Edit tour
Windows
Analysis Report
ZmWSzgevgt.exe
Overview
General Information
Sample name: | ZmWSzgevgt.exerenamed because original name is a hash value |
Original sample name: | 4f2d5d155fe7497f9ab429cae34c5ebbdd711b0256b3bae83d9038cf1526c724.exe |
Analysis ID: | 1354609 |
MD5: | 2deaf2be4672bf6457e136d78a7a3940 |
SHA1: | f8460d05dbdb1c171818510c9685847d00468349 |
SHA256: | 4f2d5d155fe7497f9ab429cae34c5ebbdd711b0256b3bae83d9038cf1526c724 |
Tags: | exe |
Infos: | |
Detection
NetSupport RAT, LummaC Stealer
Score: | 92 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected LummaC Stealer
Binary is likely a compiled AutoIt script file
Connects to many ports of the same IP (likely port scanning)
Contains functionality to detect sleep reduction / modifications
Creates an undocumented autostart registry key
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Obfuscated command line found
Performs DNS queries to domains with low reputation
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Uses known network protocols on non-standard ports
Yara detected Generic Downloader
Adds / modifies Windows certificates
Binary contains a suspicious time stamp
Checks for available system drives (often done to infect USB drives)
Checks for debuggers (devices)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Connects to many different domains
Contains capabilities to detect virtual machines
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Enables security privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTML body contains low number of good links
HTML title does not match URL
HTTP GET or POST without a user agent
Installs a raw input device (often for capturing keystrokes)
May check if the current machine is a sandbox (GetTickCount - Sleep)
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Stores files to the Windows start menu directory
Stores large binary data to the registry
Tries to load missing DLLs
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Uses reg.exe to modify the Windows registry
Uses taskkill to terminate processes
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer
Yara detected Keylogger Generic
Yara detected NetSupport remote tool
Classification
- System is w10x64
- ZmWSzgevgt.exe (PID: 3436 cmdline:
C:\Users\u ser\Deskto p\ZmWSzgev gt.exe MD5: 2DEAF2BE4672BF6457E136D78A7A3940) - ZmWSzgevgt.tmp (PID: 2952 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-GNV BO.tmp\ZmW Szgevgt.tm p" /SL5="$ 10450,8325 12,832512, C:\Users\u ser\Deskto p\ZmWSzgev gt.exe" MD5: BE0E74DC6AC70C5B8CC74C42B6999A70) - setup.exe (PID: 6400 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\is-CLID K.tmp\setu p.exe MD5: ACA06319EC01C3DB9FFC2EA4CD8505B2) - setup.tmp (PID: 5256 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-1UG 24.tmp\set up.tmp" /S L5="$104CA ,4289520,8 32512,C:\U sers\user\ AppData\Lo cal\Temp\i s-CLIDK.tm p\setup.ex e" MD5: C039C014580F43E5B8162552F3CAF067) - a0.exe (PID: 6544 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-K33 CA.tmp\a0. exe" /VERY SILENT /PA SSWORD=NtI RVUpMK9ZD3 0Nf98220 - token mtn1 co3fo4gs5v wq -subid 2598 MD5: 5AFE9D5A2BCC39B1E0573A77EFBE82B7) - a0.tmp (PID: 6948 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-PVR 3Q.tmp\a0. tmp" /SL5= "$50222,10 235147,832 512,C:\Use rs\user\Ap pData\Loca l\Temp\is- K33CA.tmp\ a0.exe" /V ERYSILENT /PASSWORD= NtIRVUpMK9 ZD30Nf9822 0 -token m tn1co3fo4g s5vwq -sub id 2598 MD5: AD96645518D5ABDD4F96B007E799F61E) - cmd.exe (PID: 5020 cmdline:
"cmd.exe" /c expand C:\Users\u ser\AppDat a\Local\Te mp\is-J195 4.tmp\{app }\aglwjhm. cab -F:* % ProgramDat a% MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5032 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - expand.exe (PID: 4612 cmdline:
expand C:\ Users\user \AppData\L ocal\Temp\ is-J1954.t mp\{app}\a glwjhm.cab -F:* C:\P rogramData MD5: 544B0DBFF3F393BCE8BB9D815F532D51) - cmd.exe (PID: 2556 cmdline:
"cmd.exe" /c reg add "HKEY_CUR RENT_USER\ Environmen t" /v User InitMprLog onScript / t REG_EXPA ND_SZ /d " %ProgramDa ta%\regid. 1993-06.co m.microsof t\wmiprvse .exe" /f MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 2504 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - reg.exe (PID: 2616 cmdline:
reg add "H KEY_CURREN T_USER\Env ironment" /v UserIni tMprLogonS cript /t R EG_EXPAND_ SZ /d "C:\ ProgramDat a\regid.19 93-06.com. microsoft\ wmiprvse.e xe" /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C) - wmiprvse.exe (PID: 3160 cmdline:
C:\Program Data\regid .1993-06.c om.microso ft\wmiprvs e.exe MD5: 261D6E9D4571D1938CB54A2AE1B1821D) - cmd.exe (PID: 2364 cmdline:
"cmd.exe" /c start h ttps://axs boe-campai gn.com/pix el?pmhzmq= fhoohvpn6e 7i^&c=5306 757^&pl=0x 03^&pb=1^& px=2598 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 3472 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - chrome.exe (PID: 6664 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// axsboe-cam paign.com/ pixel?pmhz mq=fhoohvp n6e7i&c=53 06757&pl=0 x03&pb=1&p x=2598 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 344 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2100 --fi eld-trial- handle=188 8,i,707299 9325873136 118,173840 9871217889 0255,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - a1.exe (PID: 5648 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\is-K33C A.tmp\a1.e xe" /qn CA MPAIGN="25 98 MD5: FA24733F5A6A6F44D0E65D7D98B84AA6) - msiexec.exe (PID: 6204 cmdline:
C:\Windows \system32\ msiexec.ex e" /i "C:\ Users\user \AppData\R oaming\AW Manager\Wi ndows Mana ger 1.0.0\ install\97 FDF62\Wind ows Manage r - Postba ck Johan.m si" /qn CA MPAIGN=259 8 AI_SETUP EXEPATH=C: \Users\use r\AppData\ Local\Temp \is-K33CA. tmp\a1.exe SETUPEXED IR=C:\User s\user\App Data\Local \Temp\is-K 33CA.tmp\ EXE_CMD_LI NE="/exeno updates /f orcecleanu p /wintime 170187043 9 /qn CAMP AIGN=""259 8"" " CAMP AIGN="2598 MD5: 9D09DC1EDA745A5F87553048E57620CF) - a3.exe (PID: 5564 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\is-K33C A.tmp\a3.e xe MD5: 3372EE41B0B68A033CD0EA3120594E29) - 1922353491.exe (PID: 5896 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\1922353 491.exe MD5: AC87E1B8B3A20F9AD653699B10768BED)
- msiexec.exe (PID: 5652 cmdline:
C:\Windows \system32\ msiexec.ex e /V MD5: E5DA170027542E25EDE42FC54C929077) - msiexec.exe (PID: 2676 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng 422D03A D2CDBB69F5 57E245BAEF 1ACF7 C MD5: 9D09DC1EDA745A5F87553048E57620CF) - msiexec.exe (PID: 4444 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng 6BF05F1 87B53BFBF4 7C225A3773 85DB6 MD5: 9D09DC1EDA745A5F87553048E57620CF) - taskkill.exe (PID: 3628 cmdline:
"C:\Window s\SysWOW64 \taskkill. exe" /im A dvancedWin dowsManage r* /f MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) - conhost.exe (PID: 6464 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - msiexec.exe (PID: 4140 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng BC9F21B CEFC691B56 6B836C637B CC195 E Gl obal\MSI00 00 MD5: 9D09DC1EDA745A5F87553048E57620CF) - msiexec.exe (PID: 6668 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng 408DB68 26F1036348 B5DAAE317A F6166 C MD5: 9D09DC1EDA745A5F87553048E57620CF) - msiexec.exe (PID: 3196 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng 90A02CA D9630D5187 6E2B2B6E89 7E85F E Gl obal\MSI00 00 MD5: 9D09DC1EDA745A5F87553048E57620CF) - taskkill.exe (PID: 5856 cmdline:
"C:\Window s\SysWOW64 \taskkill. exe" /im A dvancedWin dowsManage r* /f MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) - conhost.exe (PID: 5040 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 3344 cmdline:
"C:\Window s\SysWOW64 \taskkill. exe" /im A dvancedWin dowsManage r* /f MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) - conhost.exe (PID: 5268 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 6600 cmdline:
"C:\Window s\SysWOW64 \taskkill. exe" /im A dvancedWin dowsManage r* /f MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) - conhost.exe (PID: 6632 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- Windows Updater.exe (PID: 2360 cmdline:
"C:\Progra m Files (x 86)\AW Man ager\Windo ws Manager \Windows U pdater.exe " /silenta ll -nofreq check -nog ui MD5: F95007206C6B2407FB69748EF7C93612) - Windows Updater.exe (PID: 6584 cmdline:
C:\Windows \TEMP\ce2d 31339cfff4 1b4b6db9e3 2e93218c\W indows Upd ater.exe" /install s ilentall " C:\Windows \TEMP\ce2d 31339cfff4 1b4b6db9e3 2e93218c\W indows Upd ater.ini MD5: F95007206C6B2407FB69748EF7C93612) - v113.exe (PID: 3408 cmdline:
"C:\Progra mData\AW M anager\Win dows Manag er\updates \v113\v113 .exe" MD5: 8CAD036C5CFED94D5319A060C488E38F) - msiexec.exe (PID: 6204 cmdline:
"C:\Window s\system32 \msiexec.e xe" /i "C: \AppData\R oaming\Adv ancedWindo wsManager\ Windows In staller 5. 0.3\instal l\7EB1504\ System Upd ater.msi" AI_SETUPEX EPATH="C:\ ProgramDat a\AW Manag er\Windows Manager\u pdates\v11 3\v113.exe " SETUPEXE DIR="C:\Pr ogramData\ AW Manager \Windows M anager\upd ates\v113\ " EXE_CMD_ LINE="/exe noupdates /forceclea nup /winti me 1701870 439 " MD5: 9D09DC1EDA745A5F87553048E57620CF) - v114.exe (PID: 12248 cmdline:
"C:\Progra mData\AW M anager\Win dows Manag er\updates \v114\v114 .exe" MD5: 5DC644E00D9553FC167CB649087B8089)
- AdvancedWindowsManager.exe (PID: 7164 cmdline:
"C:\Progra m Files (x 86)\AW Man ager\Windo ws Manager \AdvancedW indowsMana ger.exe" - v 110 -t 8 080 MD5: 26F21ED76944ED83382851D9F2453B0E) - conhost.exe (PID: 5040 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- AdvancedWindowsManager.exe (PID: 5068 cmdline:
"C:\Progra m Files (x 86)\AW Man ager\Windo ws Manager \AdvancedW indowsMana ger.exe" - v 111 -t 8 080 MD5: 26F21ED76944ED83382851D9F2453B0E) - conhost.exe (PID: 7820 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- AdvancedWindowsManager.exe (PID: 7828 cmdline:
"C:\Progra m Files (x 86)\AW Man ager\Windo ws Manager \AdvancedW indowsMana ger.exe" - v 112 -t 8 080 MD5: 26F21ED76944ED83382851D9F2453B0E) - conhost.exe (PID: 7868 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- AdvancedWindowsManager.exe (PID: 8584 cmdline:
"C:\Progra m Files (x 86)\AW Man ager\Windo ws Manager \AdvancedW indowsMana ger.exe" - v 113 -t 8 080 MD5: 26F21ED76944ED83382851D9F2453B0E) - conhost.exe (PID: 8700 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- AdvancedWindowsManager.exe (PID: 8708 cmdline:
"C:\Progra m Files (x 86)\AW Man ager\Windo ws Manager \AdvancedW indowsMana ger.exe" - v 114 -t 8 080 MD5: 26F21ED76944ED83382851D9F2453B0E) - conhost.exe (PID: 9560 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- AdvancedWindowsManager.exe (PID: 9580 cmdline:
"C:\Progra m Files (x 86)\AW Man ager\Windo ws Manager \AdvancedW indowsMana ger.exe" - v 115 -t 8 080 MD5: 26F21ED76944ED83382851D9F2453B0E) - conhost.exe (PID: 10416 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
Click to see the 3 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
Click to see the 12 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
JoeSecurity_NetSupport | Yara detected NetSupport remote tool | Joe Security | ||
Click to see the 5 entries |
⊘No Sigma rule has matched
Timestamp: | 192.168.2.577.105.136.350296812046045 12/06/23-14:36:21.023223 |
SID: | 2046045 |
Source Port: | 50296 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350339812046045 12/06/23-14:36:51.222959 |
SID: | 2046045 |
Source Port: | 50339 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.5104.21.83.14550240802048094 12/06/23-14:35:36.356295 |
SID: | 2048094 |
Source Port: | 50240 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350333812046045 12/06/23-14:36:47.245112 |
SID: | 2046045 |
Source Port: | 50333 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350342812046045 12/06/23-14:36:53.204282 |
SID: | 2046045 |
Source Port: | 50342 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.5104.21.83.14550196802855505 12/06/23-14:35:05.037520 |
SID: | 2855505 |
Source Port: | 50196 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350281812046045 12/06/23-14:36:10.745594 |
SID: | 2046045 |
Source Port: | 50281 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350290812046045 12/06/23-14:36:17.057630 |
SID: | 2046045 |
Source Port: | 50290 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350278812046045 12/06/23-14:36:08.769868 |
SID: | 2046045 |
Source Port: | 50278 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350253812046045 12/06/23-14:35:52.149838 |
SID: | 2046045 |
Source Port: | 50253 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350351812046045 12/06/23-14:36:59.140117 |
SID: | 2046045 |
Source Port: | 50351 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350367812046045 12/06/23-14:37:10.788474 |
SID: | 2046045 |
Source Port: | 50367 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350287812046045 12/06/23-14:36:15.015230 |
SID: | 2046045 |
Source Port: | 50287 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350324812046045 12/06/23-14:36:39.669230 |
SID: | 2046045 |
Source Port: | 50324 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350315812046045 12/06/23-14:36:33.722404 |
SID: | 2046045 |
Source Port: | 50315 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350306812046045 12/06/23-14:36:27.603943 |
SID: | 2046045 |
Source Port: | 50306 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350280812046045 12/06/23-14:36:10.078872 |
SID: | 2046045 |
Source Port: | 50280 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350269812046045 12/06/23-14:36:02.831888 |
SID: | 2046045 |
Source Port: | 50269 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350323812046045 12/06/23-14:36:38.995481 |
SID: | 2046045 |
Source Port: | 50323 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350262812046045 12/06/23-14:35:58.204295 |
SID: | 2046045 |
Source Port: | 50262 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350297812046045 12/06/23-14:36:21.680969 |
SID: | 2046045 |
Source Port: | 50297 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350300812046045 12/06/23-14:36:23.660225 |
SID: | 2046045 |
Source Port: | 50300 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350358812046045 12/06/23-14:37:04.890944 |
SID: | 2046045 |
Source Port: | 50358 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350357812046045 12/06/23-14:37:03.144834 |
SID: | 2046045 |
Source Port: | 50357 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.5157.230.96.3250126802834928 12/06/23-14:33:41.532380 |
SID: | 2834928 |
Source Port: | 50126 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350316812046045 12/06/23-14:36:34.370818 |
SID: | 2046045 |
Source Port: | 50316 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350370812046045 12/06/23-14:37:12.776192 |
SID: | 2046045 |
Source Port: | 50370 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350305812046045 12/06/23-14:36:26.947206 |
SID: | 2046045 |
Source Port: | 50305 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350263812046045 12/06/23-14:35:58.892261 |
SID: | 2046045 |
Source Port: | 50263 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350334812046045 12/06/23-14:36:47.909549 |
SID: | 2046045 |
Source Port: | 50334 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350268812046045 12/06/23-14:36:02.185549 |
SID: | 2046045 |
Source Port: | 50268 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350352812046045 12/06/23-14:36:59.810575 |
SID: | 2046045 |
Source Port: | 50352 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350245812046045 12/06/23-14:35:46.787174 |
SID: | 2046045 |
Source Port: | 50245 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350286812046045 12/06/23-14:36:14.346391 |
SID: | 2046045 |
Source Port: | 50286 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350264812046045 12/06/23-14:35:59.558216 |
SID: | 2046045 |
Source Port: | 50264 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350368812046045 12/06/23-14:37:11.445584 |
SID: | 2046045 |
Source Port: | 50368 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350270812046045 12/06/23-14:36:03.477604 |
SID: | 2046045 |
Source Port: | 50270 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350261812046045 12/06/23-14:35:57.535196 |
SID: | 2046045 |
Source Port: | 50261 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350301812046045 12/06/23-14:36:24.319593 |
SID: | 2046045 |
Source Port: | 50301 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350279812046045 12/06/23-14:36:09.427188 |
SID: | 2046045 |
Source Port: | 50279 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350350812046045 12/06/23-14:36:58.477999 |
SID: | 2046045 |
Source Port: | 50350 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.5159.223.29.4049730802839343 12/06/23-14:33:21.497166 |
SID: | 2839343 |
Source Port: | 49730 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Potentially Bad Traffic |
Timestamp: | 192.168.2.577.105.136.350288812046045 12/06/23-14:36:15.727049 |
SID: | 2046045 |
Source Port: | 50288 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350338812046045 12/06/23-14:36:50.569356 |
SID: | 2046045 |
Source Port: | 50338 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350344812046045 12/06/23-14:36:54.501584 |
SID: | 2046045 |
Source Port: | 50344 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350285812046045 12/06/23-14:36:13.685357 |
SID: | 2046045 |
Source Port: | 50285 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350291812046045 12/06/23-14:36:17.724996 |
SID: | 2046045 |
Source Port: | 50291 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350255812046045 12/06/23-14:35:53.486217 |
SID: | 2046045 |
Source Port: | 50255 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350258812046045 12/06/23-14:35:55.450063 |
SID: | 2046045 |
Source Port: | 50258 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350353812046045 12/06/23-14:37:00.456748 |
SID: | 2046045 |
Source Port: | 50353 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350347812046045 12/06/23-14:36:56.459765 |
SID: | 2046045 |
Source Port: | 50347 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350249812046045 12/06/23-14:35:49.517021 |
SID: | 2046045 |
Source Port: | 50249 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.595.142.47.114971812032827745 12/06/23-14:33:18.908166 |
SID: | 2827745 |
Source Port: | 49718 |
Destination Port: | 1203 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350314812046045 12/06/23-14:36:33.067223 |
SID: | 2046045 |
Source Port: | 50314 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350349812046045 12/06/23-14:36:57.813215 |
SID: | 2046045 |
Source Port: | 50349 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.5104.21.83.14550196802048094 12/06/23-14:35:05.671865 |
SID: | 2048094 |
Source Port: | 50196 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350283812046045 12/06/23-14:36:12.083206 |
SID: | 2046045 |
Source Port: | 50283 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.5104.21.83.14550196802048093 12/06/23-14:35:05.393985 |
SID: | 2048093 |
Source Port: | 50196 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350320812046045 12/06/23-14:36:37.012244 |
SID: | 2046045 |
Source Port: | 50320 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350355812046045 12/06/23-14:37:01.752652 |
SID: | 2046045 |
Source Port: | 50355 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350308812046045 12/06/23-14:36:28.952581 |
SID: | 2046045 |
Source Port: | 50308 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350266812046045 12/06/23-14:36:00.860284 |
SID: | 2046045 |
Source Port: | 50266 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350294812046045 12/06/23-14:36:19.720749 |
SID: | 2046045 |
Source Port: | 50294 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350272812046045 12/06/23-14:36:04.780598 |
SID: | 2046045 |
Source Port: | 50272 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350325812046045 12/06/23-14:36:40.326068 |
SID: | 2046045 |
Source Port: | 50325 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350361812046045 12/06/23-14:37:06.857535 |
SID: | 2046045 |
Source Port: | 50361 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350331812046045 12/06/23-14:36:44.280145 |
SID: | 2046045 |
Source Port: | 50331 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350366812046045 12/06/23-14:37:10.126303 |
SID: | 2046045 |
Source Port: | 50366 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350277812046045 12/06/23-14:36:08.103794 |
SID: | 2046045 |
Source Port: | 50277 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350319812046045 12/06/23-14:36:36.357919 |
SID: | 2046045 |
Source Port: | 50319 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350299812046045 12/06/23-14:36:22.998701 |
SID: | 2046045 |
Source Port: | 50299 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350293812046045 12/06/23-14:36:19.055677 |
SID: | 2046045 |
Source Port: | 50293 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350336812046045 12/06/23-14:36:49.242148 |
SID: | 2046045 |
Source Port: | 50336 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350327812046045 12/06/23-14:36:41.646083 |
SID: | 2046045 |
Source Port: | 50327 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350284812046045 12/06/23-14:36:12.740748 |
SID: | 2046045 |
Source Port: | 50284 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350247812046045 12/06/23-14:35:48.186162 |
SID: | 2046045 |
Source Port: | 50247 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350275812046045 12/06/23-14:36:06.769942 |
SID: | 2046045 |
Source Port: | 50275 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350345812046045 12/06/23-14:36:55.159061 |
SID: | 2046045 |
Source Port: | 50345 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.537.1.198.25150187802839343 12/06/23-14:35:39.174213 |
SID: | 2839343 |
Source Port: | 50187 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Potentially Bad Traffic |
Timestamp: | 192.168.2.577.105.136.350309812046045 12/06/23-14:36:29.696042 |
SID: | 2046045 |
Source Port: | 50309 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350250812046045 12/06/23-14:35:50.167908 |
SID: | 2046045 |
Source Port: | 50250 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350312812046045 12/06/23-14:36:31.744103 |
SID: | 2046045 |
Source Port: | 50312 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350303812046045 12/06/23-14:36:25.632684 |
SID: | 2046045 |
Source Port: | 50303 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350318812046045 12/06/23-14:36:35.709561 |
SID: | 2046045 |
Source Port: | 50318 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350321812046045 12/06/23-14:36:37.678957 |
SID: | 2046045 |
Source Port: | 50321 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350330812046045 12/06/23-14:36:43.615057 |
SID: | 2046045 |
Source Port: | 50330 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350251812046045 12/06/23-14:35:50.825474 |
SID: | 2046045 |
Source Port: | 50251 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350311812046045 12/06/23-14:36:31.045970 |
SID: | 2046045 |
Source Port: | 50311 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350257812046045 12/06/23-14:35:54.795722 |
SID: | 2046045 |
Source Port: | 50257 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350340812046045 12/06/23-14:36:51.889892 |
SID: | 2046045 |
Source Port: | 50340 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350274812046045 12/06/23-14:36:06.102370 |
SID: | 2046045 |
Source Port: | 50274 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350346812046045 12/06/23-14:36:55.814799 |
SID: | 2046045 |
Source Port: | 50346 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350363812046045 12/06/23-14:37:08.174720 |
SID: | 2046045 |
Source Port: | 50363 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350298812046045 12/06/23-14:36:22.345639 |
SID: | 2046045 |
Source Port: | 50298 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350364812046045 12/06/23-14:37:08.818539 |
SID: | 2046045 |
Source Port: | 50364 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350317812046045 12/06/23-14:36:35.040401 |
SID: | 2046045 |
Source Port: | 50317 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350322812046045 12/06/23-14:36:38.345066 |
SID: | 2046045 |
Source Port: | 50322 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350328812046045 12/06/23-14:36:42.306155 |
SID: | 2046045 |
Source Port: | 50328 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350256812046045 12/06/23-14:35:54.137806 |
SID: | 2046045 |
Source Port: | 50256 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.5104.21.52.22349705802047660 12/06/23-14:33:00.564607 |
SID: | 2047660 |
Source Port: | 49705 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350369812046045 12/06/23-14:37:12.112948 |
SID: | 2046045 |
Source Port: | 50369 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350292812046045 12/06/23-14:36:18.389256 |
SID: | 2046045 |
Source Port: | 50292 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350362812046045 12/06/23-14:37:07.522278 |
SID: | 2046045 |
Source Port: | 50362 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350365812046045 12/06/23-14:37:09.468071 |
SID: | 2046045 |
Source Port: | 50365 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350267812046045 12/06/23-14:36:01.508627 |
SID: | 2046045 |
Source Port: | 50267 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350359812046045 12/06/23-14:37:05.563977 |
SID: | 2046045 |
Source Port: | 50359 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350307812046045 12/06/23-14:36:28.273610 |
SID: | 2046045 |
Source Port: | 50307 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350276812046045 12/06/23-14:36:07.453180 |
SID: | 2046045 |
Source Port: | 50276 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350310812046045 12/06/23-14:36:30.384232 |
SID: | 2046045 |
Source Port: | 50310 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350313812046045 12/06/23-14:36:32.405793 |
SID: | 2046045 |
Source Port: | 50313 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350252812046045 12/06/23-14:35:51.486831 |
SID: | 2046045 |
Source Port: | 50252 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350341812046045 12/06/23-14:36:52.546584 |
SID: | 2046045 |
Source Port: | 50341 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350304812046045 12/06/23-14:36:26.286831 |
SID: | 2046045 |
Source Port: | 50304 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350335812046045 12/06/23-14:36:48.579507 |
SID: | 2046045 |
Source Port: | 50335 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350246812046045 12/06/23-14:35:47.521454 |
SID: | 2046045 |
Source Port: | 50246 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350329812046045 12/06/23-14:36:42.957751 |
SID: | 2046045 |
Source Port: | 50329 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350282812046045 12/06/23-14:36:11.427578 |
SID: | 2046045 |
Source Port: | 50282 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350356812046045 12/06/23-14:37:02.409479 |
SID: | 2046045 |
Source Port: | 50356 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350273812046045 12/06/23-14:36:05.431652 |
SID: | 2046045 |
Source Port: | 50273 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350254812046045 12/06/23-14:35:52.820317 |
SID: | 2046045 |
Source Port: | 50254 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350248812046045 12/06/23-14:35:48.865133 |
SID: | 2046045 |
Source Port: | 50248 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350289812046045 12/06/23-14:36:16.396787 |
SID: | 2046045 |
Source Port: | 50289 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350326812046045 12/06/23-14:36:40.988661 |
SID: | 2046045 |
Source Port: | 50326 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350332812046045 12/06/23-14:36:44.925833 |
SID: | 2046045 |
Source Port: | 50332 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350271812046045 12/06/23-14:36:04.130647 |
SID: | 2046045 |
Source Port: | 50271 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350360812046045 12/06/23-14:37:06.208022 |
SID: | 2046045 |
Source Port: | 50360 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350354812046045 12/06/23-14:37:01.103024 |
SID: | 2046045 |
Source Port: | 50354 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.537.1.198.25150133802839343 12/06/23-14:33:45.067270 |
SID: | 2839343 |
Source Port: | 50133 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Potentially Bad Traffic |
Timestamp: | 192.168.2.577.105.136.350265812046045 12/06/23-14:36:00.212175 |
SID: | 2046045 |
Source Port: | 50265 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350259812046045 12/06/23-14:35:56.113850 |
SID: | 2046045 |
Source Port: | 50259 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350348812046045 12/06/23-14:36:57.105195 |
SID: | 2046045 |
Source Port: | 50348 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350337812046045 12/06/23-14:36:49.902555 |
SID: | 2046045 |
Source Port: | 50337 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350295812046045 12/06/23-14:36:20.371059 |
SID: | 2046045 |
Source Port: | 50295 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350343812046045 12/06/23-14:36:53.852752 |
SID: | 2046045 |
Source Port: | 50343 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350260812046045 12/06/23-14:35:56.768169 |
SID: | 2046045 |
Source Port: | 50260 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.577.105.136.350302812046045 12/06/23-14:36:24.976708 |
SID: | 2046045 |
Source Port: | 50302 |
Destination Port: | 81 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Avira: | ||
Source: | Avira: |
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | ReversingLabs: |
Source: | Code function: | 32_2_00232740 | |
Source: | Code function: | 32_2_00232600 | |
Source: | Code function: | 32_2_00232B40 | |
Source: | Code function: | 32_2_00232C30 | |
Source: | Code function: | 32_2_00232CB0 | |
Source: | Code function: | 32_2_00232C90 | |
Source: | Code function: | 32_2_00232D20 | |
Source: | Code function: | 32_2_00232ED0 | |
Source: | Code function: | 32_2_0023AED0 | |
Source: | Code function: | 32_2_0023B1A0 | |
Source: | Code function: | 32_2_0023B520 | |
Source: | Code function: | 32_2_0023B6A0 |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Source: | Window detected: |