Windows
Analysis Report
wssvZm9dNK.exe
Overview
General Information
Sample name: | wssvZm9dNK.exerenamed because original name is a hash value |
Original sample name: | 2c5697f085b66bec06e28ed6d24ec606.exe |
Analysis ID: | 1461765 |
MD5: | 2c5697f085b66bec06e28ed6d24ec606 |
SHA1: | a3910a0f75b328f996983847cfdcc5df85520e98 |
SHA256: | 432dc35a995a5ba33b1f3887b3cc7804fcc3d5d2b1d4aec2664acaf20cb11bad |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w7x64
- wssvZm9dNK.exe (PID: 2036 cmdline:
"C:\Users\ user\Deskt op\wssvZm9 dNK.exe" MD5: 2C5697F085B66BEC06E28ED6D24EC606) - cmd.exe (PID: 2964 cmdline:
"cmd.exe" /C chcp 65 001 && net sh wlan sh ow profile | findstr All MD5: AD7B9C14083B52BC532FBA5948342B98) - chcp.com (PID: 2776 cmdline:
chcp 65001 MD5: 4436B1A16BDC58D2B3A5263F042C09B3) - netsh.exe (PID: 2712 cmdline:
netsh wlan show prof ile MD5: 784A50A6A09C25F011C3143DDD68E729) - findstr.exe (PID: 2120 cmdline:
findstr Al l MD5: 18F02C555FBC9885DF9DB77754D6BB9B)
- msiexec.exe (PID: 3040 cmdline:
C:\Windows \system32\ msiexec.ex e /V MD5: AC2E7152124CEED36846BD1B6592A00F)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PXRECVOWEIWOEI | Yara detected PXRECVOWEIWOEI Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_PXRECVOWEIWOEI | Yara detected PXRECVOWEIWOEI Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AntiVM_3 | Yara detected AntiVM_3 | Joe Security |
Source: | Author: Brandon George (blog post), Thomas Patzke: |
Stealing of Sensitive Information |
---|
Source: | Author: Joe Security: |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | HTTPS traffic detected: |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: |
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: |
Source: | HTTPS traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
Source: | Window created: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Classification label: |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | WMI Queries: |
Source: | Key opened: | Jump to behavior |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Data Obfuscation |
---|
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | File source: |
Source: | HTTP traffic detected: |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Binary or memory string: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | WMI Queries: |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Lowering of HIPS / PFW / Operating System Security Settings |
---|
Source: | Process created: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 131 Windows Management Instrumentation | 1 DLL Side-Loading | 11 Process Injection | 11 Disable or Modify Tools | 1 OS Credential Dumping | 341 Security Software Discovery | Remote Services | 1 Email Collection | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 161 Virtualization/Sandbox Evasion | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | 2 Data from Local System | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 11 Process Injection | Security Account Manager | 161 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | 1 Clipboard Data | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Software Packing | NTDS | 1 Application Window Discovery | Distributed Component Object Model | Input Capture | 4 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Timestomp | LSA Secrets | 1 Remote System Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | 1 System Network Configuration Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | Compile After Delivery | DCSync | 44 System Information Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
53% | ReversingLabs | ByteCode-MSIL.Trojan.Zilla | ||
100% | Avira | TR/Dropper.MSIL.Gen | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
whatismyipaddressnow.co | 188.114.96.3 | true | false | unknown | |
ip-api.com | 208.95.112.1 | true | true | unknown | |
icanhazip.com | 104.16.185.241 | true | false | unknown | |
90.168.9.0.in-addr.arpa | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown | |
false |
| unknown | |
false |
| unknown | |
false |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
208.95.112.1 | ip-api.com | United States | 53334 | TUT-ASUS | true | |
188.114.97.3 | unknown | European Union | 13335 | CLOUDFLARENETUS | false | |
188.114.96.3 | whatismyipaddressnow.co | European Union | 13335 | CLOUDFLARENETUS | false | |
104.16.185.241 | icanhazip.com | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1461765 |
Start date and time: | 2024-06-24 16:49:54 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 50s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2) |
Number of analysed new started processes analysed: | 9 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | wssvZm9dNK.exerenamed because original name is a hash value |
Original Sample Name: | 2c5697f085b66bec06e28ed6d24ec606.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@10/9@6/4 |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, conhost.exe
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtAllocateVirtualMemory calls found.
- Report size getting too big, too many NtOpenFile calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: wssvZm9dNK.exe
Time | Type | Description |
---|---|---|
10:50:45 | API Interceptor | |
10:50:55 | API Interceptor | |
10:50:56 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
208.95.112.1 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
188.114.97.3 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Azorult, PureLog Stealer | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
ip-api.com | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
whatismyipaddressnow.co | Get hash | malicious | PXRECVOWEIWOEI Stealer | Browse |
| |
Get hash | malicious | PXRECVOWEIWOEI Stealer | Browse |
| ||
Get hash | malicious | PXRECVOWEIWOEI Stealer | Browse |
| ||
Get hash | malicious | PXRECVOWEIWOEI Stealer | Browse |
| ||
Get hash | malicious | PXRECVOWEIWOEI Stealer | Browse |
| ||
Get hash | malicious | PXRECVOWEIWOEI Stealer | Browse |
| ||
Get hash | malicious | PXRECVOWEIWOEI Stealer | Browse |
| ||
Get hash | malicious | PXRECVOWEIWOEI Stealer | Browse |
| ||
Get hash | malicious | PXRECVOWEIWOEI Stealer | Browse |
| ||
Get hash | malicious | PXRECVOWEIWOEI Stealer | Browse |
| ||
icanhazip.com | Get hash | malicious | LummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, PureLog Stealer, RedLine | Browse |
| |
Get hash | malicious | PXRECVOWEIWOEI Stealer | Browse |
| ||
Get hash | malicious | PXRECVOWEIWOEI Stealer | Browse |
| ||
Get hash | malicious | PXRECVOWEIWOEI Stealer | Browse |
| ||
Get hash | malicious | AsyncRAT, StormKitty, VenomRAT, WorldWind Stealer, XWorm | Browse |
| ||
Get hash | malicious | PXRECVOWEIWOEI Stealer | Browse |
| ||
Get hash | malicious | PXRECVOWEIWOEI Stealer | Browse |
| ||
Get hash | malicious | PXRECVOWEIWOEI Stealer | Browse |
| ||
Get hash | malicious | PXRECVOWEIWOEI Stealer | Browse |
| ||
Get hash | malicious | PXRECVOWEIWOEI Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Conti, PureLog Stealer, Targeted Ransomware | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Conti, PureLog Stealer, Targeted Ransomware | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Conti, PureLog Stealer, Targeted Ransomware | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
TUT-ASUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
05af1f5ca1b87cc9cc9b25185115607d | Get hash | malicious | Remcos | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | SmokeLoader | Browse |
| ||
Get hash | malicious | Lokibot | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
36f7277af969a6947a61ae0b815907a1 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | FormBook | Browse |
|
Process: | C:\Users\user\Desktop\wssvZm9dNK.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 16384 |
Entropy (8bit): | 1.121508608738599 |
Encrypted: | false |
SSDEEP: | 3:Lt/hV/plfltt/lE9lllnldlHGltdl/l8/V0V6H/qSkBgRzc/e42jtgwS0dB7EWWD:5X9cvVmXy/VXXRYmFZtB7E0MH0cLD |
MD5: | 1DEFC9C4F8AFC884D5714DE065F88E3D |
SHA1: | AE6ABD61EB9592F3804B80A0F4C4214AB2D85102 |
SHA-256: | 6F30E3E5BC88098596885E89B129B847646BBE16B7537FB2A0D876AA8515BF02 |
SHA-512: | B1E4A625E6C3E24BDF5519C9D791E8C97E56381CF8882C4EC861CFC67F09811CED782E2CF51A0D55E434BF5EB5ACC2AA4DB0E7FBF1A7A3D06B5A3E0676360C54 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\wssvZm9dNK.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 40960 |
Entropy (8bit): | 0.7798653713156546 |
Encrypted: | false |
SSDEEP: | 48:L3k+YzHF/8LKBwUf9KfWfkMUEilGc7xBM6vu3f+fmyJqhU:LSe7mlcwilGc7Ha3f+u |
MD5: | CD5ACB5FAA79EEB4CDB481C6939EEC15 |
SHA1: | 527F3091889C553B87B6BC0180E903E2931CCCFE |
SHA-256: | D86AE09AC801C92AF3F2A18515F0C6ACBFA162671A7925405590CA4959B51E96 |
SHA-512: | A79C4D7F592A9E8CC983878B02C0B89DECB77D71F9451C0A5AE3F1E898C42081693C350E0BE0BA52342D51D6A3E198E0E87340AC5E268921623B088113A70D5D |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\wssvZm9dNK.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 131072 |
Entropy (8bit): | 0.07093764277882578 |
Encrypted: | false |
SSDEEP: | 12:DgIfgbz+Kh0sFcw23FmdAc/OPVJXfPNn43etRRIYRJxeYaNcDakMGz:DCf1ysFZ232ANVpP9TJKN0MG |
MD5: | 37F03D0EB1744FFEBCF26E3DB4A4280F |
SHA1: | 0B120B18B36AD6A64C27D3845A5871D10568C92E |
SHA-256: | 4D7F53C9B0D3757074542B9EB246FA5242456418394DAD90D23CB0CE8D664040 |
SHA-512: | 49397393F2E9B43A696606EACCAB285165AD7919C1C0D1BC62B42B6C2DD564AA352E49D1172CCEAEF41F6D1D7856523F96D009CE9EA0968017FAE662167CA5A0 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\wssvZm9dNK.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 122880 |
Entropy (8bit): | 1.4530338001328815 |
Encrypted: | false |
SSDEEP: | 3072:oNghQnzpCp7pfYcVlVRVHLNYhtn8pApNVuVvY:oNghQnzpCp7pfYcVlVRVHLNYhtn8pApr |
MD5: | 9DEFC75D6086CCDBE05ED9EE2159CF84 |
SHA1: | BCF6B1893581F2420564160F784E47E91946269A |
SHA-256: | 04F89C6DE1CA272A5019395A923DEAE68D5F47641AD5623606E3D092BAA7245A |
SHA-512: | D92A772BF416D7BCF0FF3F940E3ECDC4B2130060E85C1EBBBFDD108F535B28F034E1FAD846812607548B02D7AD4DC2BCD11546822E38A6F60ED2D87EB7F5D686 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\wssvZm9dNK.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1146880 |
Entropy (8bit): | 0.15644146423012004 |
Encrypted: | false |
SSDEEP: | 192:CdEcZ6zssdySB+exixS4fS4QS4NS4ibRqwxeKlZfTOmPp80WOpp:+EccZdD3yJnbkw0KlAo5H |
MD5: | E28514A583D6F83F8C67CA62CB891CA7 |
SHA1: | 4107934697F0891B26B16A6E0D9795271353355C |
SHA-256: | B41E251C18B2B1CDD79E33F0B3AB12EAD8EF257969E26BFBB06DB7C70E9E0FFC |
SHA-512: | BF83CD24FEA896D38F07EA61FA639FCE7CC637AB97C6DFE5A6502772DECC4835160F5F49442266024B6564947B0AFB72901A8B1C848AF00808F0A3E08B740E4E |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\wssvZm9dNK.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 20480 |
Entropy (8bit): | 1.3870145383915669 |
Encrypted: | false |
SSDEEP: | 48:TBLOpEO5J/Kd7UEvqckQaKgj5EZwx1wayEgd7kKK9LeYyBlIAO/tXK:hNw0CKaKfu1wai6LeYzN/9K |
MD5: | 1623709C6B2FB813984B1265C26A85F1 |
SHA1: | CCE4DDBE93E97E68359CB6FD71242F796A785F86 |
SHA-256: | 88BCF762A75F085ECD3B12EB2BA81B81A7F8C9CDDDD4DED624BA28566EB7EEAA |
SHA-512: | 6D2E23E4E0D1D912AF3426129F7DE490F23326F6179EEC27AFE28C438CA37493AEA775E62755C76D6A8850DB6D6E70F0D0A8D396A35E869F4BF0F761CDD507D8 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\wssvZm9dNK.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 122880 |
Entropy (8bit): | 1.4530338001328815 |
Encrypted: | false |
SSDEEP: | 3072:oNghQnzpCp7pfYcVlVRVHLNYhtn8pApNVuVvY:oNghQnzpCp7pfYcVlVRVHLNYhtn8pApr |
MD5: | 9DEFC75D6086CCDBE05ED9EE2159CF84 |
SHA1: | BCF6B1893581F2420564160F784E47E91946269A |
SHA-256: | 04F89C6DE1CA272A5019395A923DEAE68D5F47641AD5623606E3D092BAA7245A |
SHA-512: | D92A772BF416D7BCF0FF3F940E3ECDC4B2130060E85C1EBBBFDD108F535B28F034E1FAD846812607548B02D7AD4DC2BCD11546822E38A6F60ED2D87EB7F5D686 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\wssvZm9dNK.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 77824 |
Entropy (8bit): | 1.133993246026424 |
Encrypted: | false |
SSDEEP: | 96:LSGKaEdUDHN3ZMesTyWTJe7uKfeWb3d738Hsa/NlSGIdEd01YLvqAogv5KzzUG+S:uG8mZMDTJQb3OCaM0f6kL1Vumi |
MD5: | 8BB4851AE9495C7F93B4D8A6566E64DB |
SHA1: | B16C29E9DBBC1E1FE5279D593811E9E317D26AF7 |
SHA-256: | 143AD87B1104F156950A14481112E79682AAD645687DF5E8C9232F4B2786D790 |
SHA-512: | DDFD8A6243C2FC5EE7DAE2EAE8D6EA9A51268382730FA3D409A86165AB41386B0E13E4C2F2AC5556C9748E4A160D19B480D7B0EA23BA0671F921CB9E07637149 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\wssvZm9dNK.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 77824 |
Entropy (8bit): | 1.133993246026424 |
Encrypted: | false |
SSDEEP: | 96:LSGKaEdUDHN3ZMesTyWTJe7uKfeWb3d738Hsa/NlSGIdEd01YLvqAogv5KzzUG+S:uG8mZMDTJQb3OCaM0f6kL1Vumi |
MD5: | 8BB4851AE9495C7F93B4D8A6566E64DB |
SHA1: | B16C29E9DBBC1E1FE5279D593811E9E317D26AF7 |
SHA-256: | 143AD87B1104F156950A14481112E79682AAD645687DF5E8C9232F4B2786D790 |
SHA-512: | DDFD8A6243C2FC5EE7DAE2EAE8D6EA9A51268382730FA3D409A86165AB41386B0E13E4C2F2AC5556C9748E4A160D19B480D7B0EA23BA0671F921CB9E07637149 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 5.393437263205704 |
TrID: |
|
File name: | wssvZm9dNK.exe |
File size: | 57'856 bytes |
MD5: | 2c5697f085b66bec06e28ed6d24ec606 |
SHA1: | a3910a0f75b328f996983847cfdcc5df85520e98 |
SHA256: | 432dc35a995a5ba33b1f3887b3cc7804fcc3d5d2b1d4aec2664acaf20cb11bad |
SHA512: | 6a2782f95d13973aefa99ee9503ff4c5d814ce74b20755a60dd39f25dfc5e01af5266c08e2c28eb53c0d6d4912493e3e1c02ca9d2fda3cdf3711e71a9bc0d0c9 |
SSDEEP: | 1536:BxBJBt804BeNBNBRdOemd4HmGECaS3JFF:BxBJBS04BeNBNBRdK2GJsF |
TLSH: | C043522DED50EA96C914F977C8F6F100C37570C76223872E6966ACBA2197727468E0FC |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Z............."...0.................. ........@.. .......................@............@................................ |
Icon Hash: | aaf3e3e3918382a0 |
Entrypoint: | 0x40f5b2 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x83FE105A [Sun Mar 4 09:20:26 2040 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xf568 | 0x4a | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x10000 | 0x6be | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x12000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0xd5b8 | 0xd600 | e4552483185499814aa846ea5cf84428 | False | 0.3599591121495327 | OpenPGP Public Key | 5.474091517006805 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x10000 | 0x6be | 0x800 | 04c8a61356da92d3f8a2a4a962886a13 | False | 0.373046875 | data | 3.713192232392757 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x12000 | 0xc | 0x200 | 74cf21c98df36c56482e6954ead78eee | False | 0.044921875 | data | 0.08153941234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x100a0 | 0x434 | data | 0.43215613382899626 | ||
RT_MANIFEST | 0x104d4 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jun 24, 2024 16:50:49.361504078 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:49.361555099 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:49.361639023 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:49.364950895 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:49.365010023 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:49.842924118 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:49.843144894 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:49.847968102 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:49.848006010 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:49.848567009 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:49.963933945 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.008522034 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.404618979 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.404681921 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.404766083 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.404804945 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.404933929 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.404978037 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.404987097 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.405292034 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.405335903 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.405353069 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.405515909 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.405559063 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.405566931 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.406115055 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.406162977 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.406172037 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.406605005 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.406644106 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.406733036 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.409387112 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.491154909 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.491224051 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.491235018 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.491246939 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.491297960 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.491307020 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.491812944 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.491858006 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.491858959 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.491875887 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.491909981 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.491921902 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.492424011 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.492474079 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.492490053 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.492695093 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.492738962 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.492743015 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.492753029 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.492790937 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.493258953 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.493328094 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.493375063 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.493382931 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.493864059 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.493906975 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.493957996 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.493973970 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.494021893 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.494501114 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.494571924 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.494621038 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.494628906 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.495070934 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.495115995 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.495120049 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.495130062 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.495167971 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.495176077 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.495780945 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.495839119 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.495846033 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.579054117 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.579122066 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.579185009 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.579220057 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.579241037 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.579252958 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.580005884 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.580054998 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.580065012 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.580070972 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.580080032 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.580094099 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.580909967 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.580964088 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.580972910 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.581434011 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.581487894 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.581505060 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.582421064 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.582468987 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.582470894 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.582484007 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.582510948 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.583523035 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.583564997 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.583578110 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.583585978 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.583600044 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.584414959 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.584479094 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.584491968 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.585418940 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.585474014 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.585498095 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.585506916 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.585520029 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.586273909 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.586322069 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.586338997 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.586347103 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.586360931 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.586388111 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.587234974 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.587338924 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.665693998 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.665864944 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.666007042 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.666141033 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.666743994 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.666788101 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.666809082 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.666829109 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.666846037 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.667375088 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.667418957 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.667428970 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.667438030 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.667462111 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.668092012 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.668143034 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.668153048 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.668900013 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.668941021 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.668950081 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.668957949 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.668987036 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.669591904 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.669639111 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.669648886 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.670480013 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.670526981 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.670533895 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.670542955 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.670572996 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.671298027 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.671336889 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.671346903 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.671355009 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.671380997 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.672200918 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.672246933 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.672260046 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.672275066 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.672290087 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.673037052 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.673089981 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.673105955 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.673732996 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.673791885 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.673794031 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.673808098 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.673840046 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.674689054 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.674736023 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.674736977 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.674751043 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.674782038 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.674793959 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.674834013 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.674844027 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.675672054 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.675713062 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.675715923 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.675725937 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.675755024 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.677644968 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.677675962 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.677701950 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.677711010 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.677725077 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.677736998 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.753241062 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.753276110 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.753314018 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.753353119 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.753372908 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.755291939 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.755321026 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.755346060 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.755358934 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.755373955 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.755377054 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.755377054 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.755399942 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.755409956 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.755423069 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.755433083 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.755475998 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.755486012 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.755587101 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.757209063 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.757241011 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.757271051 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.757280111 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.757294893 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.757344961 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.758007050 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.758063078 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.758845091 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.758893967 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.758897066 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.758910894 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.758938074 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.758953094 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.758990049 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.758999109 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.759777069 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.759825945 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.759835005 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.759888887 CEST | 443 | 49164 | 188.114.96.3 | 192.168.2.22 |
Jun 24, 2024 16:50:50.759937048 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:50.760746956 CEST | 49164 | 443 | 192.168.2.22 | 188.114.96.3 |
Jun 24, 2024 16:50:55.439671040 CEST | 49165 | 80 | 192.168.2.22 | 104.16.185.241 |
Jun 24, 2024 16:50:55.444581032 CEST | 80 | 49165 | 104.16.185.241 | 192.168.2.22 |
Jun 24, 2024 16:50:55.444634914 CEST | 49165 | 80 | 192.168.2.22 | 104.16.185.241 |
Jun 24, 2024 16:50:55.444897890 CEST | 49165 | 80 | 192.168.2.22 | 104.16.185.241 |
Jun 24, 2024 16:50:55.449764967 CEST | 80 | 49165 | 104.16.185.241 | 192.168.2.22 |
Jun 24, 2024 16:50:55.915349960 CEST | 80 | 49165 | 104.16.185.241 | 192.168.2.22 |
Jun 24, 2024 16:50:56.124316931 CEST | 80 | 49165 | 104.16.185.241 | 192.168.2.22 |
Jun 24, 2024 16:50:56.124460936 CEST | 49165 | 80 | 192.168.2.22 | 104.16.185.241 |
Jun 24, 2024 16:51:02.148525953 CEST | 49165 | 80 | 192.168.2.22 | 104.16.185.241 |
Jun 24, 2024 16:51:02.153911114 CEST | 80 | 49165 | 104.16.185.241 | 192.168.2.22 |
Jun 24, 2024 16:51:02.154553890 CEST | 49165 | 80 | 192.168.2.22 | 104.16.185.241 |
Jun 24, 2024 16:51:02.171993971 CEST | 49166 | 80 | 192.168.2.22 | 208.95.112.1 |
Jun 24, 2024 16:51:02.176996946 CEST | 80 | 49166 | 208.95.112.1 | 192.168.2.22 |
Jun 24, 2024 16:51:02.177130938 CEST | 49166 | 80 | 192.168.2.22 | 208.95.112.1 |
Jun 24, 2024 16:51:02.177234888 CEST | 49166 | 80 | 192.168.2.22 | 208.95.112.1 |
Jun 24, 2024 16:51:02.187647104 CEST | 80 | 49166 | 208.95.112.1 | 192.168.2.22 |
Jun 24, 2024 16:51:02.649985075 CEST | 80 | 49166 | 208.95.112.1 | 192.168.2.22 |
Jun 24, 2024 16:51:02.864099026 CEST | 80 | 49166 | 208.95.112.1 | 192.168.2.22 |
Jun 24, 2024 16:51:02.864176989 CEST | 49166 | 80 | 192.168.2.22 | 208.95.112.1 |
Jun 24, 2024 16:51:08.130481958 CEST | 49166 | 80 | 192.168.2.22 | 208.95.112.1 |
Jun 24, 2024 16:51:08.136094093 CEST | 80 | 49166 | 208.95.112.1 | 192.168.2.22 |
Jun 24, 2024 16:51:08.136162043 CEST | 49166 | 80 | 192.168.2.22 | 208.95.112.1 |
Jun 24, 2024 16:51:08.175009012 CEST | 49167 | 443 | 192.168.2.22 | 188.114.97.3 |
Jun 24, 2024 16:51:08.175039053 CEST | 443 | 49167 | 188.114.97.3 | 192.168.2.22 |
Jun 24, 2024 16:51:08.175280094 CEST | 49167 | 443 | 192.168.2.22 | 188.114.97.3 |
Jun 24, 2024 16:51:08.251812935 CEST | 49167 | 443 | 192.168.2.22 | 188.114.97.3 |
Jun 24, 2024 16:51:08.251832008 CEST | 443 | 49167 | 188.114.97.3 | 192.168.2.22 |
Jun 24, 2024 16:51:08.730282068 CEST | 443 | 49167 | 188.114.97.3 | 192.168.2.22 |
Jun 24, 2024 16:51:08.730396032 CEST | 49167 | 443 | 192.168.2.22 | 188.114.97.3 |
Jun 24, 2024 16:51:08.868691921 CEST | 49167 | 443 | 192.168.2.22 | 188.114.97.3 |
Jun 24, 2024 16:51:08.868727922 CEST | 443 | 49167 | 188.114.97.3 | 192.168.2.22 |
Jun 24, 2024 16:51:08.869847059 CEST | 443 | 49167 | 188.114.97.3 | 192.168.2.22 |
Jun 24, 2024 16:51:08.882181883 CEST | 49167 | 443 | 192.168.2.22 | 188.114.97.3 |
Jun 24, 2024 16:51:08.882350922 CEST | 49167 | 443 | 192.168.2.22 | 188.114.97.3 |
Jun 24, 2024 16:51:08.882522106 CEST | 443 | 49167 | 188.114.97.3 | 192.168.2.22 |
Jun 24, 2024 16:51:08.882620096 CEST | 49167 | 443 | 192.168.2.22 | 188.114.97.3 |
Jun 24, 2024 16:51:08.882780075 CEST | 443 | 49167 | 188.114.97.3 | 192.168.2.22 |
Jun 24, 2024 16:51:09.367986917 CEST | 443 | 49167 | 188.114.97.3 | 192.168.2.22 |
Jun 24, 2024 16:51:09.368072033 CEST | 443 | 49167 | 188.114.97.3 | 192.168.2.22 |
Jun 24, 2024 16:51:09.368119955 CEST | 49167 | 443 | 192.168.2.22 | 188.114.97.3 |
Jun 24, 2024 16:51:09.368769884 CEST | 49167 | 443 | 192.168.2.22 | 188.114.97.3 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jun 24, 2024 16:50:49.340115070 CEST | 57893 | 53 | 192.168.2.22 | 8.8.8.8 |
Jun 24, 2024 16:50:49.355318069 CEST | 53 | 57893 | 8.8.8.8 | 192.168.2.22 |
Jun 24, 2024 16:50:55.421560049 CEST | 54821 | 53 | 192.168.2.22 | 8.8.8.8 |
Jun 24, 2024 16:50:55.431735039 CEST | 53 | 54821 | 8.8.8.8 | 192.168.2.22 |
Jun 24, 2024 16:50:57.039324045 CEST | 54719 | 53 | 192.168.2.22 | 8.8.8.8 |
Jun 24, 2024 16:50:57.046508074 CEST | 53 | 54719 | 8.8.8.8 | 192.168.2.22 |
Jun 24, 2024 16:51:02.159045935 CEST | 49881 | 53 | 192.168.2.22 | 8.8.8.8 |
Jun 24, 2024 16:51:02.170931101 CEST | 53 | 49881 | 8.8.8.8 | 192.168.2.22 |
Jun 24, 2024 16:51:08.142549992 CEST | 54998 | 53 | 192.168.2.22 | 8.8.8.8 |
Jun 24, 2024 16:51:08.160586119 CEST | 53 | 54998 | 8.8.8.8 | 192.168.2.22 |
Jun 24, 2024 16:51:08.161233902 CEST | 54998 | 53 | 192.168.2.22 | 8.8.8.8 |
Jun 24, 2024 16:51:08.174427986 CEST | 53 | 54998 | 8.8.8.8 | 192.168.2.22 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jun 24, 2024 16:50:49.340115070 CEST | 192.168.2.22 | 8.8.8.8 | 0xd6cd | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jun 24, 2024 16:50:55.421560049 CEST | 192.168.2.22 | 8.8.8.8 | 0xc702 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jun 24, 2024 16:50:57.039324045 CEST | 192.168.2.22 | 8.8.8.8 | 0x432c | Standard query (0) | PTR (Pointer record) | IN (0x0001) | false | |
Jun 24, 2024 16:51:02.159045935 CEST | 192.168.2.22 | 8.8.8.8 | 0xfe5 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jun 24, 2024 16:51:08.142549992 CEST | 192.168.2.22 | 8.8.8.8 | 0x3d23 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jun 24, 2024 16:51:08.161233902 CEST | 192.168.2.22 | 8.8.8.8 | 0x3d23 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jun 24, 2024 16:50:49.355318069 CEST | 8.8.8.8 | 192.168.2.22 | 0xd6cd | No error (0) | 188.114.96.3 | A (IP address) | IN (0x0001) | false | ||
Jun 24, 2024 16:50:49.355318069 CEST | 8.8.8.8 | 192.168.2.22 | 0xd6cd | No error (0) | 188.114.97.3 | A (IP address) | IN (0x0001) | false | ||
Jun 24, 2024 16:50:55.431735039 CEST | 8.8.8.8 | 192.168.2.22 | 0xc702 | No error (0) | 104.16.185.241 | A (IP address) | IN (0x0001) | false | ||
Jun 24, 2024 16:50:55.431735039 CEST | 8.8.8.8 | 192.168.2.22 | 0xc702 | No error (0) | 104.16.184.241 | A (IP address) | IN (0x0001) | false | ||
Jun 24, 2024 16:50:57.046508074 CEST | 8.8.8.8 | 192.168.2.22 | 0x432c | Name error (3) | none | none | PTR (Pointer record) | IN (0x0001) | false | |
Jun 24, 2024 16:51:02.170931101 CEST | 8.8.8.8 | 192.168.2.22 | 0xfe5 | No error (0) | 208.95.112.1 | A (IP address) | IN (0x0001) | false | ||
Jun 24, 2024 16:51:08.160586119 CEST | 8.8.8.8 | 192.168.2.22 | 0x3d23 | No error (0) | 188.114.96.3 | A (IP address) | IN (0x0001) | false | ||
Jun 24, 2024 16:51:08.160586119 CEST | 8.8.8.8 | 192.168.2.22 | 0x3d23 | No error (0) | 188.114.97.3 | A (IP address) | IN (0x0001) | false | ||
Jun 24, 2024 16:51:08.174427986 CEST | 8.8.8.8 | 192.168.2.22 | 0x3d23 | No error (0) | 188.114.97.3 | A (IP address) | IN (0x0001) | false | ||
Jun 24, 2024 16:51:08.174427986 CEST | 8.8.8.8 | 192.168.2.22 | 0x3d23 | No error (0) | 188.114.96.3 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.22 | 49165 | 104.16.185.241 | 80 | 2036 | C:\Users\user\Desktop\wssvZm9dNK.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jun 24, 2024 16:50:55.444897890 CEST | 63 | OUT | |
Jun 24, 2024 16:50:55.915349960 CEST | 534 | IN | |
Jun 24, 2024 16:50:56.124316931 CEST | 534 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.22 | 49166 | 208.95.112.1 | 80 | 2036 | C:\Users\user\Desktop\wssvZm9dNK.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jun 24, 2024 16:51:02.177234888 CEST | 80 | OUT | |
Jun 24, 2024 16:51:02.649985075 CEST | 175 | IN | |
Jun 24, 2024 16:51:02.864099026 CEST | 175 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.22 | 49164 | 188.114.96.3 | 443 | 2036 | C:\Users\user\Desktop\wssvZm9dNK.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-06-24 14:50:49 UTC | 125 | OUT | |
2024-06-24 14:50:50 UTC | 619 | IN | |
2024-06-24 14:50:50 UTC | 750 | IN | |
2024-06-24 14:50:50 UTC | 1369 | IN | |
2024-06-24 14:50:50 UTC | 1369 | IN | |
2024-06-24 14:50:50 UTC | 1369 | IN | |
2024-06-24 14:50:50 UTC | 1369 | IN | |
2024-06-24 14:50:50 UTC | 1060 | IN | |
2024-06-24 14:50:50 UTC | 1369 | IN | |
2024-06-24 14:50:50 UTC | 1369 | IN | |
2024-06-24 14:50:50 UTC | 1369 | IN | |
2024-06-24 14:50:50 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.22 | 49167 | 188.114.97.3 | 443 | 2036 | C:\Users\user\Desktop\wssvZm9dNK.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-06-24 14:51:08 UTC | 202 | OUT | |
2024-06-24 14:51:08 UTC | 1024 | OUT | |
2024-06-24 14:51:08 UTC | 4101 | OUT | |
2024-06-24 14:51:08 UTC | 44 | OUT | |
2024-06-24 14:51:09 UTC | 572 | IN | |
2024-06-24 14:51:09 UTC | 20 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 10:50:45 |
Start date: | 24/06/2024 |
Path: | C:\Users\user\Desktop\wssvZm9dNK.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x230000 |
File size: | 57'856 bytes |
MD5 hash: | 2C5697F085B66BEC06E28ED6D24EC606 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 10:50:53 |
Start date: | 24/06/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x49f10000 |
File size: | 302'592 bytes |
MD5 hash: | AD7B9C14083B52BC532FBA5948342B98 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 10:50:54 |
Start date: | 24/06/2024 |
Path: | C:\Windows\SysWOW64\chcp.com |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x340000 |
File size: | 11'776 bytes |
MD5 hash: | 4436B1A16BDC58D2B3A5263F042C09B3 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 5 |
Start time: | 10:50:54 |
Start date: | 24/06/2024 |
Path: | C:\Windows\SysWOW64\netsh.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1490000 |
File size: | 96'256 bytes |
MD5 hash: | 784A50A6A09C25F011C3143DDD68E729 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 6 |
Start time: | 10:50:54 |
Start date: | 24/06/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x580000 |
File size: | 62'976 bytes |
MD5 hash: | 18F02C555FBC9885DF9DB77754D6BB9B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 7 |
Start time: | 10:50:56 |
Start date: | 24/06/2024 |
Path: | C:\Windows\System32\msiexec.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xff1c0000 |
File size: | 128'512 bytes |
MD5 hash: | AC2E7152124CEED36846BD1B6592A00F |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | false |