Windows
Analysis Report
WSLRT.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- WSLRT.exe (PID: 6800 cmdline:
"C:\Users\ user\Deskt op\WSLRT.e xe" MD5: 7DADBF556492F9DE788752000420C6F6) - dxdiag.exe (PID: 2596 cmdline:
"C:\Window s\SysWOW64 \dxdiag.ex e" MD5: 24D3F0DB6CCF0C341EA4F6B206DF2EDF)
- cleanup
{"C2 url": ["se-blurry.biz", "covery-mover.biz", "zinc-sneark.biz", "fixxyplanterv.click", "formy-spill.biz", "dwell-exclaim.biz", "dare-curbys.biz", "print-vexer.biz", "impend-differ.biz"], "Build id": "ZqchOa--new"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
Click to see the 30 entries |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-13T08:34:28.401455+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49730 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:34:29.413014+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49731 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:34:30.770894+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49732 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:34:31.924788+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49733 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:34:33.330422+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49734 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:34:35.272248+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49735 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:34:36.681814+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49736 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:34:38.800815+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49737 | 172.67.134.197 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-13T08:34:28.885127+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:34:29.889364+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49731 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:34:39.244158+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49737 | 172.67.134.197 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-13T08:34:28.885127+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 172.67.134.197 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-13T08:34:29.889364+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.4 | 49731 | 172.67.134.197 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-13T08:34:32.434366+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49733 | 172.67.134.197 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 1_3_03452565 | |
Source: | Code function: | 1_3_03452565 | |
Source: | Code function: | 1_3_03452565 | |
Source: | Code function: | 1_3_03452565 | |
Source: | Code function: | 1_3_03452565 | |
Source: | Code function: | 1_3_03457135 | |
Source: | Code function: | 1_3_03457135 | |
Source: | Code function: | 1_3_03457135 | |
Source: | Code function: | 1_3_03457135 | |
Source: | Code function: | 1_3_03457135 | |
Source: | Code function: | 1_3_03452565 | |
Source: | Code function: | 1_3_03452565 | |
Source: | Code function: | 1_3_03452565 | |
Source: | Code function: | 1_3_03452565 | |
Source: | Code function: | 1_3_03452565 | |
Source: | Code function: | 1_3_03457135 | |
Source: | Code function: | 1_3_03457135 | |
Source: | Code function: | 1_3_03457135 | |
Source: | Code function: | 1_3_03457135 | |
Source: | Code function: | 1_3_03457135 | |
Source: | Code function: | 1_3_03452565 | |
Source: | Code function: | 1_3_03452565 | |
Source: | Code function: | 1_3_03452565 | |
Source: | Code function: | 1_3_03452565 | |
Source: | Code function: | 1_3_03452565 | |
Source: | Code function: | 1_3_03457135 | |
Source: | Code function: | 1_3_03457135 | |
Source: | Code function: | 1_3_03457135 | |
Source: | Code function: | 1_3_03457135 | |
Source: | Code function: | 1_3_03457135 | |
Source: | Code function: | 1_3_03452565 |
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | System information queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Memory allocated: | Jump to behavior |
Source: | Memory written: | Jump to behavior |
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00007FF73E9FE1EC |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 2 Windows Management Instrumentation | 1 DLL Side-Loading | 311 Process Injection | 11 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 1 System Time Discovery | Remote Services | 41 Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 311 Process Injection | LSASS Memory | 121 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 2 Obfuscated Files or Information | Security Account Manager | 11 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Software Packing | NTDS | 1 Process Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 1 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | Steganography | Cached Domain Credentials | 23 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
58% | Virustotal | Browse | ||
55% | ReversingLabs | Win32.Exploit.LummaC | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
fixxyplanterv.click | 172.67.134.197 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high | ||
false | high | ||
true |
| unknown | |
false | high | ||
false | high | ||
false | high | ||
true |
| unknown | |
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
172.67.134.197 | fixxyplanterv.click | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1589839 |
Start date and time: | 2025-01-13 08:33:17 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 56s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 5 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | WSLRT.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@3/0@1/1 |
EGA Information: | Failed |
HCA Information: | Failed |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.253.45
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target WSLRT.exe, PID 6800 because there are no executed function
- Execution Graph export aborted for target dxdiag.exe, PID 2596 because there are no executed function
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
02:34:28 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
172.67.134.197 | Get hash | malicious | LummaC Stealer | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
fixxyplanterv.click | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Babadeda, DanaBot, KeyLogger, LummaC Stealer, Poverty Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
File type: | |
Entropy (8bit): | 7.7830674350470055 |
TrID: |
|
File name: | WSLRT.exe |
File size: | 12'697'600 bytes |
MD5: | 7dadbf556492f9de788752000420c6f6 |
SHA1: | 1ba1474fa22d88e4bd3300a3ad1abf2a6a422fa8 |
SHA256: | f5ce9b8329c08e9c5351319073a9fac32d2e6ea7ad7d510bf5a61c9d341de7f2 |
SHA512: | 100f29cfafac9e741f95dcb7cfdd10b7e7a632418b336704ba5c26289ddcf485f68dc6aa02739bb0f4ac8a3a6505ebba7436196462b0f9fc1f1e3a35c170cf36 |
SSDEEP: | 196608:MH2/kcOKvhKUPgOuueBA8i0L6md9OSdNmplVhBYeVmtKBcE0+:N/kcOKsUPluN8MtOSEDhgC0+ |
TLSH: | F8D6E118BE77E9C9F47ED032C41516334EB1951D4626DEFA32E60B98EE0B0626FC6274 |
File Content Preview: | MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d....vXg.........."......D...x.................@.............................P............`........................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x14007e1d8 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x140000000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT |
Time Stamp: | 0x675876C3 [Tue Dec 10 17:13:39 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 7bb4e8cef6a9f350a8f5dc71e7b3773c |
Instruction |
---|
dec eax |
sub esp, 28h |
call 00007F44B12E1AB0h |
dec eax |
add esp, 28h |
jmp 00007F44B12E191Fh |
int3 |
int3 |
dec eax |
mov dword ptr [esp+18h], ebx |
push ebp |
dec eax |
mov ebp, esp |
dec eax |
sub esp, 30h |
dec eax |
mov eax, dword ptr [00B527C0h] |
dec eax |
mov ebx, 2DDFA232h |
cdq |
sub eax, dword ptr [eax] |
add byte ptr [eax+3Bh], cl |
ret |
jne 00007F44B12E1B16h |
dec eax |
and dword ptr [ebp+10h], 00000000h |
dec eax |
lea ecx, dword ptr [ebp+10h] |
call dword ptr [00A1377Ah] |
dec eax |
mov eax, dword ptr [ebp+10h] |
dec eax |
mov dword ptr [ebp-10h], eax |
call dword ptr [00A136FCh] |
mov eax, eax |
dec eax |
xor dword ptr [ebp-10h], eax |
call dword ptr [00A136E8h] |
mov eax, eax |
dec eax |
lea ecx, dword ptr [ebp+18h] |
dec eax |
xor dword ptr [ebp-10h], eax |
call dword ptr [00A137E0h] |
mov eax, dword ptr [ebp+18h] |
dec eax |
lea ecx, dword ptr [ebp-10h] |
dec eax |
shl eax, 20h |
dec eax |
xor eax, dword ptr [ebp+18h] |
dec eax |
xor eax, dword ptr [ebp-10h] |
dec eax |
xor eax, ecx |
dec eax |
mov ecx, FFFFFFFFh |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xa91588 | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xbda000 | 0x1b4 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0xbd4000 | 0x2694 | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xbdb000 | 0x493b4 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0xa90bb0 | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0xa87d40 | 0x140 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0xa91850 | 0x2a0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x94386 | 0x94400 | 58dc89d5942396d2fb07a3aae556552b | False | 0.5879449699620574 | data | 6.955121861927559 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x96000 | 0x9ff7dc | 0x9ff800 | 84946fa80dc136dc6d332d3f71ba7b1b | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xa96000 | 0x13d270 | 0x13ba00 | b65e0af8c4910b0a11353dbdbad53e73 | False | 0.2597021967821782 | OpenPGP Public Key | 4.9045040045973245 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0xbd4000 | 0x2694 | 0x2800 | 27214f25b863fb8ba73daf6d544a8766 | False | 0.4875 | data | 5.666371736680218 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.fptable | 0xbd7000 | 0x100 | 0x200 | bf619eac0cdf3f68d496ea9344137e8b | False | 0.02734375 | data | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.tls | 0xbd8000 | 0x9 | 0x200 | 1f354d76203061bfdd5a53dae48d5435 | False | 0.033203125 | data | 0.020393135236084953 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
_RDATA | 0xbd9000 | 0x280 | 0x400 | 42627bf1df88622aca481310d8cbc1ff | False | 0.287109375 | data | 3.183167776444881 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0xbda000 | 0x1b4 | 0x200 | 2e77bf60acacb601d81615a014e963b7 | False | 0.4921875 | data | 5.109292165198166 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xbdb000 | 0x493b4 | 0x49400 | 2ac66bb1c87141a4abb770c83cdca551 | False | 0.014698432167235495 | data | 5.429112974746318 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_MANIFEST | 0xbda058 | 0x15b | ASCII text, with CRLF line terminators | English | United States | 0.5446685878962536 |
DLL | Import |
---|---|
KERNEL32.dll | AcquireSRWLockExclusive, CloseHandle, CreateFileW, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, FindClose, FindFirstFileExW, FindNextFileW, FlsAlloc, FlsFree, FlsGetValue, FlsSetValue, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetFileType, GetLastError, GetLocaleInfoW, GetModuleFileNameW, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, GetUserDefaultLCID, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, LCMapStringEx, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReleaseSRWLockExclusive, RtlCaptureContext, RtlLookupFunctionEntry, RtlPcToFileHeader, RtlUnwindEx, RtlVirtualUnwind, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, SleepConditionVariableSRW, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, VirtualProtect, WakeAllConditionVariable, WideCharToMultiByte, WriteConsoleW, WriteFile |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-13T08:34:28.401455+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49730 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:34:28.885127+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49730 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:34:28.885127+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49730 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:34:29.413014+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49731 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:34:29.889364+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.4 | 49731 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:34:29.889364+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49731 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:34:30.770894+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49732 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:34:31.924788+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49733 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:34:32.434366+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.4 | 49733 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:34:33.330422+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49734 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:34:35.272248+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49735 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:34:36.681814+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49736 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:34:38.800815+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49737 | 172.67.134.197 | 443 | TCP |
2025-01-13T08:34:39.244158+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49737 | 172.67.134.197 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 13, 2025 08:34:27.771608114 CET | 49730 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:27.771646976 CET | 443 | 49730 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:27.771739006 CET | 49730 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:27.774838924 CET | 49730 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:27.774853945 CET | 443 | 49730 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:28.401390076 CET | 443 | 49730 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:28.401454926 CET | 49730 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:28.406434059 CET | 49730 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:28.406447887 CET | 443 | 49730 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:28.406713963 CET | 443 | 49730 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:28.459268093 CET | 49730 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:28.465204954 CET | 49730 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:28.465228081 CET | 49730 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:28.465416908 CET | 443 | 49730 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:28.885132074 CET | 443 | 49730 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:28.885225058 CET | 443 | 49730 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:28.885389090 CET | 49730 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:28.886956930 CET | 49730 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:28.886982918 CET | 443 | 49730 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:28.886996984 CET | 49730 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:28.887003899 CET | 443 | 49730 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:28.941662073 CET | 49731 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:28.941709042 CET | 443 | 49731 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:28.941787958 CET | 49731 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:28.942115068 CET | 49731 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:28.942137003 CET | 443 | 49731 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:29.412910938 CET | 443 | 49731 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:29.413013935 CET | 49731 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:29.415076017 CET | 49731 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:29.415093899 CET | 443 | 49731 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:29.415565014 CET | 443 | 49731 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:29.425688028 CET | 49731 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:29.425719976 CET | 49731 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:29.425775051 CET | 443 | 49731 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:29.889352083 CET | 443 | 49731 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:29.889439106 CET | 443 | 49731 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:29.889472008 CET | 443 | 49731 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:29.889498949 CET | 443 | 49731 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:29.889529943 CET | 443 | 49731 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:29.889530897 CET | 49731 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:29.889563084 CET | 443 | 49731 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:29.889566898 CET | 49731 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:29.889580011 CET | 443 | 49731 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:29.889609098 CET | 49731 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:29.889967918 CET | 443 | 49731 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:29.890022039 CET | 49731 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:29.890041113 CET | 443 | 49731 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:29.894028902 CET | 443 | 49731 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:29.894104004 CET | 49731 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:29.894128084 CET | 443 | 49731 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:29.959285021 CET | 49731 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:29.959323883 CET | 443 | 49731 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:29.977761030 CET | 443 | 49731 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:29.977806091 CET | 443 | 49731 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:29.977842093 CET | 49731 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:29.977861881 CET | 443 | 49731 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:29.977905989 CET | 443 | 49731 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:29.977907896 CET | 49731 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:29.977952957 CET | 49731 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:30.046045065 CET | 49731 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:30.046088934 CET | 443 | 49731 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:30.046111107 CET | 49731 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:30.046118975 CET | 443 | 49731 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:30.284250975 CET | 49732 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:30.284297943 CET | 443 | 49732 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:30.284414053 CET | 49732 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:30.284775972 CET | 49732 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:30.284796000 CET | 443 | 49732 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:30.770827055 CET | 443 | 49732 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:30.770894051 CET | 49732 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:30.773230076 CET | 49732 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:30.773240089 CET | 443 | 49732 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:30.773492098 CET | 443 | 49732 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:30.775429964 CET | 49732 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:30.775702953 CET | 49732 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:30.775768042 CET | 443 | 49732 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:30.775830030 CET | 49732 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:30.775839090 CET | 443 | 49732 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:31.307648897 CET | 443 | 49732 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:31.307768106 CET | 443 | 49732 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:31.307840109 CET | 49732 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:31.307992935 CET | 49732 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:31.308016062 CET | 443 | 49732 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:31.436989069 CET | 49733 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:31.437081099 CET | 443 | 49733 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:31.437169075 CET | 49733 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:31.437668085 CET | 49733 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:31.437685966 CET | 443 | 49733 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:31.924668074 CET | 443 | 49733 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:31.924787998 CET | 49733 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:31.926105976 CET | 49733 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:31.926136971 CET | 443 | 49733 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:31.926508904 CET | 443 | 49733 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:31.927783012 CET | 49733 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:31.927932978 CET | 49733 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:31.927980900 CET | 443 | 49733 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:32.434355021 CET | 443 | 49733 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:32.434490919 CET | 443 | 49733 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:32.434561014 CET | 49733 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:32.434672117 CET | 49733 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:32.434688091 CET | 443 | 49733 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:32.696429968 CET | 49734 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:32.696496010 CET | 443 | 49734 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:32.696563005 CET | 49734 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:32.696863890 CET | 49734 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:32.696886063 CET | 443 | 49734 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:33.330180883 CET | 443 | 49734 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:33.330421925 CET | 49734 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:33.331969976 CET | 49734 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:33.331979990 CET | 443 | 49734 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:33.332210064 CET | 443 | 49734 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:33.333683014 CET | 49734 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:33.333683014 CET | 49734 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:33.333719969 CET | 443 | 49734 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:33.333789110 CET | 49734 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:33.333789110 CET | 49734 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:33.333798885 CET | 443 | 49734 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:33.379322052 CET | 443 | 49734 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:34.274518967 CET | 443 | 49734 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:34.274640083 CET | 443 | 49734 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:34.274792910 CET | 49734 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:34.274895906 CET | 49734 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:34.274914026 CET | 443 | 49734 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:34.795576096 CET | 49735 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:34.795644045 CET | 443 | 49735 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:34.795752048 CET | 49735 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:34.796111107 CET | 49735 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:34.796127081 CET | 443 | 49735 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:35.272123098 CET | 443 | 49735 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:35.272248030 CET | 49735 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:35.273883104 CET | 49735 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:35.273917913 CET | 443 | 49735 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:35.274303913 CET | 443 | 49735 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:35.275473118 CET | 49735 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:35.275543928 CET | 49735 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:35.275557041 CET | 443 | 49735 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:35.709489107 CET | 443 | 49735 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:35.709615946 CET | 443 | 49735 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:35.709667921 CET | 49735 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:35.709758043 CET | 49735 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:35.709774971 CET | 443 | 49735 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:36.196218967 CET | 49736 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:36.196266890 CET | 443 | 49736 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:36.196341038 CET | 49736 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:36.196651936 CET | 49736 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:36.196666956 CET | 443 | 49736 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:36.681617022 CET | 443 | 49736 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:36.681813955 CET | 49736 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:36.683408976 CET | 49736 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:36.683418036 CET | 443 | 49736 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:36.683985949 CET | 443 | 49736 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:36.686009884 CET | 49736 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:36.686803102 CET | 49736 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:36.686835051 CET | 443 | 49736 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:36.686963081 CET | 49736 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:36.686992884 CET | 443 | 49736 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:36.687103033 CET | 49736 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:36.687180996 CET | 443 | 49736 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:36.687304974 CET | 49736 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:36.687335014 CET | 443 | 49736 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:36.687465906 CET | 49736 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:36.687491894 CET | 443 | 49736 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:36.687644005 CET | 49736 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:36.687669039 CET | 443 | 49736 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:36.687685966 CET | 49736 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:36.687814951 CET | 49736 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:36.687841892 CET | 49736 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:36.696866989 CET | 443 | 49736 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:36.697004080 CET | 49736 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:36.697040081 CET | 443 | 49736 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:36.697058916 CET | 49736 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:36.697072983 CET | 49736 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:36.697118044 CET | 443 | 49736 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:36.697180986 CET | 49736 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:36.697201014 CET | 443 | 49736 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:36.697220087 CET | 49736 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:36.697247982 CET | 49736 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:36.701782942 CET | 443 | 49736 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:38.244713068 CET | 443 | 49736 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:38.244816065 CET | 443 | 49736 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:38.244911909 CET | 49736 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:38.245172977 CET | 49736 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:38.245192051 CET | 443 | 49736 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:38.314352989 CET | 49737 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:38.314440966 CET | 443 | 49737 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:38.314531088 CET | 49737 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:38.314899921 CET | 49737 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:38.314937115 CET | 443 | 49737 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:38.800734043 CET | 443 | 49737 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:38.800815105 CET | 49737 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:38.802011013 CET | 49737 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:38.802043915 CET | 443 | 49737 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:38.802443027 CET | 443 | 49737 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:38.803963900 CET | 49737 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:38.804008007 CET | 49737 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:38.804079056 CET | 443 | 49737 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:39.244124889 CET | 443 | 49737 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:39.244249105 CET | 443 | 49737 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:39.244303942 CET | 49737 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:39.244452000 CET | 49737 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:39.244491100 CET | 443 | 49737 | 172.67.134.197 | 192.168.2.4 |
Jan 13, 2025 08:34:39.244520903 CET | 49737 | 443 | 192.168.2.4 | 172.67.134.197 |
Jan 13, 2025 08:34:39.244535923 CET | 443 | 49737 | 172.67.134.197 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 13, 2025 08:34:27.753268003 CET | 59643 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 13, 2025 08:34:27.765988111 CET | 53 | 59643 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 13, 2025 08:34:27.753268003 CET | 192.168.2.4 | 1.1.1.1 | 0x1626 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 13, 2025 08:34:27.765988111 CET | 1.1.1.1 | 192.168.2.4 | 0x1626 | No error (0) | 172.67.134.197 | A (IP address) | IN (0x0001) | false | ||
Jan 13, 2025 08:34:27.765988111 CET | 1.1.1.1 | 192.168.2.4 | 0x1626 | No error (0) | 104.21.6.116 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49730 | 172.67.134.197 | 443 | 2596 | C:\Windows\SysWOW64\dxdiag.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-13 07:34:28 UTC | 266 | OUT | |
2025-01-13 07:34:28 UTC | 8 | OUT | |
2025-01-13 07:34:28 UTC | 1123 | IN | |
2025-01-13 07:34:28 UTC | 7 | IN | |
2025-01-13 07:34:28 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49731 | 172.67.134.197 | 443 | 2596 | C:\Windows\SysWOW64\dxdiag.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-13 07:34:29 UTC | 267 | OUT | |
2025-01-13 07:34:29 UTC | 45 | OUT | |
2025-01-13 07:34:29 UTC | 1131 | IN | |
2025-01-13 07:34:29 UTC | 238 | IN | |
2025-01-13 07:34:29 UTC | 894 | IN | |
2025-01-13 07:34:29 UTC | 1369 | IN | |
2025-01-13 07:34:29 UTC | 1369 | IN | |
2025-01-13 07:34:29 UTC | 1369 | IN | |
2025-01-13 07:34:29 UTC | 1369 | IN | |
2025-01-13 07:34:29 UTC | 1369 | IN | |
2025-01-13 07:34:29 UTC | 1369 | IN | |
2025-01-13 07:34:29 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49732 | 172.67.134.197 | 443 | 2596 | C:\Windows\SysWOW64\dxdiag.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-13 07:34:30 UTC | 280 | OUT | |
2025-01-13 07:34:30 UTC | 15331 | OUT | |
2025-01-13 07:34:30 UTC | 2800 | OUT | |
2025-01-13 07:34:31 UTC | 1129 | IN | |
2025-01-13 07:34:31 UTC | 20 | IN | |
2025-01-13 07:34:31 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49733 | 172.67.134.197 | 443 | 2596 | C:\Windows\SysWOW64\dxdiag.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-13 07:34:31 UTC | 275 | OUT | |
2025-01-13 07:34:31 UTC | 8728 | OUT | |
2025-01-13 07:34:32 UTC | 1127 | IN | |
2025-01-13 07:34:32 UTC | 20 | IN | |
2025-01-13 07:34:32 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49734 | 172.67.134.197 | 443 | 2596 | C:\Windows\SysWOW64\dxdiag.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-13 07:34:33 UTC | 277 | OUT | |
2025-01-13 07:34:33 UTC | 15331 | OUT | |
2025-01-13 07:34:33 UTC | 5056 | OUT | |
2025-01-13 07:34:34 UTC | 1139 | IN | |
2025-01-13 07:34:34 UTC | 20 | IN | |
2025-01-13 07:34:34 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49735 | 172.67.134.197 | 443 | 2596 | C:\Windows\SysWOW64\dxdiag.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-13 07:34:35 UTC | 279 | OUT | |
2025-01-13 07:34:35 UTC | 1218 | OUT | |
2025-01-13 07:34:35 UTC | 1126 | IN | |
2025-01-13 07:34:35 UTC | 20 | IN | |
2025-01-13 07:34:35 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49736 | 172.67.134.197 | 443 | 2596 | C:\Windows\SysWOW64\dxdiag.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-13 07:34:36 UTC | 279 | OUT | |
2025-01-13 07:34:36 UTC | 15331 | OUT | |
2025-01-13 07:34:36 UTC | 15331 | OUT | |
2025-01-13 07:34:36 UTC | 15331 | OUT | |
2025-01-13 07:34:36 UTC | 15331 | OUT | |
2025-01-13 07:34:36 UTC | 15331 | OUT | |
2025-01-13 07:34:36 UTC | 15331 | OUT | |
2025-01-13 07:34:36 UTC | 15331 | OUT | |
2025-01-13 07:34:36 UTC | 15331 | OUT | |
2025-01-13 07:34:36 UTC | 15331 | OUT | |
2025-01-13 07:34:36 UTC | 15331 | OUT | |
2025-01-13 07:34:38 UTC | 1131 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49737 | 172.67.134.197 | 443 | 2596 | C:\Windows\SysWOW64\dxdiag.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-13 07:34:38 UTC | 267 | OUT | |
2025-01-13 07:34:38 UTC | 80 | OUT | |
2025-01-13 07:34:39 UTC | 1131 | IN | |
2025-01-13 07:34:39 UTC | 54 | IN | |
2025-01-13 07:34:39 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 02:34:24 |
Start date: | 13/01/2025 |
Path: | C:\Users\user\Desktop\WSLRT.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff73e980000 |
File size: | 12'697'600 bytes |
MD5 hash: | 7DADBF556492F9DE788752000420C6F6 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 02:34:26 |
Start date: | 13/01/2025 |
Path: | C:\Windows\SysWOW64\dxdiag.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x160000 |
File size: | 222'720 bytes |
MD5 hash: | 24D3F0DB6CCF0C341EA4F6B206DF2EDF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | moderate |
Has exited: | true |
Function 00007FF73E9FE1EC Relevance: 6.0, APIs: 4, Instructions: 39timethreadCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|