Analysis Report api.exe
Overview
General Information
Detection
Score: | 64 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
No yara matches |
---|
Sigma Overview |
---|
No Sigma rule has matched |
---|
Signature Overview |
---|
- • AV Detection
- • Compliance
- • Spreading
- • Networking
- • System Summary
- • Data Obfuscation
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • Language, Device and Operating System Detection
Click to jump to signature section
AV Detection: |
---|
Multi AV Scanner detection for submitted file |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Machine Learning detection for sample |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Code function: |
Source: | Process created: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: | ||
Source: | Command line argument: |
Source: | Static PE information: |
Source: | Key opened: |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | ||
Source: | Process created: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: |
Source: | Code function: | ||
Source: | Code function: |
Source: | Code function: |
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: |
Malware Analysis System Evasion: |
---|
Contain functionality to detect virtual machines |
Source: | Code function: | ||
Source: | Code function: |
Tries to detect sandboxes / dynamic malware analysis system (registry check) |
Source: | File opened: |
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Registry key queried: |
Source: | Thread sleep time: |
Source: | Code function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: |
Source: | Process queried: | ||
Source: | Process queried: |
Source: | Code function: |
Source: | Code function: |
Source: | Code function: |
Source: | Code function: | ||
Source: | Code function: |
Source: | Code function: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Code function: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Code function: |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Command and Scripting Interpreter3 | Application Shimming1 | Process Injection1 | Virtualization/Sandbox Evasion13 | OS Credential Dumping | System Time Discovery1 | Remote Services | Archive Collected Data1 | Exfiltration Over Other Network Medium | Encrypted Channel1 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Native API1 | Boot or Logon Initialization Scripts | Application Shimming1 | Process Injection1 | LSASS Memory | Security Software Discovery341 | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Ingress Tool Transfer1 | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Deobfuscate/Decode Files or Information1 | Security Account Manager | Virtualization/Sandbox Evasion13 | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Non-Application Layer Protocol2 | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Obfuscated Files or Information2 | NTDS | Process Discovery2 | Distributed Component Object Model | Input Capture | Scheduled Transfer | Application Layer Protocol2 | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | Remote System Discovery1 | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings | |
Replication Through Removable Media | Launchd | Rc.common | Rc.common | Steganography | Cached Domain Credentials | File and Directory Discovery1 | VNC | GUI Input Capture | Exfiltration Over C2 Channel | Multiband Communication | Jamming or Denial of Service | Abuse Accessibility Features | |
External Remote Services | Scheduled Task | Startup Items | Startup Items | Compile After Delivery | DCSync | System Information Discovery22 | Windows Remote Management | Web Portal Capture | Exfiltration Over Alternative Protocol | Commonly Used Port | Rogue Wi-Fi Access Points | Data Encrypted for Impact |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
44% | Virustotal | Browse | ||
34% | ReversingLabs | Win32.Downloader.Satacom | ||
100% | Joe Sandbox ML |
No Antivirus matches |
---|
No Antivirus matches |
---|
No Antivirus matches |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
doought.com | 104.21.18.167 | true | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown | |
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.18.167 | doought.com | United States | 13335 | CLOUDFLARENETUS | false |
IP |
---|
192.168.2.1 |
General Information |
---|
Joe Sandbox Version: | 31.0.0 Emerald |
Analysis ID: | 371964 |
Start date: | 19.03.2021 |
Start time: | 12:41:08 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 5m 5s |
Hypervisor based Inspection enabled: | false |
Report type: | light |
Sample file name: | api.exe |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Run name: | Run with higher sleep bypass |
Number of analysed new started processes analysed: | 17 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal64.evad.winEXE@2/4@1/2 |
EGA Information: | Failed |
HDC Information: |
|
HCA Information: | Failed |
Cookbook Comments: |
|
Warnings: | Show All
|
No simulations |
---|
No context |
---|
No context |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
No context |
---|
No context |
---|
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 11562 |
Entropy (8bit): | 3.7678449578832627 |
Encrypted: | false |
SSDEEP: | 96:sPf25BnA8vHfxIwY9oIaq9NfPpXIQcQvc6QcEDMcw3DhCm+HbHgnoW6HeonsFEJU:ymDHiHBUZMXojGHk/u7s8AS274Itlu |
MD5: | 9DFE6E12F4E345DFA71F88D88EC81F3B |
SHA1: | D681D157507A56E337A87D50A374E0B79CCFA8B4 |
SHA-256: | 09BD649738D81ECBD09F318666BEA5774017D116FF919EC44046C5AC74E04381 |
SHA-512: | 895332C54DF5D71ADE583EBC959580DDAE021A0AAAB059C5CDCCE9641DB5BF8AD752AD15985042E135884D306C80E4A781B8A70AF4241E4B5C6E33CD2A0C7734 |
Malicious: | true |
Reputation: | low |
Preview: |
|
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 78320 |
Entropy (8bit): | 1.89753116343559 |
Encrypted: | false |
SSDEEP: | 192:E5d++19UFDMajulPCBuFYGQXUnIYzz6PPXgObLmPw353bseOuW6GZ1n7RAFXnTMT:61qgFYBPXXmPwhOuEoXIpB |
MD5: | 0AF7D16EECCF0618459F06B6353C9EB3 |
SHA1: | B3C4EBBA0F717E38DF9216904A93C9FC7E012C57 |
SHA-256: | 14BA2CE896028777D4557F378B419F663330A8C3702CA21F5692BD423F7D09EF |
SHA-512: | 579695B40C8AA0B3EF6816D12BF7CDE639B3B0C139962A7C28BAFE4A8F737251E53135A640CCE68F66FF8B88E080D8D93D1E607130EAFD77E22130382B6DF4C1 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8264 |
Entropy (8bit): | 3.69548014548556 |
Encrypted: | false |
SSDEEP: | 192:Rrl7r3GLNiGF6To16YrHSU6+BgmfKSd+pru89b0xsft8m:RrlsNiU6To16YLSU6+BgmfKS+0qfD |
MD5: | 50654062BFCAD9BEE074DD2AACEFDC65 |
SHA1: | 0BDB7C67744C4A66CFCAA23FDE121823A822CA5F |
SHA-256: | F47A08952BC147703C771ABE04771AA18397D210D0F68D75938ABE546E1A34F6 |
SHA-512: | 59E829E89D9F7C24B2C77204650E73C75DFF07B243700C6F77245A0044E36579178AD14FC5146CC69F9F45D1677A1EBD47FC9A8BCC7F3299C8DB5A9C0831E2D6 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4602 |
Entropy (8bit): | 4.43980057180413 |
Encrypted: | false |
SSDEEP: | 48:cvIwSD8zsYJgtWI9Rj9WSC8Bg8fm8M4JQ3FUL+q8iejDDTg0d:uITfeeMSNzJ3mjvM0d |
MD5: | EEF75C94B6B3925D9C71E57F02E6A7CE |
SHA1: | 1674FE0F30761DECF8BE045E057C94ACCAA89652 |
SHA-256: | 9E814112D51D21516C65E1BF6A3FB3251FCAAA9200BB0CFD8E13464244243CAD |
SHA-512: | D047794F284096533DFB57766C969750F8179A4C2A031872F075A610AFDC9097187859CC03EF508C66A5D4A7A3A83981761FE26A68CE706927B6A491848E77B7 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 7.935954826556636 |
TrID: |
|
File name: | api.exe |
File size: | 2071040 |
MD5: | b63932cde2143b739551fa5501394146 |
SHA1: | 3d64abbc533021eb46a860d13f8465d2e448fcd3 |
SHA256: | c592d92f14fd97f4f4b29a3c71ec2a119d4cf5df4750f76fc455e1f82bc8b798 |
SHA512: | f69185b41c3e7657ebfc8653aa4222dd2ae3c047d989f45d92f428ac212d7a1116a6f1a9cfecf61f894c69ba0e4caeb847dc71510909859a2927f32a82c75a93 |
SSDEEP: | 49152:noT1j3FsVjlgHnPcN/45z7p9PgYGG8BQBCqnNKxTmORI/CaX+ijHFPPP:noT1bpcO5F8eC+NkBRGXLjH9PP |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......8.q.|...|...|...'...q...'.......'...j...'...}.......3.......m.......e...'...o...|.......}...u...}...}...}...}...Rich|.......... |
File Icon |
---|
Icon Hash: | 6863eee6b292c6ee |
General | |
---|---|
Entrypoint: | 0x40ae2b |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | 32BIT_MACHINE, EXECUTABLE_IMAGE |
DLL Characteristics: | TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT |
Time Stamp: | 0x6054676F [Fri Mar 19 08:57:19 2021 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 212ad670c01686a5b7fce94f52bc41d1 |
Instruction |
---|
call 00007F046C8593C2h |
jmp 00007F046C858D1Fh |
push ebp |
mov ebp, esp |
push esi |
push dword ptr [ebp+08h] |
mov esi, ecx |
call 00007F046C850912h |
mov dword ptr [esi], 00425340h |
mov eax, esi |
pop esi |
pop ebp |
retn 0004h |
and dword ptr [ecx+04h], 00000000h |
mov eax, ecx |
and dword ptr [ecx+08h], 00000000h |
mov dword ptr [ecx+04h], 00425348h |
mov dword ptr [ecx], 00425340h |
ret |
push ebp |
mov ebp, esp |
push esi |
push dword ptr [ebp+08h] |
mov esi, ecx |
call 00007F046C8508DFh |
mov dword ptr [esi], 0042535Ch |
mov eax, esi |
pop esi |
pop ebp |
retn 0004h |
and dword ptr [ecx+04h], 00000000h |
mov eax, ecx |
and dword ptr [ecx+08h], 00000000h |
mov dword ptr [ecx+04h], 00425364h |
mov dword ptr [ecx], 0042535Ch |
ret |
push ebp |
mov ebp, esp |
push esi |
mov esi, ecx |
lea eax, dword ptr [esi+04h] |
mov dword ptr [esi], 00425334h |
push eax |
call 00007F046C85AC18h |
test byte ptr [ebp+08h], 00000001h |
pop ecx |
je 00007F046C858EACh |
push 0000000Ch |
push esi |
call 00007F046C858ACCh |
pop ecx |
pop ecx |
mov eax, esi |
pop esi |
pop ebp |
retn 0004h |
push ebp |
mov ebp, esp |
sub esp, 0Ch |
lea ecx, dword ptr [ebp-0Ch] |
call 00007F046C858E1Fh |
push 00433C24h |
lea eax, dword ptr [ebp-0Ch] |
push eax |
call 00007F046C85ADFFh |
int3 |
push ebp |
mov ebp, esp |
sub esp, 0Ch |
lea ecx, dword ptr [ebp-0Ch] |
call 00007F046C858E35h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x343a4 | 0x8c | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x37000 | 0x132246 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x16a000 | 0x228c | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x32370 | 0x70 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x32484 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x323e0 | 0x40 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x25000 | 0x1c0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x23ce8 | 0x23e00 | False | 0.558042519599 | data | 6.64138021056 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
.rdata | 0x25000 | 0xfdb6 | 0xfe00 | False | 0.518531619094 | data | 5.70182022829 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x35000 | 0x1f68 | 0x1200 | False | 0.182074652778 | DOS executable (block device driver \277DN) | 3.01785095247 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
.rsrc | 0x37000 | 0x132246 | 0x132400 | False | 0.982848373724 | data | 7.9869015532 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x16a000 | 0x228c | 0x2400 | False | 0.7314453125 | data | 6.6640906817 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
B | 0x37828 | 0x12a154 | LZMA compressed data, non-streamed, size 8381306 | ||
GOOGLEUPDATE | 0x16197c | 0x4 | data | ||
RT_ICON | 0x161980 | 0x128 | GLS_BINARY_LSB_FIRST | English | United States |
RT_ICON | 0x161aa8 | 0x568 | GLS_BINARY_LSB_FIRST | English | United States |
RT_ICON | 0x162010 | 0x2e8 | data | English | United States |
RT_ICON | 0x1622f8 | 0x8a8 | dBase IV DBT of @.DBF, block length 1024, next free block index 40, next free block 8816262, next used block 9868950 | English | United States |
RT_ICON | 0x162ba0 | 0x668 | dBase IV DBT of `.DBF, block length 1536, next free block index 40, next free block 224, next used block 65281 | English | United States |
RT_ICON | 0x163208 | 0xea8 | data | English | United States |
RT_STRING | 0x1640b0 | 0x12a | data | Arabic | Saudi Arabia |
RT_STRING | 0x1641dc | 0x196 | data | Bulgarian | Bulgaria |
RT_STRING | 0x164374 | 0x182 | data | Catalan | Spain |
RT_STRING | 0x1644f8 | 0xb8 | data | Chinese | Taiwan |
RT_STRING | 0x1645b0 | 0x176 | data | Czech | Czech Republic |
RT_STRING | 0x164728 | 0x146 | data | Danish | Denmark |
RT_STRING | 0x164870 | 0x156 | data | German | Germany |
RT_STRING | 0x1649c8 | 0x19c | data | Greek | Greece |
RT_STRING | 0x164b64 | 0x120 | data | English | United States |
RT_STRING | 0x164c84 | 0x174 | data | Finnish | Finland |
RT_STRING | 0x164df8 | 0x1ac | data | French | France |
RT_STRING | 0x164fa4 | 0x12e | data | Hebrew | Israel |
RT_STRING | 0x1650d4 | 0x150 | data | Hungarian | Hungary |
RT_STRING | 0x165224 | 0x13c | data | Icelandic | Iceland |
RT_STRING | 0x165360 | 0x19c | data | Italian | Italy |
RT_STRING | 0x1654fc | 0xea | data | Japanese | Japan |
RT_STRING | 0x1655e8 | 0xde | data | Korean | North Korea |
RT_STRING | 0x1655e8 | 0xde | data | Korean | South Korea |
RT_STRING | 0x1656c8 | 0x19c | data | Dutch | Netherlands |
RT_STRING | 0x165864 | 0x16c | data | Norwegian | Norway |
RT_STRING | 0x1659d0 | 0x17c | data | Polish | Poland |
RT_STRING | 0x165b4c | 0x14a | data | Portuguese | Brazil |
RT_STRING | 0x165c98 | 0x1b2 | data | Romanian | Romania |
RT_STRING | 0x165e4c | 0x182 | data | Russian | Russia |
RT_STRING | 0x165fd0 | 0x188 | data | Croatian | Croatia |
RT_STRING | 0x166158 | 0x16c | data | Slovak | Slovakia |
RT_STRING | 0x1662c4 | 0x18c | data | Swedish | Sweden |
RT_STRING | 0x166450 | 0x146 | data | Thai | Thailand |
RT_STRING | 0x166598 | 0x146 | data | Turkish | Turkey |
RT_STRING | 0x1666e0 | 0x118 | data | Urdu | Pakistan |
RT_STRING | 0x1666e0 | 0x118 | data | Urdu | India |
RT_STRING | 0x1667f8 | 0x164 | data | Indonesian | Indonesia |
RT_STRING | 0x16695c | 0x15a | data | Ukrainian | Ukrain |
RT_STRING | 0x166ab8 | 0x1a8 | data | Slovenian | Slovenia |
RT_STRING | 0x166c60 | 0x138 | data | Estonian | Estonia |
RT_STRING | 0x166d98 | 0x1c4 | data | Latvian | Lativa |
RT_STRING | 0x166f5c | 0x174 | data | Lithuanian | Lithuania |
RT_STRING | 0x1670d0 | 0x124 | data | Farsi | Iran |
RT_STRING | 0x1670d0 | 0x124 | data | Farsi | Afganistan |
RT_STRING | 0x1670d0 | 0x124 | data | Farsi | Tajikistan |
RT_STRING | 0x1670d0 | 0x124 | data | Farsi | Uzbekistan |
RT_STRING | 0x1671f4 | 0x144 | data | Vietnamese | Vietnam |
RT_STRING | 0x167338 | 0x128 | data | Hindi | India |
RT_STRING | 0x167460 | 0x148 | data | Malay | Malaysia |
RT_STRING | 0x1675a8 | 0x15e | data | Swahili | Kenya |
RT_STRING | 0x1675a8 | 0x15e | data | Swahili | Mozambiq |
RT_STRING | 0x167708 | 0x122 | data | Bengali | India |
RT_STRING | 0x16782c | 0x13e | data | Gujarati | India |
RT_STRING | 0x16796c | 0x13a | data | Tamil | India |
RT_STRING | 0x16796c | 0x13a | data | Tamil | Sri Lanka |
RT_STRING | 0x167aa8 | 0x140 | data | Telugu | India |
RT_STRING | 0x167be8 | 0x142 | data | Kannada | Kanada |
RT_STRING | 0x167d2c | 0x186 | data | Malayalam | India |
RT_STRING | 0x167eb4 | 0x164 | data | Marathi | India |
RT_STRING | 0x168018 | 0xdc | data | Amharic | Ethiopia |
RT_STRING | 0x1680f4 | 0x168 | data | Filipino | Philippines |
RT_STRING | 0x16825c | 0xba | data | Chinese | China |
RT_STRING | 0x168318 | 0x120 | data | English | Great Britain |
RT_STRING | 0x168438 | 0x13e | data | Spanish | Mexico |
RT_STRING | 0x168578 | 0x174 | data | Portuguese | Portugal |
RT_STRING | 0x1686ec | 0x196 | data | ||
RT_STRING | 0x168884 | 0x1aa | data | Serbian | Cyrillic |
RT_GROUP_ICON | 0x168a30 | 0x5a | data | English | United States |
RT_VERSION | 0x168a8c | 0x32c | data | English | United States |
RT_MANIFEST | 0x168db8 | 0x48e | XML 1.0 document, ASCII text |
DLL | Import |
---|---|
KERNEL32.dll | HeapAlloc, GetProcAddress, GetProcessHeap, FreeLibrary, IsBadReadPtr, CreateProcessA, Process32First, GetCurrentProcess, GetModuleHandleA, CreateToolhelp32Snapshot, Sleep, GetLastError, GetNativeSystemInfo, CloseHandle, ExitProcess, lstrcmpiA, ReadFile, WriteFile, GetTempPathA, CreateFileA, DeleteFileA, GetFileSize, HeapSize, GetConsoleCP, FlushFileBuffers, CreateFileW, LoadLibraryA, VirtualAlloc, VirtualFree, SetLastError, HeapFree, Process32Next, VirtualProtect, SetStdHandle, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetCommandLineA, GetOEMCP, GetACP, IsValidCodePage, FindNextFileW, FindFirstFileExW, FindClose, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetConsoleMode, SetFilePointerEx, GetFileType, HeapReAlloc, WriteConsoleW, GetStdHandle, GetModuleFileNameW, GetModuleHandleExW, LoadLibraryExW, RaiseException, RtlUnwind, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, CreateEventW, GetModuleHandleW, IsProcessorFeaturePresent, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, TerminateProcess, WideCharToMultiByte, SwitchToThread, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, DecodePointer, MultiByteToWideChar, LCMapStringW, GetLocaleInfoW, GetStringTypeW, GetCPInfo |
USER32.dll | wsprintfA |
ADVAPI32.dll | RegCloseKey, RegQueryValueExA, RegCreateKeyExA, RegSetValueExA, RegOpenKeyExA, RegGetValueA |
SHELL32.dll | ShellExecuteA |
SHLWAPI.dll | StrStrIA |
WINHTTP.dll | WinHttpCloseHandle, WinHttpSendRequest, WinHttpQueryDataAvailable, WinHttpOpenRequest, WinHttpReadData, WinHttpSetTimeouts, WinHttpOpen, WinHttpReceiveResponse, WinHttpConnect |
Description | Data |
---|---|
LegalCopyright | Copyright 2018 Google LLC |
InternalName | Google Update Setup |
FileVersion | 1.3.35.342 |
CompanyName | Google LLC |
LanguageId | en |
ProductName | Google Update |
ProductVersion | 1.3.35.342 |
FileDescription | Google Update Setup |
OriginalFilename | GoogleUpdateSetup.exe |
Translation | 0x0409 0x04b0 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States | |
Arabic | Saudi Arabia | |
Bulgarian | Bulgaria | |
Catalan | Spain | |
Chinese | Taiwan | |
Czech | Czech Republic | |
Danish | Denmark | |
German | Germany | |
Greek | Greece | |
Finnish | Finland | |
French | France | |
Hebrew | Israel | |
Hungarian | Hungary | |
Icelandic | Iceland | |
Italian | Italy | |
Japanese | Japan | |
Korean | North Korea | |
Korean | South Korea | |
Dutch | Netherlands | |
Norwegian | Norway | |
Polish | Poland | |
Portuguese | Brazil | |
Romanian | Romania | |
Russian | Russia | |
Croatian | Croatia | |
Slovak | Slovakia | |
Swedish | Sweden | |
Thai | Thailand | |
Turkish | Turkey | |
Urdu | Pakistan | |
Urdu | India | |
Indonesian | Indonesia | |
Ukrainian | Ukrain | |
Slovenian | Slovenia | |
Estonian | Estonia | |
Latvian | Lativa | |
Lithuanian | Lithuania | |
Farsi | Iran | |
Farsi | Afganistan | |
Farsi | Tajikistan | |
Farsi | Uzbekistan | |
Vietnamese | Vietnam | |
Malay | Malaysia | |
Swahili | Kenya | |
Swahili | Mozambiq | |
Tamil | Sri Lanka | |
Kannada | Kanada | |
Amharic | Ethiopia | |
Filipino | Philippines | |
Chinese | China | |
English | Great Britain | |
Spanish | Mexico | |
Portuguese | Portugal | |
Serbian | Cyrillic |
Network Behavior |
---|
Snort IDS Alerts |
---|
Timestamp | Protocol | SID | Message | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|---|---|---|
03/19/21-12:35:59.641669 | TCP | 1201 | ATTACK-RESPONSES 403 Forbidden | 80 | 49732 | 172.67.182.193 | 192.168.2.4 |
03/19/21-12:35:59.756694 | TCP | 1201 | ATTACK-RESPONSES 403 Forbidden | 80 | 49732 | 172.67.182.193 | 192.168.2.4 |
Network Port Distribution |
---|
- Total Packets: 46
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 19, 2021 12:41:50.123013020 CET | 49747 | 80 | 192.168.2.4 | 104.21.18.167 |
Mar 19, 2021 12:41:50.166119099 CET | 80 | 49747 | 104.21.18.167 | 192.168.2.4 |
Mar 19, 2021 12:41:50.166275024 CET | 49747 | 80 | 192.168.2.4 | 104.21.18.167 |
Mar 19, 2021 12:41:50.167229891 CET | 49747 | 80 | 192.168.2.4 | 104.21.18.167 |
Mar 19, 2021 12:41:50.208826065 CET | 80 | 49747 | 104.21.18.167 | 192.168.2.4 |
Mar 19, 2021 12:41:50.219945908 CET | 80 | 49747 | 104.21.18.167 | 192.168.2.4 |
Mar 19, 2021 12:41:50.235914946 CET | 49747 | 80 | 192.168.2.4 | 104.21.18.167 |
Mar 19, 2021 12:41:50.277554035 CET | 80 | 49747 | 104.21.18.167 | 192.168.2.4 |
Mar 19, 2021 12:41:50.286350965 CET | 80 | 49747 | 104.21.18.167 | 192.168.2.4 |
Mar 19, 2021 12:41:50.340141058 CET | 49747 | 80 | 192.168.2.4 | 104.21.18.167 |
Mar 19, 2021 12:42:00.154618025 CET | 49747 | 80 | 192.168.2.4 | 104.21.18.167 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 19, 2021 12:41:42.849868059 CET | 55854 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:41:42.899146080 CET | 53 | 55854 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:41:43.327034950 CET | 64549 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:41:43.384898901 CET | 53 | 64549 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:41:44.534482956 CET | 63153 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:41:44.584237099 CET | 53 | 63153 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:41:48.546674967 CET | 52991 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:41:48.596236944 CET | 53 | 52991 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:41:49.550297022 CET | 53700 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:41:49.600048065 CET | 53 | 53700 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:41:50.013761044 CET | 51726 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:41:50.077419043 CET | 53 | 51726 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:41:56.323702097 CET | 56794 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:41:56.376306057 CET | 53 | 56794 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:41:57.294467926 CET | 56534 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:41:57.346875906 CET | 53 | 56534 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:41:57.534070969 CET | 56627 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:41:57.586289883 CET | 53 | 56627 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:41:59.086359024 CET | 56621 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:41:59.146933079 CET | 53 | 56621 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:42:00.571120024 CET | 63116 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:42:00.623409033 CET | 53 | 63116 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:42:01.373596907 CET | 64078 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:42:01.423741102 CET | 53 | 64078 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:42:02.602166891 CET | 64801 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:42:02.654356956 CET | 53 | 64801 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:42:03.941096067 CET | 61721 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:42:03.993263960 CET | 53 | 61721 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:42:07.002767086 CET | 51255 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:42:07.060898066 CET | 53 | 51255 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:42:07.884759903 CET | 61522 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:42:07.937033892 CET | 53 | 61522 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:42:12.121313095 CET | 52337 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:42:12.171473026 CET | 53 | 52337 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:42:12.323532104 CET | 55046 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:42:12.372864008 CET | 53 | 55046 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:42:12.919662952 CET | 49612 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:42:12.973860025 CET | 53 | 49612 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:42:17.952696085 CET | 49285 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:42:18.002171040 CET | 53 | 49285 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:42:19.130839109 CET | 50601 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:42:19.180336952 CET | 53 | 50601 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:42:20.286911011 CET | 60875 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:42:20.336321115 CET | 53 | 60875 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:42:21.449606895 CET | 56448 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:42:21.499216080 CET | 53 | 56448 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:42:28.631556988 CET | 59172 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:42:28.734754086 CET | 53 | 59172 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:42:29.295288086 CET | 62420 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:42:29.422442913 CET | 53 | 62420 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:42:29.853671074 CET | 60579 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:42:29.947283983 CET | 53 | 60579 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:42:29.974452972 CET | 50183 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:42:30.049989939 CET | 53 | 50183 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:42:30.399065971 CET | 61531 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:42:30.456696033 CET | 53 | 61531 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:42:30.980238914 CET | 49228 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:42:31.038223028 CET | 53 | 49228 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:42:31.554480076 CET | 59794 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:42:31.612416983 CET | 53 | 59794 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:42:32.139904976 CET | 55916 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:42:32.189273119 CET | 53 | 55916 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:42:33.435105085 CET | 52752 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:42:33.503179073 CET | 53 | 52752 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:42:34.325062990 CET | 60542 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:42:34.386035919 CET | 53 | 60542 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:42:34.872929096 CET | 60689 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:42:34.933021069 CET | 53 | 60689 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:42:38.843983889 CET | 64206 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:42:38.905520916 CET | 53 | 64206 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:42:47.425586939 CET | 50904 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:42:47.477922916 CET | 53 | 50904 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:42:47.596848011 CET | 57525 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:42:47.668210983 CET | 53 | 57525 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:42:50.328815937 CET | 53814 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:42:50.388324022 CET | 53 | 53814 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:43:21.109225035 CET | 53418 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:43:21.158648014 CET | 53 | 53418 | 8.8.8.8 | 192.168.2.4 |
Mar 19, 2021 12:43:22.850086927 CET | 62833 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 19, 2021 12:43:22.910229921 CET | 53 | 62833 | 8.8.8.8 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class |
---|---|---|---|---|---|---|---|
Mar 19, 2021 12:41:50.013761044 CET | 192.168.2.4 | 8.8.8.8 | 0xe685 | Standard query (0) | A (IP address) | IN (0x0001) |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class |
---|---|---|---|---|---|---|---|---|---|
Mar 19, 2021 12:41:50.077419043 CET | 8.8.8.8 | 192.168.2.4 | 0xe685 | No error (0) | 104.21.18.167 | A (IP address) | IN (0x0001) | ||
Mar 19, 2021 12:41:50.077419043 CET | 8.8.8.8 | 192.168.2.4 | 0xe685 | No error (0) | 172.67.182.193 | A (IP address) | IN (0x0001) |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
0 | 192.168.2.4 | 49747 | 104.21.18.167 | 80 | C:\Users\user\Desktop\api.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
Mar 19, 2021 12:41:50.167229891 CET | 937 | OUT | |
Mar 19, 2021 12:41:50.219945908 CET | 938 | IN | |
Mar 19, 2021 12:41:50.235914946 CET | 938 | OUT | |
Mar 19, 2021 12:41:50.286350965 CET | 939 | IN |
Code Manipulations |
---|
Statistics |
---|
Behavior |
---|
Click to jump to process
System Behavior |
---|
Start time: | 12:41:49 |
Start date: | 19/03/2021 |
Path: | C:\Users\user\Desktop\api.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xf20000 |
File size: | 2071040 bytes |
MD5 hash: | B63932CDE2143B739551FA5501394146 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
File Activities
Registry Activities
Start time: | 12:41:51 |
Start date: | 19/03/2021 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xf30000 |
File size: | 434592 bytes |
MD5 hash: | 9E2B8ACAD48ECCA55C0230D63623661B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
File Activities
Registry Activities
Disassembly |
---|
Code Analysis |
---|