Analysis Report http://api.btloader.com
Overview
General Information
Detection
Score: | 0 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 60% |
Signatures
Classification
Analysis Advice |
---|
Joe Sandbox was unable to browse the URL (domain or webserver down or HTTPS issue), try to browse the URL again later |
Some HTTP requests failed (404). It is likely the sample will exhibit less behavior |
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
No yara matches |
---|
Sigma Overview |
---|
No Sigma rule has matched |
---|
Signature Overview |
---|
- • Networking
- • System Summary
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | Process Injection1 | Masquerading1 | OS Credential Dumping | File and Directory Discovery1 | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Non-Application Layer Protocol3 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Process Injection1 | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Application Layer Protocol3 | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Ingress Tool Transfer3 | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe |
No Antivirus matches |
---|
No Antivirus matches |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
api.btloader.com | 130.211.23.194 | true | false |
| unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
130.211.23.194 | unknown | United States | 15169 | GOOGLEUS | false |
General Information |
---|
Joe Sandbox Version: | 31.0.0 Red Diamond |
Analysis ID: | 320662 |
Start date: | 19.11.2020 |
Start time: | 16:48:34 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 2m 5s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | http://api.btloader.com |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 4 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | UNKNOWN |
Classification: | unknown0.win@3/14@1/1 |
Cookbook Comments: |
|
Warnings: | Show All
|
Errors: |
|
No simulations |
---|
No context |
---|
No context |
---|
No context |
---|
No context |
---|
No context |
---|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 30296 |
Entropy (8bit): | 1.8567155489349554 |
Encrypted: | false |
SSDEEP: | 48:IwphGcprT6GwpLCTG/ap8UcrGIpcRzGvnZpvRgGoCqp9RIGo49pmRjGW449RiGWT:rRZeZq2Z9WR0tR2fRb9MRNR0RafRhsX |
MD5: | 150133B051E79470E973A6F389BAC50E |
SHA1: | 8AC67D2510ADEB23A9D583F5B4516B4BCB511CE4 |
SHA-256: | AD4F7AB6676402C5A7F8C9CAB5B4BE18E05C096A1F706643BB996F8CDAF0C8A1 |
SHA-512: | AA898FA67ABA92DFFA09E9455FD7FB9E018BD559A4242D58E3B90C7A52981B443C68C0F264F2D4D385A586C059F02630B6D63ACC7FBD049D6765CB8037D05C4C |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 24160 |
Entropy (8bit): | 1.6249576533638241 |
Encrypted: | false |
SSDEEP: | 48:IwqGcprbGwpaTG4pQKGrapbS5rGQpBuGHHpcosTGUp8PGzYpmlSYGopGHnpGyXpm:rOZ1Ql68BS5Fj92okW9M4YsHtg |
MD5: | B507A14DED114AB1FA43BEBE284D56F3 |
SHA1: | B3210AB7DA5A0B94D65DA1D79F2937551948F3A5 |
SHA-256: | E783A88A8A9FC64FAB8D462EEDDC6255AE482F03D8EB0B2ECC84A49F8ED8BBCE |
SHA-512: | F72A9ACAB68D7543FC301C26ABAA3E823905427A8467B1BFD944B6DA9D0A9D361AC4A46578BD208B0ED58EFCD6220E01315AB513E652B4D3451DB7FD7320865E |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 16984 |
Entropy (8bit): | 1.561175974390627 |
Encrypted: | false |
SSDEEP: | 48:IwnGcprCGwpabG4pQTGrapbScrGQpKCG7HpRDsTGIpG:rNZqQ963BScFAtTD4A |
MD5: | FD845490F94BF0969ABFE7FED7A82636 |
SHA1: | 59EBC87B8EE7F4378BF26AFC573FD9297DC30E6A |
SHA-256: | 8E11499BDD99F7526F207D8F119108EA384591E9356EC6BD634EA1FEAE79FC9C |
SHA-512: | 831C7B65FDA5F2273B8C858480F17AEBA4EA73B5C5092995CA7B4B1B6FD80177F92440DE09B5464B29233C24C6AA3EC48A780F83D936857E0CA60238FE9EF8FE |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 748 |
Entropy (8bit): | 7.249606135668305 |
Encrypted: | false |
SSDEEP: | 12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE |
MD5: | C4F558C4C8B56858F15C09037CD6625A |
SHA1: | EE497CC061D6A7A59BB66DEFEA65F9A8145BA240 |
SHA-256: | 39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781 |
SHA-512: | D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44 |
Malicious: | false |
Reputation: | low |
IE Cache URL: | res://ieframe.dll/down.png |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 4720 |
Entropy (8bit): | 5.164796203267696 |
Encrypted: | false |
SSDEEP: | 96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk |
MD5: | D65EC06F21C379C87040B83CC1ABAC6B |
SHA1: | 208D0A0BB775661758394BE7E4AFB18357E46C8B |
SHA-256: | A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F |
SHA-512: | 8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E |
Malicious: | false |
Reputation: | low |
IE Cache URL: | res://ieframe.dll/errorPageStrings.js |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 2168 |
Entropy (8bit): | 5.207912016937144 |
Encrypted: | false |
SSDEEP: | 24:5+j5xU5k5N0ndgvoyeP0yyiyQCDr3nowMVworDtX3orKxWxDnCMA0da+hieyuSQK:5Q5K5k5pvFehWrrarrZIrHd3FIQfOS6 |
MD5: | F4FE1CB77E758E1BA56B8A8EC20417C5 |
SHA1: | F4EDA06901EDB98633A686B11D02F4925F827BF0 |
SHA-256: | 8D018639281B33DA8EB3CE0B21D11E1D414E59024C3689F92BE8904EB5779B5F |
SHA-512: | 62514AB345B6648C5442200A8E9530DFB88A0355E262069E0A694289C39A4A1C06C6143E5961074BFAC219949102A416C09733F24E8468984B96843DC222B436 |
Malicious: | false |
Reputation: | low |
IE Cache URL: | res://ieframe.dll/ErrorPageTemplate.css |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 447 |
Entropy (8bit): | 7.304718288205936 |
Encrypted: | false |
SSDEEP: | 12:6v/71Cyt/JNTWxGdr+kZDWO7+4dKIv0b1GKuxu+R:/yBJNTqsSk9BTwE05su+R |
MD5: | 26F971D87CA00E23BD2D064524AEF838 |
SHA1: | 7440BEFF2F4F8FABC9315608A13BF26CABAD27D9 |
SHA-256: | 1D8E5FD3C1FD384C0A7507E7283C7FE8F65015E521B84569132A7EABEDC9D41D |
SHA-512: | C62EB51BE301BB96C80539D66A73CD17CA2021D5D816233853A37DB72E04050271E581CC99652F3D8469B390003CA6C62DAD2A9D57164C620B7777AE99AA1B15 |
Malicious: | false |
Reputation: | low |
IE Cache URL: | res://ieframe.dll/bullet.png |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 453 |
Entropy (8bit): | 5.019973044227213 |
Encrypted: | false |
SSDEEP: | 6:3llVuiPjlXJYhg5suRd8PImMo23C/kHrJ8yA/NIeYoWg78C/vTFvbKLAh3:V/XPYhiPRd8j7+9LoIrobtHTdbKi |
MD5: | 20F0110ED5E4E0D5384A496E4880139B |
SHA1: | 51F5FC61D8BF19100DF0F8AADAA57FCD9C086255 |
SHA-256: | 1471693BE91E53C2640FE7BAEECBC624530B088444222D93F2815DFCE1865D5B |
SHA-512: | 5F52C117E346111D99D3B642926139178A80B9EC03147C00E27F07AAB47FE38E9319FE983444F3E0E36DEF1E86DD7C56C25E44B14EFDC3F13B45EDEDA064DB5A |
Malicious: | false |
Reputation: | low |
IE Cache URL: | res://ieframe.dll/background_gradient.jpg |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 12105 |
Entropy (8bit): | 5.451485481468043 |
Encrypted: | false |
SSDEEP: | 192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f |
MD5: | 9234071287E637F85D721463C488704C |
SHA1: | CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152 |
SHA-256: | 65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649 |
SHA-512: | 87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384 |
Malicious: | false |
Reputation: | low |
IE Cache URL: | res://ieframe.dll/httpErrorPagesScripts.js |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 6495 |
Entropy (8bit): | 3.8998802417135856 |
Encrypted: | false |
SSDEEP: | 48:up4d0yV4VkBXvLutC5N9J/1a5TI7kZ3GUXn3GFa7K083GJehBu01kptk7KwyBwpM:uKp6yN9JaKktZX36a7x05hwW7RM |
MD5: | F65C729DC2D457B7A1093813F1253192 |
SHA1: | 5006C9B50108CF582BE308411B157574E5A893FC |
SHA-256: | B82BFB6FA37FD5D56AC7C00536F150C0F244C81F1FC2D4FEFBBDC5E175C71B4F |
SHA-512: | 717AFF18F105F342103D36270D642CC17BD9921FF0DBC87E3E3C2D897F490F4ECFAB29CF998D6D99C4951C3EABB356FE759C3483A33704CE9FCC1F546EBCBBC7 |
Malicious: | false |
Reputation: | low |
IE Cache URL: | res://ieframe.dll/http_404.htm |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 4113 |
Entropy (8bit): | 7.9370830126943375 |
Encrypted: | false |
SSDEEP: | 96:WNTJL8szf79M8FUjE39KJoUUuJPnvmKacs6Uq7qDMj1XPL:WNrzFoQSJPnvzs6rL |
MD5: | 5565250FCC163AA3A79F0B746416CE69 |
SHA1: | B97CC66471FCDEE07D0EE36C7FB03F342C231F8F |
SHA-256: | 51129C6C98A82EA491F89857C31146ECEC14C4AF184517450A7A20C699C84859 |
SHA-512: | E60EA153B0FECE4D311769391D3B763B14B9A140105A36A13DAD23C2906735EAAB9092236DEB8C68EF078E8864D6E288BEF7EF1731C1E9F1AD9B0170B95AC134 |
Malicious: | false |
Reputation: | low |
IE Cache URL: | res://ieframe.dll/info_48.png |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 25441 |
Entropy (8bit): | 0.32119439813099177 |
Encrypted: | false |
SSDEEP: | 24:c9lLh9lLh9lIn9lIn9lRx/9lRJ9lTb9lTb9lSSU9lSSU9laAa/9laAJGlLb:kBqoxxJhHWSVSEaboZ |
MD5: | D12814C000A2554B5C5A1E0A2043A837 |
SHA1: | 533A52361283EF5D3E118890F99A54F9217406C0 |
SHA-256: | EBC479253C7EB361BC25E03716C041CC075C8956D998E7D20DCB570D70F6B263 |
SHA-512: | C0A9B3D3A140FC037621C6BA3B288D832FEBF45FAD30F8726BA4289B3BA69D6214964A5368EDEDB580C3F24E22A84243A55A3F60689B3A795F0CFA158EA44CF2 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 34353 |
Entropy (8bit): | 0.3478855238704066 |
Encrypted: | false |
SSDEEP: | 24:c9lLh9lLh9lIn9lIn9lRg9lRA9lTS9lTy9lSSd9lSSd9lwtV9lwt19l2tD9l2tDa:kBqoxKAuvScS+0SYplIl4HnO |
MD5: | 313A993A84C8A8A80D900E6A17D07A49 |
SHA1: | 8540014CA69684C4A64037A7E3CDE8F433C2EEBD |
SHA-256: | DD6583B8A6BF3101EA6B5E8AABC0F18296C9D60041069905AF6C951E9FC9E3A9 |
SHA-512: | 3EBC59D78A97C0E905528E2AF9269784D994A98211D27ADB42F126219A8DB9B13C0BD0EE066CAFA0B702CD883998F14DC2C94ADDC9C091E97E2C6F1A4AE33E11 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 13029 |
Entropy (8bit): | 0.4799323899983687 |
Encrypted: | false |
SSDEEP: | 24:c9lLh9lLh9lIn9lIn9lo8F9lo89lWxOK0A:kBqoIXxxOLA |
MD5: | F53A14C5E178AA34EA49BB72483ECD49 |
SHA1: | 3D67CE6B8AD0D1836527A2B520E9F5AA21F198DD |
SHA-256: | 6437F97D90BE628CB35C113C0BF838CE9F548027787D1F50ACA75C232926FB00 |
SHA-512: | 320E4CE84E35918243BA6E78F00637FBD7EDA0ADDC9413653F2FF2672420C356250C5E601B0DE944F68C6D58B7EB881481AF5BF3E854F2501BEF0710A58D7155 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Static File Info |
---|
No static file info |
---|
Network Behavior |
---|
Network Port Distribution |
---|
- Total Packets: 20
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 19, 2020 16:49:24.080293894 CET | 49720 | 80 | 192.168.2.3 | 130.211.23.194 |
Nov 19, 2020 16:49:24.081218004 CET | 49721 | 80 | 192.168.2.3 | 130.211.23.194 |
Nov 19, 2020 16:49:24.107372046 CET | 80 | 49720 | 130.211.23.194 | 192.168.2.3 |
Nov 19, 2020 16:49:24.107503891 CET | 49720 | 80 | 192.168.2.3 | 130.211.23.194 |
Nov 19, 2020 16:49:24.107983112 CET | 49720 | 80 | 192.168.2.3 | 130.211.23.194 |
Nov 19, 2020 16:49:24.108244896 CET | 80 | 49721 | 130.211.23.194 | 192.168.2.3 |
Nov 19, 2020 16:49:24.108367920 CET | 49721 | 80 | 192.168.2.3 | 130.211.23.194 |
Nov 19, 2020 16:49:24.134937048 CET | 80 | 49720 | 130.211.23.194 | 192.168.2.3 |
Nov 19, 2020 16:49:24.240602016 CET | 80 | 49720 | 130.211.23.194 | 192.168.2.3 |
Nov 19, 2020 16:49:24.240746975 CET | 49720 | 80 | 192.168.2.3 | 130.211.23.194 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 19, 2020 16:49:18.712711096 CET | 60100 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 19, 2020 16:49:18.739970922 CET | 53 | 60100 | 8.8.8.8 | 192.168.2.3 |
Nov 19, 2020 16:49:19.348897934 CET | 53195 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 19, 2020 16:49:19.376240969 CET | 53 | 53195 | 8.8.8.8 | 192.168.2.3 |
Nov 19, 2020 16:49:20.117657900 CET | 50141 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 19, 2020 16:49:20.153085947 CET | 53 | 50141 | 8.8.8.8 | 192.168.2.3 |
Nov 19, 2020 16:49:21.250344992 CET | 53023 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 19, 2020 16:49:21.277558088 CET | 53 | 53023 | 8.8.8.8 | 192.168.2.3 |
Nov 19, 2020 16:49:22.547561884 CET | 49563 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 19, 2020 16:49:22.574937105 CET | 53 | 49563 | 8.8.8.8 | 192.168.2.3 |
Nov 19, 2020 16:49:22.933146000 CET | 51352 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 19, 2020 16:49:22.970010042 CET | 53 | 51352 | 8.8.8.8 | 192.168.2.3 |
Nov 19, 2020 16:49:23.255834103 CET | 59349 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 19, 2020 16:49:23.282875061 CET | 53 | 59349 | 8.8.8.8 | 192.168.2.3 |
Nov 19, 2020 16:49:24.042433023 CET | 57084 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 19, 2020 16:49:24.069627047 CET | 53 | 57084 | 8.8.8.8 | 192.168.2.3 |
Nov 19, 2020 16:49:24.146189928 CET | 58823 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 19, 2020 16:49:24.173435926 CET | 53 | 58823 | 8.8.8.8 | 192.168.2.3 |
Nov 19, 2020 16:49:25.360728025 CET | 57568 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 19, 2020 16:49:25.387888908 CET | 53 | 57568 | 8.8.8.8 | 192.168.2.3 |
Nov 19, 2020 16:49:26.339158058 CET | 50540 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 19, 2020 16:49:26.366456985 CET | 53 | 50540 | 8.8.8.8 | 192.168.2.3 |
Nov 19, 2020 16:49:27.478655100 CET | 54366 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 19, 2020 16:49:27.514430046 CET | 53 | 54366 | 8.8.8.8 | 192.168.2.3 |
Nov 19, 2020 16:49:28.526839018 CET | 53034 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 19, 2020 16:49:28.553973913 CET | 53 | 53034 | 8.8.8.8 | 192.168.2.3 |
Nov 19, 2020 16:49:43.632514000 CET | 57762 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 19, 2020 16:49:43.659899950 CET | 53 | 57762 | 8.8.8.8 | 192.168.2.3 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class |
---|---|---|---|---|---|---|---|
Nov 19, 2020 16:49:24.042433023 CET | 192.168.2.3 | 8.8.8.8 | 0x5e12 | Standard query (0) | A (IP address) | IN (0x0001) |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class |
---|---|---|---|---|---|---|---|---|---|
Nov 19, 2020 16:49:24.069627047 CET | 8.8.8.8 | 192.168.2.3 | 0x5e12 | No error (0) | 130.211.23.194 | A (IP address) | IN (0x0001) |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
0 | 192.168.2.3 | 49720 | 130.211.23.194 | 80 | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
Nov 19, 2020 16:49:24.107983112 CET | 184 | OUT | |
Nov 19, 2020 16:49:24.240602016 CET | 185 | IN |
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
Behavior |
---|
Click to jump to process
System Behavior |
---|
Start time: | 16:49:21 |
Start date: | 19/11/2020 |
Path: | C:\Program Files\internet explorer\iexplore.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7605e0000 |
File size: | 823560 bytes |
MD5 hash: | 6465CB92B25A7BC1DF8E01D8AC5E7596 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
Network Activities
Object Security Activities
LPC Port Activities
Start time: | 16:49:22 |
Start date: | 19/11/2020 |
Path: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xba0000 |
File size: | 822536 bytes |
MD5 hash: | 071277CC2E3DF41EEEA8013E2AB58D5A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
Network Activities
Object Security Activities
LPC Port Activities
Disassembly |
---|