Create Interactive Tour

Analysis Report Alvin2.xml

Overview

General Information

Sample Name:Alvin2.xml
Analysis ID:389598
MD5:e2c3cd38d9fa9173bad4d0379180d8a1
SHA1:9c57c956c67cfb157fab95e01ffa92b437518388
SHA256:cddce16cabc65fa294b2ec6cf6277651f2db77d319942e53c58505532e80531a
Infos:

Most interesting Screenshot:

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Contains capabilities to detect virtual machines
Creates a process in suspended mode (likely to inject code)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • MSOXMLED.EXE (PID: 6440 cmdline: 'C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE16\MSOXMLED.EXE' /verb open 'C:\Users\user\Desktop\Alvin2.xml' MD5: 77F586C2DB0175DD4AA085531A82C88A)
    • iexplore.exe (PID: 6480 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' C:\Users\user\Desktop\Alvin2.xml MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
      • iexplore.exe (PID: 6536 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6480 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
Source: msapplication.xml0.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x6f15ad8a,0x01d7332b</date><accdate>0x6f15ad8a,0x01d7332b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml0.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x6f15ad8a,0x01d7332b</date><accdate>0x6f15ad8a,0x01d7332b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml5.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x6f1a723d,0x01d7332b</date><accdate>0x6f1a723d,0x01d7332b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml5.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x6f1a723d,0x01d7332b</date><accdate>0x6f1a723d,0x01d7332b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml7.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x6f1a723d,0x01d7332b</date><accdate>0x6f1a723d,0x01d7332b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: msapplication.xml7.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x6f1a723d,0x01d7332b</date><accdate>0x6f1a723d,0x01d7332b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: msapplication.xml.1.drString found in binary or memory: http://www.amazon.com/
Source: msapplication.xml1.1.drString found in binary or memory: http://www.google.com/
Source: msapplication.xml2.1.drString found in binary or memory: http://www.live.com/
Source: msapplication.xml3.1.drString found in binary or memory: http://www.nytimes.com/
Source: msapplication.xml4.1.drString found in binary or memory: http://www.reddit.com/
Source: msapplication.xml5.1.drString found in binary or memory: http://www.twitter.com/
Source: msapplication.xml6.1.drString found in binary or memory: http://www.wikipedia.com/
Source: msapplication.xml7.1.drString found in binary or memory: http://www.youtube.com/
Source: classification engineClassification label: clean1.winXML@5/14@0/0
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{9978A460-9F1E-11EB-90E5-ECF4BB570DC9}.datJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DFC45588D931CEC673.TMPJump to behavior
Source: C:\Program Files (x86)\Common Files\microsoft shared\OFFICE16\MSOXMLED.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: unknownProcess created: C:\Program Files (x86)\Common Files\microsoft shared\OFFICE16\MSOXMLED.EXE 'C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE16\MSOXMLED.EXE' /verb open 'C:\Users\user\Desktop\Alvin2.xml'
Source: C:\Program Files (x86)\Common Files\microsoft shared\OFFICE16\MSOXMLED.EXEProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' C:\Users\user\Desktop\Alvin2.xml
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6480 CREDAT:17410 /prefetch:2
Source: C:\Program Files (x86)\Common Files\microsoft shared\OFFICE16\MSOXMLED.EXEProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' C:\Users\user\Desktop\Alvin2.xmlJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6480 CREDAT:17410 /prefetch:2Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
Source: C:\Program Files (x86)\Common Files\microsoft shared\OFFICE16\MSOXMLED.EXERegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
Source: C:\Program Files (x86)\Common Files\microsoft shared\OFFICE16\MSOXMLED.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Common Files\microsoft shared\OFFICE16\MSOXMLED.EXEFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
Source: C:\Program Files (x86)\Common Files\microsoft shared\OFFICE16\MSOXMLED.EXEProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' C:\Users\user\Desktop\Alvin2.xmlJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection11Masquerading1OS Credential DumpingQuery Registry1Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion1LSASS MemorySecurity Software Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection11Security Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSFile and Directory Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 389598 Sample: Alvin2.xml Startdate: 16/04/2021 Architecture: WINDOWS Score: 1 6 MSOXMLED.EXE 3 13 2->6         started        process3 8 iexplore.exe 1 78 6->8         started        process4 10 iexplore.exe 22 8->10         started       

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand
SourceDetectionScannerLabelLink
Alvin2.xml0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.wikipedia.com/0%URL Reputationsafe
http://www.wikipedia.com/0%URL Reputationsafe
http://www.wikipedia.com/0%URL Reputationsafe
http://www.wikipedia.com/0%URL Reputationsafe

Download Network PCAP: filteredfull

No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.wikipedia.com/msapplication.xml6.1.drfalse
  • URL Reputation: safe
  • URL Reputation: safe
  • URL Reputation: safe
  • URL Reputation: safe
unknown
http://www.amazon.com/msapplication.xml.1.drfalse
    high
    http://www.nytimes.com/msapplication.xml3.1.drfalse
      high
      http://www.live.com/msapplication.xml2.1.drfalse
        high
        http://www.reddit.com/msapplication.xml4.1.drfalse
          high
          http://www.twitter.com/msapplication.xml5.1.drfalse
            high
            http://www.youtube.com/msapplication.xml7.1.drfalse
              high
              No contacted IP infos

              General Information

              Joe Sandbox Version:31.0.0 Emerald
              Analysis ID:389598
              Start date:16.04.2021
              Start time:18:44:45
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 4m 31s
              Hypervisor based Inspection enabled:false
              Report type:full
              Sample file name:Alvin2.xml
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:31
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:CLEAN
              Classification:clean1.winXML@5/14@0/0
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              • Found application associated with file extension: .xml
              Warnings:
              • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
              • Excluded IPs from analysis (whitelisted): 204.79.197.200, 13.107.21.200, 20.82.210.154, 104.42.151.234, 93.184.220.29, 104.43.193.48, 13.88.21.125, 168.61.161.212, 92.122.145.220, 52.255.188.83, 88.221.62.148, 23.57.80.111, 152.199.19.161, 92.122.213.194, 92.122.213.247, 205.185.216.42, 205.185.216.10, 20.82.209.183, 52.155.217.156, 20.54.26.129
              • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, cs9.wac.phicdn.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, e11290.dspg.akamaiedge.net, iecvlist.microsoft.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, go.microsoft.com, ocsp.digicert.com, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, au.download.windowsupdate.com.hwcdn.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, www.bing.com, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, fs.microsoft.com, dual-a-0001.a-msedge.net, ie9comview.vo.msecnd.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, skypedataprdcolcus15.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, go.microsoft.com.edgekey.net, skypedataprdcolwus16.cloudapp.net, skypedataprdcolwus15.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, cs9.wpc.v0cdn.net
              No simulations
              No context
              No context
              No context
              No context
              No context
              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{9978A460-9F1E-11EB-90E5-ECF4BB570DC9}.dat
              Process:C:\Program Files\internet explorer\iexplore.exe
              File Type:Microsoft Word Document
              Category:dropped
              Size (bytes):24152
              Entropy (8bit):1.7594808966882751
              Encrypted:false
              SSDEEP:48:IwJ7GcproGwpLUyG/ap8Y5GIpc28GvnZpv2MTGvHZp922oGo1iqpv2DGo4h8Kpck:rLZwZp2KW4tsfxA7tPh8KW206
              MD5:5C195AF8E05FFB8269DFCB08B39E5BF6
              SHA1:8D5A99142E49659F48DD80EA66F2D5C28B4D4CEE
              SHA-256:DB264077FFF1B702466C1BBD58FD5D9D6053F826CDFC332374AB6A44B7AE9387
              SHA-512:DAF0A54804A99036D01E2E5FECF3F48586E6B58F0B4D5253CCF10B6124A7CFD035D42C9F7B6EF62760638636FFDA57D9BC5281C9E2BEAEF31E8097280E3BA63E
              Malicious:false
              Reputation:low
              Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{9978A462-9F1E-11EB-90E5-ECF4BB570DC9}.dat
              Process:C:\Program Files\internet explorer\iexplore.exe
              File Type:Microsoft Word Document
              Category:dropped
              Size (bytes):23640
              Entropy (8bit):1.7062198350914597
              Encrypted:false
              SSDEEP:48:IwcGcprJGwpaBG4pglJ3G7HprilJRTGApxlJjGspPlJIGeXpdlJALGR4pNlJKuFY:rAZjQTqLWxiL/zLJtLCfLALPLLZL7umg
              MD5:CBB17C597CB6AC29073C1743B5A99D98
              SHA1:1FAF6C3F758AE5BAAFC61F9115BFF869A7B0598E
              SHA-256:EB85046FF228EA138AAEF807D548901CB55E288F79CFEF38ED0B246A7BD67267
              SHA-512:C51CEE00D08B91ECB1E04A54A9AADF05665D087030BB8AA9A2A872F36EE48A0E8DAD179FF0B180ABEBBC806472BC84FFE8806B1C1A30B0E387EA27D3AB4C5DD2
              Malicious:false
              Reputation:low
              Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
              Process:C:\Program Files\internet explorer\iexplore.exe
              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
              Category:dropped
              Size (bytes):657
              Entropy (8bit):5.081698339429366
              Encrypted:false
              SSDEEP:12:TMHdNMNxOE8EGEg4nWimI002EtM3MHdNMNxOE8EGEg4nWimI00ONVbkEtMb:2d6NxO+R5SZHKd6NxO+R5SZ7Qb
              MD5:40DC2DAEA810016A2FEDF6EE0E7480CE
              SHA1:3C53B4879367ECBA64119863C382067ACE035635
              SHA-256:9906A3ADD2F4577ABA64C1C229CE2D9DA15350A4AF5CC11AC192EE84CA5633CF
              SHA-512:D28156E251E08698C328075DD43AEEE25339898DD1E6C506AB8D5C81A518147C9F4205416F991923814D04518816E8E877035E331616E9782437359FF4F93914
              Malicious:false
              Reputation:low
              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x6f1a723d,0x01d7332b</date><accdate>0x6f1a723d,0x01d7332b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x6f1a723d,0x01d7332b</date><accdate>0x6f1a723d,0x01d7332b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig>..
              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
              Process:C:\Program Files\internet explorer\iexplore.exe
              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
              Category:dropped
              Size (bytes):654
              Entropy (8bit):5.129427137361252
              Encrypted:false
              SSDEEP:12:TMHdNMNxe2k24/414nWimI002EtM3MHdNMNxe2k24/414nWimI00ONkak6EtMb:2d6NxrzMBSZHKd6NxrzMBSZ72a7b
              MD5:58ED65F3788FA4A9D7B42BB6338A9588
              SHA1:D25B1DCB448E85FDF9234165048C57F7AF7FDEED
              SHA-256:D144FEC44CE2B6DA5C8DE840EBADA61EDB8F8E44C8F4E44108B443547C8ACADA
              SHA-512:1C5A82CB54D4FC415AED9CC329A75D3B90C4AA415B05AC865EBDA8489C699E547B64EC9AA988D082851F6543FA2EA91E0A3F549D5FA0E96151DB1D2CE7C6D4A7
              Malicious:false
              Reputation:low
              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0x6f134b2a,0x01d7332b</date><accdate>0x6f134b2a,0x01d7332b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0x6f134b2a,0x01d7332b</date><accdate>0x6f134b2a,0x01d7332b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Amazon.url"/></tile></msapplication></browserconfig>..
              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
              Process:C:\Program Files\internet explorer\iexplore.exe
              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
              Category:dropped
              Size (bytes):663
              Entropy (8bit):5.099681739464678
              Encrypted:false
              SSDEEP:12:TMHdNMNxvL8EGEg4nWimI002EtM3MHdNMNxvL8EGEg4nWimI00ONmZEtMb:2d6Nxv7R5SZHKd6Nxv7R5SZ7Ub
              MD5:E5D978C874770642EFA19E39215B380B
              SHA1:A14A52403629D00FDCD61BE82D211682557F4737
              SHA-256:6CD620605925D51C65799EDC3467A5533A6DC65B296412D453039FAE2157BBD8
              SHA-512:303E6D2FE78D46A48A15C0957CFD9E22D65F0980D0D1CAD47BEE087898B5DB1221FB296AB43B02548DDDC6D2F3CC9F70007FE5A90356829820EB6E5F8CCFA3B2
              Malicious:false
              Reputation:low
              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0x6f1a723d,0x01d7332b</date><accdate>0x6f1a723d,0x01d7332b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0x6f1a723d,0x01d7332b</date><accdate>0x6f1a723d,0x01d7332b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Wikipedia.url"/></tile></msapplication></browserconfig>..
              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
              Process:C:\Program Files\internet explorer\iexplore.exe
              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
              Category:dropped
              Size (bytes):648
              Entropy (8bit):5.09361039426407
              Encrypted:false
              SSDEEP:12:TMHdNMNxiW4nWimI002EtM3MHdNMNxiW4nWimI00ONd5EtMb:2d6Nx0SZHKd6Nx0SZ7njb
              MD5:D1D41306738D8FBFE83D7A6CF97FB9C1
              SHA1:37262C47333253EE7616EFDF7B00BB111FFA0F17
              SHA-256:0E42E03EB260C9274AA0B2A073900CFF3EA6E7A3A7476FBAA4222DF3633D264A
              SHA-512:AC4ECCC6E7B92E5C152214634592D1F82DB8F6687D3958C225A5CBC326AB11472239A0BE49B3B18EC6B3222CF03BED125709082E7B39AD388EB07C79AF9B17CF
              Malicious:false
              Reputation:low
              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0x6f180feb,0x01d7332b</date><accdate>0x6f180feb,0x01d7332b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0x6f180feb,0x01d7332b</date><accdate>0x6f180feb,0x01d7332b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Live.url"/></tile></msapplication></browserconfig>..
              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
              Process:C:\Program Files\internet explorer\iexplore.exe
              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
              Category:dropped
              Size (bytes):657
              Entropy (8bit):5.112291170365664
              Encrypted:false
              SSDEEP:12:TMHdNMNxhGw8EGEg4nWimI002EtM3MHdNMNxhGw8EGEg4nWimI00ON8K075EtMb:2d6NxQqR5SZHKd6NxQqR5SZ7uKajb
              MD5:0850E21BD49C3030DB0CC7AB7A602E74
              SHA1:B8B95E3965385D37B26B468B22C849E0879947A6
              SHA-256:FCCF4F970C31CC878782025EBE944A9E4D86FC777EABFFB809E04073E0FD437C
              SHA-512:322C59AF8FD0CA45EF8B0FE1A4A997C81F45A230ECE95A5E06BE5BA77AC4CF322546E37788FA877F99CE57F276ED86430A4F01A70A24D71F751ACA109595968C
              Malicious:false
              Reputation:low
              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x6f1a723d,0x01d7332b</date><accdate>0x6f1a723d,0x01d7332b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x6f1a723d,0x01d7332b</date><accdate>0x6f1a723d,0x01d7332b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig>..
              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
              Process:C:\Program Files\internet explorer\iexplore.exe
              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
              Category:dropped
              Size (bytes):654
              Entropy (8bit):5.082332389767289
              Encrypted:false
              SSDEEP:12:TMHdNMNx0nW4nWimI002EtM3MHdNMNx0nW4nWimI00ONxEtMb:2d6Nx0zSZHKd6Nx0zSZ7Vb
              MD5:EC5CDFA47290C86B0363DDC06FD06477
              SHA1:CF4409FD811EE7EDF04F266B53637E3CBFA5A869
              SHA-256:E7B256AA490BF17B503F4DF7819327CC9CA205F3EA6AFE6AAC9C89CA8EA3FB13
              SHA-512:2B7F00E19F04DD00BFFFCB26098189C5BA19FBBEFFFB3354430BEA72429D5273D0502DFA2CA45BEB55DD17CDF108BAA7C3A23469AF9364D3A36B6FA4FD5CEF08
              Malicious:false
              Reputation:low
              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0x6f180feb,0x01d7332b</date><accdate>0x6f180feb,0x01d7332b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0x6f180feb,0x01d7332b</date><accdate>0x6f180feb,0x01d7332b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Reddit.url"/></tile></msapplication></browserconfig>..
              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
              Process:C:\Program Files\internet explorer\iexplore.exe
              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
              Category:dropped
              Size (bytes):657
              Entropy (8bit):5.118231030921768
              Encrypted:false
              SSDEEP:12:TMHdNMNxxW4nWimI002EtM3MHdNMNxxW4nWimI00ON6Kq5EtMb:2d6NxlSZHKd6NxlSZ7ub
              MD5:8705AF54FBFCF5BB28B8D53E86F6CA09
              SHA1:47E0800F73659A6CABA32274B1F934B4A80F4291
              SHA-256:9B5C4BC006FEA9E5A092DB2008285A5DC34BAE340272A9E8C0CB262B6E541BEF
              SHA-512:204D39670C73BCF8AD6DD25EFDECE03C73401BBD0F81B3A35332002E0D281E2BB5CD645413336DFC4FEEE6A6236F6BE782C549BD3E119A5F0E890078420AD57F
              Malicious:false
              Reputation:low
              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0x6f180feb,0x01d7332b</date><accdate>0x6f180feb,0x01d7332b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0x6f180feb,0x01d7332b</date><accdate>0x6f180feb,0x01d7332b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\NYTimes.url"/></tile></msapplication></browserconfig>..
              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
              Process:C:\Program Files\internet explorer\iexplore.exe
              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
              Category:dropped
              Size (bytes):660
              Entropy (8bit):5.101728356064849
              Encrypted:false
              SSDEEP:12:TMHdNMNxcW4nWimI002EtM3MHdNMNxcW4nWimI00ONVEtMb:2d6NxOSZHKd6NxOSZ71b
              MD5:DB1B382B2662B6A06635DA2C31ACF5C0
              SHA1:E46DE5C7AE0688C90B25273236DDC604504C1AE3
              SHA-256:463F1ED9F05BF586A836DE80C8755932C321DDADAB9D5289695EDE470340219B
              SHA-512:EF3668CF88B45AAC775B7F5A370F3F14AA22699BDA8754C4C22BD752B50FA020C29CE30BA62255C00FA123E3AE2530BFA57D09441497EF1CFDD777B58CC24F91
              Malicious:false
              Reputation:low
              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x6f15ad8a,0x01d7332b</date><accdate>0x6f15ad8a,0x01d7332b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x6f15ad8a,0x01d7332b</date><accdate>0x6f15ad8a,0x01d7332b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig>..
              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
              Process:C:\Program Files\internet explorer\iexplore.exe
              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
              Category:dropped
              Size (bytes):654
              Entropy (8bit):5.087914031049422
              Encrypted:false
              SSDEEP:12:TMHdNMNxfnW4nWimI002EtM3MHdNMNxfnW4nWimI00ONe5EtMb:2d6NxbSZHKd6NxbSZ7Ejb
              MD5:2ABF8DDC1C67C5587CB7EE23383F46C0
              SHA1:70AB83FFC6FFF348D15CAE90E66AB6ABBFE3364A
              SHA-256:6B1DC856F28CA70DFA10972DB7CF81A4F8AFAD7F1C73BE55347C6A0F01338FA9
              SHA-512:E550A7FB5A65C2E1BB40898C2B16AC61158D6DFACC5ADAE2E578C7F0699962C8BCD4A1B378AD71470522C6F267042A3BA5B3769B7E227512374E40BB7DAF3FAF
              Malicious:false
              Reputation:low
              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0x6f15ad8a,0x01d7332b</date><accdate>0x6f15ad8a,0x01d7332b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0x6f15ad8a,0x01d7332b</date><accdate>0x6f15ad8a,0x01d7332b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Google.url"/></tile></msapplication></browserconfig>..
              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\xmltreeview[1]
              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
              File Type:ASCII text, with CRLF line terminators
              Category:downloaded
              Size (bytes):17524
              Entropy (8bit):4.340063035506032
              Encrypted:false
              SSDEEP:192:wiuFhk5un5EpDdblzKaz+OJGbiIBJofNbr5/dn82/jqmo3qAi:rq25unWZd9dvJGiIBJoh387oAi
              MD5:03710426AB25AD1280E197F61249F9DE
              SHA1:F5E7A6FD42503AE4758BC36C8DD78D98EFB35047
              SHA-256:21E63F7C77896ED2B5F115957F2448E0A9E2DD738D7D487E471217421F6A93E1
              SHA-512:213CB55B8573335D1384AE704FF4267F224376056F71548660F9B2FDAA1203D8ABDDB787900AAF5D1E0AC6E5BE261F713BDBEFB67643D08E8D3672512A1AF588
              Malicious:false
              Reputation:moderate, very likely benign file
              IE Cache URL:res://mshtml.dll/xmltreeview.js
              Preview: (function()..{.. var XHTML = "http://www.w3.org/1999/xhtml";.. .. // Time slicing constants.. var LIMIT = 10; // Maximum number of nodes to process before checking time.. var DURATION = 200; // Maximum amount of time (ms) to process before unblocking UI.. var DELAY = 15; // Amount of time (ms) to unblock UI.... // Tree building state.. var iterator;.. var nextNode;.. var root;.. var rootFirstChild;.. var time;.. .. // Template References.. var attrTemplate, attrName, attrValue;.. var elmStartTemplate, elmStartName;.. var elmEndTemplate, elmEndName;.. var cdataTemplate, cdataValue;.. var commentTemplate, commentValue;.. var style; .. .. // Only invoke this script if it was injected by our parser. Test for a condition that is.. // impossible for a markup to create - two direct children of the document... var secondRootElement = document.documentElement.nextElementSibling;.. if (secondRootElement == null
              C:\Users\user\AppData\Local\Temp\~DFC45588D931CEC673.TMP
              Process:C:\Program Files\internet explorer\iexplore.exe
              File Type:data
              Category:dropped
              Size (bytes):12965
              Entropy (8bit):0.4206675811013856
              Encrypted:false
              SSDEEP:24:c9lLh9lLh9lIn9lIn9log9low9lW4CaVogf3:kBqoIb9WVPv
              MD5:860B26E2A95CFEBF34203FF5C82A9BD2
              SHA1:EF2CEA6A6A667630B6D8F6F7EE8B05900166BA0C
              SHA-256:A5F79B030FA7149680340C861E2CD8552594F94D40739A58268B24894347F867
              SHA-512:B70870A17AEED0663F755EC4E4615408A0095A1A5DD3280CF106A38542690E96B58688204834D9B827492C2F6987C4BB679F173565C933DADED7CBEAB5DF0DEB
              Malicious:false
              Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              C:\Users\user\AppData\Local\Temp\~DFFBACEAD0A58BD79A.TMP
              Process:C:\Program Files\internet explorer\iexplore.exe
              File Type:data
              Category:dropped
              Size (bytes):34629
              Entropy (8bit):0.42936611486861104
              Encrypted:false
              SSDEEP:48:kBqoxKwlJBlJ4ilJ7ilJBlJ7lJFlJXlJOlJKYlJKMvzcScm:kBqoxKwLBL4iL7iLBL7LFLXLOLVLh7um
              MD5:697DBE9CBC38F363DC7777022588AA82
              SHA1:61A84D5C7A61F66B56AB2E0B9605663A57013611
              SHA-256:EF246FAEC465B0120A3DCC3CEA7016F24CAEF5201D2EDA4D2442F1EE81E23A24
              SHA-512:99F9DE1EA87B9BA582D12C7E5971D5738207A2C61497EC327CF0F5B1D4E3DB89045541328E11C66F18B6B19006BF7173119A3FCC4D9BC46142A4BF7E9064231E
              Malicious:false
              Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

              Static File Info

              General

              File type:XML 1.0 document text
              Entropy (8bit):5.249063309229664
              TrID:
              • Generic XML (ASCII) (5005/1) 100.00%
              File name:Alvin2.xml
              File size:381
              MD5:e2c3cd38d9fa9173bad4d0379180d8a1
              SHA1:9c57c956c67cfb157fab95e01ffa92b437518388
              SHA256:cddce16cabc65fa294b2ec6cf6277651f2db77d319942e53c58505532e80531a
              SHA512:285cb8c294585c7b42868e1d367f5414b99d56008c86a20455a46b3ebb2ba6418de096d226ac92fb1ac8b4706519299d585489c5e6ca2b22fdcc2f4c67f59496
              SSDEEP:6:TM3iWT1jopL6LDYrqXQ3bYBq2NYnHPT33YaRtiYhyVqp4XkY8bH62yYXihqiO2Kq:TM3ii1JPAw5qHPTzRt9pKXepGoiL1
              File Content Preview:<?xml version='1.0' encoding='utf-8' standalone='yes' ?>.<map>.<long name="S" value="2579698657" />.<string name="EI">352402098459201</string>.<string name="UTDID">XfdZvh5OLg4DAN1FgSs6tosj</string>.<string name="SI">505023407162404</string>.<long name="t2

              File Icon

              Icon Hash:e4ccd4ccccd6d4d8

              Network Behavior

              Download Network PCAP: filteredfull

              TimestampSource PortDest PortSource IPDest IP
              Apr 16, 2021 18:45:27.003997087 CEST5430253192.168.2.58.8.8.8
              Apr 16, 2021 18:45:27.084110975 CEST53543028.8.8.8192.168.2.5
              Apr 16, 2021 18:45:27.123907089 CEST5378453192.168.2.58.8.8.8
              Apr 16, 2021 18:45:27.193443060 CEST53537848.8.8.8192.168.2.5
              Apr 16, 2021 18:45:27.296859026 CEST6530753192.168.2.58.8.8.8
              Apr 16, 2021 18:45:27.314275980 CEST6434453192.168.2.58.8.8.8
              Apr 16, 2021 18:45:27.345521927 CEST53653078.8.8.8192.168.2.5
              Apr 16, 2021 18:45:27.372853994 CEST53643448.8.8.8192.168.2.5
              Apr 16, 2021 18:45:28.364448071 CEST6206053192.168.2.58.8.8.8
              Apr 16, 2021 18:45:28.423305035 CEST53620608.8.8.8192.168.2.5
              Apr 16, 2021 18:45:29.319371939 CEST6180553192.168.2.58.8.8.8
              Apr 16, 2021 18:45:29.370882988 CEST53618058.8.8.8192.168.2.5
              Apr 16, 2021 18:45:30.528007030 CEST5479553192.168.2.58.8.8.8
              Apr 16, 2021 18:45:30.576828957 CEST53547958.8.8.8192.168.2.5
              Apr 16, 2021 18:45:30.878120899 CEST4955753192.168.2.58.8.8.8
              Apr 16, 2021 18:45:30.937136889 CEST53495578.8.8.8192.168.2.5
              Apr 16, 2021 18:45:31.937319994 CEST6173353192.168.2.58.8.8.8
              Apr 16, 2021 18:45:31.988883018 CEST53617338.8.8.8192.168.2.5
              Apr 16, 2021 18:45:33.288614035 CEST6544753192.168.2.58.8.8.8
              Apr 16, 2021 18:45:33.340142012 CEST53654478.8.8.8192.168.2.5
              Apr 16, 2021 18:45:34.394736052 CEST5244153192.168.2.58.8.8.8
              Apr 16, 2021 18:45:34.455893993 CEST53524418.8.8.8192.168.2.5
              Apr 16, 2021 18:45:35.208201885 CEST6217653192.168.2.58.8.8.8
              Apr 16, 2021 18:45:35.270422935 CEST53621768.8.8.8192.168.2.5
              Apr 16, 2021 18:45:37.349318027 CEST5959653192.168.2.58.8.8.8
              Apr 16, 2021 18:45:37.398360014 CEST53595968.8.8.8192.168.2.5
              Apr 16, 2021 18:45:38.300128937 CEST6529653192.168.2.58.8.8.8
              Apr 16, 2021 18:45:38.351805925 CEST53652968.8.8.8192.168.2.5
              Apr 16, 2021 18:45:46.397495985 CEST6318353192.168.2.58.8.8.8
              Apr 16, 2021 18:45:46.447633028 CEST53631838.8.8.8192.168.2.5
              Apr 16, 2021 18:45:47.518301964 CEST6015153192.168.2.58.8.8.8
              Apr 16, 2021 18:45:47.567161083 CEST53601518.8.8.8192.168.2.5
              Apr 16, 2021 18:45:53.567276955 CEST5696953192.168.2.58.8.8.8
              Apr 16, 2021 18:45:53.631599903 CEST53569698.8.8.8192.168.2.5
              Apr 16, 2021 18:45:54.924175024 CEST5516153192.168.2.58.8.8.8
              Apr 16, 2021 18:45:54.983314991 CEST53551618.8.8.8192.168.2.5
              Apr 16, 2021 18:46:05.190788031 CEST5475753192.168.2.58.8.8.8
              Apr 16, 2021 18:46:05.242422104 CEST53547578.8.8.8192.168.2.5
              Apr 16, 2021 18:46:06.198542118 CEST5475753192.168.2.58.8.8.8
              Apr 16, 2021 18:46:06.250128984 CEST53547578.8.8.8192.168.2.5
              Apr 16, 2021 18:46:06.260516882 CEST4999253192.168.2.58.8.8.8
              Apr 16, 2021 18:46:06.319612980 CEST53499928.8.8.8192.168.2.5
              Apr 16, 2021 18:46:06.805007935 CEST6007553192.168.2.58.8.8.8
              Apr 16, 2021 18:46:06.864937067 CEST53600758.8.8.8192.168.2.5
              Apr 16, 2021 18:46:07.257224083 CEST5475753192.168.2.58.8.8.8
              Apr 16, 2021 18:46:07.277537107 CEST4999253192.168.2.58.8.8.8
              Apr 16, 2021 18:46:07.310343027 CEST53547578.8.8.8192.168.2.5
              Apr 16, 2021 18:46:07.327632904 CEST53499928.8.8.8192.168.2.5
              Apr 16, 2021 18:46:08.290887117 CEST4999253192.168.2.58.8.8.8
              Apr 16, 2021 18:46:08.339560032 CEST53499928.8.8.8192.168.2.5
              Apr 16, 2021 18:46:09.259527922 CEST5475753192.168.2.58.8.8.8
              Apr 16, 2021 18:46:09.311391115 CEST53547578.8.8.8192.168.2.5
              Apr 16, 2021 18:46:10.290791035 CEST4999253192.168.2.58.8.8.8
              Apr 16, 2021 18:46:10.339519978 CEST53499928.8.8.8192.168.2.5
              Apr 16, 2021 18:46:13.275501966 CEST5475753192.168.2.58.8.8.8
              Apr 16, 2021 18:46:13.327306032 CEST53547578.8.8.8192.168.2.5
              Apr 16, 2021 18:46:14.306689978 CEST4999253192.168.2.58.8.8.8
              Apr 16, 2021 18:46:14.365835905 CEST53499928.8.8.8192.168.2.5
              Apr 16, 2021 18:46:14.953933954 CEST5501653192.168.2.58.8.8.8
              Apr 16, 2021 18:46:15.014249086 CEST53550168.8.8.8192.168.2.5
              Apr 16, 2021 18:46:21.811578035 CEST6434553192.168.2.58.8.8.8
              Apr 16, 2021 18:46:21.870476007 CEST53643458.8.8.8192.168.2.5
              Apr 16, 2021 18:46:46.503160000 CEST5712853192.168.2.58.8.8.8
              Apr 16, 2021 18:46:46.553739071 CEST53571288.8.8.8192.168.2.5
              Apr 16, 2021 18:46:49.483150005 CEST5479153192.168.2.58.8.8.8
              Apr 16, 2021 18:46:49.540337086 CEST53547918.8.8.8192.168.2.5
              Apr 16, 2021 18:47:09.055783033 CEST5046353192.168.2.58.8.8.8
              Apr 16, 2021 18:47:09.117686033 CEST53504638.8.8.8192.168.2.5
              Apr 16, 2021 18:47:09.952390909 CEST5039453192.168.2.58.8.8.8
              Apr 16, 2021 18:47:10.009460926 CEST53503948.8.8.8192.168.2.5
              Apr 16, 2021 18:47:10.268024921 CEST5853053192.168.2.58.8.8.8
              Apr 16, 2021 18:47:10.332945108 CEST53585308.8.8.8192.168.2.5
              Apr 16, 2021 18:47:10.586636066 CEST5381353192.168.2.58.8.8.8
              Apr 16, 2021 18:47:10.886852026 CEST53538138.8.8.8192.168.2.5
              Apr 16, 2021 18:47:11.344201088 CEST6373253192.168.2.58.8.8.8
              Apr 16, 2021 18:47:11.403708935 CEST53637328.8.8.8192.168.2.5
              Apr 16, 2021 18:47:11.930423021 CEST5734453192.168.2.58.8.8.8
              Apr 16, 2021 18:47:11.984051943 CEST53573448.8.8.8192.168.2.5
              Apr 16, 2021 18:47:12.602488995 CEST5445053192.168.2.58.8.8.8
              Apr 16, 2021 18:47:12.651155949 CEST53544508.8.8.8192.168.2.5
              Apr 16, 2021 18:47:13.246529102 CEST5926153192.168.2.58.8.8.8
              Apr 16, 2021 18:47:13.298137903 CEST53592618.8.8.8192.168.2.5
              Apr 16, 2021 18:47:14.089862108 CEST5715153192.168.2.58.8.8.8
              Apr 16, 2021 18:47:14.148979902 CEST53571518.8.8.8192.168.2.5
              Apr 16, 2021 18:47:15.102264881 CEST5941353192.168.2.58.8.8.8
              Apr 16, 2021 18:47:15.159820080 CEST53594138.8.8.8192.168.2.5
              Apr 16, 2021 18:47:15.697483063 CEST6051653192.168.2.58.8.8.8
              Apr 16, 2021 18:47:15.754612923 CEST53605168.8.8.8192.168.2.5
              Apr 16, 2021 18:47:25.722743988 CEST5164953192.168.2.58.8.8.8
              Apr 16, 2021 18:47:25.771487951 CEST53516498.8.8.8192.168.2.5
              Apr 16, 2021 18:47:27.206918955 CEST6508653192.168.2.58.8.8.8
              Apr 16, 2021 18:47:27.267535925 CEST53650868.8.8.8192.168.2.5

              Code Manipulations

              Statistics

              CPU Usage

              050100s020406080100

              Click to jump to process

              Memory Usage

              050100s0.0010203040MB

              Click to jump to process

              Behavior

              Click to jump to process

              System Behavior

              Start time:18:45:33
              Start date:16/04/2021
              Path:C:\Program Files (x86)\Common Files\microsoft shared\OFFICE16\MSOXMLED.EXE
              Wow64 process (32bit):true
              Commandline:'C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE16\MSOXMLED.EXE' /verb open 'C:\Users\user\Desktop\Alvin2.xml'
              Imagebase:0x13c0000
              File size:220872 bytes
              MD5 hash:77F586C2DB0175DD4AA085531A82C88A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate
              Start time:18:45:34
              Start date:16/04/2021
              Path:C:\Program Files\internet explorer\iexplore.exe
              Wow64 process (32bit):false
              Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' C:\Users\user\Desktop\Alvin2.xml
              Imagebase:0x7ff7942f0000
              File size:823560 bytes
              MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Start time:18:45:35
              Start date:16/04/2021
              Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
              Wow64 process (32bit):true
              Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6480 CREDAT:17410 /prefetch:2
              Imagebase:0xd70000
              File size:822536 bytes
              MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Disassembly