Windows
Analysis Report
ahx8PyqunR.msi
Overview
General Information
Sample name: | ahx8PyqunR.msirenamed because original name is a hash value |
Original sample name: | abc72097f51360b0d2ec6cee38f61f2416177e6b4bf55f48ff3221ce58e5ce2b.msi |
Analysis ID: | 1442379 |
MD5: | ffa79d6b5eb84e8a714f185eb55278e4 |
SHA1: | d9841949fc96bb4f72c1cf377333d12fae0f8c5a |
SHA256: | abc72097f51360b0d2ec6cee38f61f2416177e6b4bf55f48ff3221ce58e5ce2b |
Tags: | bankerdotnetjanela-ratmsi |
Infos: | |
Detection
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- msiexec.exe (PID: 5836 cmdline:
"C:\Window s\System32 \msiexec.e xe" /i "C: \Users\use r\Desktop\ ahx8PyqunR .msi" MD5: E5DA170027542E25EDE42FC54C929077)
- msiexec.exe (PID: 5988 cmdline:
C:\Windows \system32\ msiexec.ex e /V MD5: E5DA170027542E25EDE42FC54C929077) - msiexec.exe (PID: 2376 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng F4F39D2 FDBE76F97F C567DD0108 74426 MD5: 9D09DC1EDA745A5F87553048E57620CF)
- cleanup
Source: | Author: frack113: |
Timestamp: | 05/16/24-04:42:14.345778 |
SID: | 2849814 |
Source Port: | 49700 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/16/24-04:42:14.345778 |
SID: | 2849813 |
Source Port: | 49700 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Click to jump to signature section
Source: | HTTPS traffic detected: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Snort IDS: | ||
Source: | Snort IDS: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | File deleted: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Binary string: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | File written: | Jump to behavior |
Source: | Static file information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | WMI Queries: |
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | WMI Queries: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | 1 Replication Through Removable Media | 3 Windows Management Instrumentation | 1 DLL Side-Loading | 1 Process Injection | 21 Masquerading | OS Credential Dumping | 21 Security Software Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 2 Virtualization/Sandbox Evasion | LSASS Memory | 2 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | 3 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Process Injection | Security Account Manager | 1 Process Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 4 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Timestomp | NTDS | 11 Peripheral Device Discovery | Distributed Component Object Model | Input Capture | 15 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 2 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 File Deletion | Cached Domain Credentials | 32 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
5% | ReversingLabs | |||
2% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs | |||
0% | Virustotal | Browse | ||
0% | ReversingLabs | |||
0% | Virustotal | Browse | ||
0% | ReversingLabs | |||
0% | Virustotal | Browse | ||
0% | ReversingLabs | |||
0% | Virustotal | Browse | ||
0% | ReversingLabs | |||
0% | Virustotal | Browse | ||
0% | ReversingLabs | |||
0% | Virustotal | Browse | ||
0% | ReversingLabs | |||
0% | Virustotal | Browse | ||
0% | ReversingLabs | |||
0% | Virustotal | Browse | ||
0% | ReversingLabs | |||
0% | Virustotal | Browse | ||
0% | ReversingLabs | |||
0% | Virustotal | Browse | ||
0% | ReversingLabs | |||
0% | Virustotal | Browse | ||
0% | ReversingLabs | |||
0% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse | ||
0% | Virustotal | Browse | ||
0% | Virustotal | Browse | ||
0% | Virustotal | Browse | ||
0% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Virustotal | Browse | ||
2% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe | ||
0% | Virustotal | Browse | ||
0% | Virustotal | Browse |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
bg.microsoft.map.fastly.net | 199.232.210.172 | true | false |
| unknown |
collect.installeranalytics.com | 54.221.197.204 | true | true |
| unknown |
presteservicosaz.pro | 194.180.191.24 | true | false | unknown | |
fp2e7a.wpc.phicdn.net | 192.229.211.108 | true | false |
| unknown |
windowsupdatebg.s.llnwi.net | 208.111.136.0 | true | false |
| unknown |
time.windows.com | unknown | unknown | false |
| unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown | |
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
54.221.197.204 | collect.installeranalytics.com | United States | 14618 | AMAZON-AESUS | true | |
194.180.191.24 | presteservicosaz.pro | unknown | 39798 | MIVOCLOUDMD | false |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1442379 |
Start date and time: | 2024-05-16 04:41:10 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 48s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 17 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | ahx8PyqunR.msirenamed because original name is a hash value |
Original Sample Name: | abc72097f51360b0d2ec6cee38f61f2416177e6b4bf55f48ff3221ce58e5ce2b.msi |
Detection: | MAL |
Classification: | mal48.winMSI@4/27@3/2 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 40.119.6.228, 40.68.123.157, 20.242.39.171, 52.165.164.15
- Excluded domains from analysis (whitelisted): fe3.delivery.mp.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, twc.trafficmanager.net, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
- HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- Not all processes where analyzed, report is missing behavior information
Time | Type | Description |
---|---|---|
04:42:03 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
fp2e7a.wpc.phicdn.net | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | TechSupportScam | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
collect.installeranalytics.com | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | NetSupport RAT, LummaC Stealer | Browse |
| ||
windowsupdatebg.s.llnwi.net | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | TechSupportScam | Browse |
| ||
Get hash | malicious | TechSupportScam | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | TechSupportScam | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
bg.microsoft.map.fastly.net | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | TechSupportScam | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | TechSupportScam | Browse |
| ||
Get hash | malicious | TechSupportScam | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
AMAZON-AESUS | Get hash | malicious | HTMLPhisher | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Quasar | Browse |
| ||
MIVOCLOUDMD | Get hash | malicious | PrivateLoader, VMdetect | Browse |
| |
Get hash | malicious | PrivateLoader, VMdetect | Browse |
| ||
Get hash | malicious | VMdetect | Browse |
| ||
Get hash | malicious | VMdetect | Browse |
| ||
Get hash | malicious | PrivateLoader, VMdetect | Browse |
| ||
Get hash | malicious | DarkGate, MailPassView | Browse |
| ||
Get hash | malicious | DarkGate, MailPassView | Browse |
| ||
Get hash | malicious | DarkGate, MailPassView | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | VMdetect | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | PureLog Stealer | Browse |
| |
Get hash | malicious | RisePro Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Amadey | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | RisePro Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\shi435A.tmp | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | NetSupport RAT, LummaC Stealer | Browse | |||
C:\Users\user\AppData\Local\Temp\shi43C8.tmp | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | NetSupport RAT, LummaC Stealer | Browse |
C:\Users\user\AppData\Local\AdvinstAnalytics\6644d99620a59ade4c23836a\7.6.8.4\tracking.ini
Download File
Process: | C:\Windows\SysWOW64\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 26 |
Entropy (8bit): | 4.0081320258334 |
Encrypted: | false |
SSDEEP: | 3:1EyEMyvn:1BEN |
MD5: | 6BC190DD42A169DFA14515484427FC8E |
SHA1: | B53BD614A834416E4A20292AA291A6D2FC221A5E |
SHA-256: | B3395B660EB1EDB00FF91ECE4596E3ABE99FA558B149200F50AABF2CB77F5087 |
SHA-512: | 5B7011ED628B673217695809A38A800E9C8A42CEB0C54AB6F8BC39DBA0745297A4FBD66D6B09188FCC952C08217152844DFC3ADA7CF468C3AAFCEC379C0B16B6 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
C:\Users\user\AppData\Local\AdvinstAnalytics\6644d99620a59ade4c23836a\7.6.8.4\{D8AEF8C3-CEF6-431D-A272-E1D18ECE6B1E}.session
Download File
Process: | C:\Windows\SysWOW64\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 13388 |
Entropy (8bit): | 5.383254782224033 |
Encrypted: | false |
SSDEEP: | 384:2kPzn8D9CM5vqKkD8aJs947KfLJh66qDsGmF4uOwyBeg4DN:2kPzn8D9CM5vqKkD8aJs947KfLf66qDq |
MD5: | 3AA8AF9B163AED48F684CF1D4ABA7697 |
SHA1: | 47507352198F0B95116D27FFC11D512B553E27FE |
SHA-256: | D5F9717F7F8984703F4D155B83C4B48CD92C2045E7C8F3783CD6ED34B43DF715 |
SHA-512: | 02BDC7A1108EB23BE588E21F98D7E5345DC36A5709D985D6FAEC052E07C29F9A372DF4376D9EDE850B7F511DAFD51F3F59D0D0D8778F8720A3FFB834FB969B3C |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4509696 |
Entropy (8bit): | 6.100941182830929 |
Encrypted: | false |
SSDEEP: | 49152:jm+XAVAMPLfOyim8iTRxYUOQSfLTZZZ2y38lb7Cjn3mboy4+MT7ujWx/Tl0ng48e:CzVAwiKTOpfLTDQyaNoy787ujWx/TlR |
MD5: | F6153E803F1533042AC7E6988237C2C3 |
SHA1: | DDA81BB8BC8CC14877C9CB9B7C664DEFD81EBB4F |
SHA-256: | F42A771D310C762C05A5BE3DE0CFDB9BEC28D3DFCCAEF800C901F551A0DF30ED |
SHA-512: | 7AE76A4CB58A9929C09B1D6376073268622C74B1E3F0C346AFA7A7829E2EF136CCF091F58CCA28BFE83C665573C23D9DB6AF51A44275DA0CC2CF8C1306ADDBAC |
Malicious: | false |
Antivirus: |
|
Joe Sandbox View: |
|
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Windows\SysWOW64\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 83128 |
Entropy (8bit): | 6.654653670108596 |
Encrypted: | false |
SSDEEP: | 1536:0jIdYoF2CwmzOVStYMAuNWrmaTk++ouMOczT0ud4x41xmPS:0jRoFZwmr+bDk/MOcv0G4sxm |
MD5: | 125B0F6BF378358E4F9C837FF6682D94 |
SHA1: | 8715BEB626E0F4BD79A14819CC0F90B81A2E58AD |
SHA-256: | E99EAB3C75989B519F7F828373042701329ACBD8CEADF4F3FF390F346AC76193 |
SHA-512: | B63BB6BFDA70D42472868B5A1D3951CF9B2E00A7FADB08C1F599151A1801A19F5A75CFC3ACE94C952CFD284EB261C7D6F11BE0EBBCAA701B75036D3A6B442DB2 |
Malicious: | false |
Antivirus: |
|
Joe Sandbox View: |
|
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Windows\SysWOW64\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6 |
Entropy (8bit): | 2.2516291673878226 |
Encrypted: | false |
SSDEEP: | 3:gpyn:g4n |
MD5: | A067F5EC97BA51B576825B69BC855E58 |
SHA1: | 907D296538A45D5B593512881D721C7D347B8E04 |
SHA-256: | CF3E339D25C3C023C9417FFC5D8E73F1DA828B18FEECAF14FDB9C24D04E49BA0 |
SHA-512: | F6058F37CF764E6CD807D9C0E9DE881849E4C94EC1D2E0C0EB504ABF77147E77CB09113B087E1C10E790C3EC45780E5986D29B2A84B364C5F697F884B1549F4D |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8183792 |
Entropy (8bit): | 7.786766319454845 |
Encrypted: | false |
SSDEEP: | 196608:F9YuWsRVjVJFAoGgSWhGGO9AaLF+AXvkmxxrRq:F99WsRVj7esoqax+g9Fq |
MD5: | FFA79D6B5EB84E8A714F185EB55278E4 |
SHA1: | D9841949FC96BB4F72C1CF377333D12FAE0F8C5A |
SHA-256: | ABC72097F51360B0D2EC6CEE38F61F2416177E6B4BF55F48FF3221CE58E5CE2B |
SHA-512: | 667B0A6025B629F02A096C245842117782DE12C10216BE2ACBAF3205F8FB19578985B1306B0D10555E532D708F93268861175DE7A72ABB02FC7BEB6E15E99A49 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 780768 |
Entropy (8bit): | 6.387720196228063 |
Encrypted: | false |
SSDEEP: | 12288:8tlNr2btWAp/wEqjh/lNKCQSZ1YVzsRiiqn6BbFAmrhymkM49+Og2Z04KHjJaI/5:8tlNrgpSZKVsRkn4frUMXjJaI/tWogPa |
MD5: | 573F5E653258BF622AE1C0AD118880A2 |
SHA1: | E243C761983908D14BAF6C7C0879301C8437415D |
SHA-256: | 371D1346EC9CA236B257FED5B5A5C260114E56DFF009F515FA543E11C4BB81F7 |
SHA-512: | DFFF15345DBF62307C3E6A4C0B363C133D1A0B8B368492F1200273407C2520B33ACB20BFF90FEAC356305990492F800844D849EE454E7124395F945DE39F39EA |
Malicious: | false |
Antivirus: |
|
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 388064 |
Entropy (8bit): | 6.407392408414975 |
Encrypted: | false |
SSDEEP: | 6144:U7C5QB3/CNG2HBOqf2BLuoZSKYfuAO8DOE09VKYnyZwYW:qB3WBOG2BPDKSf9VtyZNW |
MD5: | 20C782EB64C81AC14C83A853546A8924 |
SHA1: | A1506933D294DE07A7A2AE1FBC6BE468F51371D6 |
SHA-256: | 0ED6836D55180AF20F71F7852E3D728F2DEFE22AA6D2526C54CFBBB4B48CC6A1 |
SHA-512: | AFF21E3E00B39F8983D101A0C616CA84CC3DC72D6464A0DD331965CF6BECCF9B45025A7DB2042D6E8B05221D3EB5813445C8ADA69AE96E2727A607398A3DE3D9 |
Malicious: | false |
Antivirus: |
|
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 388064 |
Entropy (8bit): | 6.407392408414975 |
Encrypted: | false |
SSDEEP: | 6144:U7C5QB3/CNG2HBOqf2BLuoZSKYfuAO8DOE09VKYnyZwYW:qB3WBOG2BPDKSf9VtyZNW |
MD5: | 20C782EB64C81AC14C83A853546A8924 |
SHA1: | A1506933D294DE07A7A2AE1FBC6BE468F51371D6 |
SHA-256: | 0ED6836D55180AF20F71F7852E3D728F2DEFE22AA6D2526C54CFBBB4B48CC6A1 |
SHA-512: | AFF21E3E00B39F8983D101A0C616CA84CC3DC72D6464A0DD331965CF6BECCF9B45025A7DB2042D6E8B05221D3EB5813445C8ADA69AE96E2727A607398A3DE3D9 |
Malicious: | false |
Antivirus: |
|
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 388064 |
Entropy (8bit): | 6.407392408414975 |
Encrypted: | false |
SSDEEP: | 6144:U7C5QB3/CNG2HBOqf2BLuoZSKYfuAO8DOE09VKYnyZwYW:qB3WBOG2BPDKSf9VtyZNW |
MD5: | 20C782EB64C81AC14C83A853546A8924 |
SHA1: | A1506933D294DE07A7A2AE1FBC6BE468F51371D6 |
SHA-256: | 0ED6836D55180AF20F71F7852E3D728F2DEFE22AA6D2526C54CFBBB4B48CC6A1 |
SHA-512: | AFF21E3E00B39F8983D101A0C616CA84CC3DC72D6464A0DD331965CF6BECCF9B45025A7DB2042D6E8B05221D3EB5813445C8ADA69AE96E2727A607398A3DE3D9 |
Malicious: | false |
Antivirus: |
|
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 878560 |
Entropy (8bit): | 6.452749824306929 |
Encrypted: | false |
SSDEEP: | 24576:QK8S3AccKkqSojmrhCMou5vk3Y+ukDln/hFRFNUEekB:QK8tKk5ojmrhCMz5vk3ukDln/hFRFNU0 |
MD5: | D51A7E3BCE34C74638E89366DEEE2AAB |
SHA1: | 0E68022B52C288E8CDFFE85739DE1194253A7EF0 |
SHA-256: | 7C6BDF16A0992DB092B7F94C374B21DE5D53E3043F5717A6EECAE614432E0DF5 |
SHA-512: | 8ED246747CDD05CAC352919D7DED3F14B1E523CCC1F7F172DB85EED800B0C5D24475C270B34A7C25E7934467ACE7E363542A586CDEB156BFC484F7417C3A4AB0 |
Malicious: | false |
Antivirus: |
|
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 780768 |
Entropy (8bit): | 6.387720196228063 |
Encrypted: | false |
SSDEEP: | 12288:8tlNr2btWAp/wEqjh/lNKCQSZ1YVzsRiiqn6BbFAmrhymkM49+Og2Z04KHjJaI/5:8tlNrgpSZKVsRkn4frUMXjJaI/tWogPa |
MD5: | 573F5E653258BF622AE1C0AD118880A2 |
SHA1: | E243C761983908D14BAF6C7C0879301C8437415D |
SHA-256: | 371D1346EC9CA236B257FED5B5A5C260114E56DFF009F515FA543E11C4BB81F7 |
SHA-512: | DFFF15345DBF62307C3E6A4C0B363C133D1A0B8B368492F1200273407C2520B33ACB20BFF90FEAC356305990492F800844D849EE454E7124395F945DE39F39EA |
Malicious: | false |
Antivirus: |
|
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 780768 |
Entropy (8bit): | 6.387720196228063 |
Encrypted: | false |
SSDEEP: | 12288:8tlNr2btWAp/wEqjh/lNKCQSZ1YVzsRiiqn6BbFAmrhymkM49+Og2Z04KHjJaI/5:8tlNrgpSZKVsRkn4frUMXjJaI/tWogPa |
MD5: | 573F5E653258BF622AE1C0AD118880A2 |
SHA1: | E243C761983908D14BAF6C7C0879301C8437415D |
SHA-256: | 371D1346EC9CA236B257FED5B5A5C260114E56DFF009F515FA543E11C4BB81F7 |
SHA-512: | DFFF15345DBF62307C3E6A4C0B363C133D1A0B8B368492F1200273407C2520B33ACB20BFF90FEAC356305990492F800844D849EE454E7124395F945DE39F39EA |
Malicious: | false |
Antivirus: |
|
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 388064 |
Entropy (8bit): | 6.407392408414975 |
Encrypted: | false |
SSDEEP: | 6144:U7C5QB3/CNG2HBOqf2BLuoZSKYfuAO8DOE09VKYnyZwYW:qB3WBOG2BPDKSf9VtyZNW |
MD5: | 20C782EB64C81AC14C83A853546A8924 |
SHA1: | A1506933D294DE07A7A2AE1FBC6BE468F51371D6 |
SHA-256: | 0ED6836D55180AF20F71F7852E3D728F2DEFE22AA6D2526C54CFBBB4B48CC6A1 |
SHA-512: | AFF21E3E00B39F8983D101A0C616CA84CC3DC72D6464A0DD331965CF6BECCF9B45025A7DB2042D6E8B05221D3EB5813445C8ADA69AE96E2727A607398A3DE3D9 |
Malicious: | false |
Antivirus: |
|
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 780768 |
Entropy (8bit): | 6.387720196228063 |
Encrypted: | false |
SSDEEP: | 12288:8tlNr2btWAp/wEqjh/lNKCQSZ1YVzsRiiqn6BbFAmrhymkM49+Og2Z04KHjJaI/5:8tlNrgpSZKVsRkn4frUMXjJaI/tWogPa |
MD5: | 573F5E653258BF622AE1C0AD118880A2 |
SHA1: | E243C761983908D14BAF6C7C0879301C8437415D |
SHA-256: | 371D1346EC9CA236B257FED5B5A5C260114E56DFF009F515FA543E11C4BB81F7 |
SHA-512: | DFFF15345DBF62307C3E6A4C0B363C133D1A0B8B368492F1200273407C2520B33ACB20BFF90FEAC356305990492F800844D849EE454E7124395F945DE39F39EA |
Malicious: | false |
Antivirus: |
|
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | modified |
Size (bytes): | 2426 |
Entropy (8bit): | 5.574248892317593 |
Encrypted: | false |
SSDEEP: | 48:RzU1yhlA4ngGdv314+mQ1AX6AI31ZuOEnY14Xj3v/QI6fty72hpXN1w:RzUElAURpmQ1i6haOEYOz3vorfRp9W |
MD5: | 567A21F7511D4C1AFE23719F2B5D407E |
SHA1: | 5C1C81895A715DE71EEDAC8BBE6E5824850FC71A |
SHA-256: | 10358646B79581E9C885C0D511A20A97CB4AAFCA6210A4E5E5EBAA5814A0CCE8 |
SHA-512: | ECE433E99825E54A5688DEA8DD9B36F384ED8EC774C76F8B2118F35F9455A0192997C282CE5E877762E02F580169957230142304615421CAF2349DBC52D098C6 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 780768 |
Entropy (8bit): | 6.387720196228063 |
Encrypted: | false |
SSDEEP: | 12288:8tlNr2btWAp/wEqjh/lNKCQSZ1YVzsRiiqn6BbFAmrhymkM49+Og2Z04KHjJaI/5:8tlNrgpSZKVsRkn4frUMXjJaI/tWogPa |
MD5: | 573F5E653258BF622AE1C0AD118880A2 |
SHA1: | E243C761983908D14BAF6C7C0879301C8437415D |
SHA-256: | 371D1346EC9CA236B257FED5B5A5C260114E56DFF009F515FA543E11C4BB81F7 |
SHA-512: | DFFF15345DBF62307C3E6A4C0B363C133D1A0B8B368492F1200273407C2520B33ACB20BFF90FEAC356305990492F800844D849EE454E7124395F945DE39F39EA |
Malicious: | false |
Antivirus: |
|
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 20480 |
Entropy (8bit): | 1.1641951888377486 |
Encrypted: | false |
SSDEEP: | 12:JSbX72FjE/liAGiLIlHVRpZh/7777777777777777777777777vDHFzi/chit/lN:JGIQI5tVKiF |
MD5: | B2C627E56547331D3A371287B313EC18 |
SHA1: | CDC4E19DF2D2FC6BAF517AF2D06D96114A16287B |
SHA-256: | 2E068B487146F864C2CBBB8FC3C19A5505DF2152691FA440822053FBEFDFC7C1 |
SHA-512: | 225ADBE125BA5AB4B2D170BEF7A1D28F9B2B6CF40345F92C6286EFC801A8CEC0717413B57447452B5690E14AA02D1847200BE7D7A7FB404D4F940A4FF5470A39 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 24576 |
Entropy (8bit): | 1.8413178665023457 |
Encrypted: | false |
SSDEEP: | 48:QFS8PhhuRc06WXJMFT5OT36PmeS+PmEAE+lCyozTMS8xfoHswXGcp4ru2xBxYxMP:whh1vFTcT36vrSZlCc5co2WG7vrW+ |
MD5: | A419FBE7A1BB84055FF25439953CC181 |
SHA1: | 8FBC32194B44DBFDB0274CAF867FB511A1969DAA |
SHA-256: | 758EF2832F125535064ECA12CB95191767F9889960C51C6DEFDD9FA9D3B05CDA |
SHA-512: | 361F221CE325B8EA9342E859724C3D7514CE7F7AD700467200C730C0F0757769A161D934DC1CCE811E437B5F5DA4A7511C7FD14EBD4342666F36436223F9B11E |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 360001 |
Entropy (8bit): | 5.362980550701125 |
Encrypted: | false |
SSDEEP: | 1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26Kgau0:zTtbmkExhMJCIpEp |
MD5: | C536D612700ACB798D779D1A59A88D29 |
SHA1: | B98FC883DC22AF599D9E73B6216C24BCD86F40AD |
SHA-256: | 59707798634B7E7219C09E1B7515F3C1046DB5FA778A8EE7DAA65C31B8AC6F6D |
SHA-512: | BE87C4F1C5209F5FFCFB551035B83EC069A81DEBFD2F899E40818D31DEDB38380E7F56F4D74FCCD700BF9ABDD7B19F3274FE22FCC2853E6814C49F9655955D49 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 49152 |
Entropy (8bit): | 1.2078276780531825 |
Encrypted: | false |
SSDEEP: | 48:khwZuNO+CFXJBT55UVyfT36PmeS+PmEAE+lCyozTMS8xfoHswXGcp4ru2xBxYxMP:3ZFZT38ST36vrSZlCc5co2WG7vrW+ |
MD5: | 785AF0E56C1F59175DD5C2B6EABE1C2B |
SHA1: | 344F6C0439B35B2EA2D14692A5E9B95DCC4EDEA1 |
SHA-256: | 46C2DD6E1AB0881484211F660DCE7729FE6453331B1F59E34F9E22AC3C124FA3 |
SHA-512: | 60205B57E037DDD53CF06C07D8DB41E04A12E1E5EA74B38AD32A1267EEC25597EABADCB26ADA3F99F264E0B96409AF885D0198A14E01F79D0E33A8B7B46E040F |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 73728 |
Entropy (8bit): | 0.30635473637740857 |
Encrypted: | false |
SSDEEP: | 48:YU162ETSPmeS+PmbPmeS+PmEAE+lCyozTMS8xfoHswXGcp4ru2xBxYxMxqxrxbxC:Y+zvrCvrSZlCc5co2WGQ3D |
MD5: | AD182CD4448C843AAACF91CD84ED7E15 |
SHA1: | 482B0F9A3AA2532D72CAB242491478E79DCB3461 |
SHA-256: | BF1C48A67874B6C4D9B6301B98C90C52ECBA5DA7670FF619FA53A2FA703B0FAE |
SHA-512: | DEE046A86DB55221463E5280C6C049F4AD11328F4E2EF04AF007D277FDC0B863139249AEC9F4A58003530CB3978A12084D2F2C85B1BFCB57DB71C0897DE9A840 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 24576 |
Entropy (8bit): | 1.8413178665023457 |
Encrypted: | false |
SSDEEP: | 48:QFS8PhhuRc06WXJMFT5OT36PmeS+PmEAE+lCyozTMS8xfoHswXGcp4ru2xBxYxMP:whh1vFTcT36vrSZlCc5co2WG7vrW+ |
MD5: | A419FBE7A1BB84055FF25439953CC181 |
SHA1: | 8FBC32194B44DBFDB0274CAF867FB511A1969DAA |
SHA-256: | 758EF2832F125535064ECA12CB95191767F9889960C51C6DEFDD9FA9D3B05CDA |
SHA-512: | 361F221CE325B8EA9342E859724C3D7514CE7F7AD700467200C730C0F0757769A161D934DC1CCE811E437B5F5DA4A7511C7FD14EBD4342666F36436223F9B11E |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 32768 |
Entropy (8bit): | 0.07152163661010089 |
Encrypted: | false |
SSDEEP: | 6:2/9LG7iVCnLG7iVrKOzPLHKOJUETsf/cHstgVky6lit/:2F0i8n0itFzDHFzi/cMZit/ |
MD5: | FEC8535399A693349BD6357222EBF66E |
SHA1: | CB267CA3FBD421B5915454DC9469A2B8ACF82609 |
SHA-256: | 811F66CD3940ECD67F3C04C3923BE4F88B6A60301196AEF1BC1D67C62EAF0333 |
SHA-512: | CDEFC0B7C05D27A4D26FD07BB2181B31483C0B1BAEE65E0E87FEDE1DEF83C0E7D2A946009B127A3EA11CFB01EB8C8F457492EBF61F6195407108877E37489197 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\msiexec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 64 |
Entropy (8bit): | 3.588108324205336 |
Encrypted: | false |
SSDEEP: | 3:ydlX85I2Y1AnLU1lt8lLn:yndG4KLn |
MD5: | 6F1BAC6EDA8D866AFEB95600956E8750 |
SHA1: | DFCE213AB1708243B3E374DFA3655C9F1BD4DA41 |
SHA-256: | F53A138DB745D42A259C18B83B91EE17A7800E5AB7D1B3A8FF1DED4D6B6DA3FD |
SHA-512: | D423E97BABF5497DA2A18A829101FE478D6D7C640F6D107EC100318708007F327C4E9A647BD617123DA7F9809E720AB03A11A660949274E26D8402403C58CF95 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.786766319454845 |
TrID: |
|
File name: | ahx8PyqunR.msi |
File size: | 8'183'792 bytes |
MD5: | ffa79d6b5eb84e8a714f185eb55278e4 |
SHA1: | d9841949fc96bb4f72c1cf377333d12fae0f8c5a |
SHA256: | abc72097f51360b0d2ec6cee38f61f2416177e6b4bf55f48ff3221ce58e5ce2b |
SHA512: | 667b0a6025b629f02a096c245842117782de12c10216be2acbaf3205f8fb19578985b1306b0d10555e532d708f93268861175de7a72abb02fc7beb6e15e99a49 |
SSDEEP: | 196608:F9YuWsRVjVJFAoGgSWhGGO9AaLF+AXvkmxxrRq:F99WsRVj7esoqax+g9Fq |
TLSH: | 9686021275CA8732EA7E8534A5BADB3664FA3FE01BB194DF63D4192A0E705C201B1F17 |
File Content Preview: | ........................>...................&...................................................................................................................J...K...L...M...N...O...P...Q...R...S...T...U.................................................. |
Icon Hash: | 2d2e3797b32b2b99 |
Timestamp | Protocol | SID | Message | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|---|---|---|
05/16/24-04:42:14.345778 | TCP | 2849814 | ETPRO MALWARE TakeMyFile User-Agent | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
05/16/24-04:42:14.345778 | TCP | 2849813 | ETPRO MALWARE TakeMyFile Installer Checkin | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
May 16, 2024 04:42:06.417944908 CEST | 49699 | 443 | 192.168.2.7 | 194.180.191.24 |
May 16, 2024 04:42:06.417980909 CEST | 443 | 49699 | 194.180.191.24 | 192.168.2.7 |
May 16, 2024 04:42:06.418051958 CEST | 49699 | 443 | 192.168.2.7 | 194.180.191.24 |
May 16, 2024 04:42:06.429291010 CEST | 49699 | 443 | 192.168.2.7 | 194.180.191.24 |
May 16, 2024 04:42:06.429306030 CEST | 443 | 49699 | 194.180.191.24 | 192.168.2.7 |
May 16, 2024 04:42:06.999833107 CEST | 443 | 49699 | 194.180.191.24 | 192.168.2.7 |
May 16, 2024 04:42:06.999908924 CEST | 49699 | 443 | 192.168.2.7 | 194.180.191.24 |
May 16, 2024 04:42:07.002636909 CEST | 49699 | 443 | 192.168.2.7 | 194.180.191.24 |
May 16, 2024 04:42:07.002645016 CEST | 443 | 49699 | 194.180.191.24 | 192.168.2.7 |
May 16, 2024 04:42:07.002902985 CEST | 443 | 49699 | 194.180.191.24 | 192.168.2.7 |
May 16, 2024 04:42:07.045983076 CEST | 49699 | 443 | 192.168.2.7 | 194.180.191.24 |
May 16, 2024 04:42:07.049182892 CEST | 49699 | 443 | 192.168.2.7 | 194.180.191.24 |
May 16, 2024 04:42:07.092123985 CEST | 443 | 49699 | 194.180.191.24 | 192.168.2.7 |
May 16, 2024 04:42:07.550837040 CEST | 443 | 49699 | 194.180.191.24 | 192.168.2.7 |
May 16, 2024 04:42:07.551037073 CEST | 443 | 49699 | 194.180.191.24 | 192.168.2.7 |
May 16, 2024 04:42:07.551094055 CEST | 49699 | 443 | 192.168.2.7 | 194.180.191.24 |
May 16, 2024 04:42:07.553788900 CEST | 49699 | 443 | 192.168.2.7 | 194.180.191.24 |
May 16, 2024 04:42:07.553803921 CEST | 443 | 49699 | 194.180.191.24 | 192.168.2.7 |
May 16, 2024 04:42:07.553817987 CEST | 49699 | 443 | 192.168.2.7 | 194.180.191.24 |
May 16, 2024 04:42:07.553822994 CEST | 443 | 49699 | 194.180.191.24 | 192.168.2.7 |
May 16, 2024 04:42:08.357626915 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:08.489718914 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:08.489814997 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:08.490015030 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:08.490144014 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:08.621975899 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:08.622047901 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:08.629513979 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:08.629576921 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:08.790291071 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:08.790540934 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:08.922486067 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:08.929481030 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:08.929697990 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:08.935235023 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:08.935336113 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:09.067382097 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:09.077168941 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:09.077266932 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:09.080255985 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:09.080298901 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:09.212272882 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:09.219554901 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:09.219639063 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:09.223685026 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:09.223722935 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:09.355710030 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:09.370189905 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:09.370317936 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:09.376192093 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:09.376192093 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:09.508172035 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:09.515156031 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:09.515228987 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:09.520294905 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:09.520433903 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:09.652369976 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:09.660440922 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:09.660499096 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:09.661719084 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:09.661895037 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:09.793824911 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:09.800803900 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:09.800885916 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:09.801894903 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:09.802011013 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:09.934506893 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:09.946228981 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:09.946320057 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:09.947459936 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:09.947540998 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:10.079473972 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:10.087580919 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:10.087788105 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:10.089412928 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:10.089443922 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:10.221435070 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:10.228492022 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:10.228595972 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:10.230223894 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:10.230285883 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:10.364821911 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:10.372190952 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:10.372277975 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:10.373547077 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:10.373624086 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:10.505542994 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:10.512823105 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:10.512895107 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:10.514081955 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:10.514133930 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:10.646073103 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:10.654156923 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:10.654215097 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:10.656063080 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:10.656105995 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:10.789071083 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:10.796681881 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:10.796746016 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:10.798016071 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:10.798118114 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:10.929995060 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:10.937678099 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:10.937753916 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:10.939299107 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:10.939451933 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:11.071360111 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:11.078484058 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:11.078807116 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:11.129023075 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:11.129165888 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:11.261121035 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:11.267376900 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:11.267435074 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:11.270662069 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:11.270750046 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:11.402770996 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:11.410870075 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:11.410942078 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:11.412802935 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:11.412854910 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:11.545790911 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:11.555500031 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:11.555557013 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:11.556766033 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:11.556766033 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:11.689428091 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:11.696563005 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:11.696639061 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:11.697784901 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:11.697845936 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:11.829802036 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:11.836520910 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:11.837112904 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:11.838390112 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:11.838426113 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:11.970350027 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:11.978198051 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:11.978287935 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:11.979671001 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:11.979722023 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:12.111768007 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:12.118927956 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:12.119009018 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:12.120992899 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:12.121037960 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:12.253015995 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:12.260911942 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:12.260981083 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:12.262370110 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:12.262440920 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:12.394354105 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:12.401886940 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:12.401954889 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:12.403271914 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:12.403351068 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:12.535229921 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:12.543386936 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:12.543489933 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:12.544778109 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:12.544816971 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:12.678071976 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:12.685200930 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:12.685281992 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:12.686405897 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:12.686486006 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:12.818444967 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:12.825625896 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:12.825720072 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:12.845892906 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:12.845944881 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:12.977936983 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:12.984716892 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:12.984776974 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:12.986229897 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:12.986267090 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:13.118199110 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:13.126019955 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:13.126096010 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:13.127391100 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:13.127458096 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:13.259357929 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:13.266900063 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:13.267107010 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:13.268435001 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:13.268518925 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:13.400445938 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:13.407656908 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:13.407716036 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:13.409476042 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:13.409503937 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:13.541465044 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:13.549118996 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:13.550822020 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:13.623631001 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:13.623744011 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:13.755619049 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:13.763701916 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:13.763767958 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:13.765256882 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:13.765333891 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:13.897222996 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:13.904340982 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:13.904412031 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:13.906250954 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:13.906440020 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:14.038410902 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:14.048527002 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:14.048589945 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:14.049762011 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:14.049817085 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:14.181807041 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:14.189699888 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:14.191239119 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:14.205003023 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:14.205075979 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:14.337018013 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:14.344145060 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:14.344202042 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:14.345777988 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:14.345798016 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:14.477763891 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:14.493298054 CEST | 80 | 49700 | 54.221.197.204 | 192.168.2.7 |
May 16, 2024 04:42:14.494893074 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
May 16, 2024 04:42:14.780926943 CEST | 49700 | 80 | 192.168.2.7 | 54.221.197.204 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
May 16, 2024 04:42:06.060910940 CEST | 50938 | 53 | 192.168.2.7 | 1.1.1.1 |
May 16, 2024 04:42:06.388176918 CEST | 53 | 50938 | 1.1.1.1 | 192.168.2.7 |
May 16, 2024 04:42:08.229661942 CEST | 58807 | 53 | 192.168.2.7 | 1.1.1.1 |
May 16, 2024 04:42:08.351625919 CEST | 53 | 58807 | 1.1.1.1 | 192.168.2.7 |
May 16, 2024 04:42:12.852288961 CEST | 62421 | 53 | 192.168.2.7 | 1.1.1.1 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
May 16, 2024 04:42:06.060910940 CEST | 192.168.2.7 | 1.1.1.1 | 0x2c0 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
May 16, 2024 04:42:08.229661942 CEST | 192.168.2.7 | 1.1.1.1 | 0x4539 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
May 16, 2024 04:42:12.852288961 CEST | 192.168.2.7 | 1.1.1.1 | 0x6dd0 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
May 16, 2024 04:42:06.388176918 CEST | 1.1.1.1 | 192.168.2.7 | 0x2c0 | No error (0) | 194.180.191.24 | A (IP address) | IN (0x0001) | false | ||
May 16, 2024 04:42:08.351625919 CEST | 1.1.1.1 | 192.168.2.7 | 0x4539 | No error (0) | 54.221.197.204 | A (IP address) | IN (0x0001) | false | ||
May 16, 2024 04:42:08.351625919 CEST | 1.1.1.1 | 192.168.2.7 | 0x4539 | No error (0) | 54.227.134.57 | A (IP address) | IN (0x0001) | false | ||
May 16, 2024 04:42:12.961051941 CEST | 1.1.1.1 | 192.168.2.7 | 0x6dd0 | No error (0) | twc.trafficmanager.net | CNAME (Canonical name) | IN (0x0001) | false | ||
May 16, 2024 04:42:18.664206982 CEST | 1.1.1.1 | 192.168.2.7 | 0xb5d7 | No error (0) | 199.232.210.172 | A (IP address) | IN (0x0001) | false | ||
May 16, 2024 04:42:18.664206982 CEST | 1.1.1.1 | 192.168.2.7 | 0xb5d7 | No error (0) | 199.232.214.172 | A (IP address) | IN (0x0001) | false | ||
May 16, 2024 04:42:18.753519058 CEST | 1.1.1.1 | 192.168.2.7 | 0x84dc | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
May 16, 2024 04:42:18.753519058 CEST | 1.1.1.1 | 192.168.2.7 | 0x84dc | No error (0) | 192.229.211.108 | A (IP address) | IN (0x0001) | false | ||
May 16, 2024 04:42:32.011432886 CEST | 1.1.1.1 | 192.168.2.7 | 0xacec | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
May 16, 2024 04:42:32.011432886 CEST | 1.1.1.1 | 192.168.2.7 | 0xacec | No error (0) | 192.229.211.108 | A (IP address) | IN (0x0001) | false | ||
May 16, 2024 04:42:58.298871040 CEST | 1.1.1.1 | 192.168.2.7 | 0x6538 | No error (0) | 208.111.136.0 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.7 | 49700 | 54.221.197.204 | 80 | 2376 | C:\Windows\SysWOW64\msiexec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
May 16, 2024 04:42:08.490015030 CEST | 241 | OUT | |
May 16, 2024 04:42:08.490144014 CEST | 167 | OUT | |
May 16, 2024 04:42:08.629513979 CEST | 338 | IN | |
May 16, 2024 04:42:08.790291071 CEST | 396 | OUT | |
May 16, 2024 04:42:08.790540934 CEST | 179 | OUT | |
May 16, 2024 04:42:08.929481030 CEST | 122 | IN | |
May 16, 2024 04:42:08.935235023 CEST | 396 | OUT | |
May 16, 2024 04:42:08.935336113 CEST | 181 | OUT | |
May 16, 2024 04:42:09.077168941 CEST | 122 | IN | |
May 16, 2024 04:42:09.080255985 CEST | 396 | OUT | |
May 16, 2024 04:42:09.080298901 CEST | 184 | OUT | |
May 16, 2024 04:42:09.219554901 CEST | 122 | IN | |
May 16, 2024 04:42:09.223685026 CEST | 396 | OUT | |
May 16, 2024 04:42:09.223722935 CEST | 180 | OUT | |
May 16, 2024 04:42:09.370189905 CEST | 122 | IN | |
May 16, 2024 04:42:09.376192093 CEST | 396 | OUT | |
May 16, 2024 04:42:09.376192093 CEST | 174 | OUT | |
May 16, 2024 04:42:09.515156031 CEST | 122 | IN | |
May 16, 2024 04:42:09.520294905 CEST | 396 | OUT | |
May 16, 2024 04:42:09.520433903 CEST | 183 | OUT | |
May 16, 2024 04:42:09.660440922 CEST | 122 | IN | |
May 16, 2024 04:42:09.661719084 CEST | 396 | OUT | |
May 16, 2024 04:42:09.661895037 CEST | 183 | OUT | |
May 16, 2024 04:42:09.800803900 CEST | 122 | IN | |
May 16, 2024 04:42:09.801894903 CEST | 396 | OUT | |
May 16, 2024 04:42:09.802011013 CEST | 183 | OUT | |
May 16, 2024 04:42:09.946228981 CEST | 122 | IN | |
May 16, 2024 04:42:09.947459936 CEST | 396 | OUT | |
May 16, 2024 04:42:09.947540998 CEST | 185 | OUT | |
May 16, 2024 04:42:10.087580919 CEST | 122 | IN | |
May 16, 2024 04:42:10.089412928 CEST | 396 | OUT | |
May 16, 2024 04:42:10.228492022 CEST | 122 | IN | |
May 16, 2024 04:42:10.230223894 CEST | 396 | OUT | |
May 16, 2024 04:42:10.372190952 CEST | 122 | IN | |
May 16, 2024 04:42:10.373547077 CEST | 396 | OUT | |
May 16, 2024 04:42:10.512823105 CEST | 122 | IN | |
May 16, 2024 04:42:10.514081955 CEST | 396 | OUT | |
May 16, 2024 04:42:10.654156923 CEST | 122 | IN | |
May 16, 2024 04:42:10.656063080 CEST | 396 | OUT | |
May 16, 2024 04:42:10.796681881 CEST | 122 | IN | |
May 16, 2024 04:42:10.798016071 CEST | 396 | OUT | |
May 16, 2024 04:42:10.937678099 CEST | 122 | IN | |
May 16, 2024 04:42:10.939299107 CEST | 396 | OUT | |
May 16, 2024 04:42:11.078484058 CEST | 122 | IN | |
May 16, 2024 04:42:11.129023075 CEST | 396 | OUT | |
May 16, 2024 04:42:11.267376900 CEST | 122 | IN | |
May 16, 2024 04:42:11.270662069 CEST | 396 | OUT | |
May 16, 2024 04:42:11.410870075 CEST | 122 | IN | |
May 16, 2024 04:42:11.412802935 CEST | 396 | OUT | |
May 16, 2024 04:42:11.555500031 CEST | 122 | IN | |
May 16, 2024 04:42:11.556766033 CEST | 396 | OUT | |
May 16, 2024 04:42:11.696563005 CEST | 122 | IN | |
May 16, 2024 04:42:11.697784901 CEST | 396 | OUT | |
May 16, 2024 04:42:11.836520910 CEST | 122 | IN | |
May 16, 2024 04:42:11.838390112 CEST | 396 | OUT | |
May 16, 2024 04:42:11.978198051 CEST | 122 | IN | |
May 16, 2024 04:42:11.979671001 CEST | 396 | OUT | |
May 16, 2024 04:42:12.118927956 CEST | 122 | IN | |
May 16, 2024 04:42:12.120992899 CEST | 396 | OUT | |
May 16, 2024 04:42:12.260911942 CEST | 122 | IN | |
May 16, 2024 04:42:12.262370110 CEST | 396 | OUT | |
May 16, 2024 04:42:12.401886940 CEST | 122 | IN | |
May 16, 2024 04:42:12.403271914 CEST | 396 | OUT | |
May 16, 2024 04:42:12.543386936 CEST | 122 | IN | |
May 16, 2024 04:42:12.544778109 CEST | 396 | OUT | |
May 16, 2024 04:42:12.685200930 CEST | 122 | IN | |
May 16, 2024 04:42:12.686405897 CEST | 396 | OUT | |
May 16, 2024 04:42:12.825625896 CEST | 122 | IN | |
May 16, 2024 04:42:12.845892906 CEST | 396 | OUT | |
May 16, 2024 04:42:12.984716892 CEST | 122 | IN | |
May 16, 2024 04:42:12.986229897 CEST | 396 | OUT | |
May 16, 2024 04:42:13.126019955 CEST | 122 | IN | |
May 16, 2024 04:42:13.127391100 CEST | 396 | OUT | |
May 16, 2024 04:42:13.266900063 CEST | 122 | IN | |
May 16, 2024 04:42:13.268435001 CEST | 396 | OUT | |
May 16, 2024 04:42:13.407656908 CEST | 122 | IN | |
May 16, 2024 04:42:13.409476042 CEST | 396 | OUT | |
May 16, 2024 04:42:13.549118996 CEST | 122 | IN | |
May 16, 2024 04:42:13.623631001 CEST | 396 | OUT | |
May 16, 2024 04:42:13.763701916 CEST | 122 | IN | |
May 16, 2024 04:42:13.765256882 CEST | 396 | OUT | |
May 16, 2024 04:42:13.904340982 CEST | 122 | IN | |
May 16, 2024 04:42:13.906250954 CEST | 396 | OUT | |
May 16, 2024 04:42:14.048527002 CEST | 122 | IN | |
May 16, 2024 04:42:14.049762011 CEST | 396 | OUT | |
May 16, 2024 04:42:14.189699888 CEST | 122 | IN | |
May 16, 2024 04:42:14.205003023 CEST | 396 | OUT | |
May 16, 2024 04:42:14.344145060 CEST | 122 | IN | |
May 16, 2024 04:42:14.345777988 CEST | 396 | OUT | |
May 16, 2024 04:42:14.493298054 CEST | 122 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.7 | 49699 | 194.180.191.24 | 443 | 2376 | C:\Windows\SysWOW64\msiexec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-05-16 02:42:07 UTC | 171 | OUT | |
2024-05-16 02:42:07 UTC | 180 | IN | |
2024-05-16 02:42:07 UTC | 283 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 04:41:58 |
Start date: | 16/05/2024 |
Path: | C:\Windows\System32\msiexec.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff798310000 |
File size: | 69'632 bytes |
MD5 hash: | E5DA170027542E25EDE42FC54C929077 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 04:41:58 |
Start date: | 16/05/2024 |
Path: | C:\Windows\System32\msiexec.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff798310000 |
File size: | 69'632 bytes |
MD5 hash: | E5DA170027542E25EDE42FC54C929077 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 3 |
Start time: | 04:41:59 |
Start date: | 16/05/2024 |
Path: | C:\Windows\SysWOW64\msiexec.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x810000 |
File size: | 59'904 bytes |
MD5 hash: | 9D09DC1EDA745A5F87553048E57620CF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |