Windows
Analysis Report
LisectAVT_2403002B_55.exe
Overview
General Information
Detection
Score: | 72 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- LisectAVT_2403002B_55.exe (PID: 5508 cmdline:
"C:\Users\ user\Deskt op\LisectA VT_2403002 B_55.exe" MD5: 9420D134BC3579423A69E90821311CDC) - conhost.exe (PID: 3404 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- svchost.exe (PID: 1464 cmdline:
C:\Windows \System32\ svchost.ex e -k Local Service -p -s Licens eManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
xmrig | According to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information. | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security |
Source: | Author: vburov: |
Timestamp: | 2024-07-25T11:40:58.384154+0200 |
SID: | 2022930 |
Source Port: | 443 |
Destination Port: | 62255 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 2024-07-25T11:39:57.135683+0200 |
SID: | 2022930 |
Source Port: | 443 |
Destination Port: | 49704 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 2024-07-25T11:39:09.076683+0200 |
SID: | 2826930 |
Source Port: | 62256 |
Destination Port: | 13333 |
Protocol: | TCP |
Classtype: | Crypto Currency Mining Activity Detected |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Integrated Neural Analysis Model: |
Bitcoin Miner |
---|
Source: | File source: |
Source: | TCP traffic: |
Source: | Static PE information: |
Source: | TCP traffic: |
Source: | ASN Name: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | Process Stats: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Classification label: |
Source: | Mutant created: |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | Signature Results: |
Source: | System information queried: | Jump to behavior |
Source: | Last function: |
Source: | Binary or memory string: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 2 Process Injection | 1 Virtualization/Sandbox Evasion | OS Credential Dumping | 21 Security Software Discovery | Remote Services | Data from Local System | 1 Non-Standard Port | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Software Packing | LSASS Memory | 1 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 2 Process Injection | Security Account Manager | 1 Process Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | 11 System Information Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | Internet Connection Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | HEUR/AGEN.1357980 |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
auto.c3pool.org | 5.75.158.61 | true | true | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
5.75.158.61 | auto.c3pool.org | Germany | 24940 | HETZNER-ASDE | true |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1481595 |
Start date and time: | 2024-07-25 11:38:13 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 15s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 10 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | LisectAVT_2403002B_55.exe |
Detection: | MAL |
Classification: | mal72.evad.mine.winEXE@3/0@1/1 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- VT rate limit hit for: LisectAVT_2403002B_55.exe
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
5.75.158.61 | Get hash | malicious | Xmrig | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
auto.c3pool.org | Get hash | malicious | Xmrig | Browse |
| |
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | DoublePulsar, ETERNALBLUE, Xmrig | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
HETZNER-ASDE | Get hash | malicious | Emotet | Browse |
| |
Get hash | malicious | Bdaejec, Sodinokibi | Browse |
| ||
Get hash | malicious | Hancitor, Vidar | Browse |
| ||
Get hash | malicious | SmokeLoader | Browse |
| ||
Get hash | malicious | PureLog Stealer, Vidar | Browse |
| ||
Get hash | malicious | Quasar | Browse |
| ||
Get hash | malicious | PureLog Stealer, Vidar | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | PolyRansom | Browse |
|
File type: | |
Entropy (8bit): | 7.9313297489727335 |
TrID: |
|
File name: | LisectAVT_2403002B_55.exe |
File size: | 2'023'951 bytes |
MD5: | 9420d134bc3579423a69e90821311cdc |
SHA1: | 45060ea8a7a17b627f0203ecbaa7c20f6cfbe5e4 |
SHA256: | 3b38b9cf3821288e19450b9b4df1d4e79b20643c7bf7608ce3de97c35b9a0c99 |
SHA512: | 8a60c4b54001256ca434dcf75c1c92bbbcf2afad9ab469a91bd59b598331b0052060feb9666c3212609a770a7f3673d439c2a6ab4c4b8dfde82d20e5d60e46c2 |
SSDEEP: | 49152:jf5NtP4ZrMFuuZJ6rVoNm5AS4XdoPPxq0IyYzObx2:jf5csmV15P8oP5EyYV |
TLSH: | 2B95339B814F08A0F7170F767029C1C0FE956E2916C61AEFC74CB8E7D6B3589194A35B |
File Content Preview: | MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.........'z..I)..I)..I)..J(..I)..L(0.I)...)..I)..M(..I)..J(..I)..L(..I)..M(..I)..M(..I)..H)..I)..H(..I)8.M(..I)..@(..I)..J(..I)...)..I |
Icon Hash: | 878f595d4d473618 |
Entrypoint: | 0x1407fb6d0 |
Entrypoint Section: | GOOD |
Digitally signed: | false |
Imagebase: | 0x140000000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x65BD4884 [Fri Feb 2 19:54:44 2024 UTC] |
TLS Callbacks: | 0x407fb981, 0x1 |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 6649ddb93b9e7fbe447efc05d4b43998 |
Instruction |
---|
push ebx |
push esi |
push edi |
push ebp |
dec eax |
lea esi, dword ptr [FFE18925h] |
dec eax |
lea edi, dword ptr [esi-00613000h] |
dec eax |
lea eax, dword ptr [edi+007AA054h] |
push dword ptr [eax] |
mov dword ptr [eax], 90AD9090h |
push eax |
push edi |
xor ebx, ebx |
xor ecx, ecx |
dec eax |
or ebp, FFFFFFFFh |
call 00007F870106CC85h |
add ebx, ebx |
je 00007F870106CC34h |
rep ret |
mov ebx, dword ptr [esi] |
dec eax |
sub esi, FFFFFFFCh |
adc ebx, ebx |
mov dl, byte ptr [esi] |
rep ret |
dec eax |
lea eax, dword ptr [edi+ebp] |
cmp ecx, 05h |
mov dl, byte ptr [eax] |
jbe 00007F870106CC53h |
dec eax |
cmp ebp, FFFFFFFCh |
jnbe 00007F870106CC4Dh |
sub ecx, 04h |
mov edx, dword ptr [eax] |
dec eax |
add eax, 04h |
sub ecx, 04h |
mov dword ptr [edi], edx |
dec eax |
lea edi, dword ptr [edi+04h] |
jnc 00007F870106CC21h |
add ecx, 04h |
mov dl, byte ptr [eax] |
je 00007F870106CC42h |
dec eax |
inc eax |
mov byte ptr [edi], dl |
sub ecx, 01h |
mov dl, byte ptr [eax] |
dec eax |
lea edi, dword ptr [edi+01h] |
jne 00007F870106CC22h |
rep ret |
cld |
inc ecx |
pop ebx |
jmp 00007F870106CC3Ah |
dec eax |
inc esi |
mov byte ptr [edi], dl |
dec eax |
inc edi |
mov dl, byte ptr [esi] |
add ebx, ebx |
jne 00007F870106CC3Ch |
mov ebx, dword ptr [esi] |
dec eax |
sub esi, FFFFFFFCh |
adc ebx, ebx |
mov dl, byte ptr [esi] |
jc 00007F870106CC18h |
lea eax, dword ptr [ecx+01h] |
jmp 00007F870106CC39h |
dec eax |
inc ecx |
call ebx |
adc eax, eax |
inc ecx |
call ebx |
adc eax, eax |
add ebx, ebx |
jne 00007F870106CC3Ch |
mov ebx, dword ptr [esi] |
dec eax |
sub esi, FFFFFFFCh |
adc ebx, ebx |
mov dl, byte ptr [esi] |
jnc 00007F870106CC16h |
sub eax, 03h |
jc 00007F870106CC4Bh |
shl eax, 08h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x801eb4 | 0x2dc | .rsrc |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x7fc000 | 0x5eb4 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x7bf000 | 0x1fe90 | GOOD |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x802190 | 0x24 | .rsrc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x7fb9a8 | 0x28 | GOOD |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x7fba08 | 0x140 | GOOD |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
GOOD | 0x1000 | 0x613000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
GOOD | 0x614000 | 0x1e8000 | 0x1e7c00 | 70a6a445bb625914bc404a28519b70d4 | False | 0.9791823503972322 | data | 7.938608752319478 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x7fc000 | 0x7000 | 0x6200 | 102439ea3fb0e996dccca7e7caf119ce | False | 0.5770487882653061 | data | 5.521124671724878 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x7fc240 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors | 0.5700867052023122 | ||
RT_ICON | 0x7fc7ac | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | 0.699468085106383 | ||
RT_ICON | 0x7fcc18 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors | 0.7346570397111913 | ||
RT_ICON | 0x7fd4c4 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4224 | 0.6383677298311444 | ||
RT_ICON | 0x7fe570 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors | 0.5751599147121536 | ||
RT_ICON | 0x7ff41c | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9600 | 0.537655601659751 | ||
RT_GROUP_ICON | 0x8019c8 | 0x5a | data | 0.7 | ||
RT_VERSION | 0x801a28 | 0x308 | data | 0.4742268041237113 | ||
RT_MANIFEST | 0x801d34 | 0x17d | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.5931758530183727 |
DLL | Import |
---|---|
ADVAPI32.dll | LsaClose |
bcrypt.dll | BCryptGenRandom |
CRYPT32.dll | CertOpenStore |
IPHLPAPI.DLL | GetAdaptersAddresses |
KERNEL32.DLL | LoadLibraryA, ExitProcess, GetProcAddress, VirtualProtect |
ole32.dll | CoInitializeEx |
SHELL32.dll | SHGetSpecialFolderPathA |
USER32.dll | ShowWindow |
USERENV.dll | GetUserProfileDirectoryW |
WS2_32.dll | ioctlsocket |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | Protocol | SID | Signature | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|---|---|---|
2024-07-25T11:40:58.384154+0200 | TCP | 2022930 | ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow | 443 | 62255 | 52.165.165.26 | 192.168.2.8 |
2024-07-25T11:39:57.135683+0200 | TCP | 2022930 | ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow | 443 | 49704 | 52.165.165.26 | 192.168.2.8 |
2024-07-25T11:39:09.076683+0200 | TCP | 2826930 | ETPRO COINMINER XMR CoinMiner Usage | 62256 | 13333 | 192.168.2.8 | 5.75.158.61 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jul 25, 2024 11:42:34.068622112 CEST | 62256 | 13333 | 192.168.2.8 | 5.75.158.61 |
Jul 25, 2024 11:42:34.073596954 CEST | 13333 | 62256 | 5.75.158.61 | 192.168.2.8 |
Jul 25, 2024 11:42:34.073684931 CEST | 62256 | 13333 | 192.168.2.8 | 5.75.158.61 |
Jul 25, 2024 11:42:34.073890924 CEST | 62256 | 13333 | 192.168.2.8 | 5.75.158.61 |
Jul 25, 2024 11:42:34.079011917 CEST | 13333 | 62256 | 5.75.158.61 | 192.168.2.8 |
Jul 25, 2024 11:42:34.079166889 CEST | 13333 | 62256 | 5.75.158.61 | 192.168.2.8 |
Jul 25, 2024 11:42:34.728892088 CEST | 13333 | 62256 | 5.75.158.61 | 192.168.2.8 |
Jul 25, 2024 11:42:34.810940027 CEST | 62256 | 13333 | 192.168.2.8 | 5.75.158.61 |
Jul 25, 2024 11:43:03.085855961 CEST | 62256 | 13333 | 192.168.2.8 | 5.75.158.61 |
Jul 25, 2024 11:43:03.090914965 CEST | 13333 | 62256 | 5.75.158.61 | 192.168.2.8 |
Jul 25, 2024 11:43:03.330029964 CEST | 13333 | 62256 | 5.75.158.61 | 192.168.2.8 |
Jul 25, 2024 11:43:03.514115095 CEST | 62256 | 13333 | 192.168.2.8 | 5.75.158.61 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jul 25, 2024 11:40:15.225584984 CEST | 53 | 51291 | 1.1.1.1 | 192.168.2.8 |
Jul 25, 2024 11:42:34.055481911 CEST | 58400 | 53 | 192.168.2.8 | 1.1.1.1 |
Jul 25, 2024 11:42:34.066077948 CEST | 53 | 58400 | 1.1.1.1 | 192.168.2.8 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jul 25, 2024 11:42:34.055481911 CEST | 192.168.2.8 | 1.1.1.1 | 0xabcf | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jul 25, 2024 11:42:34.066077948 CEST | 1.1.1.1 | 192.168.2.8 | 0xabcf | No error (0) | 5.75.158.61 | A (IP address) | IN (0x0001) | false | ||
Jul 25, 2024 11:42:34.066077948 CEST | 1.1.1.1 | 192.168.2.8 | 0xabcf | No error (0) | 88.198.117.174 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 05:39:11 |
Start date: | 25/07/2024 |
Path: | C:\Users\user\Desktop\LisectAVT_2403002B_55.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff698280000 |
File size: | 2'023'951 bytes |
MD5 hash: | 9420D134BC3579423A69E90821311CDC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 1 |
Start time: | 05:39:11 |
Start date: | 25/07/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6ee680000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 6 |
Start time: | 05:39:59 |
Start date: | 25/07/2024 |
Path: | C:\Windows\System32\svchost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff67e6d0000 |
File size: | 55'320 bytes |
MD5 hash: | B7F884C1B74A263F746EE12A5F7C9F6A |
Has elevated privileges: | true |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |