Windows
Analysis Report
hyirn.hta
Overview
General Information
Detection
Score: | 48 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Searches for the Microsoft Outlook file path
Sigma detected: Use Short Name Path in Command Line
Classification
- System is w10x64
mshta.exe (PID: 5736 cmdline:
mshta.exe "C:\Users\ user\Deskt op\hyirn.h ta" MD5: 06B02D5C097C7DB1F109749C45F3F505)
iexplore.exe (PID: 1488 cmdline:
"C:\Progra m Files\In ternet Exp lorer\iexp lore.exe" -Embedding MD5: CFE2E6942AC1B72981B3105E22D3224E) iexplore.exe (PID: 7952 cmdline:
"C:\Progra m Files (x 86)\Intern et Explore r\IEXPLORE .EXE" SCOD EF:1488 CR EDAT:17410 /prefetch :2 MD5: 6F0F06D6AB125A99E43335427066A4A1) ssvagent.exe (PID: 8140 cmdline:
"C:\PROGRA ~2\Java\jr e-1.8\bin\ ssvagent.e xe" -new MD5: F9A898A606E7F5A1CD7CFFA8079253A0) iexplore.exe (PID: 7048 cmdline:
"C:\Progra m Files (x 86)\Intern et Explore r\IEXPLORE .EXE" SCOD EF:1488 CR EDAT:17414 /prefetch :2 MD5: 6F0F06D6AB125A99E43335427066A4A1)
- cleanup
⊘No configs have been found
⊘No yara matches
Source: | Author: frack113, Nasreddine Bencherchali: |
Source: | Author: frack113: |
⊘No Suricata rule has matched
- • AV Detection
- • Compliance
- • Networking
- • System Summary
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Key opened: | Jump to behavior |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Window detected: |
Source: | Key opened: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 1 Process Injection | 1 Masquerading | OS Credential Dumping | 1 Application Window Discovery | Remote Services | 1 Email Collection | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Process Injection | LSASS Memory | 1 File and Directory Discovery | Remote Desktop Protocol | Data from Removable Media | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 DLL Side-Loading | Security Account Manager | 3 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 1 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | phishing | ||
100% | Avira URL Cloud | phishing | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
d.coka.la | 74.63.241.29 | true | false | high | |
12065.bodis.com | 199.59.243.228 | true | false | high | |
ww1.coka.la | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown | |
false |
| unknown | |
false |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
74.63.241.29 | d.coka.la | United States | 46475 | LIMESTONENETWORKSUS | false | |
199.59.243.228 | 12065.bodis.com | United States | 395082 | BODIS-NJUS | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1676268 |
Start date and time: | 2025-04-28 14:57:13 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 59s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 10 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | hyirn.hta |
Detection: | MAL |
Classification: | mal48.winHTA@8/21@2/2 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, i elowutil.exe, WMIADAP.exe, SIH Client.exe, conhost.exe - Excluded IPs from analysis (wh
itelisted): 23.194.101.222, 23 .62.226.8, 23.62.226.62, 23.62 .226.4, 23.62.226.46, 23.62.22 6.57, 23.62.226.49, 23.62.226. 45, 23.62.226.64, 23.62.226.65 , 150.171.27.10, 150.171.28.10 , 184.29.183.29, 172.202.163.2 00 - Excluded domains from analysis
(whitelisted): www.bing.com, fs.microsoft.com, slscr.update .microsoft.com, ctldl.windowsu pdate.com, www-www.bing.com.tr afficmanager.net, fe3cr.delive ry.mp.microsoft.com, e11290.ds pg.akamaiedge.net, c2a9c95e369 881c67228a6591cac2686.clo.foot printdns.com, ax-ring.msedge.n et, go.microsoft.com, e86303.d scx.akamaiedge.net, any.edge.b ing.com, www.bing.com.edgekey. net, go.microsoft.com.edgekey. net, ieonline.microsoft.com, c .pki.goog - Execution Graph export aborted
for target mshta.exe, PID 573 6 because it is empty - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtCreateKey calls foun d. - Report size getting too big, t
oo many NtOpenKeyEx calls foun d. - Report size getting too big, t
oo many NtProtectVirtualMemory calls found. - Report size getting too big, t
oo many NtQueryValueKey calls found. - Report size getting too big, t
oo many NtSetValueKey calls fo und. - Some HTTP raw data packets hav
e been limited to 10 per sessi on. Please view the PCAPs for the complete data.
⊘No simulations
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
199.59.243.228 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Wannacry | Browse |
| ||
Get hash | malicious | Wannacry | Browse |
| ||
Get hash | malicious | Wannacry | Browse |
| ||
Get hash | malicious | Wannacry | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
d.coka.la | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
12065.bodis.com | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
LIMESTONENETWORKSUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | GhostRat | Browse |
| ||
Get hash | malicious | GhostRat | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
BODIS-NJUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
6271f898ce5be7dd52b0fc260d0662b3 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Ramnit | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | ProRat | Browse |
| ||
Get hash | malicious | SheetRat, SpyBot | Browse |
|
⊘No context
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4286 |
Entropy (8bit): | 3.8046022951415335 |
Encrypted: | false |
SSDEEP: | 24:suZOWcCXPRS4QAUs/KBy3TYI42Apvl6wheXpktCH2Yn4KgISQggggFpz1k9PAYHu:HBRh+sCBykteatiBn4KWi1+Ne |
MD5: | DA597791BE3B6E732F0BC8B20E38EE62 |
SHA1: | 1125C45D285C360542027D7554A5C442288974DE |
SHA-256: | 5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07 |
SHA-512: | D8DC8358727590A1ED74DC70356AEDC0499552C2DC0CD4F7A01853DD85CEB3AEAD5FBDC7C75D7DA36DB6AF2448CE5ABDFF64CEBDCA3533ECAD953C061A9B338E |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 5632 |
Entropy (8bit): | 2.408730669483057 |
Encrypted: | false |
SSDEEP: | 48:rNbGI4nBwGImBEs7y7F+bB7y7s8Vdlz8VA:+BZE6IeNIs8Xlz8i |
MD5: | 6E61CA2DED0DF6AADA03D1CBDC27530F |
SHA1: | E077E6A69BAB97685D26E58085084BE1D6FAA67D |
SHA-256: | 6A0D66731D178FD7AECB0C7AB5FB3FC81240A3018DF54869EF57CB88D5C09C00 |
SHA-512: | D584191623A0E93726073E3EAD45DDBB2176FABC7DD3DD7F2732F9BCDB82C3E93AE5153B39933168C00A9B61788BA05F534F7097C347E6E3B8C8E961762839B6 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4096 |
Entropy (8bit): | 1.7208923186195864 |
Encrypted: | false |
SSDEEP: | 12:rl0oXGFedXDrEgm8Gf76FplXDrEgm8Gn7qw9lgOjg0t1V/9lLahd0t1kC:rXG89lTG8m9l28L9la8a |
MD5: | A2A51D41C58A228FFE45B5538181F922 |
SHA1: | 73EBBE569F269D7B1947BC710EB8DB056ACEBCE7 |
SHA-256: | 6C76374AC2D545D58F32949C6C9188346E37C43951B5CCE9BF2078F6EC7B1333 |
SHA-512: | 23EC9D10738E21E479BBECDBD00AB2F972CFF93A49D5BB08516E19CC3E4AFA2E77A8139BF0FD6CFD8FC2056D53D09C9D6EB8CFA22FD4AA04FE8480E70002E5C9 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4096 |
Entropy (8bit): | 2.3805570162325225 |
Encrypted: | false |
SSDEEP: | 12:rlxAFs1frEgmf07fF/rEgmf07qFI9lQcatQ0trQtPmGooNl1H3kwUl/ANVLtdwon:rbGaGG9lb8rQcW1LcAZdwoyieXc |
MD5: | D30E321E9D4BA4A2F4FD6F4D380AB9A5 |
SHA1: | 4539B47C6B5C02C38980FD1BBBDF735587AB5652 |
SHA-256: | ECE0F968F360FB201FDE2C01C1B7539BF0E2A63B02A2882351197639268AA022 |
SHA-512: | 8D65733C04DAD9B333D58C8B7DFD1E242DED1CF21038599ABF54DDC7A5E7B363B7FDB0EEFDA489C7A5A8DFB3ED5FB30A139CA0B9E4D8C983C42033AE736E2EF0 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 356 |
Entropy (8bit): | 5.081732925460967 |
Encrypted: | false |
SSDEEP: | 6:TMVBdc9EMdLD5Ltqc41EzEAMtHEAMRTD90/QL3WIZK0QhPPFVDHkEtMjwu:TMHdNMNxOEzqenWimI00ONVbkEtMb |
MD5: | A0F5E788907B308D94898175B3E51843 |
SHA1: | 5CBB4790BA2B5D4AECB87A9F72D3E0D2FD8AE930 |
SHA-256: | 3E9435EAB1B44915C5DFF5DC7AFC6280A01AF719F925896FAE4CCA5DE9A8F125 |
SHA-512: | 2D88BD9293519342A3B846372EE3045933CADE8FB4928D285A2EDDA49D4D6820804276F0A8967AB043FCC376EC618A470EAF5EAB7D7B69485CA845AD38CC4C69 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 354 |
Entropy (8bit): | 5.162220497734954 |
Encrypted: | false |
SSDEEP: | 6:TMVBdc9EMdLD5Ltqc4fLGTkW0Junt/d+nRTD90/QL3WIZK0QhPPFkI5kU5EtMjwu:TMHdNMNxe2kW/doRnWimI00ONkak6Ety |
MD5: | F3352C14831F891524FA15187ACFBC11 |
SHA1: | F6CD6145513EE77AA4CD4C104C72372C22A1938B |
SHA-256: | A3B0FA308D46BD4C07DB01426E5D3865EB197028CD6E67DAD0B4677051C5A233 |
SHA-512: | 24D96A7046B6D041D8256DC607394FCA87466D7B7216432640BB9384AC369FFBCF86B704889D205712B5F6E061BC9F53959E630D81DD950268610EA701B81940 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 360 |
Entropy (8bit): | 5.100429430894882 |
Encrypted: | false |
SSDEEP: | 6:TMVBdc9EMdLD5Ltqc4GLzEAMtHEAMRTD90/QL3WIZK0QhPPFyhBcEEtMjwu:TMHdNMNxvLzqenWimI00ONmZEtMb |
MD5: | F5770CF060C2BD0BA05A073C6B3634EE |
SHA1: | D687FCDC7703FFC21CB1EA6108288159EE54BE76 |
SHA-256: | 4030D254C882333F710C09CAD8BE7114C72414167F9462C38C10AF536143B2A4 |
SHA-512: | 05CD77A4A7739AF6AEF89CC74CF9A8A59CF2C81EDFFE3FAB7BE2325A5E9AB0CACF7F7FE6693FADE9099DCF10D68D58F80B793F52FB82301D4FCDD1A298A00A5A |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 377 |
Entropy (8bit): | 5.207862330169641 |
Encrypted: | false |
SSDEEP: | 6:TMVBdc9EMdLD5Ltq08eDPOOKaihMCd+nt/d+nRTD90/QL3WIZK0QhPPFcE5EtMjv:TMHdNMNxtDPOOKayodoRnWimI00ONcE/ |
MD5: | 5B12168FA2E12DB66E49EF7BFFCF37A0 |
SHA1: | 01BA67BB0F3B1CA38F71FE2DC661151D1F8795AE |
SHA-256: | 5725F4EB2175EF9474316D7AA5DD5B1AC1CEA7CF86C83FCD33F349EB09DCACFB |
SHA-512: | 3B41BA33CA1E52C3C8E919901F3E7103B704CDFAAF508EF024D037A9B046600C33BD0A9F64AE5B4746CF574DA2108C707A74629E751449C199C24C700A17B153 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 350 |
Entropy (8bit): | 5.132542763880932 |
Encrypted: | false |
SSDEEP: | 6:TMVBdc9EMdLD5Ltqc4JORntyuKRTD90/QL3WIZK0QhPPFgE5EtMjwu:TMHdNMNxiORYPnWimI00ONd5EtMb |
MD5: | DA6AAE161C0D488B668D11F3D38394A8 |
SHA1: | 0AE7ED5BB280C287982F2D2DB2FB79F5A0A9F89B |
SHA-256: | 8B321C7DDAD3E756B3FFAED685CB8EBC82B8C89272A10B739610B097716E31E1 |
SHA-512: | 4354E9DBAB0D8EDBAC668C212CCE1E6E13206F1654B8E673EFF01B8BFA2B6567AFA6520A347DF74093281E04C90C8A83C05E2104F041116473EDD0E87FE6B8D4 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 356 |
Entropy (8bit): | 5.163272668598438 |
Encrypted: | false |
SSDEEP: | 6:TMVBdc9EMdLD5Ltqc4UxGwF8tZ8RTD90/QL3WIZK0QhPPF8K0QU5EtMjwu:TMHdNMNxhGwpnWimI00ON8K075EtMb |
MD5: | F707D1D8CEFA75843D6C44768C3B80AF |
SHA1: | 06709EE3B5209D77006BB0C0B8AF95B9E79782BE |
SHA-256: | 3A32ADE49E7B043BBC36C511D3130B5B95CC72F5897FF5F61B92489A707A65C1 |
SHA-512: | C7F585E77227544CC7117BF4DFDF3566242426A35399C23892C57DDE0BC49C9F1710409942FE2A223D04396A81BD66598DEF2E86593127B10D8E5049756C9C89 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 354 |
Entropy (8bit): | 5.125751520947853 |
Encrypted: | false |
SSDEEP: | 6:TMVBdc9EMdLD5Ltqc4QunuuKtyuKRTD90/QL3WIZK0QhPPFAkEtMjwu:TMHdNMNx0nu6PnWimI00ONxEtMb |
MD5: | 3494B9582CFB8CD421A46B8F3EDE34ED |
SHA1: | 865049F4743483097B3FAC880EB432EE407199CE |
SHA-256: | 119968FC1ABE416F23AD26DE81552645EA2599C30EA197390BB7D55AD03A54FD |
SHA-512: | 73D943AF311F5E76D2AD66FACCE91E7A926BFA3679E629F0A399BAF0983FCB06F328F2AD5D66C63F5A3EFB65C345CDB3C5EED04F8FC4C1A8C5ADB96171F2799C |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 356 |
Entropy (8bit): | 5.1766231623278935 |
Encrypted: | false |
SSDEEP: | 6:TMVBdc9EMdLD5Ltqc4oTuuKtyuKRTD90/QL3WIZK0QhPPF6Kq5EtMjwu:TMHdNMNxxu6PnWimI00ON6Kq5EtMb |
MD5: | 02886B3D8C78A3280C951109B7521ED7 |
SHA1: | 60397462D62ECAB9DFC94D1ECE48BD53C15D6FAA |
SHA-256: | 5481E0B7743DAF2624B41B161888EF5807FD024D800A0D0D416579B4C819D7FC |
SHA-512: | 0224DF9E8CB37789016A5FB4BE25C65A277EA3D62284A2FB2C0B082865C7CC694EDC29B4F0AF4F331487FBD08EA5ACC0355DC6E9B92F2291983836A48805C324 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 358 |
Entropy (8bit): | 5.124486462984375 |
Encrypted: | false |
SSDEEP: | 6:TMVBdc9EMdLD5Ltqc4YX2nLd+ntaRnRTD90/QL3WIZK0QhPPF02CqEtMjwu:TMHdNMNxcLo4RRnWimI00ONVEtMb |
MD5: | F8C28AA1D5CEED2763CB554E54E820EE |
SHA1: | 59075C5711B07149452005367C2687DCCEF3378C |
SHA-256: | 768194399CD3AE9D858B8F605078788F7E621B3F7CF0A8C7798F03C1CE263784 |
SHA-512: | FDD7466BB64A4345C5B4A35CC7D624AB0A6450699401BDDDF00B3B803831259312DFFCFB7CBED30926FA80B1E737D95806A9F8FC86642E205751668889421F0E |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 354 |
Entropy (8bit): | 5.098534519057563 |
Encrypted: | false |
SSDEEP: | 6:TMVBdc9EMdLD5Ltqc4InORntaRnRTD90/QL3WIZK0QhPPFiwE5EtMjwu:TMHdNMNxfnOR4RRnWimI00ONe5EtMb |
MD5: | C0EF34283CD367FEE5AA5A1161C30897 |
SHA1: | BE335A49538982AB01AD5A97B008638A028AA060 |
SHA-256: | 633EBAFF4B3FFF71420F7A05ACED66023E7363BA22935ABFC54AC459DE76FE31 |
SHA-512: | 0D04ED34D6FDB80E630B827FBE7F24986F32EACECAF8425EF45782D7C6C043DEBB0605479A0910358026E2D374FACD348974F7E9CB3AB5C57BDB6AA50306D866 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4286 |
Entropy (8bit): | 3.8046022951415335 |
Encrypted: | false |
SSDEEP: | 24:suZOWcCXPRS4QAUs/KBy3TYI42Apvl6wheXpktCH2Yn4KgISQggggFpz1k9PAYHu:HBRh+sCBykteatiBn4KWi1+Ne |
MD5: | DA597791BE3B6E732F0BC8B20E38EE62 |
SHA1: | 1125C45D285C360542027D7554A5C442288974DE |
SHA-256: | 5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07 |
SHA-512: | D8DC8358727590A1ED74DC70356AEDC0499552C2DC0CD4F7A01853DD85CEB3AEAD5FBDC7C75D7DA36DB6AF2448CE5ABDFF64CEBDCA3533ECAD953C061A9B338E |
Malicious: | false |
Preview: |
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 11 |
Entropy (8bit): | 3.0957952550009344 |
Encrypted: | false |
SSDEEP: | 3:0MXAG3n:0MQa |
MD5: | 32682312D17C7CBF18E73594F5570319 |
SHA1: | 60E22121BDD0BC71CDB2BAE2A3AA577006B2EAE9 |
SHA-256: | E55FB1A1D731153E943B68844AF12DCCE8BFAC917C98FFDEA64C80DA0607DD47 |
SHA-512: | 68337DEBB9CD659CECE621AF582AE2BC4B56B9CF06B26C45F4D9EB8BEB91D3F36BEAD287218B5AA2BB4853A1CF1A12017CA57318D7E12F489884FDC6B261DFC1 |
Malicious: | false |
Preview: |
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1038 |
Entropy (8bit): | 5.93155724331789 |
Encrypted: | false |
SSDEEP: | 24:0pY0kiTWbOLBdrE6w1Fo5N/1AVnCHLc1SCHSxvGbV4j:0XkioO9dreq5NWVCrc1SCHSttj |
MD5: | D00A8FABB2B512DC08F4A8F572B6D9E0 |
SHA1: | 574E40397EFDD9A348899C5E46FDED257B1BC76E |
SHA-256: | 137B8D9ED37AE8518AC29B342DB797764EF0DD42D60242518BFE85D5359B8C7A |
SHA-512: | 0081C6990D29CE837F9E76122D47E698CC5B0BF534EA6D2C38FD0B605E14B2CC8C78D5C3BA824054C3747C7F9B504DF2D00386B616334FA1CEA61B37FE473B7C |
Malicious: | false |
Preview: |
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 35693 |
Entropy (8bit): | 5.355387647428162 |
Encrypted: | false |
SSDEEP: | 768:TP2y1slVcJ7n85NdxBB5gPCGIW8rnaVGexrEs0Ddem+euROvvMzLXWI+6Ch/ZXh4:rOrnSGexrECRL5 |
MD5: | 6DCAA605361A0F3FE3C86BB8D94B7B4D |
SHA1: | 8DDB31E30F920CAFE1C9A6EA91C1910A728E3266 |
SHA-256: | 417A08E92EEABC6883D955241F2815566AAA2BB2433486E4A3D39640E87CAA28 |
SHA-512: | 0DCE78FC07D1FE8775D10C6D602D99F9ECE380DFFE34DF41B0AA9D19740F608F5458EEDD5612817808CDC5956C70E454A6ADB3A540BEC58B857A92F3F7C8D3DC |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 16384 |
Entropy (8bit): | 0.3248754888588105 |
Encrypted: | false |
SSDEEP: | 12:i9lQcatQ0trQtPmGooNl1H3kwawNVLtdwo94Wl0IsSILNcKQnAa:i9lb8rQcW1LawZdwoyieXc |
MD5: | 8ADD1E1854194C5E6ED8FE9DEBB1DF07 |
SHA1: | 99AD0E0C36F908FBF785A71EDB125A327E68EDA6 |
SHA-256: | 14CE285B0EF637AF9F319FEF95C7A6F5A84B0B6F1DB92155B0C4A169E5F61BA7 |
SHA-512: | 63C94BA8B255979C79E454782B209E4F2FCD13716E070F6433C3B3DF119EC3616A803B6443CEB05EC583798FFBB325CBE208E15BA63A8E5110E97862D3A07256 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 16384 |
Entropy (8bit): | 0.0688880047516826 |
Encrypted: | false |
SSDEEP: | 3:alFXEAUolllbll1nltllNlFlVlZmllol/Hflly7l8t5tXlRsltFll2/lsllM/llR:a/vllLaluqh8tMl3+tsM6GKYS/W1 |
MD5: | FA1353DE18B2DE09AFF8C24CBC9C0DED |
SHA1: | C0BCFBEA6CB2F582BB5851A0BFCE1A91C975A341 |
SHA-256: | BEA6D7A750DA840130369C1B1D67AC579E49CE80260780A5DCE1379EC48CE461 |
SHA-512: | EE2742FD3A3A2F2CC032FC63BC8233CE99A41E6F10F58C8CC96145CDA4F59B051B46C7EE5A35D292ABEE41C2403889D4F096EF35A1A8F66EB6247B10E76BA1BC |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Internet Explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 16384 |
Entropy (8bit): | 0.1019664654643523 |
Encrypted: | false |
SSDEEP: | 3:F2S4bdS4b/tdlRsltFll2/lslllVu8BM:Fqh1ql3+tsev |
MD5: | 6FE85ED9C5B53E8878DFEFD750FE3A39 |
SHA1: | 4642B3FF38BBB9F9EE7F1E73A4D8DDC3E723BC72 |
SHA-256: | 6077928A8CCD8566EDC08E85D568769689953C6B4A5F0E9ED6E4359D23BAF092 |
SHA-512: | F95A0280D36ECE701E043BC7CFD3C198F09F5AAFCDB3F06D41CC264F8CBE285728A9DB495F83302B2C98C4CAA459DA46C59AB941FC939EB15B0D5D43FD899AEB |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 5.815725534121472 |
TrID: |
|
File name: | hyirn.hta |
File size: | 480 bytes |
MD5: | 2bf28df3cae6ec8fd294b251f9f7dc9e |
SHA1: | 582da9e1b58f400b3564dfd198abaa516f0c1338 |
SHA256: | 82c78c649bf729ce4980ec4bce974521b0949271e6d4c09860e6001e7a060b59 |
SHA512: | fd1eb99079c8e6c60b5db41211618282abb0f6f903da3d773c89aecaf6d312ed36b6cd3b77e1684f86aa832bbfe690c01c48132ab28e4593984c41a3f5fcff86 |
SSDEEP: | 12:kxvsCk9cE3MbUT/XU5bjlJjdJ9/X6rD9YMBYI:kbxb8/kV9/X6rDWFI |
TLSH: | BFF0DCE78C96CCCCE2C0185D8EA8421C05C886A8199CD86D40DCE8A4FCF938FCD06136 |
File Content Preview: | <html><head><title>Loading...</title></head><body><script type='text/javascript'>window.location.replace('https://d.coka.la/hyirn.hta?ch=1&js=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJhdWQiOiJKb2tlbiIsImV4cCI6MTc0NTg1MTg3NCwiaWF0IjoxNzQ1ODQ0Njc0LCJpc3MiOiJK |
Download Network PCAP: filtered – full
- Total Packets: 61
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 28, 2025 14:58:19.405308008 CEST | 49692 | 443 | 192.168.2.5 | 74.63.241.29 |
Apr 28, 2025 14:58:19.405356884 CEST | 49693 | 443 | 192.168.2.5 | 74.63.241.29 |
Apr 28, 2025 14:58:19.405363083 CEST | 443 | 49692 | 74.63.241.29 | 192.168.2.5 |
Apr 28, 2025 14:58:19.405392885 CEST | 443 | 49693 | 74.63.241.29 | 192.168.2.5 |
Apr 28, 2025 14:58:19.405468941 CEST | 49692 | 443 | 192.168.2.5 | 74.63.241.29 |
Apr 28, 2025 14:58:19.405503035 CEST | 49693 | 443 | 192.168.2.5 | 74.63.241.29 |
Apr 28, 2025 14:58:19.413417101 CEST | 49692 | 443 | 192.168.2.5 | 74.63.241.29 |
Apr 28, 2025 14:58:19.413427114 CEST | 443 | 49692 | 74.63.241.29 | 192.168.2.5 |
Apr 28, 2025 14:58:19.413619995 CEST | 49693 | 443 | 192.168.2.5 | 74.63.241.29 |
Apr 28, 2025 14:58:19.413635969 CEST | 443 | 49693 | 74.63.241.29 | 192.168.2.5 |
Apr 28, 2025 14:58:19.929974079 CEST | 443 | 49693 | 74.63.241.29 | 192.168.2.5 |
Apr 28, 2025 14:58:19.930066109 CEST | 49693 | 443 | 192.168.2.5 | 74.63.241.29 |
Apr 28, 2025 14:58:19.959311008 CEST | 443 | 49692 | 74.63.241.29 | 192.168.2.5 |
Apr 28, 2025 14:58:19.959400892 CEST | 49692 | 443 | 192.168.2.5 | 74.63.241.29 |
Apr 28, 2025 14:58:19.968805075 CEST | 49692 | 443 | 192.168.2.5 | 74.63.241.29 |
Apr 28, 2025 14:58:19.968820095 CEST | 443 | 49692 | 74.63.241.29 | 192.168.2.5 |
Apr 28, 2025 14:58:19.969018936 CEST | 49693 | 443 | 192.168.2.5 | 74.63.241.29 |
Apr 28, 2025 14:58:19.969018936 CEST | 49693 | 443 | 192.168.2.5 | 74.63.241.29 |
Apr 28, 2025 14:58:19.969036102 CEST | 443 | 49693 | 74.63.241.29 | 192.168.2.5 |
Apr 28, 2025 14:58:19.969043970 CEST | 443 | 49693 | 74.63.241.29 | 192.168.2.5 |
Apr 28, 2025 14:58:19.969332933 CEST | 443 | 49693 | 74.63.241.29 | 192.168.2.5 |
Apr 28, 2025 14:58:19.969439983 CEST | 49693 | 443 | 192.168.2.5 | 74.63.241.29 |
Apr 28, 2025 14:58:19.969583035 CEST | 443 | 49692 | 74.63.241.29 | 192.168.2.5 |
Apr 28, 2025 14:58:19.969643116 CEST | 49692 | 443 | 192.168.2.5 | 74.63.241.29 |
Apr 28, 2025 14:58:20.233139992 CEST | 443 | 49693 | 74.63.241.29 | 192.168.2.5 |
Apr 28, 2025 14:58:20.233293056 CEST | 49693 | 443 | 192.168.2.5 | 74.63.241.29 |
Apr 28, 2025 14:58:20.233308077 CEST | 443 | 49693 | 74.63.241.29 | 192.168.2.5 |
Apr 28, 2025 14:58:20.233318090 CEST | 443 | 49693 | 74.63.241.29 | 192.168.2.5 |
Apr 28, 2025 14:58:20.233386040 CEST | 49693 | 443 | 192.168.2.5 | 74.63.241.29 |
Apr 28, 2025 14:58:20.257188082 CEST | 49693 | 443 | 192.168.2.5 | 74.63.241.29 |
Apr 28, 2025 14:58:20.257215977 CEST | 443 | 49693 | 74.63.241.29 | 192.168.2.5 |
Apr 28, 2025 14:58:20.464560032 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 14:58:20.464627028 CEST | 49696 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 14:58:20.611923933 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:20.611942053 CEST | 80 | 49696 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:20.612000942 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 14:58:20.612047911 CEST | 49696 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 14:58:20.612483978 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 14:58:20.759690046 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:20.830123901 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:20.830144882 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:20.830219984 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 14:58:20.837383032 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:20.837551117 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 14:58:21.011673927 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 14:58:21.158967018 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:21.229041100 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:21.229059935 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:21.229079008 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:21.229090929 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:21.229106903 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:21.229108095 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 14:58:21.229116917 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:21.229141951 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:21.229157925 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:21.229170084 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:21.229178905 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 14:58:21.229178905 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 14:58:21.229187965 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:21.229197025 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 14:58:21.229202986 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 14:58:21.229206085 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:21.229234934 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 14:58:21.229243994 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:21.229254961 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:21.229270935 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:21.229296923 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 14:58:21.229305983 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:21.229296923 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 14:58:21.229360104 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:21.229370117 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 14:58:21.229374886 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:21.229393959 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 14:58:21.229410887 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:21.229432106 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:21.229448080 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:21.229451895 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 14:58:21.229451895 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 14:58:21.229487896 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 14:58:21.229509115 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:21.229517937 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 14:58:21.229528904 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:21.229552984 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 14:58:21.229578018 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 14:58:21.229587078 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:21.229623079 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:21.229650974 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:21.229660034 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:21.229669094 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 14:58:21.229696035 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 14:58:21.233453035 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:21.233499050 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:21.233515024 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:21.233561993 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 14:58:24.956334114 CEST | 443 | 49692 | 74.63.241.29 | 192.168.2.5 |
Apr 28, 2025 14:58:24.956398010 CEST | 443 | 49692 | 74.63.241.29 | 192.168.2.5 |
Apr 28, 2025 14:58:24.956403971 CEST | 49692 | 443 | 192.168.2.5 | 74.63.241.29 |
Apr 28, 2025 14:58:24.956502914 CEST | 49692 | 443 | 192.168.2.5 | 74.63.241.29 |
Apr 28, 2025 14:58:30.745316029 CEST | 80 | 49696 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:30.745331049 CEST | 80 | 49696 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:30.745368004 CEST | 49696 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 14:58:30.745408058 CEST | 49696 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 14:58:30.751415014 CEST | 80 | 49696 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:30.751471043 CEST | 49696 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 14:58:31.229223013 CEST | 80 | 49695 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 14:58:31.229427099 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 15:00:08.782247066 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 15:00:08.782293081 CEST | 49696 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 15:00:08.782358885 CEST | 49696 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 15:00:08.782563925 CEST | 49692 | 443 | 192.168.2.5 | 74.63.241.29 |
Apr 28, 2025 15:00:08.782604933 CEST | 49692 | 443 | 192.168.2.5 | 74.63.241.29 |
Apr 28, 2025 15:00:08.929927111 CEST | 80 | 49696 | 199.59.243.228 | 192.168.2.5 |
Apr 28, 2025 15:00:09.093873024 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 15:00:09.718885899 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 15:00:10.952984095 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 15:00:13.408622026 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Apr 28, 2025 15:00:18.312356949 CEST | 49695 | 80 | 192.168.2.5 | 199.59.243.228 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 28, 2025 14:58:19.229968071 CEST | 49246 | 53 | 192.168.2.5 | 1.1.1.1 |
Apr 28, 2025 14:58:19.399807930 CEST | 53 | 49246 | 1.1.1.1 | 192.168.2.5 |
Apr 28, 2025 14:58:20.260471106 CEST | 61520 | 53 | 192.168.2.5 | 1.1.1.1 |
Apr 28, 2025 14:58:20.463639975 CEST | 53 | 61520 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Apr 28, 2025 14:58:19.229968071 CEST | 192.168.2.5 | 1.1.1.1 | 0xf65b | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 28, 2025 14:58:20.260471106 CEST | 192.168.2.5 | 1.1.1.1 | 0xd412 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Apr 28, 2025 14:58:19.399807930 CEST | 1.1.1.1 | 192.168.2.5 | 0xf65b | No error (0) | 74.63.241.29 | A (IP address) | IN (0x0001) | false | ||
Apr 28, 2025 14:58:20.463639975 CEST | 1.1.1.1 | 192.168.2.5 | 0xd412 | No error (0) | 12065.bodis.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 28, 2025 14:58:20.463639975 CEST | 1.1.1.1 | 192.168.2.5 | 0xd412 | No error (0) | 199.59.243.228 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49695 | 199.59.243.228 | 80 | 7048 | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Apr 28, 2025 14:58:20.612483978 CEST | 258 | OUT | |
Apr 28, 2025 14:58:20.830123901 CEST | 1358 | IN |