File name:

02600004

Full analysis: https://app.any.run/tasks/1a59f975-ca66-4487-bdb7-cd5654dffab4
Verdict: Malicious activity
Threats:

Qbot is a banking Trojan — a malware designed to collect banking information from victims. Qbot targets organizations mostly in the US. It is equipped with various sophisticated evasion and info-stealing functions and worm-like functionality, and a strong persistence mechanism.

Analysis date: August 09, 2021, 23:56:38
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
backdoor
qbot
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
MD5:

1408275C2E2C8FE5E83227BA371AC6B3

SHA1:

DAC3D479CE4AF6D2FFD5314191E768543ACFE32D

SHA256:

CC185105946C202D9FD0EF18423B078CD8E064B1E2A87E93ED1B3D4F2CBDB65D

SSDEEP:

6144:1mkhfOCMFhvKnJP1flVS3Di3DMFOJJJJJJJJ8JJJJJJJJJJJJJJJJJJJJJJJJJJY:in+lQDiwFPZg

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • 02600004.exe (PID: 2612)
    • Runs PING.EXE for delay simulation

      • cmd.exe (PID: 2484)
    • Runs injected code in another process

      • 02600004.exe (PID: 2612)
      • ebgqylu.exe (PID: 2368)
    • Application was injected by another process

      • Explorer.EXE (PID: 1896)
      • Dwm.exe (PID: 600)
      • taskeng.exe (PID: 776)
      • conhost.exe (PID: 2500)
      • SearchProtocolHost.exe (PID: 908)
    • Changes internet zones settings

      • ebgqylu.exe (PID: 2368)
    • Loads the Task Scheduler COM API

      • mmc.exe (PID: 2872)
    • QBOT was detected

      • iexplore.exe (PID: 1328)
    • Connects to CnC server

      • iexplore.exe (PID: 1328)
  • SUSPICIOUS

    • Checks supported languages

      • 02600004.exe (PID: 2612)
      • ebgqylu.exe (PID: 2368)
      • conhost.exe (PID: 2500)
      • cmd.exe (PID: 2484)
    • Reads the computer name

      • 02600004.exe (PID: 2612)
      • ebgqylu.exe (PID: 2368)
      • cmd.exe (PID: 2484)
      • conhost.exe (PID: 2500)
    • Creates files in the user directory

      • 02600004.exe (PID: 2612)
    • Reads Windows Product ID

      • 02600004.exe (PID: 2612)
      • ebgqylu.exe (PID: 2368)
    • Drops a file that was compiled in debug mode

      • 02600004.exe (PID: 2612)
    • Executable content was dropped or overwritten

      • 02600004.exe (PID: 2612)
    • Starts CMD.EXE for commands execution

      • Explorer.EXE (PID: 1896)
    • Starts CMD.EXE for self-deleting

      • Explorer.EXE (PID: 1896)
    • Starts Internet Explorer

      • Explorer.EXE (PID: 1896)
    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 3612)
  • INFO

    • Manual execution by user

      • cmd.exe (PID: 2484)
      • ebgqylu.exe (PID: 2368)
      • iexplore.exe (PID: 1328)
      • mmc.exe (PID: 2872)
      • mmc.exe (PID: 2132)
    • Checks supported languages

      • PING.EXE (PID: 2792)
      • mmc.exe (PID: 2872)
      • iexplore.exe (PID: 1328)
      • iexplore.exe (PID: 3612)
      • iexplore.exe (PID: 2624)
      • SearchProtocolHost.exe (PID: 908)
    • Reads the computer name

      • PING.EXE (PID: 2792)
      • mmc.exe (PID: 2872)
      • iexplore.exe (PID: 1328)
      • iexplore.exe (PID: 3612)
      • iexplore.exe (PID: 2624)
      • SearchProtocolHost.exe (PID: 908)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3612)
      • iexplore.exe (PID: 1328)
    • Changes settings of System certificates

      • iexplore.exe (PID: 3612)
      • iexplore.exe (PID: 1328)
    • Application launched itself

      • iexplore.exe (PID: 1328)
      • iexplore.exe (PID: 3612)
    • Changes internet zones settings

      • iexplore.exe (PID: 1328)
    • Dropped object may contain Bitcoin addresses

      • iexplore.exe (PID: 1328)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 3612)
      • iexplore.exe (PID: 1328)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 3612)
      • iexplore.exe (PID: 1328)
    • Creates files in the user directory

      • iexplore.exe (PID: 3612)
      • iexplore.exe (PID: 1328)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3612)
    • Searches for installed software

      • iexplore.exe (PID: 1328)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (43.5)
.exe | Win32 Executable (generic) (29.8)
.exe | Generic Win/DOS Executable (13.2)
.exe | DOS Executable Generic (13.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2014:11:21 21:03:38+01:00
PEType: PE32
LinkerVersion: 6
CodeSize: 24576
InitializedDataSize: 335872
UninitializedDataSize: 0
EntryPoint: 0x6000
OSVersion: 4
ImageVersion: 0
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 2.0.0.0
ProductVersionNumber: 2.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Windows NT
ObjectFileType: Executable application
FileSubtype: 0
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: Stencyl, LLC
FileDescription: Stencyl 2.0
FileVersion: 2
InternalName: Stencyl
LegalCopyright: Copyright, Stencyl, LLC
OriginalFileName: Stencyl.exe
ProductName: Stencyl
ProductVersion: 2

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 21-Nov-2014 20:03:38
Detected languages:
  • English - United States
  • Process Default Language
Debug artifacts:
  • import1.pdb
CompanyName: Stencyl, LLC
FileDescription: Stencyl 2.0
FileVersion: 2.0
InternalName: Stencyl
LegalCopyright: Copyright, Stencyl, LLC
OriginalFilename: Stencyl.exe
ProductName: Stencyl
ProductVersion: 2.0

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000C8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 21-Nov-2014 20:03:38
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_DEBUG_STRIPPED
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00005532
0x00006000
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
4.94189
.rdata
0x00007000
0x00031A73
0x00032000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
7.19099
.data
0x00039000
0x0000033C
0x00001000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
1.61026
.reloc
0x0003A000
0x00000407
0x00001000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.rsrc
0x0003B000
0x0001D27C
0x0001E000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.19472

Resources

Title
Entropy
Size
Codepage
Language
Type
1
3.2335
672
UNKNOWN
Process Default Language
RT_VERSION
2
4.58513
67624
UNKNOWN
Process Default Language
RT_ICON
3
4.773
16936
UNKNOWN
Process Default Language
RT_ICON
4
4.47585
9640
UNKNOWN
Process Default Language
RT_ICON
5
4.61766
4264
UNKNOWN
Process Default Language
RT_ICON
6
4.85921
2440
UNKNOWN
Process Default Language
RT_ICON
7
5.02095
2064
UNKNOWN
Process Default Language
RT_ICON
8
5.03074
1128
UNKNOWN
Process Default Language
RT_ICON
10
1.79248
6
UNKNOWN
Process Default Language
RT_RCDATA
14
2.80735
7
UNKNOWN
Process Default Language
RT_RCDATA

Imports

KERNEL32.dll
SHLWAPI.dll
USER32.dll (delay-loaded)
WINMM.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
48
Monitored processes
14
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start inject inject inject inject inject 02600004.exe ebgqylu.exe no specs cmd.exe no specs ping.exe no specs taskeng.exe dwm.exe conhost.exe mmc.exe no specs mmc.exe explorer.exe #QBOT iexplore.exe iexplore.exe iexplore.exe no specs searchprotocolhost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2612"C:\Users\admin\AppData\Local\Temp\02600004.exe" C:\Users\admin\AppData\Local\Temp\02600004.exe
Explorer.EXE
User:
admin
Company:
Stencyl, LLC
Integrity Level:
MEDIUM
Description:
Stencyl 2.0
Exit code:
0
Version:
2.0
2368"C:\Users\admin\AppData\Roaming\Microsoft\Ebgqylu\ebgqylu.exe"C:\Users\admin\AppData\Roaming\Microsoft\Ebgqylu\ebgqylu.exeExplorer.EXE
User:
admin
Company:
Stencyl, LLC
Integrity Level:
MEDIUM
Description:
Stencyl 2.0
Version:
2.0
2484cmd /c ping -n 10 localhost && del "C:\Users\admin\AppData\Local\Temp\02600004.exe"C:\Windows\system32\cmd.exeExplorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2792ping -n 10 localhost C:\Windows\system32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
776taskeng.exe {22B6E91C-5B0B-4FB0-99A8-D59901096E38}C:\Windows\system32\taskeng.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Engine
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
600"C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Desktop Window Manager
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2500\??\C:\Windows\system32\conhost.exe "92857863-1693453631032617958-101514155-237740995-521017290-2077688268-2067374097"\??\C:\Windows\system32\conhost.exe
csrss.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2132"C:\Windows\system32\mmc.exe" "C:\Windows\system32\taskschd.msc" /sC:\Windows\system32\mmc.exeExplorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Management Console
Exit code:
3221226540
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2872"C:\Windows\system32\mmc.exe" "C:\Windows\system32\taskschd.msc" /sC:\Windows\system32\mmc.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Management Console
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1896C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
29 118
Read events
28 909
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
21
Text files
162
Unknown types
14

Dropped files

PID
Process
Filename
Type
1328iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Ebgqylu\ebgqylu32.dllbinary
MD5:449D755623827588A9A2F8B898B23ECE
SHA256:991ACC5F42A097DB5A7D864F230597C9076F6AF7C02F9BBB562BFDE4A20F1232
261202600004.exeC:\Users\admin\AppData\Roaming\Microsoft\Ebgqylu\ebgqyl.dllbinary
MD5:F156BE0505C21A0DD0C55ED466B261F9
SHA256:6DF95DE0301890834ECD58E4D4523320B8BCAA8C0D01DA06A44A1141ACF277F9
261202600004.exeC:\Users\admin\AppData\Roaming\Microsoft\Ebgqylu\ebgqylu.exeexecutable
MD5:1408275C2E2C8FE5E83227BA371AC6B3
SHA256:CC185105946C202D9FD0EF18423B078CD8E064B1E2A87E93ED1B3D4F2CBDB65D
3612iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\de-71d089[1].csstext
MD5:E86ABE78D0A0FEA5962432DD802E6F6A
SHA256:2DD894A94053B2B9B607C420F68387F960822B374C47D2250078A0772F72C19C
3612iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\pl-pl[1].htmhtml
MD5:4A73DDEE1635D354E0E786B97601B9F2
SHA256:27E51056AA3F75BA5D917F603E16C8B4217FECE01B8D7719940EFDC19B575759
3612iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63binary
MD5:FEAFBE7312EFEE12BBFC8098A52D9CB8
SHA256:87AD745659F9E7F22C212C7BA8783E0B473CC9D29F03D79159F9C38B58BAB79F
3612iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\youtube[1].pngimage
MD5:B9A1E843699FA17513F807BC78F774FB
SHA256:A7A52942C5CCB21D55B9FDBB5BA8261544C8AA5E2AA0D71B4E20126728E29EF1
3612iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63der
MD5:DBD4631E9AC8B000AF8DE27C1C4C7F91
SHA256:7F06B412E32DCB8944F46C37878840AA6858F68D54562A0C026D7FB54AD47731
3612iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\social[1].csstext
MD5:B42B9C7E731408205B611FBB532F511F
SHA256:287E4C54269937C93EF680E0DCBAE4B5E3FF630A12698ACC7D2EB527B1598B79
1328iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\imagestore\f7ruq93\imagestore.datbinary
MD5:8AE95F0B2B99C5FF6B9B051181249D3C
SHA256:162C3B9DD2A35CCBB99CB4E267E7BD99913E77EFA0ED9182B3F085FAC3440AB2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
108
TCP/UDP connections
162
DNS requests
175
Threats
116

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3612
iexplore.exe
GET
302
104.79.89.142:80
http://www.microsoft.com/
US
whitelisted
3612
iexplore.exe
GET
200
67.26.137.254:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?faa139dd25605479
US
compressed
4.70 Kb
whitelisted
3612
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
3612
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA9bw6F2y3ieICDHiTyBZ7Q%3D
US
der
1.47 Kb
whitelisted
3612
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEALnkXH7gCHpP%2BLZg4NMUMA%3D
US
der
471 b
whitelisted
3612
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAtb9ltrp%2FvQiykNkEU33uA%3D
US
der
471 b
whitelisted
3612
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbY2QTVWENG9oovp1QifsQ%3D
US
der
471 b
whitelisted
3612
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbY2QTVWENG9oovp1QifsQ%3D
US
der
471 b
whitelisted
1328
iexplore.exe
GET
301
172.217.18.110:80
http://google.com/
US
html
219 b
whitelisted
3612
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2BnRyLFPYjID1ie%2Bx%2BdSjo%3D
US
der
1.47 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3612
iexplore.exe
104.79.89.142:80
www.microsoft.com
Time Warner Cable Internet LLC
US
malicious
3612
iexplore.exe
104.79.89.142:443
www.microsoft.com
Time Warner Cable Internet LLC
US
malicious
3612
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3612
iexplore.exe
67.26.137.254:80
ctldl.windowsupdate.com
Level 3 Communications, Inc.
US
malicious
3612
iexplore.exe
13.107.246.45:443
mem.gfx.ms
Microsoft Corporation
US
malicious
3612
iexplore.exe
23.6.112.130:443
img-prod-cms-rt-microsoft-com.akamaized.net
Akamai International B.V.
NL
unknown
3612
iexplore.exe
13.107.213.45:443
mem.gfx.ms
Microsoft Corporation
US
suspicious
3612
iexplore.exe
40.77.226.250:443
web.vortex.data.microsoft.com
Microsoft Corporation
IE
whitelisted
3612
iexplore.exe
23.47.209.178:443
c.s-microsoft.com
NTT DOCOMO, INC.
US
unknown
3612
iexplore.exe
20.190.160.129:443
login.live.com
Microsoft Corporation
US
suspicious

DNS requests

Domain
IP
Reputation
www.microsoft.com
  • 104.79.89.142
whitelisted
ctldl.windowsupdate.com
  • 67.26.137.254
  • 8.253.204.249
  • 67.27.157.126
  • 8.241.122.126
  • 8.253.95.121
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
assets.onestore.ms
  • 173.223.112.240
whitelisted
web.vortex.data.microsoft.com
  • 40.77.226.250
whitelisted
mem.gfx.ms
  • 13.107.213.45
  • 13.107.246.45
whitelisted
img-prod-cms-rt-microsoft-com.akamaized.net
  • 23.6.112.130
  • 23.6.112.153
whitelisted
wcpstatic.microsoft.com
  • 13.107.246.45
  • 13.107.213.45
whitelisted
microsoftwindows.112.2o7.net
  • 13.36.218.177
  • 15.188.95.229
  • 15.236.176.210
whitelisted
c.s-microsoft.com
  • 23.47.209.178
whitelisted

Threats

PID
Process
Class
Message
1328
iexplore.exe
Generic Protocol Command Decode
SURICATA Applayer Detect protocol only one direction
Potentially Bad Traffic
ET INFO Observed DNS Query to .biz TLD
Potentially Bad Traffic
ET INFO Observed DNS Query to .biz TLD
Potentially Bad Traffic
ET INFO Observed DNS Query to .biz TLD
Potentially Bad Traffic
ET INFO Observed DNS Query to .biz TLD
Potentially Bad Traffic
ET INFO Observed DNS Query to .biz TLD
Potentially Bad Traffic
ET INFO Observed DNS Query to .biz TLD
Potentially Bad Traffic
ET INFO Observed DNS Query to .biz TLD
Potentially Bad Traffic
ET INFO Observed DNS Query to .biz TLD
Potentially Bad Traffic
ET INFO Observed DNS Query to .biz TLD
90 ETPRO signatures available at the full report
Process
Message
mmc.exe
Constructor: Microsoft.TaskScheduler.SnapIn.TaskSchedulerSnapIn
mmc.exe
OnInitialize: Microsoft.TaskScheduler.SnapIn.TaskSchedulerSnapIn
mmc.exe
AddIcons: Microsoft.TaskScheduler.SnapIn.TaskSchedulerSnapIn
mmc.exe
ProcessCommandLineArguments: Microsoft.TaskScheduler.SnapIn.TaskSchedulerSnapIn