Analysis Report iLividSetupV1.exe
Overview
General Information
Detection
Score: | 45 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
No yara matches |
---|
Sigma Overview |
---|
No Sigma rule has matched |
---|
Signature Overview |
---|
Click to jump to signature section
AV Detection: |
---|
Antivirus / Scanner detection for submitted sample |
Source: | Avira: |
Multi AV Scanner detection for submitted file |
Source: | Virustotal: | Perma Link | ||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: |
Machine Learning detection for sample |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Window detected: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Binary string: |
Source: | DNS traffic detected: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | Virustotal: | ||
Source: | Metadefender: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Automated click: | ||
Source: | Automated click: | ||
Source: | Automated click: |
Source: | Window detected: |
Source: | Static PE information: |
Source: | Binary string: |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to behavior |
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | File opened / queried: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | Path Interception | Masquerading1 | OS Credential Dumping | Query Registry1 | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Non-Application Layer Protocol1 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Virtualization/Sandbox Evasion1 | LSASS Memory | Security Software Discovery1 | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Application Layer Protocol1 | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Virtualization/Sandbox Evasion1 | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Binary Padding | NTDS | File and Directory Discovery1 | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | System Information Discovery11 | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings | |
Replication Through Removable Media | Launchd | Rc.common | Rc.common | Steganography | Cached Domain Credentials | Remote System Discovery1 | VNC | GUI Input Capture | Exfiltration Over C2 Channel | Multiband Communication | Jamming or Denial of Service | Abuse Accessibility Features |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
47% | Virustotal | Browse | ||
32% | Metadefender | Browse | ||
45% | ReversingLabs | Win32.Adware.Bandoo | ||
100% | Avira | PUA/iLivid.Gen | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
1% | Virustotal | Browse | ||
0% | Metadefender | Browse | ||
0% | ReversingLabs | |||
0% | Virustotal | Browse | ||
0% | Metadefender | Browse | ||
0% | ReversingLabs | |||
1% | Virustotal | Browse | ||
0% | Metadefender | Browse | ||
0% | ReversingLabs | |||
0% | Virustotal | Browse | ||
0% | Metadefender | Browse | ||
0% | ReversingLabs |
No Antivirus matches |
---|
No Antivirus matches |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
download.cdn.ilivid.com | unknown | unknown | false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
No contacted IP infos |
---|
General Information |
---|
Joe Sandbox Version: | 32.0.0 Black Diamond |
Analysis ID: | 416969 |
Start date: | 19.05.2021 |
Start time: | 08:10:36 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 6m 2s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | iLividSetupV1.exe |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 26 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal45.winEXE@1/7@8/0 |
EGA Information: | Failed |
HDC Information: | Failed |
HCA Information: | Failed |
Cookbook Comments: |
|
Warnings: | Show All
|
Time | Type | Description |
---|---|---|
08:11:35 | Autostart | |
08:11:38 | API Interceptor |
No context |
---|
No context |
---|
No context |
---|
No context |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\nse91FD.tmp\System.dll | Get hash | malicious | Browse | ||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse |
Process: | C:\Users\user\Desktop\iLividSetupV1.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 614 |
Entropy (8bit): | 5.1818177479745255 |
Encrypted: | false |
SSDEEP: | 12:8c128zYNbRLTLVpN9j1d4rY2EGOjAnQ3cskXIAY2EYwpACBm:8FTnLnVpH1KM1AQ3/hYw5m |
MD5: | 02926B908E345D6D4BB5AE772FA47088 |
SHA1: | E2D5DD24AA03BE9542B5C1BFE67C9AE56E22739B |
SHA-256: | 79428BAAFA8381C69D511B7993D88D6AC5573F96653A317193B570BFBE2DD77B |
SHA-512: | 548D62F4690889085A5C6583D3D767745661A9B2E2E974BC3422240914A4A0D6482B841047E2C580940EE07D9AD90A253B52A95765BC3909F18A296A470FC114 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Users\user\Desktop\iLividSetupV1.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1069056 |
Entropy (8bit): | 6.632475035569113 |
Encrypted: | false |
SSDEEP: | 12288:6atQ0QAsqP85SFuNrC8b+qyPyTlkmn4IiaLgfeC:jtQ06M8Sqy6Tlkmn4IvieC |
MD5: | CF0E9192667CDEDFACC8646E38BD9686 |
SHA1: | 4741AC6DE1D309210279795E1C7CD7F21CEE6F17 |
SHA-256: | D0B3E7F9B304B88FE7DE3B81AFC1C64F40D7B2237721225A15A564AE62B34E66 |
SHA-512: | B8A47FC2C706822EB0ADFA820D24330901454FE37B6C93270F2FC89AA4B05E9E1527820AF1F3F674B6D8696ED79722CC51EEB12E7E1762E112E7BAD69327D36C |
Malicious: | false |
Antivirus: | |
Reputation: | low |
Preview: |
|
Process: | C:\Users\user\Desktop\iLividSetupV1.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 11264 |
Entropy (8bit): | 5.757244749345054 |
Encrypted: | false |
SSDEEP: | 192:sRer7uivwq1XpKs4FVWSjMd8tIg2cREbyCsZ8q2R4Sy+Xe:s67Xws4FVWig86/5eCBqSy+Xe |
MD5: | 959EA64598B9A3E494C00E8FA793BE7E |
SHA1: | 40F284A3B92C2F04B1038DEF79579D4B3D066EE0 |
SHA-256: | 03CD57AB00236C753E7DDEEE8EE1C10839ACE7C426769982365531042E1F6F8B |
SHA-512: | 5E765E090F712BEFFCE40C5264674F430B08719940D66E3A4D4A516FD4ADE859F7853F614D9D6BBB602780DE54E11110D66DBB0F9CA20EF6096EDE531F9F6D64 |
Malicious: | false |
Antivirus: | |
Joe Sandbox View: |
|
Reputation: | moderate, very likely benign file |
Preview: |
|
Process: | C:\Users\user\Desktop\iLividSetupV1.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 13312 |
Entropy (8bit): | 5.952191493801213 |
Encrypted: | false |
SSDEEP: | 192:qP6KdXy+Yo7e1J8qC25a5mDFmCLGUCVGpU6uNck87I0S/TDqwyTq+:q/q3Pgd5mx6VkEck87ILCTN |
MD5: | A88BAAD3461D2E9928A15753B1D93FD7 |
SHA1: | BB826E35264968BBC3B981D8430AC55DF1E6D4A6 |
SHA-256: | C5AB2926C268257122D0342739E73573D7EEDA34C861BC7A68A02CBC69BD41AF |
SHA-512: | 5EDCF46680716930DA7FD1A41B8B0426F057CF4BECEFB3EE84798EC8B449726AFB822FB626C4942036A1AE3BB937184D1F71D0E45075ABB5BF167F5D833DF43A |
Malicious: | false |
Antivirus: | |
Reputation: | moderate, very likely benign file |
Preview: |
|
Process: | C:\Users\user\Desktop\iLividSetupV1.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 18433 |
Entropy (8bit): | 4.968600211322537 |
Encrypted: | false |
SSDEEP: | 384:LdOmrJYeVR7P5/Udi6f8MWBrK3Kx2P74d0jrrK3Qv6c543Sr4cB/EGy5y06:L9rXP2iQ8Xpx2PMqjrhvsNe/EG2yP |
MD5: | ADC52E4DF9473983D7C1BBE0F67B2891 |
SHA1: | 70CD5B1954D485C1C5819329C42C2F83F3ADD182 |
SHA-256: | 46AEFAA17E63EF0FBC4EA1ED1C405BD8D55CE1CC107151404AD79FD78838CD1E |
SHA-512: | 0F00A030B8831C6DDDCF093A1B63BD3D5757B8DE7C41D7C5560872D6F6900EFD9DF77F7A9170E03D7B211CD6CA5EE00DCB0B5762870868A3C8C777CA4C71D4BF |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Users\user\Desktop\iLividSetupV1.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 86822 |
Entropy (8bit): | 4.954942158775316 |
Encrypted: | false |
SSDEEP: | 768:ENQnm7njG/tbxjtMp0PEUKDNT+OaA23qp44jrlCvlkFH:ENQnm7nj0tdjtxwyNq+lkFH |
MD5: | AAD23E408FC3EF789A35569F04484F3E |
SHA1: | FF70801973C3A8263A9208DB33C0ABCEF9FFF854 |
SHA-256: | B336D6CDF362E0A5E4879CB722AFD25ED3F56671C6244FBACDF5A7E8B4F7A05E |
SHA-512: | 0FD55AC061705BCDB5E82479B625CDF24964C91A0A96C7930B55DCCCC7DF81C84CC3844499555EFEB3DA250EB44F5C92B12590A9FA5CEF2C1B77E8B5324A4382 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Users\user\Desktop\iLividSetupV1.exe |
File Type: | |
Category: | modified |
Size (bytes): | 9728 |
Entropy (8bit): | 5.131946648363094 |
Encrypted: | false |
SSDEEP: | 192:y1zQhZDqlJcKISw99ioU3MSfwLF/+nhHUisdz:ozoZDGKYw9goWyFGBU7z |
MD5: | F7B92B78F1A00A872C8A38F40AFA7D65 |
SHA1: | 872522498F69AD49270190C74CF3AF28862057F2 |
SHA-256: | 2BEE549B2816BA29F81C47778D9E299C3A364B81769E43D5255310C2BD146D6E |
SHA-512: | 3AD6AFA6269B48F238B48CF09EEEFDEF03B58BAB4E25282C8C2887B4509856CF5CBB0223FBB06C822FB745AEEA000DD1EEE878DF46AD0BA7F2EF520A7A607F79 |
Malicious: | false |
Antivirus: | |
Reputation: | moderate, very likely benign file |
Preview: |
|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 7.970531196412497 |
TrID: |
|
File name: | iLividSetupV1.exe |
File size: | 823648 |
MD5: | 016b0f5e6b3221659c763a2cb6a238da |
SHA1: | b120b44b9320e21b9277f8520d0a9f8e0a663f05 |
SHA256: | 03d1e0a1b7bdd49c52fe65917ab7376987b89719722a3e907604be9639900370 |
SHA512: | c09ff452b1bd0b5320b0fdd939b50363b9583ede927a0e79cd9d57800b54b8163d18e791142838cae586c94821c2682130a74a961621920555d0dd0a6b8597c1 |
SSDEEP: | 24576:M0aNNdDEuDbbETLHzQlrnTfvecXz7tcTIlXdtQO6kldiDDc:MLVDU3HQzeScTIlXdtpji0 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......<.ydx..7x..7x..7_Hz7{..7_Hl7i..7x..7...7q..7s..7q..7y..7q..7y..7Richx..7........................PE..L....l.K.................d. |
File Icon |
---|
Icon Hash: | 8888c6e66470b0b9 |
General | |
---|---|
Entrypoint: | 0x4033e9 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED |
DLL Characteristics: | NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x4BC06CCB [Sat Apr 10 12:19:23 2010 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | bf95d1fc1d10de18b32654b123ad5e1f |
Signature Valid: | true |
Signature Issuer: | CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US |
Signature Validation Error: | The operation completed successfully |
Error Number: | 0 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 72CFCB254DFBDF38B2994B2AA8B976B1 |
Thumbprint SHA-1: | BD3C53D780FA1AAE7F29BAFE81622A440DF89977 |
Thumbprint SHA-256: | C88C86FF88BED46F9693669438711D2245A8D06DB5CC63E11D389F1B6AE6D5DC |
Serial: | 5915CD3A113B9B2AE7B497DDDFCDF8F5 |
Instruction |
---|
sub esp, 000002D4h |
push ebx |
push ebp |
push esi |
push edi |
push 00000020h |
xor ebp, ebp |
pop esi |
mov dword ptr [esp+18h], ebp |
mov dword ptr [esp+10h], 00408570h |
mov dword ptr [esp+14h], ebp |
call dword ptr [00408030h] |
push 00008001h |
call dword ptr [004080B4h] |
push ebp |
call dword ptr [004082B0h] |
push 00000008h |
mov dword ptr [00470678h], eax |
call 00007F4190B8C23Ch |
push ebp |
push 000002B4h |
mov dword ptr [00470590h], eax |
lea eax, dword ptr [esp+38h] |
push eax |
push ebp |
push 0040856Ch |
call dword ptr [00408180h] |
push 00408554h |
push 00468580h |
call 00007F4190B8C10Ah |
call dword ptr [004080B0h] |
push eax |
mov edi, 004C10A0h |
push edi |
call 00007F4190B8C0F8h |
push ebp |
call dword ptr [00408130h] |
cmp word ptr [004C10A0h], 0022h |
mov dword ptr [00470598h], eax |
mov eax, edi |
jne 00007F4190B89ADAh |
push 00000022h |
pop esi |
mov eax, 004C10A2h |
push esi |
push eax |
call 00007F4190B8BDCCh |
push eax |
call dword ptr [00408250h] |
mov esi, eax |
mov dword ptr [esp+1Ch], esi |
jmp 00007F4190B89B61h |
push 00000020h |
pop ebx |
cmp ax, bx |
jne 00007F4190B89AD9h |
inc esi |
inc esi |
cmp word ptr [esi], bx |
je 00007F4190B89ACBh |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x89f0 | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x242000 | 0x3188 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0xc75a0 | 0x1bc0 | .ndata |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x8000 | 0x2c0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x6240 | 0x6400 | False | 0.656640625 | data | 6.42173757604 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
.rdata | 0x8000 | 0x18ca | 0x1a00 | False | 0.424278846154 | data | 4.87836739949 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xa000 | 0x6667c | 0x200 | False | 0.193359375 | data | 1.35871626133 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
.ndata | 0x71000 | 0x1d1000 | 0x0 | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0x242000 | 0x3188 | 0x3200 | False | 0.384453125 | data | 4.27381392653 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
RT_ICON | 0x2421d8 | 0x25a8 | data | English | United States |
RT_DIALOG | 0x244780 | 0x200 | data | English | United States |
RT_DIALOG | 0x244980 | 0xf8 | data | English | United States |
RT_DIALOG | 0x244a78 | 0xee | data | English | United States |
RT_GROUP_ICON | 0x244b68 | 0x14 | data | English | United States |
RT_VERSION | 0x244b80 | 0x240 | data | ||
RT_MANIFEST | 0x244dc0 | 0x3c6 | XML 1.0 document, ASCII text, with very long lines, with no line terminators | English | United States |
DLL | Import |
---|---|
KERNEL32.dll | SetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, MulDiv, lstrlenA, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW |
USER32.dll | ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, FindWindowExW, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, IsWindow |
GDI32.dll | SetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject |
SHELL32.dll | SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation |
ADVAPI32.dll | RegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW |
COMCTL32.dll | ImageList_AddMasked, ImageList_Destroy, ImageList_Create |
ole32.dll | CoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance |
VERSION.dll | GetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW |
Description | Data |
---|---|
LegalCopyright | Copyright (c) 2011 |
FileVersion | 1.92 |
CompanyName | Bandoo Media Inc |
ProductName | iLivid |
ProductVersion | 1.92 |
FileDescription | iLivid Install |
Translation | 0x0000 0x04b0 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Network Behavior |
---|
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
May 19, 2021 08:11:23.437958002 CEST | 56590 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:23.487483978 CEST | 53 | 56590 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:11:23.667807102 CEST | 60501 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:23.724040985 CEST | 53775 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:23.728879929 CEST | 53 | 60501 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:11:23.785218954 CEST | 53 | 53775 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:11:24.349945068 CEST | 51837 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:24.402496099 CEST | 53 | 51837 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:11:25.281192064 CEST | 55411 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:25.331451893 CEST | 53 | 55411 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:11:37.441731930 CEST | 63668 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:37.491609097 CEST | 53 | 63668 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:11:38.297208071 CEST | 54640 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:38.349421978 CEST | 53 | 54640 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:11:38.985270023 CEST | 58739 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:39.035059929 CEST | 53 | 58739 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:11:39.197057009 CEST | 60338 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:39.257184982 CEST | 53 | 60338 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:11:39.360924959 CEST | 58717 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:39.402041912 CEST | 59762 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:39.412823915 CEST | 53 | 58717 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:11:39.462865114 CEST | 53 | 59762 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:11:39.600907087 CEST | 54329 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:39.661725998 CEST | 53 | 54329 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:11:39.819581985 CEST | 58052 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:39.881650925 CEST | 53 | 58052 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:11:39.912091970 CEST | 54008 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:39.972060919 CEST | 53 | 54008 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:11:40.021215916 CEST | 59451 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:40.080660105 CEST | 53 | 59451 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:11:40.169728041 CEST | 52914 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:40.218997955 CEST | 53 | 52914 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:11:40.233288050 CEST | 64569 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:40.296129942 CEST | 53 | 64569 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:11:40.445727110 CEST | 52816 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:40.503844976 CEST | 53 | 52816 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:11:41.206981897 CEST | 50781 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:41.268367052 CEST | 53 | 50781 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:11:42.084594965 CEST | 54230 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:42.135618925 CEST | 53 | 54230 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:11:42.955171108 CEST | 54911 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:43.004581928 CEST | 53 | 54911 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:11:43.913204908 CEST | 49958 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:43.983396053 CEST | 50860 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:43.992063999 CEST | 53 | 49958 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:11:44.043899059 CEST | 53 | 50860 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:11:44.844269037 CEST | 50452 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:44.894095898 CEST | 53 | 50452 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:11:46.671765089 CEST | 59730 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:46.721375942 CEST | 53 | 59730 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:11:48.900346041 CEST | 59310 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:48.950057030 CEST | 53 | 59310 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:11:49.754013062 CEST | 51919 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:49.803761959 CEST | 53 | 51919 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:11:50.591068983 CEST | 64296 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:50.640804052 CEST | 53 | 64296 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:11:51.506058931 CEST | 56680 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:51.557172060 CEST | 53 | 56680 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:11:52.584475040 CEST | 58820 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:52.645016909 CEST | 53 | 58820 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:11:53.431426048 CEST | 60983 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:53.481242895 CEST | 53 | 60983 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:11:54.368607998 CEST | 49247 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:54.420929909 CEST | 53 | 49247 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:11:55.489237070 CEST | 52286 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:11:55.541595936 CEST | 53 | 52286 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:12:09.974675894 CEST | 56064 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:12:10.041209936 CEST | 53 | 56064 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:12:18.919238091 CEST | 63744 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:12:18.978482962 CEST | 53 | 63744 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:12:48.194960117 CEST | 61457 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:12:48.253403902 CEST | 53 | 61457 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:12:57.742561102 CEST | 58367 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:12:57.803287029 CEST | 53 | 58367 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:13:17.220089912 CEST | 60599 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:13:17.274543047 CEST | 53 | 60599 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:13:17.821556091 CEST | 59571 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:13:17.871439934 CEST | 53 | 59571 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:13:18.452068090 CEST | 52689 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:13:18.511581898 CEST | 53 | 52689 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:13:18.974159956 CEST | 50290 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:13:19.002716064 CEST | 60427 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:13:19.023545027 CEST | 53 | 50290 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:13:19.075825930 CEST | 53 | 60427 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:13:19.568823099 CEST | 56209 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:13:19.627227068 CEST | 53 | 56209 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:13:20.357403994 CEST | 59582 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:13:20.407136917 CEST | 53 | 59582 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:13:20.986258030 CEST | 60949 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:13:21.044718027 CEST | 53 | 60949 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:13:22.027832031 CEST | 58542 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:13:22.088813066 CEST | 53 | 58542 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:13:23.095395088 CEST | 59179 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:13:23.195583105 CEST | 53 | 59179 | 8.8.8.8 | 192.168.2.7 |
May 19, 2021 08:13:23.889240026 CEST | 60927 | 53 | 192.168.2.7 | 8.8.8.8 |
May 19, 2021 08:13:23.973160982 CEST | 53 | 60927 | 8.8.8.8 | 192.168.2.7 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class |
---|---|---|---|---|---|---|---|
May 19, 2021 08:11:38.985270023 CEST | 192.168.2.7 | 8.8.8.8 | 0x37cd | Standard query (0) | A (IP address) | IN (0x0001) | |
May 19, 2021 08:11:39.197057009 CEST | 192.168.2.7 | 8.8.8.8 | 0x81be | Standard query (0) | A (IP address) | IN (0x0001) | |
May 19, 2021 08:11:39.402041912 CEST | 192.168.2.7 | 8.8.8.8 | 0x4757 | Standard query (0) | A (IP address) | IN (0x0001) | |
May 19, 2021 08:11:39.600907087 CEST | 192.168.2.7 | 8.8.8.8 | 0x4942 | Standard query (0) | A (IP address) | IN (0x0001) | |
May 19, 2021 08:11:39.819581985 CEST | 192.168.2.7 | 8.8.8.8 | 0xa330 | Standard query (0) | A (IP address) | IN (0x0001) | |
May 19, 2021 08:11:40.021215916 CEST | 192.168.2.7 | 8.8.8.8 | 0xabe5 | Standard query (0) | A (IP address) | IN (0x0001) | |
May 19, 2021 08:11:40.233288050 CEST | 192.168.2.7 | 8.8.8.8 | 0xefac | Standard query (0) | A (IP address) | IN (0x0001) | |
May 19, 2021 08:11:40.445727110 CEST | 192.168.2.7 | 8.8.8.8 | 0x2434 | Standard query (0) | A (IP address) | IN (0x0001) |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class |
---|---|---|---|---|---|---|---|---|---|
May 19, 2021 08:11:39.035059929 CEST | 8.8.8.8 | 192.168.2.7 | 0x37cd | Name error (3) | none | none | A (IP address) | IN (0x0001) | |
May 19, 2021 08:11:39.257184982 CEST | 8.8.8.8 | 192.168.2.7 | 0x81be | Name error (3) | none | none | A (IP address) | IN (0x0001) | |
May 19, 2021 08:11:39.462865114 CEST | 8.8.8.8 | 192.168.2.7 | 0x4757 | Name error (3) | none | none | A (IP address) | IN (0x0001) | |
May 19, 2021 08:11:39.661725998 CEST | 8.8.8.8 | 192.168.2.7 | 0x4942 | Name error (3) | none | none | A (IP address) | IN (0x0001) | |
May 19, 2021 08:11:39.881650925 CEST | 8.8.8.8 | 192.168.2.7 | 0xa330 | Name error (3) | none | none | A (IP address) | IN (0x0001) | |
May 19, 2021 08:11:40.080660105 CEST | 8.8.8.8 | 192.168.2.7 | 0xabe5 | Name error (3) | none | none | A (IP address) | IN (0x0001) | |
May 19, 2021 08:11:40.296129942 CEST | 8.8.8.8 | 192.168.2.7 | 0xefac | Name error (3) | none | none | A (IP address) | IN (0x0001) | |
May 19, 2021 08:11:40.503844976 CEST | 8.8.8.8 | 192.168.2.7 | 0x2434 | Name error (3) | none | none | A (IP address) | IN (0x0001) |
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
High Level Behavior Distribution |
---|
back
Click to dive into process behavior distribution
System Behavior |
---|
Start time: | 08:11:30 |
Start date: | 19/05/2021 |
Path: | C:\Users\user\Desktop\iLividSetupV1.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 823648 bytes |
MD5 hash: | 016B0F5E6B3221659C763A2CB6A238DA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
Network Activities
LPC Port Activities
Disassembly |
---|
Code Analysis |
---|