Edit tour

Windows Analysis Report
Revolt.bat

Overview

General Information

Sample name:Revolt.bat
Analysis ID:1654530
MD5:085457da30fec8ea0f16f7790bde35c5
SHA1:6a5fb36d0e605143c82a6caa42a408fc5ca8f45e
SHA256:fc5ff6569ef980d7448d2e948dc4f8b3ea8385be2991357648877f0676f10928
Tags:batWsgiDAVuser-JAMESWT_MHT
Infos:

Detection

HTMLPhisher
Score:48
Range:0 - 100
Confidence:100%

Signatures

Yara detected BlockedWebSite
Creates files inside the system directory
Deletes files inside the Windows folder
JA3 SSL client fingerprint seen in connection with other malware

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • chrome.exe (PID: 5872 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: E81F54E6C1129887AEA47E7D092680BF)
    • chrome.exe (PID: 5668 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2496,i,9687974529374164150,7302012809696030839,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=2524 /prefetch:3 MD5: E81F54E6C1129887AEA47E7D092680BF)
  • chrome.exe (PID: 6844 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "C:\Users\user\Desktop\Revolt.bat" MD5: E81F54E6C1129887AEA47E7D092680BF)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Revolt.batJoeSecurity_BlockedWebSiteYara detected BlockedWebSiteJoe Security
    SourceRuleDescriptionAuthorStrings
    0.0.pages.csvJoeSecurity_BlockedWebSiteYara detected BlockedWebSiteJoe Security
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      Phishing

      barindex
      Source: Yara matchFile source: Revolt.bat, type: SAMPLE
      Source: Yara matchFile source: 0.0.pages.csv, type: HTML
      Source: file:///C:/Users/user/Desktop/Revolt.batHTTP Parser: No favicon
      Source: unknownHTTPS traffic detected: 142.251.40.100:443 -> 192.168.2.4:49726 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 131.253.33.254:443 -> 192.168.2.4:49730 version: TLS 1.2
      Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
      Source: unknownTCP traffic detected without corresponding DNS query: 2.17.190.73
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 2.17.190.73
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
      Source: unknownTCP traffic detected without corresponding DNS query: 52.113.196.254
      Source: unknownTCP traffic detected without corresponding DNS query: 52.113.196.254
      Source: unknownTCP traffic detected without corresponding DNS query: 52.113.196.254
      Source: unknownTCP traffic detected without corresponding DNS query: 52.113.196.254
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.254
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.254
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.254
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.254
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
      Source: unknownTCP traffic detected without corresponding DNS query: 23.203.176.221
      Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.254
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficDNS traffic detected: DNS query: www.google.com
      Source: Revolt.batString found in binary or memory: https://www.cloudflare.com/5xx-error-landing
      Source: Revolt.batString found in binary or memory: https://www.cloudflare.com/learning/access-management/phishing-attack/
      Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
      Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
      Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
      Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
      Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
      Source: unknownHTTPS traffic detected: 142.251.40.100:443 -> 192.168.2.4:49726 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 131.253.33.254:443 -> 192.168.2.4:49730 version: TLS 1.2
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\scoped_dir5872_1059601971Jump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile deleted: C:\Windows\SystemTemp\scoped_dir5872_1059601971Jump to behavior
      Source: classification engineClassification label: mal48.phis.winBAT@22/0@2/4
      Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2496,i,9687974529374164150,7302012809696030839,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=2524 /prefetch:3
      Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "C:\Users\user\Desktop\Revolt.bat"
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2496,i,9687974529374164150,7302012809696030839,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=2524 /prefetch:3Jump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath Interception1
      Process Injection
      1
      Masquerading
      OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
      Process Injection
      LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
      File Deletion
      Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1654530 Sample: Revolt.bat Startdate: 02/04/2025 Architecture: WINDOWS Score: 48 22 Yara detected BlockedWebSite 2->22 6 chrome.exe 2 2->6         started        9 chrome.exe 2->9         started        process3 dnsIp4 14 192.168.2.23 unknown unknown 6->14 16 192.168.2.4, 138, 443, 49354 unknown unknown 6->16 18 192.168.2.6 unknown unknown 6->18 11 chrome.exe 6->11         started        process5 dnsIp6 20 www.google.com 142.251.40.100, 443, 49726, 49735 GOOGLEUS United States 11->20

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      No bigger version
      No bigger version
      No bigger version
      No bigger version
      No bigger version
      No bigger version
      No bigger version
      No bigger version
      No bigger version
      No bigger version
      No bigger version
      No bigger version
      No bigger version
      No bigger version
      No bigger version
      No bigger version
      No bigger version
      No bigger version
      No bigger version
      No bigger version
      No bigger version
      No bigger version
      No bigger version
      No bigger version

      windows-stand
      SourceDetectionScannerLabelLink
      Revolt.bat0%VirustotalBrowse
      Revolt.bat0%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      file:///C:/Users/user/Desktop/Revolt.bat0%Avira URL Cloudsafe

      Download Network PCAP: filteredfull

      NameIPActiveMaliciousAntivirus DetectionReputation
      bg.microsoft.map.fastly.net
      199.232.210.172
      truefalse
        high
        www.google.com
        142.251.40.100
        truefalse
          high
          pki-goog.l.google.com
          142.250.65.195
          truefalse
            high
            NameMaliciousAntivirus DetectionReputation
            file:///C:/Users/user/Desktop/Revolt.batfalse
            • Avira URL Cloud: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://www.cloudflare.com/learning/access-management/phishing-attack/Revolt.batfalse
              high
              https://www.cloudflare.com/5xx-error-landingRevolt.batfalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                142.251.40.100
                www.google.comUnited States
                15169GOOGLEUSfalse
                IP
                192.168.2.23
                192.168.2.4
                192.168.2.6
                Joe Sandbox version:42.0.0 Malachite
                Analysis ID:1654530
                Start date and time:2025-04-02 12:11:13 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 5m 12s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:defaultwindowshtmlcookbook.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:14
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:Revolt.bat
                Detection:MAL
                Classification:mal48.phis.winBAT@22/0@2/4
                EGA Information:Failed
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .bat
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                • Excluded IPs from analysis (whitelisted): 199.232.214.172, 199.232.210.172, 142.250.64.78, 142.251.163.84, 172.217.165.142, 142.251.35.174, 142.250.65.206, 142.251.32.110, 142.250.65.174, 142.250.64.110, 142.251.41.3, 142.251.40.142, 142.251.40.110, 142.251.41.14, 142.250.65.195, 184.31.69.3, 20.12.23.50
                • Excluded domains from analysis (whitelisted): a-ring-fallback.msedge.net, clients1.google.com, fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, clientservices.googleapis.com, fe3cr.delivery.mp.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, redirector.gvt1.com, update.googleapis.com, clients.l.google.com, wu-b-net.trafficmanager.net
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtOpenFile calls found.
                No simulations
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                pki-goog.l.google.cominvoice.exeGet hashmaliciousLummaC StealerBrowse
                • 172.217.165.131
                random.exeGet hashmaliciousLummaC StealerBrowse
                • 142.250.80.35
                NVIDIA.exeGet hashmaliciousPureCrypter, AsyncRATBrowse
                • 142.251.35.163
                a.ps1Get hashmaliciousPureCrypter, AsyncRATBrowse
                • 142.250.81.227
                PO-GST-20250401.vbsGet hashmaliciousRemcosBrowse
                • 142.251.32.99
                REQUEST FOR PRICE QUOTATION FOR THE REVISED ITEMS.exeGet hashmaliciousUnknownBrowse
                • 142.250.65.227
                cz4ZwB7N4G.exeGet hashmaliciousUnknownBrowse
                • 142.250.80.99
                https://maltese.com.br/share-sensitive-files-securely/Get hashmaliciousHTMLPhisherBrowse
                • 142.250.80.35
                uninstall.exeGet hashmaliciousUnknownBrowse
                • 142.250.65.227
                VUE-KMH-462E Missed Amex Entry-Mar-25 1.xlsmGet hashmaliciousUnknownBrowse
                • 142.250.65.163
                bg.microsoft.map.fastly.netOneD.ps1Get hashmaliciousUnknownBrowse
                • 199.232.210.172
                Draft Copy.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • 199.232.210.172
                invoice.exeGet hashmaliciousLummaC StealerBrowse
                • 199.232.210.172
                random.exeGet hashmaliciousLummaC StealerBrowse
                • 199.232.214.172
                NVIDIA.exeGet hashmaliciousPureCrypter, AsyncRATBrowse
                • 199.232.214.172
                3UQbvgGmir.exeGet hashmaliciousAsyncRATBrowse
                • 199.232.210.172
                qWR3lUj.exeGet hashmaliciousLummaC StealerBrowse
                • 199.232.210.172
                index.exeGet hashmaliciousPureCrypter, AsyncRATBrowse
                • 199.232.214.172
                a.ps1Get hashmaliciousPureCrypter, AsyncRATBrowse
                • 199.232.210.172
                NVIDIA.exeGet hashmaliciousPureCrypter, AsyncRATBrowse
                • 199.232.210.172
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                28a2c9bd18a11de089ef85a160da29e4cfr4.txt.ps1Get hashmaliciousUnknownBrowse
                • 131.253.33.254
                a.ps1Get hashmaliciousPureCrypter, AsyncRATBrowse
                • 131.253.33.254
                https://rebrand.ly/ittechsupportonlineGet hashmaliciousHTMLPhisherBrowse
                • 131.253.33.254
                https://www.terrabellaseniorliving.com/terrabella-little-avenue/Get hashmaliciousCAPTCHA Scam ClickFixBrowse
                • 131.253.33.254
                https://buildin.ai/share/5a345237-8f26-47b9-9ffb-209d1d646648?code=0GHW42&embed=trueGet hashmaliciousInvisible JS, Tycoon2FABrowse
                • 131.253.33.254
                PO-Payment-Slip.vbsGet hashmaliciousXWormBrowse
                • 131.253.33.254
                F Notice Docx 433 (1).htmlGet hashmaliciousHTMLPhisherBrowse
                • 131.253.33.254
                http://ok.fish-cloud-jar.usGet hashmaliciousUnknownBrowse
                • 131.253.33.254
                http://wovenfacade.com/Get hashmaliciousUnknownBrowse
                • 131.253.33.254
                http://convertix-api.xyzGet hashmaliciousUnknownBrowse
                • 131.253.33.254
                No context
                No created / dropped files found
                File type:HTML document, ASCII text, with very long lines (394)
                Entropy (8bit):5.0502704465531485
                TrID:
                • HyperText Markup Language (15015/1) 20.56%
                • HyperText Markup Language (12001/1) 16.44%
                • HyperText Markup Language (12001/1) 16.44%
                • HyperText Markup Language (11501/1) 15.75%
                • HyperText Markup Language (11501/1) 15.75%
                File name:Revolt.bat
                File size:4'560 bytes
                MD5:085457da30fec8ea0f16f7790bde35c5
                SHA1:6a5fb36d0e605143c82a6caa42a408fc5ca8f45e
                SHA256:fc5ff6569ef980d7448d2e948dc4f8b3ea8385be2991357648877f0676f10928
                SHA512:07568b52bdfcf390942b0f32f81fb8eaab892cbde7aaae84027623ff4cd8cca8dbb15e28e3014461c2f7d98ec6bdadddb0b8db7224fd7f6ca3b1dfd7266ca14c
                SSDEEP:96:1j9jwIjYjUDK/D5DMF+BOiUAt3ZLmmtlrR19PaQxJbGD:1j9jhjYjIK/Vo+tr3Z6mtlr39ieJGD
                TLSH:32918332F9BD153F10D3916265BDA7097AA4C053DB9B099036BCC1761F8EF45AE232C2
                File Content Preview:<!DOCTYPE html>. [if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->. [if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->. [if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->. [if gt IE

                Download Network PCAP: filteredfull

                • Total Packets: 48
                • 443 (HTTPS)
                • 80 (HTTP)
                • 53 (DNS)
                TimestampSource PortDest PortSource IPDest IP
                Apr 2, 2025 12:12:07.115518093 CEST4968180192.168.2.42.17.190.73
                Apr 2, 2025 12:12:13.449750900 CEST49671443192.168.2.4204.79.197.203
                Apr 2, 2025 12:12:13.787367105 CEST49671443192.168.2.4204.79.197.203
                Apr 2, 2025 12:12:14.390733004 CEST49671443192.168.2.4204.79.197.203
                Apr 2, 2025 12:12:15.594454050 CEST49671443192.168.2.4204.79.197.203
                Apr 2, 2025 12:12:16.849433899 CEST4968180192.168.2.42.17.190.73
                Apr 2, 2025 12:12:17.996145964 CEST49671443192.168.2.4204.79.197.203
                Apr 2, 2025 12:12:19.232585907 CEST49726443192.168.2.4142.251.40.100
                Apr 2, 2025 12:12:19.232630968 CEST44349726142.251.40.100192.168.2.4
                Apr 2, 2025 12:12:19.232691050 CEST49726443192.168.2.4142.251.40.100
                Apr 2, 2025 12:12:19.232912064 CEST49726443192.168.2.4142.251.40.100
                Apr 2, 2025 12:12:19.232920885 CEST44349726142.251.40.100192.168.2.4
                Apr 2, 2025 12:12:19.497067928 CEST44349726142.251.40.100192.168.2.4
                Apr 2, 2025 12:12:19.497129917 CEST49726443192.168.2.4142.251.40.100
                Apr 2, 2025 12:12:19.498652935 CEST49726443192.168.2.4142.251.40.100
                Apr 2, 2025 12:12:19.498662949 CEST44349726142.251.40.100192.168.2.4
                Apr 2, 2025 12:12:19.498912096 CEST44349726142.251.40.100192.168.2.4
                Apr 2, 2025 12:12:19.539371014 CEST49726443192.168.2.4142.251.40.100
                Apr 2, 2025 12:12:21.775542974 CEST49678443192.168.2.420.189.173.27
                Apr 2, 2025 12:12:22.084172010 CEST49678443192.168.2.420.189.173.27
                Apr 2, 2025 12:12:22.694138050 CEST49678443192.168.2.420.189.173.27
                Apr 2, 2025 12:12:22.896709919 CEST49671443192.168.2.4204.79.197.203
                Apr 2, 2025 12:12:23.912312984 CEST49678443192.168.2.420.189.173.27
                Apr 2, 2025 12:12:25.158191919 CEST49708443192.168.2.452.113.196.254
                Apr 2, 2025 12:12:25.165101051 CEST49708443192.168.2.452.113.196.254
                Apr 2, 2025 12:12:25.291393995 CEST4434970852.113.196.254192.168.2.4
                Apr 2, 2025 12:12:25.298810959 CEST4434970852.113.196.254192.168.2.4
                Apr 2, 2025 12:12:25.301567078 CEST4434970852.113.196.254192.168.2.4
                Apr 2, 2025 12:12:25.301587105 CEST4434970852.113.196.254192.168.2.4
                Apr 2, 2025 12:12:25.301662922 CEST49708443192.168.2.452.113.196.254
                Apr 2, 2025 12:12:25.301712990 CEST49708443192.168.2.452.113.196.254
                Apr 2, 2025 12:12:25.437455893 CEST49730443192.168.2.4131.253.33.254
                Apr 2, 2025 12:12:25.437499046 CEST44349730131.253.33.254192.168.2.4
                Apr 2, 2025 12:12:25.437608004 CEST49730443192.168.2.4131.253.33.254
                Apr 2, 2025 12:12:25.438013077 CEST49730443192.168.2.4131.253.33.254
                Apr 2, 2025 12:12:25.438028097 CEST44349730131.253.33.254192.168.2.4
                Apr 2, 2025 12:12:26.318605900 CEST49678443192.168.2.420.189.173.27
                Apr 2, 2025 12:12:29.273936033 CEST44349730131.253.33.254192.168.2.4
                Apr 2, 2025 12:12:29.274004936 CEST49730443192.168.2.4131.253.33.254
                Apr 2, 2025 12:12:29.887068033 CEST44349726142.251.40.100192.168.2.4
                Apr 2, 2025 12:12:29.887204885 CEST44349726142.251.40.100192.168.2.4
                Apr 2, 2025 12:12:29.887397051 CEST49726443192.168.2.4142.251.40.100
                Apr 2, 2025 12:12:31.130660057 CEST49678443192.168.2.420.189.173.27
                Apr 2, 2025 12:12:31.132534981 CEST49726443192.168.2.4142.251.40.100
                Apr 2, 2025 12:12:31.132569075 CEST44349726142.251.40.100192.168.2.4
                Apr 2, 2025 12:12:32.506083012 CEST49671443192.168.2.4204.79.197.203
                Apr 2, 2025 12:12:40.740592003 CEST49678443192.168.2.420.189.173.27
                Apr 2, 2025 12:13:14.805712938 CEST804971023.203.176.221192.168.2.4
                Apr 2, 2025 12:13:14.805811882 CEST4971080192.168.2.423.203.176.221
                Apr 2, 2025 12:13:19.146476030 CEST49735443192.168.2.4142.251.40.100
                Apr 2, 2025 12:13:19.146528959 CEST44349735142.251.40.100192.168.2.4
                Apr 2, 2025 12:13:19.146634102 CEST49735443192.168.2.4142.251.40.100
                Apr 2, 2025 12:13:19.146785021 CEST49735443192.168.2.4142.251.40.100
                Apr 2, 2025 12:13:19.146804094 CEST44349735142.251.40.100192.168.2.4
                Apr 2, 2025 12:13:19.412821054 CEST44349735142.251.40.100192.168.2.4
                Apr 2, 2025 12:13:19.416347027 CEST49735443192.168.2.4142.251.40.100
                Apr 2, 2025 12:13:19.416390896 CEST44349735142.251.40.100192.168.2.4
                Apr 2, 2025 12:13:30.226166010 CEST44349735142.251.40.100192.168.2.4
                Apr 2, 2025 12:13:30.226241112 CEST44349735142.251.40.100192.168.2.4
                Apr 2, 2025 12:13:30.226305008 CEST49735443192.168.2.4142.251.40.100
                Apr 2, 2025 12:13:30.444714069 CEST49735443192.168.2.4142.251.40.100
                Apr 2, 2025 12:13:30.444747925 CEST44349735142.251.40.100192.168.2.4
                Apr 2, 2025 12:14:19.210011959 CEST49750443192.168.2.4142.251.40.100
                Apr 2, 2025 12:14:19.210051060 CEST44349750142.251.40.100192.168.2.4
                Apr 2, 2025 12:14:19.210119963 CEST49750443192.168.2.4142.251.40.100
                Apr 2, 2025 12:14:19.210300922 CEST49750443192.168.2.4142.251.40.100
                Apr 2, 2025 12:14:19.210314989 CEST44349750142.251.40.100192.168.2.4
                Apr 2, 2025 12:14:19.452497005 CEST44349750142.251.40.100192.168.2.4
                Apr 2, 2025 12:14:19.452788115 CEST49750443192.168.2.4142.251.40.100
                Apr 2, 2025 12:14:19.452831984 CEST44349750142.251.40.100192.168.2.4
                Apr 2, 2025 12:14:29.490808010 CEST44349750142.251.40.100192.168.2.4
                Apr 2, 2025 12:14:29.490943909 CEST44349750142.251.40.100192.168.2.4
                Apr 2, 2025 12:14:29.492858887 CEST49750443192.168.2.4142.251.40.100
                Apr 2, 2025 12:14:30.163943052 CEST49750443192.168.2.4142.251.40.100
                Apr 2, 2025 12:14:30.163968086 CEST44349750142.251.40.100192.168.2.4
                Apr 2, 2025 12:14:30.941683054 CEST4434970852.113.196.254192.168.2.4
                Apr 2, 2025 12:14:33.058991909 CEST44349730131.253.33.254192.168.2.4
                Apr 2, 2025 12:14:33.059175014 CEST49730443192.168.2.4131.253.33.254
                TimestampSource PortDest PortSource IPDest IP
                Apr 2, 2025 12:12:05.611018896 CEST53517851.1.1.1192.168.2.4
                Apr 2, 2025 12:12:14.919462919 CEST53529211.1.1.1192.168.2.4
                Apr 2, 2025 12:12:15.073945045 CEST53582391.1.1.1192.168.2.4
                Apr 2, 2025 12:12:16.702697992 CEST53567101.1.1.1192.168.2.4
                Apr 2, 2025 12:12:19.087486982 CEST5211753192.168.2.41.1.1.1
                Apr 2, 2025 12:12:19.087707043 CEST5657553192.168.2.41.1.1.1
                Apr 2, 2025 12:12:19.221096992 CEST53565751.1.1.1192.168.2.4
                Apr 2, 2025 12:12:19.231348991 CEST53521171.1.1.1192.168.2.4
                Apr 2, 2025 12:12:33.739598989 CEST53493541.1.1.1192.168.2.4
                Apr 2, 2025 12:12:52.494894981 CEST53647931.1.1.1192.168.2.4
                Apr 2, 2025 12:13:14.520837069 CEST53567121.1.1.1192.168.2.4
                Apr 2, 2025 12:13:15.001956940 CEST53496011.1.1.1192.168.2.4
                Apr 2, 2025 12:13:19.978058100 CEST53591691.1.1.1192.168.2.4
                Apr 2, 2025 12:13:21.264847040 CEST138138192.168.2.4192.168.2.255
                Apr 2, 2025 12:13:46.608915091 CEST53515341.1.1.1192.168.2.4
                Apr 2, 2025 12:14:30.304548025 CEST53506011.1.1.1192.168.2.4
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Apr 2, 2025 12:12:19.087486982 CEST192.168.2.41.1.1.10xd8dStandard query (0)www.google.comA (IP address)IN (0x0001)false
                Apr 2, 2025 12:12:19.087707043 CEST192.168.2.41.1.1.10xbbf4Standard query (0)www.google.com65IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Apr 2, 2025 12:12:05.611018896 CEST1.1.1.1192.168.2.40xd00No error (0)c.pki.googpki-goog.l.google.comCNAME (Canonical name)IN (0x0001)false
                Apr 2, 2025 12:12:05.611018896 CEST1.1.1.1192.168.2.40xd00No error (0)pki-goog.l.google.com142.250.65.195A (IP address)IN (0x0001)false
                Apr 2, 2025 12:12:07.234463930 CEST1.1.1.1192.168.2.40x3c52No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                Apr 2, 2025 12:12:07.234463930 CEST1.1.1.1192.168.2.40x3c52No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                Apr 2, 2025 12:12:19.221096992 CEST1.1.1.1192.168.2.40xbbf4No error (0)www.google.com65IN (0x0001)false
                Apr 2, 2025 12:12:19.231348991 CEST1.1.1.1192.168.2.40xd8dNo error (0)www.google.com142.251.40.100A (IP address)IN (0x0001)false
                050100150200s020406080100

                Click to jump to process

                050100150200s0.0050100MB

                Click to jump to process

                Target ID:1
                Start time:06:12:08
                Start date:02/04/2025
                Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                Wow64 process (32bit):false
                Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
                Imagebase:0x7ff786830000
                File size:3'388'000 bytes
                MD5 hash:E81F54E6C1129887AEA47E7D092680BF
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:false

                Target ID:2
                Start time:06:12:13
                Start date:02/04/2025
                Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                Wow64 process (32bit):false
                Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2496,i,9687974529374164150,7302012809696030839,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=2524 /prefetch:3
                Imagebase:0x7ff786830000
                File size:3'388'000 bytes
                MD5 hash:E81F54E6C1129887AEA47E7D092680BF
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:false

                Target ID:4
                Start time:06:12:19
                Start date:02/04/2025
                Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                Wow64 process (32bit):false
                Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "C:\Users\user\Desktop\Revolt.bat"
                Imagebase:0x7ff786830000
                File size:3'388'000 bytes
                MD5 hash:E81F54E6C1129887AEA47E7D092680BF
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                No disassembly