Edit tour
Windows
Analysis Report
ZmWSzgevgt.exe
Overview
General Information
Sample name: | ZmWSzgevgt.exerenamed because original name is a hash value |
Original sample name: | 4f2d5d155fe7497f9ab429cae34c5ebbdd711b0256b3bae83d9038cf1526c724.exe |
Analysis ID: | 1354609 |
MD5: | 2deaf2be4672bf6457e136d78a7a3940 |
SHA1: | f8460d05dbdb1c171818510c9685847d00468349 |
SHA256: | 4f2d5d155fe7497f9ab429cae34c5ebbdd711b0256b3bae83d9038cf1526c724 |
Tags: | exe |
Infos: | |
Detection
NetSupport RAT, LummaC Stealer
Score: | 64 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected LummaC Stealer
Binary is likely a compiled AutoIt script file
Contains functionality to detect sleep reduction / modifications
Creates an undocumented autostart registry key
Obfuscated command line found
Performs DNS queries to domains with low reputation
Query firmware table information (likely to detect VMs)
Uses known network protocols on non-standard ports
Yara detected Generic Downloader
Adds / modifies Windows certificates
Binary contains a suspicious time stamp
Checks for available system drives (often done to infect USB drives)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Connects to many different domains
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Enables security privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTML body contains low number of good links
HTML title does not match URL
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check if the current machine is a sandbox (GetTickCount - Sleep)
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Stores large binary data to the registry
Tries to load missing DLLs
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Uses reg.exe to modify the Windows registry
Uses taskkill to terminate processes
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Keylogger Generic
Yara detected NetSupport remote tool
Classification
- System is w10x64
- ZmWSzgevgt.exe (PID: 6184 cmdline:
C:\Users\u ser\Deskto p\ZmWSzgev gt.exe MD5: 2DEAF2BE4672BF6457E136D78A7A3940) - ZmWSzgevgt.tmp (PID: 5240 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-P5S F5.tmp\ZmW Szgevgt.tm p" /SL5="$ 20408,8325 12,832512, C:\Users\u ser\Deskto p\ZmWSzgev gt.exe" MD5: BE0E74DC6AC70C5B8CC74C42B6999A70) - setup.exe (PID: 5800 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\is-0270 L.tmp\setu p.exe MD5: 8657D8F7608F1E03726F5B0256869C66) - setup.tmp (PID: 1992 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-UKD SG.tmp\set up.tmp" /S L5="$1047E ,4289520,8 32512,C:\U sers\user\ AppData\Lo cal\Temp\i s-0270L.tm p\setup.ex e" MD5: C039C014580F43E5B8162552F3CAF067) - a0.exe (PID: 2724 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-53U S7.tmp\a0. exe" /VERY SILENT /PA SSWORD=NtI RVUpMK9ZD3 0Nf98220 - token mtn1 co3fo4gs5v wq -subid 2598 MD5: 5AFE9D5A2BCC39B1E0573A77EFBE82B7) - a0.tmp (PID: 3172 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-8LR UI.tmp\a0. tmp" /SL5= "$204E6,10 235147,832 512,C:\Use rs\user\Ap pData\Loca l\Temp\is- 53US7.tmp\ a0.exe" /V ERYSILENT /PASSWORD= NtIRVUpMK9 ZD30Nf9822 0 -token m tn1co3fo4g s5vwq -sub id 2598 MD5: AD96645518D5ABDD4F96B007E799F61E) - cmd.exe (PID: 1472 cmdline:
"cmd.exe" /c expand C:\Users\u ser\AppDat a\Local\Te mp\is-TMJS M.tmp\{app }\aglwjhm. cab -F:* % ProgramDat a% MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5640 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - expand.exe (PID: 5696 cmdline:
expand C:\ Users\user \AppData\L ocal\Temp\ is-TMJSM.t mp\{app}\a glwjhm.cab -F:* C:\P rogramData MD5: 544B0DBFF3F393BCE8BB9D815F532D51) - cmd.exe (PID: 6036 cmdline:
"cmd.exe" /c reg add "HKEY_CUR RENT_USER\ Environmen t" /v User InitMprLog onScript / t REG_EXPA ND_SZ /d " %ProgramDa ta%\regid. 1993-06.co m.microsof t\wmiprvse .exe" /f MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 4368 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - reg.exe (PID: 5020 cmdline:
reg add "H KEY_CURREN T_USER\Env ironment" /v UserIni tMprLogonS cript /t R EG_EXPAND_ SZ /d "C:\ ProgramDat a\regid.19 93-06.com. microsoft\ wmiprvse.e xe" /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C) - wmiprvse.exe (PID: 6024 cmdline:
C:\Program Data\regid .1993-06.c om.microso ft\wmiprvs e.exe MD5: 261D6E9D4571D1938CB54A2AE1B1821D) - cmd.exe (PID: 1964 cmdline:
"cmd.exe" /c start h ttps://axs boe-campai gn.com/pix el?pmhzmq= fhoohvpn6e 7i^&c=5306 757^&pl=0x 03^&pb=1^& px=2598 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5728 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - chrome.exe (PID: 5556 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// axsboe-cam paign.com/ pixel?pmhz mq=fhoohvp n6e7i&c=53 06757&pl=0 x03&pb=1&p x=2598 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 2972 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2132 --fi eld-trial- handle=194 4,i,729332 6498590966 015,157242 2170191744 7522,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - a1.exe (PID: 7588 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\is-53US 7.tmp\a1.e xe" /qn CA MPAIGN="25 98 MD5: FA24733F5A6A6F44D0E65D7D98B84AA6) - msiexec.exe (PID: 6192 cmdline:
C:\Windows \system32\ msiexec.ex e" /i "C:\ Users\user \AppData\R oaming\AW Manager\Wi ndows Mana ger 1.0.0\ install\97 FDF62\Wind ows Manage r - Postba ck Johan.m si" /qn CA MPAIGN=259 8 AI_SETUP EXEPATH=C: \Users\use r\AppData\ Local\Temp \is-53US7. tmp\a1.exe SETUPEXED IR=C:\User s\user\App Data\Local \Temp\is-5 3US7.tmp\ EXE_CMD_LI NE="/exeno updates /f orcecleanu p /wintime 170186937 4 /qn CAMP AIGN=""259 8"" " CAMP AIGN="2598 MD5: 9D09DC1EDA745A5F87553048E57620CF)
- msiexec.exe (PID: 7932 cmdline:
C:\Windows \system32\ msiexec.ex e /V MD5: E5DA170027542E25EDE42FC54C929077) - msiexec.exe (PID: 8052 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng 7B2098D E867FDA1FB AC9E94E8D3 11FE9 C MD5: 9D09DC1EDA745A5F87553048E57620CF) - msiexec.exe (PID: 6972 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng CB3F137 362C364F2A 010C44D44B 9B692 MD5: 9D09DC1EDA745A5F87553048E57620CF) - taskkill.exe (PID: 7756 cmdline:
"C:\Window s\SysWOW64 \taskkill. exe" /im A dvancedWin dowsManage r* /f MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) - conhost.exe (PID: 7780 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - msiexec.exe (PID: 7400 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng A0F7B99 CF6F596956 15DF13CC64 61763 E Gl obal\MSI00 00 MD5: 9D09DC1EDA745A5F87553048E57620CF) - msiexec.exe (PID: 7824 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng 9A41533 8A0E06E3AA 66F7530B5F E606F C MD5: 9D09DC1EDA745A5F87553048E57620CF) - msiexec.exe (PID: 8128 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng 50B63A9 4597415634 C568616DD5 51356 E Gl obal\MSI00 00 MD5: 9D09DC1EDA745A5F87553048E57620CF) - taskkill.exe (PID: 7560 cmdline:
"C:\Window s\SysWOW64 \taskkill. exe" /im A dvancedWin dowsManage r* /f MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) - conhost.exe (PID: 8160 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 4012 cmdline:
"C:\Window s\SysWOW64 \taskkill. exe" /im A dvancedWin dowsManage r* /f MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) - conhost.exe (PID: 7312 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 7360 cmdline:
"C:\Window s\SysWOW64 \taskkill. exe" /im A dvancedWin dowsManage r* /f MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) - conhost.exe (PID: 7504 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- Windows Updater.exe (PID: 5572 cmdline:
"C:\Progra m Files (x 86)\AW Man ager\Windo ws Manager \Windows U pdater.exe " /silenta ll -nofreq check -nog ui MD5: F95007206C6B2407FB69748EF7C93612) - Windows Updater.exe (PID: 6304 cmdline:
C:\Windows \TEMP\ce2d 31339cfff4 1b4b6db9e3 2e93218c\W indows Upd ater.exe" /install s ilentall " C:\Windows \TEMP\ce2d 31339cfff4 1b4b6db9e3 2e93218c\W indows Upd ater.ini MD5: F95007206C6B2407FB69748EF7C93612) - v113.exe (PID: 7476 cmdline:
"C:\Progra mData\AW M anager\Win dows Manag er\updates \v113\v113 .exe" MD5: 8CAD036C5CFED94D5319A060C488E38F) - msiexec.exe (PID: 2928 cmdline:
"C:\Window s\system32 \msiexec.e xe" /i "C: \AppData\R oaming\Adv ancedWindo wsManager\ Windows In staller 5. 0.3\instal l\7EB1504\ System Upd ater.msi" AI_SETUPEX EPATH="C:\ ProgramDat a\AW Manag er\Windows Manager\u pdates\v11 3\v113.exe " SETUPEXE DIR="C:\Pr ogramData\ AW Manager \Windows M anager\upd ates\v113\ " EXE_CMD_ LINE="/exe noupdates /forceclea nup /winti me 1701869 374 " MD5: 9D09DC1EDA745A5F87553048E57620CF)
- AdvancedWindowsManager.exe (PID: 5808 cmdline:
"C:\Progra m Files (x 86)\AW Man ager\Windo ws Manager \AdvancedW indowsMana ger.exe" - v 110 -t 8 080 MD5: 26F21ED76944ED83382851D9F2453B0E)
- AdvancedWindowsManager.exe (PID: 7908 cmdline:
"C:\Progra m Files (x 86)\AW Man ager\Windo ws Manager \AdvancedW indowsMana ger.exe" - v 111 -t 8 080 MD5: 26F21ED76944ED83382851D9F2453B0E) - conhost.exe (PID: 5908 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- AdvancedWindowsManager.exe (PID: 4052 cmdline:
"C:\Progra m Files (x 86)\AW Man ager\Windo ws Manager \AdvancedW indowsMana ger.exe" - v 110 -t 8 080 MD5: 26F21ED76944ED83382851D9F2453B0E) - conhost.exe (PID: 5588 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- AdvancedWindowsManager.exe (PID: 4372 cmdline:
"C:\Progra m Files (x 86)\AW Man ager\Windo ws Manager \AdvancedW indowsMana ger.exe" - v 112 -t 8 080 MD5: 26F21ED76944ED83382851D9F2453B0E) - conhost.exe (PID: 4796 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- AdvancedWindowsManager.exe (PID: 7592 cmdline:
"C:\Progra m Files (x 86)\AW Man ager\Windo ws Manager \AdvancedW indowsMana ger.exe" - v 111 -t 8 080 MD5: 26F21ED76944ED83382851D9F2453B0E) - conhost.exe (PID: 360 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- AdvancedWindowsManager.exe (PID: 3936 cmdline:
"C:\Progra m Files (x 86)\AW Man ager\Windo ws Manager \AdvancedW indowsMana ger.exe" - v 114 -t 8 080 MD5: 26F21ED76944ED83382851D9F2453B0E) - conhost.exe (PID: 1048 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- AdvancedWindowsManager.exe (PID: 4832 cmdline:
"C:\Progra m Files (x 86)\AW Man ager\Windo ws Manager \AdvancedW indowsMana ger.exe" - v 113 -t 8 080 MD5: 26F21ED76944ED83382851D9F2453B0E) - conhost.exe (PID: 5508 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- AdvancedWindowsManager.exe (PID: 5000 cmdline:
"C:\Progra m Files (x 86)\AW Man ager\Windo ws Manager \AdvancedW indowsMana ger.exe" - v 115 -t 8 080 MD5: 26F21ED76944ED83382851D9F2453B0E) - conhost.exe (PID: 4012 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- AdvancedWindowsManager.exe (PID: 6308 cmdline:
"C:\Progra m Files (x 86)\AW Man ager\Windo ws Manager \AdvancedW indowsMana ger.exe" - v 112 -t 8 080 MD5: 26F21ED76944ED83382851D9F2453B0E) - conhost.exe (PID: 7412 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- AdvancedWindowsManager.exe (PID: 3012 cmdline:
"C:\Progra m Files (x 86)\AW Man ager\Windo ws Manager \AdvancedW indowsMana ger.exe" - v 113 -t 8 080 MD5: 26F21ED76944ED83382851D9F2453B0E)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
Click to see the 3 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
Click to see the 6 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
Click to see the 5 entries |
⊘No Sigma rule has matched
Timestamp: | 192.168.2.577.105.136.350296812046045 12/06/23-14:36:21.023223 |
SID: | 2046045 |
Source Port: | 50296 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350339812046045 12/06/23-14:36:51.222959 |
SID: | 2046045 |
Source Port: | 50339 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.5104.21.83.14550240802048094 12/06/23-14:35:36.356295 |
SID: | 2048094 |
Source Port: | 50240 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350333812046045 12/06/23-14:36:47.245112 |
SID: | 2046045 |
Source Port: | 50333 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350342812046045 12/06/23-14:36:53.204282 |
SID: | 2046045 |
Source Port: | 50342 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.5104.21.83.14550196802855505 12/06/23-14:35:05.037520 |
SID: | 2855505 |
Source Port: | 50196 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350281812046045 12/06/23-14:36:10.745594 |
SID: | 2046045 |
Source Port: | 50281 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350290812046045 12/06/23-14:36:17.057630 |
SID: | 2046045 |
Source Port: | 50290 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350278812046045 12/06/23-14:36:08.769868 |
SID: | 2046045 |
Source Port: | 50278 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350253812046045 12/06/23-14:35:52.149838 |
SID: | 2046045 |
Source Port: | 50253 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350351812046045 12/06/23-14:36:59.140117 |
SID: | 2046045 |
Source Port: | 50351 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350367812046045 12/06/23-14:37:10.788474 |
SID: | 2046045 |
Source Port: | 50367 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350287812046045 12/06/23-14:36:15.015230 |
SID: | 2046045 |
Source Port: | 50287 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350324812046045 12/06/23-14:36:39.669230 |
SID: | 2046045 |
Source Port: | 50324 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350315812046045 12/06/23-14:36:33.722404 |
SID: | 2046045 |
Source Port: | 50315 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350306812046045 12/06/23-14:36:27.603943 |
SID: | 2046045 |
Source Port: | 50306 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350280812046045 12/06/23-14:36:10.078872 |
SID: | 2046045 |
Source Port: | 50280 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350269812046045 12/06/23-14:36:02.831888 |
SID: | 2046045 |
Source Port: | 50269 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350323812046045 12/06/23-14:36:38.995481 |
SID: | 2046045 |
Source Port: | 50323 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350262812046045 12/06/23-14:35:58.204295 |
SID: | 2046045 |
Source Port: | 50262 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350297812046045 12/06/23-14:36:21.680969 |
SID: | 2046045 |
Source Port: | 50297 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350300812046045 12/06/23-14:36:23.660225 |
SID: | 2046045 |
Source Port: | 50300 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350358812046045 12/06/23-14:37:04.890944 |
SID: | 2046045 |
Source Port: | 50358 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350357812046045 12/06/23-14:37:03.144834 |
SID: | 2046045 |
Source Port: | 50357 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.5157.230.96.3250126802834928 12/06/23-14:33:41.532380 |
SID: | 2834928 |
Source Port: | 50126 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350316812046045 12/06/23-14:36:34.370818 |
SID: | 2046045 |
Source Port: | 50316 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350370812046045 12/06/23-14:37:12.776192 |
SID: | 2046045 |
Source Port: | 50370 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350305812046045 12/06/23-14:36:26.947206 |
SID: | 2046045 |
Source Port: | 50305 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350263812046045 12/06/23-14:35:58.892261 |
SID: | 2046045 |
Source Port: | 50263 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350334812046045 12/06/23-14:36:47.909549 |
SID: | 2046045 |
Source Port: | 50334 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350268812046045 12/06/23-14:36:02.185549 |
SID: | 2046045 |
Source Port: | 50268 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350352812046045 12/06/23-14:36:59.810575 |
SID: | 2046045 |
Source Port: | 50352 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350245812046045 12/06/23-14:35:46.787174 |
SID: | 2046045 |
Source Port: | 50245 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350286812046045 12/06/23-14:36:14.346391 |
SID: | 2046045 |
Source Port: | 50286 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350264812046045 12/06/23-14:35:59.558216 |
SID: | 2046045 |
Source Port: | 50264 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350368812046045 12/06/23-14:37:11.445584 |
SID: | 2046045 |
Source Port: | 50368 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350270812046045 12/06/23-14:36:03.477604 |
SID: | 2046045 |
Source Port: | 50270 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350261812046045 12/06/23-14:35:57.535196 |
SID: | 2046045 |
Source Port: | 50261 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350301812046045 12/06/23-14:36:24.319593 |
SID: | 2046045 |
Source Port: | 50301 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350279812046045 12/06/23-14:36:09.427188 |
SID: | 2046045 |
Source Port: | 50279 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350350812046045 12/06/23-14:36:58.477999 |
SID: | 2046045 |
Source Port: | 50350 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.5159.223.29.4049730802839343 12/06/23-14:33:21.497166 |
SID: | 2839343 |
Source Port: | 49730 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Potentially Bad Traffic |
Timestamp: | 192.168.2.577.105.136.350288812046045 12/06/23-14:36:15.727049 |
SID: | 2046045 |
Source Port: | 50288 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350338812046045 12/06/23-14:36:50.569356 |
SID: | 2046045 |
Source Port: | 50338 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350344812046045 12/06/23-14:36:54.501584 |
SID: | 2046045 |
Source Port: | 50344 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350285812046045 12/06/23-14:36:13.685357 |
SID: | 2046045 |
Source Port: | 50285 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350291812046045 12/06/23-14:36:17.724996 |
SID: | 2046045 |
Source Port: | 50291 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350255812046045 12/06/23-14:35:53.486217 |
SID: | 2046045 |
Source Port: | 50255 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350258812046045 12/06/23-14:35:55.450063 |
SID: | 2046045 |
Source Port: | 50258 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350353812046045 12/06/23-14:37:00.456748 |
SID: | 2046045 |
Source Port: | 50353 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350347812046045 12/06/23-14:36:56.459765 |
SID: | 2046045 |
Source Port: | 50347 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350249812046045 12/06/23-14:35:49.517021 |
SID: | 2046045 |
Source Port: | 50249 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.595.142.47.114971812032827745 12/06/23-14:33:18.908166 |
SID: | 2827745 |
Source Port: | 49718 |
Destination Port: | 1203 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350314812046045 12/06/23-14:36:33.067223 |
SID: | 2046045 |
Source Port: | 50314 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350349812046045 12/06/23-14:36:57.813215 |
SID: | 2046045 |
Source Port: | 50349 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.5104.21.83.14550196802048094 12/06/23-14:35:05.671865 |
SID: | 2048094 |
Source Port: | 50196 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350283812046045 12/06/23-14:36:12.083206 |
SID: | 2046045 |
Source Port: | 50283 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.5104.21.83.14550196802048093 12/06/23-14:35:05.393985 |
SID: | 2048093 |
Source Port: | 50196 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350320812046045 12/06/23-14:36:37.012244 |
SID: | 2046045 |
Source Port: | 50320 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350355812046045 12/06/23-14:37:01.752652 |
SID: | 2046045 |
Source Port: | 50355 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350308812046045 12/06/23-14:36:28.952581 |
SID: | 2046045 |
Source Port: | 50308 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350266812046045 12/06/23-14:36:00.860284 |
SID: | 2046045 |
Source Port: | 50266 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350294812046045 12/06/23-14:36:19.720749 |
SID: | 2046045 |
Source Port: | 50294 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350272812046045 12/06/23-14:36:04.780598 |
SID: | 2046045 |
Source Port: | 50272 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350325812046045 12/06/23-14:36:40.326068 |
SID: | 2046045 |
Source Port: | 50325 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350361812046045 12/06/23-14:37:06.857535 |
SID: | 2046045 |
Source Port: | 50361 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350331812046045 12/06/23-14:36:44.280145 |
SID: | 2046045 |
Source Port: | 50331 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350366812046045 12/06/23-14:37:10.126303 |
SID: | 2046045 |
Source Port: | 50366 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350277812046045 12/06/23-14:36:08.103794 |
SID: | 2046045 |
Source Port: | 50277 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350319812046045 12/06/23-14:36:36.357919 |
SID: | 2046045 |
Source Port: | 50319 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350299812046045 12/06/23-14:36:22.998701 |
SID: | 2046045 |
Source Port: | 50299 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350293812046045 12/06/23-14:36:19.055677 |
SID: | 2046045 |
Source Port: | 50293 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350336812046045 12/06/23-14:36:49.242148 |
SID: | 2046045 |
Source Port: | 50336 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350327812046045 12/06/23-14:36:41.646083 |
SID: | 2046045 |
Source Port: | 50327 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350284812046045 12/06/23-14:36:12.740748 |
SID: | 2046045 |
Source Port: | 50284 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350247812046045 12/06/23-14:35:48.186162 |
SID: | 2046045 |
Source Port: | 50247 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350275812046045 12/06/23-14:36:06.769942 |
SID: | 2046045 |
Source Port: | 50275 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350345812046045 12/06/23-14:36:55.159061 |
SID: | 2046045 |
Source Port: | 50345 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.537.1.198.25150187802839343 12/06/23-14:35:39.174213 |
SID: | 2839343 |
Source Port: | 50187 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Potentially Bad Traffic |
Timestamp: | 192.168.2.577.105.136.350309812046045 12/06/23-14:36:29.696042 |
SID: | 2046045 |
Source Port: | 50309 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350250812046045 12/06/23-14:35:50.167908 |
SID: | 2046045 |
Source Port: | 50250 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350312812046045 12/06/23-14:36:31.744103 |
SID: | 2046045 |
Source Port: | 50312 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350303812046045 12/06/23-14:36:25.632684 |
SID: | 2046045 |
Source Port: | 50303 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350318812046045 12/06/23-14:36:35.709561 |
SID: | 2046045 |
Source Port: | 50318 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350321812046045 12/06/23-14:36:37.678957 |
SID: | 2046045 |
Source Port: | 50321 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350330812046045 12/06/23-14:36:43.615057 |
SID: | 2046045 |
Source Port: | 50330 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350251812046045 12/06/23-14:35:50.825474 |
SID: | 2046045 |
Source Port: | 50251 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350311812046045 12/06/23-14:36:31.045970 |
SID: | 2046045 |
Source Port: | 50311 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350257812046045 12/06/23-14:35:54.795722 |
SID: | 2046045 |
Source Port: | 50257 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350340812046045 12/06/23-14:36:51.889892 |
SID: | 2046045 |
Source Port: | 50340 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350274812046045 12/06/23-14:36:06.102370 |
SID: | 2046045 |
Source Port: | 50274 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350346812046045 12/06/23-14:36:55.814799 |
SID: | 2046045 |
Source Port: | 50346 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350363812046045 12/06/23-14:37:08.174720 |
SID: | 2046045 |
Source Port: | 50363 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350298812046045 12/06/23-14:36:22.345639 |
SID: | 2046045 |
Source Port: | 50298 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350364812046045 12/06/23-14:37:08.818539 |
SID: | 2046045 |
Source Port: | 50364 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350317812046045 12/06/23-14:36:35.040401 |
SID: | 2046045 |
Source Port: | 50317 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350322812046045 12/06/23-14:36:38.345066 |
SID: | 2046045 |
Source Port: | 50322 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350328812046045 12/06/23-14:36:42.306155 |
SID: | 2046045 |
Source Port: | 50328 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350256812046045 12/06/23-14:35:54.137806 |
SID: | 2046045 |
Source Port: | 50256 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.5104.21.52.22349705802047660 12/06/23-14:33:00.564607 |
SID: | 2047660 |
Source Port: | 49705 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350369812046045 12/06/23-14:37:12.112948 |
SID: | 2046045 |
Source Port: | 50369 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350292812046045 12/06/23-14:36:18.389256 |
SID: | 2046045 |
Source Port: | 50292 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350362812046045 12/06/23-14:37:07.522278 |
SID: | 2046045 |
Source Port: | 50362 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350365812046045 12/06/23-14:37:09.468071 |
SID: | 2046045 |
Source Port: | 50365 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350267812046045 12/06/23-14:36:01.508627 |
SID: | 2046045 |
Source Port: | 50267 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350359812046045 12/06/23-14:37:05.563977 |
SID: | 2046045 |
Source Port: | 50359 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350307812046045 12/06/23-14:36:28.273610 |
SID: | 2046045 |
Source Port: | 50307 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350276812046045 12/06/23-14:36:07.453180 |
SID: | 2046045 |
Source Port: | 50276 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350310812046045 12/06/23-14:36:30.384232 |
SID: | 2046045 |
Source Port: | 50310 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350313812046045 12/06/23-14:36:32.405793 |
SID: | 2046045 |
Source Port: | 50313 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350252812046045 12/06/23-14:35:51.486831 |
SID: | 2046045 |
Source Port: | 50252 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350341812046045 12/06/23-14:36:52.546584 |
SID: | 2046045 |
Source Port: | 50341 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350304812046045 12/06/23-14:36:26.286831 |
SID: | 2046045 |
Source Port: | 50304 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350335812046045 12/06/23-14:36:48.579507 |
SID: | 2046045 |
Source Port: | 50335 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350246812046045 12/06/23-14:35:47.521454 |
SID: | 2046045 |
Source Port: | 50246 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350329812046045 12/06/23-14:36:42.957751 |
SID: | 2046045 |
Source Port: | 50329 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350282812046045 12/06/23-14:36:11.427578 |
SID: | 2046045 |
Source Port: | 50282 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350356812046045 12/06/23-14:37:02.409479 |
SID: | 2046045 |
Source Port: | 50356 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350273812046045 12/06/23-14:36:05.431652 |
SID: | 2046045 |
Source Port: | 50273 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350254812046045 12/06/23-14:35:52.820317 |
SID: | 2046045 |
Source Port: | 50254 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350248812046045 12/06/23-14:35:48.865133 |
SID: | 2046045 |
Source Port: | 50248 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350289812046045 12/06/23-14:36:16.396787 |
SID: | 2046045 |
Source Port: | 50289 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350326812046045 12/06/23-14:36:40.988661 |
SID: | 2046045 |
Source Port: | 50326 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350332812046045 12/06/23-14:36:44.925833 |
SID: | 2046045 |
Source Port: | 50332 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350271812046045 12/06/23-14:36:04.130647 |
SID: | 2046045 |
Source Port: | 50271 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350360812046045 12/06/23-14:37:06.208022 |
SID: | 2046045 |
Source Port: | 50360 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350354812046045 12/06/23-14:37:01.103024 |
SID: | 2046045 |
Source Port: | 50354 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.537.1.198.25150133802839343 12/06/23-14:33:45.067270 |
SID: | 2839343 |
Source Port: | 50133 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Potentially Bad Traffic |
Timestamp: | 192.168.2.577.105.136.350265812046045 12/06/23-14:36:00.212175 |
SID: | 2046045 |
Source Port: | 50265 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350259812046045 12/06/23-14:35:56.113850 |
SID: | 2046045 |
Source Port: | 50259 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350348812046045 12/06/23-14:36:57.105195 |
SID: | 2046045 |
Source Port: | 50348 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350337812046045 12/06/23-14:36:49.902555 |
SID: | 2046045 |
Source Port: | 50337 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350295812046045 12/06/23-14:36:20.371059 |
SID: | 2046045 |
Source Port: | 50295 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350343812046045 12/06/23-14:36:53.852752 |
SID: | 2046045 |
Source Port: | 50343 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350260812046045 12/06/23-14:35:56.768169 |
SID: | 2046045 |
Source Port: | 50260 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350302812046045 12/06/23-14:36:24.976708 |
SID: | 2046045 |
Source Port: | 50302 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Avira: |
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | ReversingLabs: |
Source: | Code function: | 31_2_004F2740 | |
Source: | Code function: | 31_2_004F2600 | |
Source: | Code function: | 31_2_004F2B40 | |
Source: | Code function: | 31_2_004F2C30 | |
Source: | Code function: | 31_2_004F2C90 | |
Source: | Code function: | 31_2_004F2CB0 | |
Source: | Code function: | 31_2_004F2D20 | |
Source: | Code function: | 31_2_004F2ED0 | |
Source: | Code function: | 31_2_004FAED0 | |
Source: | Code function: | 31_2_004FB1A0 | |
Source: | Code function: | 31_2_004FB520 | |
Source: | Code function: | 31_2_004FB6A0 |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Source: | Window detected: |