Windows
Analysis Report
1735939565593f5d6bf694464eb338b020a826ec212acacc46d4424bb914edbae3d507116e469.dat-decoded.exe
Overview
General Information
Sample name: | 1735939565593f5d6bf694464eb338b020a826ec212acacc46d4424bb914edbae3d507116e469.dat-decoded.exe |
Analysis ID: | 1583948 |
MD5: | 1f617f63db302fc08e4af388597353ec |
SHA1: | ecccb430f77092398479ff0cd0043b853ba46633 |
SHA256: | e8d80914c573bb4bf5748d3e19bf9ab1dcf30b39626083a683879dd4d9851509 |
Tags: | base64-decodedexeuser-abuse_ch |
Infos: | |
Detection
Score: | 72 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- 1735939565593f5d6bf694464eb338b020a826ec212acacc46d4424bb914edbae3d507116e469.dat-decoded.exe (PID: 5408 cmdline:
"C:\Users\ user\Deskt op\1735939 565593f5d6 bf694464eb 338b020a82 6ec212acac c46d4424bb 914edbae3d 507116e469 .dat-decod ed.exe" MD5: 1F617F63DB302FC08E4AF388597353EC) - chrome.exe (PID: 2756 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t http://g o.microsof t.com/fwli nk/?prd=11 324&pver=4 .5&sbp=App Launch2&pl cid=0x409& o1=SHIM_NO VERSION_FO UND&versio n=(null)&p rocessName =173593956 5593f5d6bf 694464eb33 8b020a826e c212acacc4 6d4424bb91 4edbae3d50 7116e469.d at-decoded .exe&platf orm=0009&o sver=6&isS erver=0&sh imver=4.0. 30319.0 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 7216 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2140 --fi eld-trial- handle=208 4,i,387944 0552894630 111,797356 6456303877 769,262144 --disable -features= Optimizati onGuideMod elDownload ing,Optimi zationHint s,Optimiza tionHintsF etching,Op timization TargetPred iction /pr efetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 7876 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t http://g o.microsof t.com/fwli nk/?prd=11 324&pver=4 .5&sbp=App Launch2&pl cid=0x409& o1=SHIM_NO VERSION_FO UND&versio n=(null)&p rocessName =173593956 5593f5d6bf 694464eb33 8b020a826e c212acacc4 6d4424bb91 4edbae3d50 7116e469.d at-decoded .exe&platf orm=0009&o sver=6&isS erver=0&sh imver=4.0. 30319.0 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 8128 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2036 --fi eld-trial- handle=199 2,i,780063 9916368062 632,159936 9018566729 3249,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LiteHTTPBot | Yara detected LiteHTTP Bot | Joe Security | ||
MALWARE_Win_CoreBot | Detects CoreBot | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LiteHTTPBot | Yara detected LiteHTTP Bot | Joe Security | ||
JoeSecurity_LiteHTTPBot | Yara detected LiteHTTP Bot | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
MALWARE_Win_CoreBot | Detects CoreBot | ditekSHen |
|
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Bitcoin Miner |
---|
Source: | String found in binary or memory: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: |
Source: | IP Address: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window detected: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: |
Source: | Binary or memory string: |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 11 Process Injection | 11 Process Injection | OS Credential Dumping | 1 Security Software Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 DLL Side-Loading | LSASS Memory | 1 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
18% | ReversingLabs | |||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
s-part-0033.t-0009.t-msedge.net | 13.107.246.61 | true | false | unknown | |
s-part-0017.t-0009.t-msedge.net | 13.107.246.45 | true | false | high | |
www.google.com | 142.250.186.164 | true | false | high | |
js.monitor.azure.com | unknown | unknown | false | high | |
mdec.nelreports.net | unknown | unknown | false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.250.186.164 | www.google.com | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.4 |
192.168.2.5 |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1583948 |
Start date and time: | 2025-01-03 22:27:08 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 15s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 10 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 1735939565593f5d6bf694464eb338b020a826ec212acacc46d4424bb914edbae3d507116e469.dat-decoded.exe |
Detection: | MAL |
Classification: | mal72.troj.mine.winEXE@24/65@12/4 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 142.250.185.99, 142.250.185.238, 184.28.89.167, 74.125.206.84, 95.101.150.2, 172.217.18.110, 142.250.185.142, 142.250.185.206, 2.16.168.102, 2.16.168.100, 52.182.141.63, 142.250.186.42, 172.217.16.138, 172.217.18.10, 142.250.185.170, 142.250.185.74, 142.250.185.138, 142.250.186.106, 142.250.185.106, 142.250.186.74, 216.58.206.42, 172.217.16.202, 142.250.184.202, 142.250.184.234, 216.58.206.74, 142.250.181.234, 142.250.186.138, 20.189.173.25, 13.74.129.1, 13.107.21.237, 204.79.197.237, 199.232.214.172, 192.229.221.95, 142.250.181.238, 172.217.18.14, 142.250.186.78, 142.250.185.78, 142.250.186.163, 142.250.74.206, 142.250.185.174, 142.250.186.174, 142.250.184.238, 13.107.246.45, 184.28.90.27, 13.107.246.61, 20.12.23.50
- Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, c-msn-com-nsatc.trafficmanager.net, clientservices.googleapis.com, browser.events.data.trafficmanager.net, learn.microsoft.com, e11290.dspg.akamaiedge.net, mdec.nelreports.net.akamaized.net, go.microsoft.com, clients2.google.com, ocsp.digicert.com, redirector.gvt1.com, star-azurefd-prod.trafficmanager.net, a1883.dscd.akamai.net, learn.microsoft.com.edgekey.net, update.googleapis.com, clients1.google.com, fs.microsoft.com, accounts.google.com, content-autofill.googleapis.com, otelrules.azureedge.net, c-bing-com.dual-a-0034.a-msedge.net, ctldl.windowsupdate.com, learn.microsoft.com.edgekey.net.globalredir.akadns.net, firstparty-azurefd-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, browser.events.data.microsoft.com, edgedl.me.gvt1.com, e13636.dscb.akamaiedge.net, c.bing.com, learn-public.trafficmanager.net, go.microsoft.com.edgekey.net, dual-a-0034.a-msedge.net, onedscolprdwus20.westus.cloudapp.azure.com, clients.l.google.com,
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: 1735939565593f5d6bf694464eb338b020a826ec212acacc46d4424bb914edbae3d507116e469.dat-decoded.exe
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
239.255.255.250 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | KnowBe4 | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | CAPTCHA Scam ClickFix | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | HTMLPhisher | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc, Vidar, XWorm | Browse | |||
Get hash | malicious | HTMLPhisher | Browse | |||
Get hash | malicious | Unknown | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
s-part-0033.t-0009.t-msedge.net | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Lokibot | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
s-part-0017.t-0009.t-msedge.net | Get hash | malicious | CAPTCHA Scam ClickFix | Browse |
| |
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | XRed | Browse |
| ||
Get hash | malicious | XRed | Browse |
| ||
Get hash | malicious | XRed | Browse |
| ||
Get hash | malicious | XRed | Browse |
|
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 5644 |
Entropy (8bit): | 4.785769732002188 |
Encrypted: | false |
SSDEEP: | 96:ogVOjPW7cI3aDNjExAjfWQpL0dpwmWMv7AD8RevyvRJNjyZPtJ27RlhiewZjMeZf:og5cUaDNjESLWQN0dpwm9+6DlUu7lYjX |
MD5: | B5885C991E30238110973653F2408300 |
SHA1: | 39B0A79D951F8254E21821134E047C76F57AD2A8 |
SHA-256: | 085BF5AE32E6F7F1299CA79248B0CB67EBD31566728A69F4466E1659C004732E |
SHA-512: | 6BEC209D933C7A1065047637F550B7A36809D835938C04851A3B09DF644BD3EC85A2CE30F73FCFB709FE7AF3453799B2EB76702D0AB2BE067CD07D2EC03537C0 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
URL: | https://learn.microsoft.com/en-us/content-nav/site-header/site-header.json? |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 19696 |
Entropy (8bit): | 7.9898910353479335 |
Encrypted: | false |
SSDEEP: | 384:37wfQhsuDSP36Elj0oScS8w3F1ZTt5JwtRGsh1SJR3YL0BeojRs8E:37Cms69owH3FPutReFYL+eods8E |
MD5: | 4D0BFEA9EBDA0657CEE433600ED087B6 |
SHA1: | F13C690B170D5BA6BE45DEDC576776CA79718D98 |
SHA-256: | 67E7D8E61B9984289B6F3F476BBEB6CEB955BEC823243263CF1EE57D7DB7AE9A |
SHA-512: | 9136ADEC32F1D29A72A486B4604309AA8F9611663FA1E8D49079B67260B2B09CEFDC3852CF5C08CA9F5D8EA718A16DBD8D8120AC3164B0D1519D8EF8A19E4EA5 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
URL: | https://learn.microsoft.com/static/assets/0.4.029026183/styles/docons.6a251ae.34a85e0c.woff2 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 64291 |
Entropy (8bit): | 7.964191793580486 |
Encrypted: | false |
SSDEEP: | 1536:NHnitWEy8ugr5KeKvJx4FqzmYyIf52YHcd/HpQxhSoywkY8+N4U4Bv:NHitHyJTeysFqiYyIfEYHchQWoywkY8v |
MD5: | 8CCB0248B7F2ABEEAD74C057232DF42A |
SHA1: | C02BD92FEA2DF7ED12C8013B161670B39E1EC52F |
SHA-256: | 0A9FD0C7F32EABBB2834854C655B958EC72A321F3C1CF50035DD87816591CDCC |
SHA-512: | 6D6E3C858886C9D6186AD13B94DBC2D67918AA477FB7D70A7140223FAB435CF109537C51CA7F4B2A0DB00EEAD806BBE8C6B29B947B0BE7044358D2823F5057CE |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 35005 |
Entropy (8bit): | 7.980061050467981 |
Encrypted: | false |
SSDEEP: | 768:aHBEr/QXnbCgWotMq4AZZivq2/Qu0cEv1FjHBep6U0Z/68R:ahWqbTWiM7ACvdIdldhep4rR |
MD5: | 522037F008E03C9448AE0AAAF09E93CB |
SHA1: | 8A32997EAB79246BEED5A37DB0C92FBFB006BEF2 |
SHA-256: | 983C35607C4FB0B529CA732BE42115D3FCAAC947CEE9C9632F7CACDBDECAF5A7 |
SHA-512: | 643EC613B2E7BDBB2F61E1799C189B0E3392EA5AE10845EB0B1F1542A03569E886F4B54D5B38AF10E78DB49C71357108C94589474B181F6A4573B86CF2D6F0D8 |
Malicious: | false |
URL: | https://learn.microsoft.com/en-us/dotnet/framework/install/media/application-not-started/app-could-not-be-started.png |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 72 |
Entropy (8bit): | 4.241202481433726 |
Encrypted: | false |
SSDEEP: | 3:YozDD/RNgQJzRWWlKFiFD3e4xCzY:YovtNgmzR/wYFDxkY |
MD5: | 9E576E34B18E986347909C29AE6A82C6 |
SHA1: | 532C767978DC2B55854B3CA2D2DF5B4DB221C934 |
SHA-256: | 88BDF5AF090328963973990DE427779F9C4DF3B8E1F5BADC3D972BAC3087006D |
SHA-512: | 5EF6DCFFD93434D45760888BF4B95FF134D53F34DA9DC904AD3C5EBEDC58409073483F531FEA4233869ED3EC75F38B022A70B2E179A5D3A13BDB10AB5C46B124 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 4897 |
Entropy (8bit): | 4.8007377074457604 |
Encrypted: | false |
SSDEEP: | 96:A0AIvEQ+KfZcbhaW9dp45qtAdflfDOFnymoLByzfwqrLvJ4QG63JkRJ+dRp8TJHr:dgQ+KfZcbhaWjp45qtAdflfDOFnNgByQ |
MD5: | 0E78F790402498FA57E649052DA01218 |
SHA1: | 9ED4D0846DA5D66D44EE831920B141BBF60A0200 |
SHA-256: | 73F3061A46EA8FD11D674FB21FEEEFE3753FC3A3ED77224E7F66A964C0420603 |
SHA-512: | B46E4B90E53C7DABC7208A6FDAE53F25BD70FCFBBEF03FFC64B1B5D1EB1C01C870A7309DF167246FCCD114B483038A64D7C46CA3B9FCB3779A77E42DB6967051 |
Malicious: | false |
URL: | https://learn.microsoft.com/en-us/content-nav/MSDocsHeader-DotNet.json? |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 72 |
Entropy (8bit): | 4.241202481433726 |
Encrypted: | false |
SSDEEP: | 3:YozDD/RNgQJzRWWlKFiFD3e4xCzY:YovtNgmzR/wYFDxkY |
MD5: | 9E576E34B18E986347909C29AE6A82C6 |
SHA1: | 532C767978DC2B55854B3CA2D2DF5B4DB221C934 |
SHA-256: | 88BDF5AF090328963973990DE427779F9C4DF3B8E1F5BADC3D972BAC3087006D |
SHA-512: | 5EF6DCFFD93434D45760888BF4B95FF134D53F34DA9DC904AD3C5EBEDC58409073483F531FEA4233869ED3EC75F38B022A70B2E179A5D3A13BDB10AB5C46B124 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 64291 |
Entropy (8bit): | 7.964191793580486 |
Encrypted: | false |
SSDEEP: | 1536:NHnitWEy8ugr5KeKvJx4FqzmYyIf52YHcd/HpQxhSoywkY8+N4U4Bv:NHitHyJTeysFqiYyIfEYHchQWoywkY8v |
MD5: | 8CCB0248B7F2ABEEAD74C057232DF42A |
SHA1: | C02BD92FEA2DF7ED12C8013B161670B39E1EC52F |
SHA-256: | 0A9FD0C7F32EABBB2834854C655B958EC72A321F3C1CF50035DD87816591CDCC |
SHA-512: | 6D6E3C858886C9D6186AD13B94DBC2D67918AA477FB7D70A7140223FAB435CF109537C51CA7F4B2A0DB00EEAD806BBE8C6B29B947B0BE7044358D2823F5057CE |
Malicious: | false |
URL: | https://learn.microsoft.com/en-us/media/event-banners/banner-learn-challenge-2024.jpg |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1173007 |
Entropy (8bit): | 5.503893944397598 |
Encrypted: | false |
SSDEEP: | 24576:VMga+4IVzOjS1Jho1WXQFjTEr39/jHXzT:VMcVzOjS1Jho1WXQar39/bXzT |
MD5: | 2E00D51C98DBB338E81054F240E1DEB2 |
SHA1: | D33BAC6B041064AE4330DCC2D958EBE4C28EBE58 |
SHA-256: | 300480069078B5892D2363A2B65E2DFBBF30FE5C80F83EDBFECF4610FD093862 |
SHA-512: | B6268D980CE9CB729C82DBA22F04FD592952B2A1AAB43079CA5330C68A86E72B0D232CE4070DB893A5054EE5C68325C92C9F1A33F868D61EBB35129E74FC7EF9 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 1154 |
Entropy (8bit): | 4.59126408969148 |
Encrypted: | false |
SSDEEP: | 24:txFRuJpzYeGK+VS6ckNL2091JP/UcHc8oQJ1sUWMLc/jH6GbKqjHJIOHA:JsfcU6ckNL2091Z/U/YsUDM+GhS |
MD5: | 37258A983459AE1C2E4F1E551665F388 |
SHA1: | 603A4E9115E613CC827206CF792C62AEB606C941 |
SHA-256: | 8E34F3807B4BF495D8954E7229681DA8D0DD101DD6DDC2AD7F90CD2983802B44 |
SHA-512: | 184CB63EF510143B0AF013F506411C917D68BB63F2CFA47EA2A42688FD4F55F3B820AF94F87083C24F48AACEE6A692199E185FC5C5CFBED5D70790454EED7F5C |
Malicious: | false |
URL: | https://learn.microsoft.com/en-us/media/logos/logo_net.svg |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 33273 |
Entropy (8bit): | 4.918756013698695 |
Encrypted: | false |
SSDEEP: | 384:FnvJOb4OLIch+KCnMet7NPXlJl+HjZjBTRdE0zIwHdZ4vNNpUjV8din4E9hLUukj:5hOEO8chkMet7pCjBfcHkWOzUukj |
MD5: | 86E84C732A96BF9CF18C99B48DB90B6D |
SHA1: | 6A8C212067CB9FE5B8325AE1E89FCA3E7FCF20FA |
SHA-256: | B54678C5BFB00DC1AFBF2E52C56F8E10173975C25FB19062EFE5DC86F1B7D769 |
SHA-512: | AD91A78371074B5BB2105A9AE69664371C235B7C82DFD25C9ED17F435E92018F2A0DD42203F403D7A75DF4FC63966017519F118B2B22F0DE7656B2B155636AA2 |
Malicious: | false |
URL: | https://learn.microsoft.com/en-us/dotnet/framework/toc.json |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 35005 |
Entropy (8bit): | 7.980061050467981 |
Encrypted: | false |
SSDEEP: | 768:aHBEr/QXnbCgWotMq4AZZivq2/Qu0cEv1FjHBep6U0Z/68R:ahWqbTWiM7ACvdIdldhep4rR |
MD5: | 522037F008E03C9448AE0AAAF09E93CB |
SHA1: | 8A32997EAB79246BEED5A37DB0C92FBFB006BEF2 |
SHA-256: | 983C35607C4FB0B529CA732BE42115D3FCAAC947CEE9C9632F7CACDBDECAF5A7 |
SHA-512: | 643EC613B2E7BDBB2F61E1799C189B0E3392EA5AE10845EB0B1F1542A03569E886F4B54D5B38AF10E78DB49C71357108C94589474B181F6A4573B86CF2D6F0D8 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 13842 |
Entropy (8bit): | 7.802399161550213 |
Encrypted: | false |
SSDEEP: | 192:NLNf+jBQsDHg7av3EEondO8PuRu2mIYXEIiDm42NpsHFMHfgnJ4K2DVwv:NLt+1jDmY+ndXwjLUpiDwpzfwoDVk |
MD5: | F6EC97C43480D41695065AD55A97B382 |
SHA1: | D9C3D0895A5ED1A3951B8774B519B8217F0A54C5 |
SHA-256: | 07A599FAB1E66BABC430E5FED3029F25FF3F4EA2DD0EC8968FFBA71EF1872F68 |
SHA-512: | 22462763178409D60609761A2AF734F97B35B9A818EC1FD9046AFAB489AAD83CE34896EE8586EFE402EA7739ECF088BC2DB5C1C8E4FB39E6A0FC5B3ADC6B4A9B |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4897 |
Entropy (8bit): | 4.8007377074457604 |
Encrypted: | false |
SSDEEP: | 96:A0AIvEQ+KfZcbhaW9dp45qtAdflfDOFnymoLByzfwqrLvJ4QG63JkRJ+dRp8TJHr:dgQ+KfZcbhaWjp45qtAdflfDOFnNgByQ |
MD5: | 0E78F790402498FA57E649052DA01218 |
SHA1: | 9ED4D0846DA5D66D44EE831920B141BBF60A0200 |
SHA-256: | 73F3061A46EA8FD11D674FB21FEEEFE3753FC3A3ED77224E7F66A964C0420603 |
SHA-512: | B46E4B90E53C7DABC7208A6FDAE53F25BD70FCFBBEF03FFC64B1B5D1EB1C01C870A7309DF167246FCCD114B483038A64D7C46CA3B9FCB3779A77E42DB6967051 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 1817143 |
Entropy (8bit): | 5.501007973622959 |
Encrypted: | false |
SSDEEP: | 24576:aLX8PHFluFxBSB1DkCXWjfz8gEPPXL/tie:auHFluFxBSB1DkCXWjfz7EPPXztH |
MD5: | F57E274AE8E8889C7516D3E53E3EB026 |
SHA1: | F8D21465C0C19051474BE6A4A681FA0B0D3FCC0C |
SHA-256: | 2A2198DDBDAEDD1E968C0A1A45F800765AAE703675E419E46F6E51E3E9729D01 |
SHA-512: | 9A9B42F70E09D821B799B92CB6AC981236FCF190F0A467CA7F7D382E3BCA1BC1D71673D37CD7426499D24DFBC0B7A6D10676C0E3FB2B0292249A5ABAB78F23F4 |
Malicious: | false |
URL: | https://learn.microsoft.com/static/assets/0.4.029026183/scripts/en-us/index-docs.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 3130 |
Entropy (8bit): | 4.790069981348324 |
Encrypted: | false |
SSDEEP: | 48:YWuGl640ynAqgDJ9OJWuO6Z3Db8VgK/ni47ttbtlSlA37ERw7II77Aj5M1:Nv0ynAhD3CO5t5lNEYIOEjc |
MD5: | EBA6E81304F2F555E1D2EA3126A18A41 |
SHA1: | 61429C3FE837FD4DD68E7B26678F131F2E00070D |
SHA-256: | F309CCCE17B2B4706E7110F6C76F81761F0A44168D12C358AC4D120776907F81 |
SHA-512: | 3BE0466794E7BDDC8565758DBF5553E89ED0003271F07695F09283F242BB65C1978ED79A38D5E589A99F68C0130E1E4B52576D7CD655EE272EE104BE0378E72E |
Malicious: | false |
URL: | https://learn.microsoft.com/en-us/dotnet/breadcrumb/toc.json |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 18367 |
Entropy (8bit): | 7.7772261735974215 |
Encrypted: | false |
SSDEEP: | 384:4qqZYz7CAda2Qmd6VWWNg9h8XvdkRbdi2nki:1qZYz7Cma2hYNMh8XvdObdi2nX |
MD5: | 240C4CC15D9FD65405BB642AB81BE615 |
SHA1: | 5A66783FE5DD932082F40811AE0769526874BFD3 |
SHA-256: | 030272CE6BA1BECA700EC83FDED9DBDC89296FBDE0633A7F5943EF5831876C07 |
SHA-512: | 267FE31BC25944DD7B6071C2C2C271CCC188AE1F6A0D7E587DCF9198B81598DA6B058D1B413F228DF0CB37C8304329E808089388359651E81B5F3DEC566D0EE0 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 13339 |
Entropy (8bit): | 7.683569563478597 |
Encrypted: | false |
SSDEEP: | 192:zjSKAj04ndWb6OuzZjk6TsEaJS0/bJur2Gz4Imm3MhE4NfM:zutfW69XTspsG3G0TfhEQM |
MD5: | 512625CF8F40021445D74253DC7C28C0 |
SHA1: | F6B27CE0F7D4E48E34FDDCA8A96337F07CFFE730 |
SHA-256: | 1D4DCEE8511D5371FEC911660D6049782E12901C662B409A5C675772E9B87369 |
SHA-512: | AE02319D03884D758A86C286B6F593BDFFD067885D56D82EEB8215FDCB41637C7BB9109039E7FBC93AD246D030C368FB285B3161976ED485ABC5A8DF6DF9A38C |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1432 |
Entropy (8bit): | 4.986131881931089 |
Encrypted: | false |
SSDEEP: | 24:TGAcSRrEV4YUmjiqIWD5bfD9yRSmkYR/stZLKvVqXRRlAfr6VXBAuU:Ti4IV4YUmjiqr9bfskAmZTXGfSXqh |
MD5: | 6B8763B76F400DC480450FD69072F215 |
SHA1: | 6932907906AFCF8EAFA22154D8478106521BC9EE |
SHA-256: | 3FB84D357F0C9A66100570EDD62A04D0574C45E8A5209A3E6870FF22AF839DFC |
SHA-512: | 8A07EBB806A0BA8EF54B463BD6AF37C77A10C1FA38A57128FD90FCB2C16DF71CE697D4FE65C623E5C6054C5715975831C36861D5574F59DF28836D9BC2B0BC22 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 18367 |
Entropy (8bit): | 7.7772261735974215 |
Encrypted: | false |
SSDEEP: | 384:4qqZYz7CAda2Qmd6VWWNg9h8XvdkRbdi2nki:1qZYz7Cma2hYNMh8XvdObdi2nX |
MD5: | 240C4CC15D9FD65405BB642AB81BE615 |
SHA1: | 5A66783FE5DD932082F40811AE0769526874BFD3 |
SHA-256: | 030272CE6BA1BECA700EC83FDED9DBDC89296FBDE0633A7F5943EF5831876C07 |
SHA-512: | 267FE31BC25944DD7B6071C2C2C271CCC188AE1F6A0D7E587DCF9198B81598DA6B058D1B413F228DF0CB37C8304329E808089388359651E81B5F3DEC566D0EE0 |
Malicious: | false |
URL: | https://learn.microsoft.com/en-us/dotnet/framework/install/media/application-not-started/repair-tool-no-resolution.png |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1154 |
Entropy (8bit): | 4.59126408969148 |
Encrypted: | false |
SSDEEP: | 24:txFRuJpzYeGK+VS6ckNL2091JP/UcHc8oQJ1sUWMLc/jH6GbKqjHJIOHA:JsfcU6ckNL2091Z/U/YsUDM+GhS |
MD5: | 37258A983459AE1C2E4F1E551665F388 |
SHA1: | 603A4E9115E613CC827206CF792C62AEB606C941 |
SHA-256: | 8E34F3807B4BF495D8954E7229681DA8D0DD101DD6DDC2AD7F90CD2983802B44 |
SHA-512: | 184CB63EF510143B0AF013F506411C917D68BB63F2CFA47EA2A42688FD4F55F3B820AF94F87083C24F48AACEE6A692199E185FC5C5CFBED5D70790454EED7F5C |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 3130 |
Entropy (8bit): | 4.790069981348324 |
Encrypted: | false |
SSDEEP: | 48:YWuGl640ynAqgDJ9OJWuO6Z3Db8VgK/ni47ttbtlSlA37ERw7II77Aj5M1:Nv0ynAhD3CO5t5lNEYIOEjc |
MD5: | EBA6E81304F2F555E1D2EA3126A18A41 |
SHA1: | 61429C3FE837FD4DD68E7B26678F131F2E00070D |
SHA-256: | F309CCCE17B2B4706E7110F6C76F81761F0A44168D12C358AC4D120776907F81 |
SHA-512: | 3BE0466794E7BDDC8565758DBF5553E89ED0003271F07695F09283F242BB65C1978ED79A38D5E589A99F68C0130E1E4B52576D7CD655EE272EE104BE0378E72E |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 15427 |
Entropy (8bit): | 7.784472070227724 |
Encrypted: | false |
SSDEEP: | 384:CKKdvwj3SJMpKKKKKKKKikCyKwqHILyPGQV4ykihKKKKKKKCm:CKKdvMMgKKKKKKKKiqB3yPVXkihKKKKI |
MD5: | 3062488F9D119C0D79448BE06ED140D8 |
SHA1: | 8A148951C894FC9E968D3E46589A2E978267650E |
SHA-256: | C47A383DE6DD60149B37DD24825D42D83CB48BE0ED094E3FC3B228D0A7BB9332 |
SHA-512: | 00BBA6BCBFBF44B977129594A47F732809DCE7D4E2D22D050338E4EEA91FCC02A9B333C45EEB4C9024DF076CBDA0B46B621BF48309C0D037D19BBEAE0367F5ED |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 16 |
Entropy (8bit): | 3.875 |
Encrypted: | false |
SSDEEP: | 3:HMB:k |
MD5: | 0B04EA412F8FC88B51398B1CBF38110E |
SHA1: | E073BCC5A03E7BBA2A16CF201A3CED1BE7533FBF |
SHA-256: | 7562254FF78FD854F0A8808E75A406F5C6058B57B71514481DAE490FC7B8F4C3 |
SHA-512: | 6D516068C3F3CBFC1500032E600BFF5542EE30C0EAC11A929EE002C707810BBF614A5586C2673EE959AFDF19C08F6EAEFA18193AD6CEDC839BDF249CF95E8079 |
Malicious: | false |
URL: | https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISEAkEurwx6c-nJBIFDb_mJfI=?alt=proto |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 207935 |
Entropy (8bit): | 5.420780972514107 |
Encrypted: | false |
SSDEEP: | 3072:Wx2fZBMb0y0Xi13tL9+pjXDMe/m7GG3/lHNVliMTqwK:Wof3G0NSkNzMeO7z/l3lhTa |
MD5: | 3DE400B2682E30C3F33FA4B93116491F |
SHA1: | BC48B898DF43BA2178DE28F5A29D977B2204F846 |
SHA-256: | 84E9EAD32EFA16BE0D5B2407F799FC3DAE497BCB4A90758C0106C8D8F55003FE |
SHA-512: | D4004E4A62A81116D346B7A7F95FC67F97A258E82B3BDDBF4A9F28CEBB633E4A336A17057A765DA306AD9B1E40A99FE349D698B095A6F386B9CDF4A46457FC06 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 27868 |
Entropy (8bit): | 5.155680085584642 |
Encrypted: | false |
SSDEEP: | 768:63ZUfTvLg6jLjnjrjGjXMQjtzjMFzXY8v1gWj/rlOVqnACpK3o3hhl0OU2/8BlsX:BTvL7HBJv11pOVqlh382/rIN1Y |
MD5: | 0A0F2E1CCB8E5F7C38CB11B101A8941F |
SHA1: | 112F4B7CB3DEDB9D9744CAC000E05DC949E89891 |
SHA-256: | DBDB03D01BA044C4072BBC169C1E54D05A3D89623D2EBEAC28AC89ABDA3ABC2A |
SHA-512: | 9BD4E9C2415FB62E55D04DDEB9ECE04CB9AE2B8F8B93632A11A0AFD1CE6A632DF7D58DD571BF34C6E8E99107E80340CFAFF4BB4A8E18D05B5CAA7445DE55839C |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 207935 |
Entropy (8bit): | 5.420780972514107 |
Encrypted: | false |
SSDEEP: | 3072:Wx2fZBMb0y0Xi13tL9+pjXDMe/m7GG3/lHNVliMTqwK:Wof3G0NSkNzMeO7z/l3lhTa |
MD5: | 3DE400B2682E30C3F33FA4B93116491F |
SHA1: | BC48B898DF43BA2178DE28F5A29D977B2204F846 |
SHA-256: | 84E9EAD32EFA16BE0D5B2407F799FC3DAE497BCB4A90758C0106C8D8F55003FE |
SHA-512: | D4004E4A62A81116D346B7A7F95FC67F97A258E82B3BDDBF4A9F28CEBB633E4A336A17057A765DA306AD9B1E40A99FE349D698B095A6F386B9CDF4A46457FC06 |
Malicious: | false |
URL: | https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 27868 |
Entropy (8bit): | 5.155680085584642 |
Encrypted: | false |
SSDEEP: | 768:63ZUfTvLg6jLjnjrjGjXMQjtzjMFzXY8v1gWj/rlOVqnACpK3o3hhl0OU2/8BlsX:BTvL7HBJv11pOVqlh382/rIN1Y |
MD5: | 0A0F2E1CCB8E5F7C38CB11B101A8941F |
SHA1: | 112F4B7CB3DEDB9D9744CAC000E05DC949E89891 |
SHA-256: | DBDB03D01BA044C4072BBC169C1E54D05A3D89623D2EBEAC28AC89ABDA3ABC2A |
SHA-512: | 9BD4E9C2415FB62E55D04DDEB9ECE04CB9AE2B8F8B93632A11A0AFD1CE6A632DF7D58DD571BF34C6E8E99107E80340CFAFF4BB4A8E18D05B5CAA7445DE55839C |
Malicious: | false |
URL: | https://learn.microsoft.com/en-us/banners/index.json |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 47062 |
Entropy (8bit): | 5.016149588804727 |
Encrypted: | false |
SSDEEP: | 768:haAq16LIElO6L6x2bTI1ln4a1T0MCFnFMBVeZrdLg:hTKGLlO6eAbTIr4audZqBkZRLg |
MD5: | 1FF4CE3C1DB69A5146B03AD8BE62F5EB |
SHA1: | 5D177F6D11FCFF2BD62E61983383BB39D9F045E4 |
SHA-256: | 222F320F99EF710DCE98F125314F30DAC99CF408525D86F185B317A878D48A5C |
SHA-512: | 36D198120D83AA9BDC2E74F80B99E2219EE4F03A8DD93A1E58A9E30BD48E829E5220A9F5FE6FC29B3810ED85005A8DCD0EAD04EE06DCCD0A15CD6D080E88641D |
Malicious: | false |
URL: | https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=1735939565593f5d6bf694464eb338b020a826ec212acacc46d4424bb914edbae3d507116e469.dat-decoded.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 15427 |
Entropy (8bit): | 7.784472070227724 |
Encrypted: | false |
SSDEEP: | 384:CKKdvwj3SJMpKKKKKKKKikCyKwqHILyPGQV4ykihKKKKKKKCm:CKKdvMMgKKKKKKKKiqB3yPVXkihKKKKI |
MD5: | 3062488F9D119C0D79448BE06ED140D8 |
SHA1: | 8A148951C894FC9E968D3E46589A2E978267650E |
SHA-256: | C47A383DE6DD60149B37DD24825D42D83CB48BE0ED094E3FC3B228D0A7BB9332 |
SHA-512: | 00BBA6BCBFBF44B977129594A47F732809DCE7D4E2D22D050338E4EEA91FCC02A9B333C45EEB4C9024DF076CBDA0B46B621BF48309C0D037D19BBEAE0367F5ED |
Malicious: | false |
URL: | https://learn.microsoft.com/en-us/dotnet/framework/install/media/application-not-started/repair-tool-recommended-changes.png |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 1432 |
Entropy (8bit): | 4.986131881931089 |
Encrypted: | false |
SSDEEP: | 24:TGAcSRrEV4YUmjiqIWD5bfD9yRSmkYR/stZLKvVqXRRlAfr6VXBAuU:Ti4IV4YUmjiqr9bfskAmZTXGfSXqh |
MD5: | 6B8763B76F400DC480450FD69072F215 |
SHA1: | 6932907906AFCF8EAFA22154D8478106521BC9EE |
SHA-256: | 3FB84D357F0C9A66100570EDD62A04D0574C45E8A5209A3E6870FF22AF839DFC |
SHA-512: | 8A07EBB806A0BA8EF54B463BD6AF37C77A10C1FA38A57128FD90FCB2C16DF71CE697D4FE65C623E5C6054C5715975831C36861D5574F59DF28836D9BC2B0BC22 |
Malicious: | false |
URL: | https://learn.microsoft.com/static/assets/0.4.029026183/global/deprecation.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 464328 |
Entropy (8bit): | 5.0747157240281755 |
Encrypted: | false |
SSDEEP: | 6144:XegPrbKCerH5dyUJ6Yh6BFPDxZYX04GK7M4:1KCerXyUh |
MD5: | 875E7F3672FEC41DDB5A2386D2331531 |
SHA1: | 282979933E99BDE3A6342DC1EF93FBC51682F2C3 |
SHA-256: | F205B3CBA340ECB0B5D45E5DE6D385947CC4C21248707A90BFD5894E9B61F3C9 |
SHA-512: | 67A3C1D8FF089E01C20962D96968DE43F3E8D49B474C396F08827EE891C0315693634E663D3148D7441B501EA6939A7D84A80B1E855B7C2A8BCB17E0013AFAD4 |
Malicious: | false |
URL: | https://learn.microsoft.com/static/assets/0.4.029026183/styles/site-ltr.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 52717 |
Entropy (8bit): | 5.462668685745912 |
Encrypted: | false |
SSDEEP: | 1536:tjspYRrxlhd0fq3agV3IcgPPPI3r7DAQHCloIB3Tj7xHw:tjZLCtxQ |
MD5: | 413FCC759CC19821B61B6941808B29B5 |
SHA1: | 1AD23B8A202043539C20681B1B3E9F3BC5D55133 |
SHA-256: | DAF7759FEDD9AF6C4D7E374B0D056547AE7CB245EC24A1C4ACF02932F30DC536 |
SHA-512: | E9BF8A74FEF494990AAFD15A0F21E0398DC28B4939C8F9F8AA1F3FFBD18056C8D1AB282B081F5C56F0928C48E30E768F7E347929304B55547F9CA8C1AABD80B8 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 52717 |
Entropy (8bit): | 5.462668685745912 |
Encrypted: | false |
SSDEEP: | 1536:tjspYRrxlhd0fq3agV3IcgPPPI3r7DAQHCloIB3Tj7xHw:tjZLCtxQ |
MD5: | 413FCC759CC19821B61B6941808B29B5 |
SHA1: | 1AD23B8A202043539C20681B1B3E9F3BC5D55133 |
SHA-256: | DAF7759FEDD9AF6C4D7E374B0D056547AE7CB245EC24A1C4ACF02932F30DC536 |
SHA-512: | E9BF8A74FEF494990AAFD15A0F21E0398DC28B4939C8F9F8AA1F3FFBD18056C8D1AB282B081F5C56F0928C48E30E768F7E347929304B55547F9CA8C1AABD80B8 |
Malicious: | false |
URL: | https://wcpstatic.microsoft.com/mscc/lib/v2/wcp-consent.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 1173007 |
Entropy (8bit): | 5.503893944397598 |
Encrypted: | false |
SSDEEP: | 24576:VMga+4IVzOjS1Jho1WXQFjTEr39/jHXzT:VMcVzOjS1Jho1WXQar39/bXzT |
MD5: | 2E00D51C98DBB338E81054F240E1DEB2 |
SHA1: | D33BAC6B041064AE4330DCC2D958EBE4C28EBE58 |
SHA-256: | 300480069078B5892D2363A2B65E2DFBBF30FE5C80F83EDBFECF4610FD093862 |
SHA-512: | B6268D980CE9CB729C82DBA22F04FD592952B2A1AAB43079CA5330C68A86E72B0D232CE4070DB893A5054EE5C68325C92C9F1A33F868D61EBB35129E74FC7EF9 |
Malicious: | false |
URL: | https://learn.microsoft.com/static/third-party/MathJax/3.2.2/tex-mml-chtml.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1817143 |
Entropy (8bit): | 5.501007973622959 |
Encrypted: | false |
SSDEEP: | 24576:aLX8PHFluFxBSB1DkCXWjfz8gEPPXL/tie:auHFluFxBSB1DkCXWjfz7EPPXztH |
MD5: | F57E274AE8E8889C7516D3E53E3EB026 |
SHA1: | F8D21465C0C19051474BE6A4A681FA0B0D3FCC0C |
SHA-256: | 2A2198DDBDAEDD1E968C0A1A45F800765AAE703675E419E46F6E51E3E9729D01 |
SHA-512: | 9A9B42F70E09D821B799B92CB6AC981236FCF190F0A467CA7F7D382E3BCA1BC1D71673D37CD7426499D24DFBC0B7A6D10676C0E3FB2B0292249A5ABAB78F23F4 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 72 |
Entropy (8bit): | 4.241202481433726 |
Encrypted: | false |
SSDEEP: | 3:YozDD/RNgQJzRWWlKFiFD3e4xCzY:YovtNgmzR/wYFDxkY |
MD5: | 9E576E34B18E986347909C29AE6A82C6 |
SHA1: | 532C767978DC2B55854B3CA2D2DF5B4DB221C934 |
SHA-256: | 88BDF5AF090328963973990DE427779F9C4DF3B8E1F5BADC3D972BAC3087006D |
SHA-512: | 5EF6DCFFD93434D45760888BF4B95FF134D53F34DA9DC904AD3C5EBEDC58409073483F531FEA4233869ED3EC75F38B022A70B2E179A5D3A13BDB10AB5C46B124 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 13339 |
Entropy (8bit): | 7.683569563478597 |
Encrypted: | false |
SSDEEP: | 192:zjSKAj04ndWb6OuzZjk6TsEaJS0/bJur2Gz4Imm3MhE4NfM:zutfW69XTspsG3G0TfhEQM |
MD5: | 512625CF8F40021445D74253DC7C28C0 |
SHA1: | F6B27CE0F7D4E48E34FDDCA8A96337F07CFFE730 |
SHA-256: | 1D4DCEE8511D5371FEC911660D6049782E12901C662B409A5C675772E9B87369 |
SHA-512: | AE02319D03884D758A86C286B6F593BDFFD067885D56D82EEB8215FDCB41637C7BB9109039E7FBC93AD246D030C368FB285B3161976ED485ABC5A8DF6DF9A38C |
Malicious: | false |
URL: | https://learn.microsoft.com/en-us/dotnet/framework/install/media/application-not-started/repair-tool-changes-complete.png |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 17174 |
Entropy (8bit): | 2.9129715116732746 |
Encrypted: | false |
SSDEEP: | 24:QSNTmTFxg4lyyyyyyyyyyyyyio7eeeeeeeeekzgsLsLsLsLsLsQZp:nfgyyyyyyyyyyyyynzQQQQQO |
MD5: | 12E3DAC858061D088023B2BD48E2FA96 |
SHA1: | E08CE1A144ECEAE0C3C2EA7A9D6FBC5658F24CE5 |
SHA-256: | 90CDAF487716184E4034000935C605D1633926D348116D198F355A98B8C6CD21 |
SHA-512: | C5030C55A855E7A9E20E22F4C70BF1E0F3C558A9B7D501CFAB6992AC2656AE5E41B050CCAC541EFA55F9603E0D349B247EB4912EE169D44044271789C719CD01 |
Malicious: | false |
URL: | https://learn.microsoft.com/favicon.ico |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 5644 |
Entropy (8bit): | 4.785769732002188 |
Encrypted: | false |
SSDEEP: | 96:ogVOjPW7cI3aDNjExAjfWQpL0dpwmWMv7AD8RevyvRJNjyZPtJ27RlhiewZjMeZf:og5cUaDNjESLWQN0dpwm9+6DlUu7lYjX |
MD5: | B5885C991E30238110973653F2408300 |
SHA1: | 39B0A79D951F8254E21821134E047C76F57AD2A8 |
SHA-256: | 085BF5AE32E6F7F1299CA79248B0CB67EBD31566728A69F4466E1659C004732E |
SHA-512: | 6BEC209D933C7A1065047637F550B7A36809D835938C04851A3B09DF644BD3EC85A2CE30F73FCFB709FE7AF3453799B2EB76702D0AB2BE067CD07D2EC03537C0 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 17174 |
Entropy (8bit): | 2.9129715116732746 |
Encrypted: | false |
SSDEEP: | 24:QSNTmTFxg4lyyyyyyyyyyyyyio7eeeeeeeeekzgsLsLsLsLsLsQZp:nfgyyyyyyyyyyyyynzQQQQQO |
MD5: | 12E3DAC858061D088023B2BD48E2FA96 |
SHA1: | E08CE1A144ECEAE0C3C2EA7A9D6FBC5658F24CE5 |
SHA-256: | 90CDAF487716184E4034000935C605D1633926D348116D198F355A98B8C6CD21 |
SHA-512: | C5030C55A855E7A9E20E22F4C70BF1E0F3C558A9B7D501CFAB6992AC2656AE5E41B050CCAC541EFA55F9603E0D349B247EB4912EE169D44044271789C719CD01 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 13842 |
Entropy (8bit): | 7.802399161550213 |
Encrypted: | false |
SSDEEP: | 192:NLNf+jBQsDHg7av3EEondO8PuRu2mIYXEIiDm42NpsHFMHfgnJ4K2DVwv:NLt+1jDmY+ndXwjLUpiDwpzfwoDVk |
MD5: | F6EC97C43480D41695065AD55A97B382 |
SHA1: | D9C3D0895A5ED1A3951B8774B519B8217F0A54C5 |
SHA-256: | 07A599FAB1E66BABC430E5FED3029F25FF3F4EA2DD0EC8968FFBA71EF1872F68 |
SHA-512: | 22462763178409D60609761A2AF734F97B35B9A818EC1FD9046AFAB489AAD83CE34896EE8586EFE402EA7739ECF088BC2DB5C1C8E4FB39E6A0FC5B3ADC6B4A9B |
Malicious: | false |
URL: | https://learn.microsoft.com/en-us/dotnet/framework/install/media/application-not-started/install-3-5.png |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 33273 |
Entropy (8bit): | 4.918756013698695 |
Encrypted: | false |
SSDEEP: | 384:FnvJOb4OLIch+KCnMet7NPXlJl+HjZjBTRdE0zIwHdZ4vNNpUjV8din4E9hLUukj:5hOEO8chkMet7pCjBfcHkWOzUukj |
MD5: | 86E84C732A96BF9CF18C99B48DB90B6D |
SHA1: | 6A8C212067CB9FE5B8325AE1E89FCA3E7FCF20FA |
SHA-256: | B54678C5BFB00DC1AFBF2E52C56F8E10173975C25FB19062EFE5DC86F1B7D769 |
SHA-512: | AD91A78371074B5BB2105A9AE69664371C235B7C82DFD25C9ED17F435E92018F2A0DD42203F403D7A75DF4FC63966017519F118B2B22F0DE7656B2B155636AA2 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 5.521395787485969 |
TrID: |
|
File name: | 1735939565593f5d6bf694464eb338b020a826ec212acacc46d4424bb914edbae3d507116e469.dat-decoded.exe |
File size: | 49'162 bytes |
MD5: | 1f617f63db302fc08e4af388597353ec |
SHA1: | ecccb430f77092398479ff0cd0043b853ba46633 |
SHA256: | e8d80914c573bb4bf5748d3e19bf9ab1dcf30b39626083a683879dd4d9851509 |
SHA512: | 7f6461c27f973561d3da08c8736ab6078100f8d320d8cadd9628603630ff8851d39516754003039b350997b4c858b135c06b40b12ea73466becc9091cf24159f |
SSDEEP: | 1536:0a6K5OoO7r8bhlpina/HIItQLbIbSySG+:0a6LoO70uXI8bIbSySG+ |
TLSH: | 09231784A3ED0612F1FFAFB99C7581048776F9679902E78D1ECC60DD28763809A807B7 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...P.vg..............0.................. ........@.. ....................... ............`................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x40d10a |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x6776FD50 [Thu Jan 2 20:55:44 2025 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: |
Instruction |
---|
insb |
add eax, dword ptr [ecx+5F64DE3Ah] |
pop edi |
xor dword ptr [ecx], edi |
add byte ptr [eax], al |
inc ebx |
add dword ptr [eax], eax |
inc ecx |
outsb |
jne 00007FAFFCF8D0A4h |
imul esi, dword ptr [ebx+2Eh], 73616C43h |
jnc 00007FAFFCF8D0A7h |
jnc 00007FAFFCF8D070h |
dec edi |
jo 00007FAFFCF8D0B6h |
imul ebp, dword ptr [edi+6Eh], 65522B73h |
insd |
outsd |
jbe 00007FAFFCF8D0A3h |
insb |
sub edi, dword ptr [esi+edi] |
arpl word ptr [ebx], bp |
cmp al, 3Ch |
push ebx |
arpl word ptr [ecx+6Eh], sp |
push esp |
push 64616572h |
inc ecx |
jnc 00007FAFFCF8D0BBh |
outsb |
arpl word ptr [esi], di |
bound ebx, dword ptr [edi+5Fh] |
xor dword ptr [eax], edi |
pop edi |
xor byte ptr [ebx], al |
cmp dword ptr [edx], 000064DEh |
sbb dword ptr [ecx], eax |
add byte ptr [edx], al |
add byte ptr [eax], al |
add byte ptr [eax+edx*2], al |
popad |
je 00007FAFFCF8D0AAh |
or edx, dword ptr [ebx+65h] |
jc 00007FAFFCF8D0B8h |
imul esp, dword ptr [ebx+65h], 656D614Eh |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax-03h], dl |
jbe 00007FAFFCF8D0A9h |
add byte ptr [eax], al |
add byte ptr [eax], al |
add al, byte ptr [eax] |
add byte ptr [eax], al |
sbb al, 01h |
add byte ptr [eax], al |
pushfd |
iretd |
add byte ptr [eax], al |
pushfd |
mov cl, 00h |
add byte ptr [edx+53h], dl |
inc esp |
push ebx |
xchg eax, edi |
daa |
mov edx, 040EFF3Fh |
jmp 00007FAFFCF8D0BBh |
xlatb |
inc ebx |
cdq |
and byte ptr [esi+3651DCD5h], dh |
mov ch, 01h |
add byte ptr [eax], al |
add byte ptr [ebx+3Ah], al |
pop esp |
push ebp |
jnc 00007FAFFCF8D0A7h |
jc 00007FAFFCF8D0B5h |
pop esp |
inc edx |
popad |
jne 00007FAFFCF8D0B6h |
pop esp |
dec edi |
outsb |
inc esp |
jc 00007FAFFCF8D0ABh |
jbe 00007FAFFCF8D0A7h |
pop esp |
inc esp |
jnc 00007FAFFCF8D0AEh |
je 00007FAFFCF8D0B1h |
jo 00007FAFFCF8D09Eh |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xd0b8 | 0x4f | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xe000 | 0x624 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x10000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0xcf80 | 0x1c | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0xb110 | 0xb200 | 6f19940b9d2faf57e0d59312e2383dcd | False | 0.4750921699438202 | data | 5.6846363929162 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0xe000 | 0x624 | 0x800 | 7a5a8df6d6e987553bfa236c13fb5758 | False | 0.3427734375 | data | 3.5217695749711964 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x10000 | 0xc | 0x200 | e6b907f31c66eb05bb7d50cc33436152 | False | 0.099609375 | data | 0.7536771595642265 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 3, 2025 22:27:57.853363037 CET | 49675 | 443 | 192.168.2.4 | 173.222.162.32 |
Jan 3, 2025 22:28:07.462851048 CET | 49675 | 443 | 192.168.2.4 | 173.222.162.32 |
Jan 3, 2025 22:28:13.863610983 CET | 49747 | 443 | 192.168.2.4 | 142.250.186.164 |
Jan 3, 2025 22:28:13.863661051 CET | 443 | 49747 | 142.250.186.164 | 192.168.2.4 |
Jan 3, 2025 22:28:13.863734007 CET | 49747 | 443 | 192.168.2.4 | 142.250.186.164 |
Jan 3, 2025 22:28:13.864134073 CET | 49747 | 443 | 192.168.2.4 | 142.250.186.164 |
Jan 3, 2025 22:28:13.864149094 CET | 443 | 49747 | 142.250.186.164 | 192.168.2.4 |
Jan 3, 2025 22:28:14.518918037 CET | 443 | 49747 | 142.250.186.164 | 192.168.2.4 |
Jan 3, 2025 22:28:14.519138098 CET | 49747 | 443 | 192.168.2.4 | 142.250.186.164 |
Jan 3, 2025 22:28:14.519175053 CET | 443 | 49747 | 142.250.186.164 | 192.168.2.4 |
Jan 3, 2025 22:28:14.520196915 CET | 443 | 49747 | 142.250.186.164 | 192.168.2.4 |
Jan 3, 2025 22:28:14.520266056 CET | 49747 | 443 | 192.168.2.4 | 142.250.186.164 |
Jan 3, 2025 22:28:14.521236897 CET | 49747 | 443 | 192.168.2.4 | 142.250.186.164 |
Jan 3, 2025 22:28:14.521305084 CET | 443 | 49747 | 142.250.186.164 | 192.168.2.4 |
Jan 3, 2025 22:28:14.562629938 CET | 49747 | 443 | 192.168.2.4 | 142.250.186.164 |
Jan 3, 2025 22:28:14.562638044 CET | 443 | 49747 | 142.250.186.164 | 192.168.2.4 |
Jan 3, 2025 22:28:14.608351946 CET | 49747 | 443 | 192.168.2.4 | 142.250.186.164 |
Jan 3, 2025 22:28:22.203202963 CET | 49672 | 443 | 192.168.2.4 | 173.222.162.32 |
Jan 3, 2025 22:28:22.203243971 CET | 443 | 49672 | 173.222.162.32 | 192.168.2.4 |
Jan 3, 2025 22:28:22.237909079 CET | 49723 | 80 | 192.168.2.4 | 2.16.164.72 |
Jan 3, 2025 22:28:22.242973089 CET | 80 | 49723 | 2.16.164.72 | 192.168.2.4 |
Jan 3, 2025 22:28:22.243030071 CET | 49723 | 80 | 192.168.2.4 | 2.16.164.72 |
Jan 3, 2025 22:28:24.416848898 CET | 443 | 49747 | 142.250.186.164 | 192.168.2.4 |
Jan 3, 2025 22:28:24.416923046 CET | 443 | 49747 | 142.250.186.164 | 192.168.2.4 |
Jan 3, 2025 22:28:24.416973114 CET | 49747 | 443 | 192.168.2.4 | 142.250.186.164 |
Jan 3, 2025 22:28:25.167316914 CET | 49747 | 443 | 192.168.2.4 | 142.250.186.164 |
Jan 3, 2025 22:28:25.167356014 CET | 443 | 49747 | 142.250.186.164 | 192.168.2.4 |
Jan 3, 2025 22:29:10.325845957 CET | 49724 | 80 | 192.168.2.4 | 2.16.164.105 |
Jan 3, 2025 22:29:10.330948114 CET | 80 | 49724 | 2.16.164.105 | 192.168.2.4 |
Jan 3, 2025 22:29:10.331990004 CET | 49724 | 80 | 192.168.2.4 | 2.16.164.105 |
Jan 3, 2025 22:29:13.916770935 CET | 49955 | 443 | 192.168.2.4 | 142.250.186.164 |
Jan 3, 2025 22:29:13.916799068 CET | 443 | 49955 | 142.250.186.164 | 192.168.2.4 |
Jan 3, 2025 22:29:13.916874886 CET | 49955 | 443 | 192.168.2.4 | 142.250.186.164 |
Jan 3, 2025 22:29:13.917114973 CET | 49955 | 443 | 192.168.2.4 | 142.250.186.164 |
Jan 3, 2025 22:29:13.917129993 CET | 443 | 49955 | 142.250.186.164 | 192.168.2.4 |
Jan 3, 2025 22:29:14.557907104 CET | 443 | 49955 | 142.250.186.164 | 192.168.2.4 |
Jan 3, 2025 22:29:14.558223009 CET | 49955 | 443 | 192.168.2.4 | 142.250.186.164 |
Jan 3, 2025 22:29:14.558235884 CET | 443 | 49955 | 142.250.186.164 | 192.168.2.4 |
Jan 3, 2025 22:29:14.558574915 CET | 443 | 49955 | 142.250.186.164 | 192.168.2.4 |
Jan 3, 2025 22:29:14.558887005 CET | 49955 | 443 | 192.168.2.4 | 142.250.186.164 |
Jan 3, 2025 22:29:14.558958054 CET | 443 | 49955 | 142.250.186.164 | 192.168.2.4 |
Jan 3, 2025 22:29:14.602937937 CET | 49955 | 443 | 192.168.2.4 | 142.250.186.164 |
Jan 3, 2025 22:29:24.463871002 CET | 443 | 49955 | 142.250.186.164 | 192.168.2.4 |
Jan 3, 2025 22:29:24.463943005 CET | 443 | 49955 | 142.250.186.164 | 192.168.2.4 |
Jan 3, 2025 22:29:24.464025974 CET | 49955 | 443 | 192.168.2.4 | 142.250.186.164 |
Jan 3, 2025 22:29:25.995364904 CET | 49955 | 443 | 192.168.2.4 | 142.250.186.164 |
Jan 3, 2025 22:29:25.995397091 CET | 443 | 49955 | 142.250.186.164 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 3, 2025 22:28:09.421082973 CET | 53 | 56631 | 1.1.1.1 | 192.168.2.4 |
Jan 3, 2025 22:28:09.541038036 CET | 53 | 60974 | 1.1.1.1 | 192.168.2.4 |
Jan 3, 2025 22:28:10.906549931 CET | 53 | 55792 | 1.1.1.1 | 192.168.2.4 |
Jan 3, 2025 22:28:13.519407034 CET | 49168 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 3, 2025 22:28:13.519610882 CET | 49182 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 3, 2025 22:28:13.855429888 CET | 62778 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 3, 2025 22:28:13.856162071 CET | 62571 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 3, 2025 22:28:13.862468958 CET | 53 | 62778 | 1.1.1.1 | 192.168.2.4 |
Jan 3, 2025 22:28:13.862843990 CET | 53 | 62571 | 1.1.1.1 | 192.168.2.4 |
Jan 3, 2025 22:28:14.611665964 CET | 52839 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 3, 2025 22:28:14.611819029 CET | 58277 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 3, 2025 22:28:15.386085987 CET | 56627 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 3, 2025 22:28:15.386435986 CET | 59122 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 3, 2025 22:28:17.707631111 CET | 53 | 56082 | 1.1.1.1 | 192.168.2.4 |
Jan 3, 2025 22:28:21.507970095 CET | 138 | 138 | 192.168.2.4 | 192.168.2.255 |
Jan 3, 2025 22:28:28.065304995 CET | 53 | 62147 | 1.1.1.1 | 192.168.2.4 |
Jan 3, 2025 22:28:46.842608929 CET | 53 | 50863 | 1.1.1.1 | 192.168.2.4 |
Jan 3, 2025 22:29:09.175039053 CET | 53 | 51195 | 1.1.1.1 | 192.168.2.4 |
Jan 3, 2025 22:29:09.695728064 CET | 53 | 51595 | 1.1.1.1 | 192.168.2.4 |
Jan 3, 2025 22:29:15.502361059 CET | 49537 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 3, 2025 22:29:15.502511978 CET | 53753 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 3, 2025 22:29:15.503551006 CET | 53379 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 3, 2025 22:29:15.503947020 CET | 61254 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 3, 2025 22:29:39.767364979 CET | 53 | 51574 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Checksum | Code | Type |
---|---|---|---|---|---|
Jan 3, 2025 22:28:13.536708117 CET | 192.168.2.4 | 1.1.1.1 | c2b4 | (Port unreachable) | Destination Unreachable |
Jan 3, 2025 22:28:14.643188000 CET | 192.168.2.4 | 1.1.1.1 | c2e3 | (Port unreachable) | Destination Unreachable |
Jan 3, 2025 22:28:20.223563910 CET | 192.168.2.4 | 1.1.1.1 | c264 | (Port unreachable) | Destination Unreachable |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 3, 2025 22:28:13.519407034 CET | 192.168.2.4 | 1.1.1.1 | 0x9c24 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 3, 2025 22:28:13.519610882 CET | 192.168.2.4 | 1.1.1.1 | 0x3457 | Standard query (0) | 65 | IN (0x0001) | false | |
Jan 3, 2025 22:28:13.855429888 CET | 192.168.2.4 | 1.1.1.1 | 0x8aa5 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 3, 2025 22:28:13.856162071 CET | 192.168.2.4 | 1.1.1.1 | 0x4d50 | Standard query (0) | 65 | IN (0x0001) | false | |
Jan 3, 2025 22:28:14.611665964 CET | 192.168.2.4 | 1.1.1.1 | 0x66f7 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 3, 2025 22:28:14.611819029 CET | 192.168.2.4 | 1.1.1.1 | 0xfe7 | Standard query (0) | 65 | IN (0x0001) | false | |
Jan 3, 2025 22:28:15.386085987 CET | 192.168.2.4 | 1.1.1.1 | 0x9b21 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 3, 2025 22:28:15.386435986 CET | 192.168.2.4 | 1.1.1.1 | 0xc4c1 | Standard query (0) | 65 | IN (0x0001) | false | |
Jan 3, 2025 22:29:15.502361059 CET | 192.168.2.4 | 1.1.1.1 | 0xdab | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 3, 2025 22:29:15.502511978 CET | 192.168.2.4 | 1.1.1.1 | 0x975a | Standard query (0) | 65 | IN (0x0001) | false | |
Jan 3, 2025 22:29:15.503551006 CET | 192.168.2.4 | 1.1.1.1 | 0x6cfc | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 3, 2025 22:29:15.503947020 CET | 192.168.2.4 | 1.1.1.1 | 0xd660 | Standard query (0) | 65 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 3, 2025 22:28:13.520649910 CET | 1.1.1.1 | 192.168.2.4 | 0x8504 | No error (0) | firstparty-azurefd-prod.trafficmanager.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 3, 2025 22:28:13.520649910 CET | 1.1.1.1 | 192.168.2.4 | 0x8504 | No error (0) | s-part-0017.t-0009.t-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 3, 2025 22:28:13.520649910 CET | 1.1.1.1 | 192.168.2.4 | 0x8504 | No error (0) | 13.107.246.45 | A (IP address) | IN (0x0001) | false | ||
Jan 3, 2025 22:28:13.527162075 CET | 1.1.1.1 | 192.168.2.4 | 0x9c24 | No error (0) | aijscdn2-bwfdfxezdubebtb0.z01.azurefd.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 3, 2025 22:28:13.527162075 CET | 1.1.1.1 | 192.168.2.4 | 0x9c24 | No error (0) | star-azurefd-prod.trafficmanager.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 3, 2025 22:28:13.527162075 CET | 1.1.1.1 | 192.168.2.4 | 0x9c24 | No error (0) | s-part-0017.t-0009.t-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 3, 2025 22:28:13.527162075 CET | 1.1.1.1 | 192.168.2.4 | 0x9c24 | No error (0) | 13.107.246.45 | A (IP address) | IN (0x0001) | false | ||
Jan 3, 2025 22:28:13.527461052 CET | 1.1.1.1 | 192.168.2.4 | 0x3457 | No error (0) | aijscdn2-bwfdfxezdubebtb0.z01.azurefd.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 3, 2025 22:28:13.527461052 CET | 1.1.1.1 | 192.168.2.4 | 0x3457 | No error (0) | star-azurefd-prod.trafficmanager.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 3, 2025 22:28:13.536602974 CET | 1.1.1.1 | 192.168.2.4 | 0xb7bd | No error (0) | firstparty-azurefd-prod.trafficmanager.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 3, 2025 22:28:13.862468958 CET | 1.1.1.1 | 192.168.2.4 | 0x8aa5 | No error (0) | 142.250.186.164 | A (IP address) | IN (0x0001) | false | ||
Jan 3, 2025 22:28:13.862843990 CET | 1.1.1.1 | 192.168.2.4 | 0x4d50 | No error (0) | 65 | IN (0x0001) | false | |||
Jan 3, 2025 22:28:14.397974014 CET | 1.1.1.1 | 192.168.2.4 | 0xddee | No error (0) | firstparty-azurefd-prod.trafficmanager.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 3, 2025 22:28:14.397974014 CET | 1.1.1.1 | 192.168.2.4 | 0xddee | No error (0) | s-part-0033.t-0009.t-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 3, 2025 22:28:14.397974014 CET | 1.1.1.1 | 192.168.2.4 | 0xddee | No error (0) | 13.107.246.61 | A (IP address) | IN (0x0001) | false | ||
Jan 3, 2025 22:28:14.409979105 CET | 1.1.1.1 | 192.168.2.4 | 0xac34 | No error (0) | firstparty-azurefd-prod.trafficmanager.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 3, 2025 22:28:14.619333982 CET | 1.1.1.1 | 192.168.2.4 | 0x66f7 | No error (0) | aijscdn2-bwfdfxezdubebtb0.z01.azurefd.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 3, 2025 22:28:14.619333982 CET | 1.1.1.1 | 192.168.2.4 | 0x66f7 | No error (0) | star-azurefd-prod.trafficmanager.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 3, 2025 22:28:14.619333982 CET | 1.1.1.1 | 192.168.2.4 | 0x66f7 | No error (0) | s-part-0017.t-0009.t-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 3, 2025 22:28:14.619333982 CET | 1.1.1.1 | 192.168.2.4 | 0x66f7 | No error (0) | 13.107.246.45 | A (IP address) | IN (0x0001) | false | ||
Jan 3, 2025 22:28:14.619400978 CET | 1.1.1.1 | 192.168.2.4 | 0xfe7 | No error (0) | aijscdn2-bwfdfxezdubebtb0.z01.azurefd.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 3, 2025 22:28:14.619400978 CET | 1.1.1.1 | 192.168.2.4 | 0xfe7 | No error (0) | star-azurefd-prod.trafficmanager.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 3, 2025 22:28:15.394680023 CET | 1.1.1.1 | 192.168.2.4 | 0xc4c1 | No error (0) | mdec.nelreports.net.akamaized.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 3, 2025 22:28:15.394880056 CET | 1.1.1.1 | 192.168.2.4 | 0x9b21 | No error (0) | mdec.nelreports.net.akamaized.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 3, 2025 22:28:20.211855888 CET | 1.1.1.1 | 192.168.2.4 | 0xd563 | No error (0) | c-msn-com-nsatc.trafficmanager.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 3, 2025 22:28:20.221311092 CET | 1.1.1.1 | 192.168.2.4 | 0x4cdc | No error (0) | c-msn-com-nsatc.trafficmanager.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 3, 2025 22:28:25.745754957 CET | 1.1.1.1 | 192.168.2.4 | 0x694a | No error (0) | c-msn-com-nsatc.trafficmanager.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 3, 2025 22:28:25.748420954 CET | 1.1.1.1 | 192.168.2.4 | 0xd5c3 | No error (0) | c-msn-com-nsatc.trafficmanager.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 3, 2025 22:29:15.511066914 CET | 1.1.1.1 | 192.168.2.4 | 0x975a | No error (0) | mdec.nelreports.net.akamaized.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 3, 2025 22:29:15.511265993 CET | 1.1.1.1 | 192.168.2.4 | 0xdab | No error (0) | mdec.nelreports.net.akamaized.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 3, 2025 22:29:15.512739897 CET | 1.1.1.1 | 192.168.2.4 | 0xd660 | No error (0) | mdec.nelreports.net.akamaized.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 3, 2025 22:29:15.512852907 CET | 1.1.1.1 | 192.168.2.4 | 0x6cfc | No error (0) | mdec.nelreports.net.akamaized.net | CNAME (Canonical name) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 16:28:02 |
Start date: | 03/01/2025 |
Path: | C:\Users\user\Desktop\1735939565593f5d6bf694464eb338b020a826ec212acacc46d4424bb914edbae3d507116e469.dat-decoded.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xa90000 |
File size: | 49'162 bytes |
MD5 hash: | 1F617F63DB302FC08E4AF388597353EC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 16:28:06 |
Start date: | 03/01/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff76e190000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 3 |
Start time: | 16:28:08 |
Start date: | 03/01/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff76e190000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 4 |
Start time: | 16:28:10 |
Start date: | 03/01/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff76e190000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 16:28:11 |
Start date: | 03/01/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff76e190000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |