg
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Packages\ActiveSync\LocalState\DiagOutputDir\SyncVerbose.etl
data
#
C:\Users\user\AppData\Local\Packages\ActiveSync\LocalState\DiagOutputDir\UnistackCircular.etl
data
#
C:\Users\user\AppData\Local\Packages\ActiveSync\LocalState\DiagOutputDir\UnistackCritical.etl
data
#
C:\Users\user\AppData\Local\Temp\MSIDAF2.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
#
C:\Users\user\AppData\Local\Temp\MSIDAF2.tmp-\CustomAction.config
XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\MSIDAF2.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\MSIDAF2.tmp-\ScreenConnect.Core.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\MSIDAF2.tmp-\ScreenConnect.InstallerActions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
#
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
data
#