Analysis Report http://csync.loopme.me
Overview
General Information
Detection
Score: | 0 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
No yara matches |
---|
Sigma Overview |
---|
No Sigma rule has matched |
---|
Signature Overview |
---|
- • Networking
- • System Summary
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | Process Injection1 | Masquerading1 | OS Credential Dumping | File and Directory Discovery1 | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Non-Application Layer Protocol2 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Process Injection1 | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Application Layer Protocol2 | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Ingress Tool Transfer1 | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe |
No Antivirus matches |
---|
No Antivirus matches |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse |
No Antivirus matches |
---|
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
generic.lb.lm5v.com | 116.202.114.114 | true | false |
| unknown |
csync.loopme.me | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
116.202.114.114 | unknown | Germany | 24940 | HETZNER-ASDE | false |
General Information |
---|
Joe Sandbox Version: | 31.0.0 Red Diamond |
Analysis ID: | 329311 |
Start date: | 10.12.2020 |
Start time: | 21:56:26 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 2m 12s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | http://csync.loopme.me |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | UNKNOWN |
Classification: | unknown0.win@3/13@1/1 |
Cookbook Comments: |
|
Warnings: | Show All
|
Errors: |
|
No simulations |
---|
No context |
---|
No context |
---|
No context |
---|
No context |
---|
No context |
---|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 30296 |
Entropy (8bit): | 1.8540322619181613 |
Encrypted: | false |
SSDEEP: | 48:IwpGcprIGwpL8G/ap86rGIpcjHGvnZpvjQGoWqp9jGGo4VpmjB+GWkE9jpGW6Evv:rvZQZ+269Wj4tjafjhVMjBcjHj8fj78X |
MD5: | 93DE3DC06E7B086A82853E81D1C6A08E |
SHA1: | A2AF82BF9EF4AAC6E83D94457E825AE3AC26C8F8 |
SHA-256: | 06544018B2AE36DB33F4899F11E471BCFE449D11070C86B04C861A2672E7EAED |
SHA-512: | 8DB4BA4AB91D4DB2CC486A44D34FB112E529BA2DBA03328E5F4A52D029C3D88FBB9DD0EB75377FA8AB965194C1ADA23A8D6235E62006ACE961C9D74E15C72682 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 24156 |
Entropy (8bit): | 1.6241384765796907 |
Encrypted: | false |
SSDEEP: | 48:Iw00Gcpr1GwpaZG4pQ9GrapbSkrGQpBMUGHHpcqoXsTGUp8mGzYpm15YGopq/hYM:rbZfQ76dBSkFjML2qokWKMHYgwg |
MD5: | 295521BFF46B5766B20C4C08267B4C99 |
SHA1: | 93686E074CD495BA5B83C32254EA0B0BCA751337 |
SHA-256: | FF49225E7174027B72D142CB5D45AB83EC6959D63ABCF53DE6F4975968B77903 |
SHA-512: | 717A49BEF90300E791927AF0C33346E3851732567E820D7D8042D51EF1B345608FBC9281E4D16BCC8B9BFCD3F2C750741B51A96DBC9794F70898E7BD26BE1929 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 16984 |
Entropy (8bit): | 1.5643581872727266 |
Encrypted: | false |
SSDEEP: | 48:Iw5GcprZGwpaoG4pQEGrapbS5rGQpK8G7HpREsTGIpG:rfZTQ46SBS5FAXTE4A |
MD5: | B207317F5D93800420EE80FC0FA9DCB9 |
SHA1: | F1FC1F118C373F98C2227325923DEA0F1D632C38 |
SHA-256: | 37CD982E24393BFF288ED7ED51CD40D42EB69E7BDD20AE21E2592779A2782C26 |
SHA-512: | 05CE340C6563901CFF274732BA5AD95D4DFDF3503830F3B40AD4FC4EED441447D6CA62C438166A6825D99AA44DD60861B306C276E40697927F479054A23907DA |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 453 |
Entropy (8bit): | 5.019973044227213 |
Encrypted: | false |
SSDEEP: | 6:3llVuiPjlXJYhg5suRd8PImMo23C/kHrJ8yA/NIeYoWg78C/vTFvbKLAh3:V/XPYhiPRd8j7+9LoIrobtHTdbKi |
MD5: | 20F0110ED5E4E0D5384A496E4880139B |
SHA1: | 51F5FC61D8BF19100DF0F8AADAA57FCD9C086255 |
SHA-256: | 1471693BE91E53C2640FE7BAEECBC624530B088444222D93F2815DFCE1865D5B |
SHA-512: | 5F52C117E346111D99D3B642926139178A80B9EC03147C00E27F07AAB47FE38E9319FE983444F3E0E36DEF1E86DD7C56C25E44B14EFDC3F13B45EDEDA064DB5A |
Malicious: | false |
Reputation: | low |
IE Cache URL: | res://ieframe.dll/background_gradient.jpg |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 4720 |
Entropy (8bit): | 5.164796203267696 |
Encrypted: | false |
SSDEEP: | 96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk |
MD5: | D65EC06F21C379C87040B83CC1ABAC6B |
SHA1: | 208D0A0BB775661758394BE7E4AFB18357E46C8B |
SHA-256: | A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F |
SHA-512: | 8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E |
Malicious: | false |
Reputation: | low |
IE Cache URL: | res://ieframe.dll/errorPageStrings.js |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 2168 |
Entropy (8bit): | 5.207912016937144 |
Encrypted: | false |
SSDEEP: | 24:5+j5xU5k5N0ndgvoyeP0yyiyQCDr3nowMVworDtX3orKxWxDnCMA0da+hieyuSQK:5Q5K5k5pvFehWrrarrZIrHd3FIQfOS6 |
MD5: | F4FE1CB77E758E1BA56B8A8EC20417C5 |
SHA1: | F4EDA06901EDB98633A686B11D02F4925F827BF0 |
SHA-256: | 8D018639281B33DA8EB3CE0B21D11E1D414E59024C3689F92BE8904EB5779B5F |
SHA-512: | 62514AB345B6648C5442200A8E9530DFB88A0355E262069E0A694289C39A4A1C06C6143E5961074BFAC219949102A416C09733F24E8468984B96843DC222B436 |
Malicious: | false |
Reputation: | low |
IE Cache URL: | res://ieframe.dll/ErrorPageTemplate.css |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 447 |
Entropy (8bit): | 7.304718288205936 |
Encrypted: | false |
SSDEEP: | 12:6v/71Cyt/JNTWxGdr+kZDWO7+4dKIv0b1GKuxu+R:/yBJNTqsSk9BTwE05su+R |
MD5: | 26F971D87CA00E23BD2D064524AEF838 |
SHA1: | 7440BEFF2F4F8FABC9315608A13BF26CABAD27D9 |
SHA-256: | 1D8E5FD3C1FD384C0A7507E7283C7FE8F65015E521B84569132A7EABEDC9D41D |
SHA-512: | C62EB51BE301BB96C80539D66A73CD17CA2021D5D816233853A37DB72E04050271E581CC99652F3D8469B390003CA6C62DAD2A9D57164C620B7777AE99AA1B15 |
Malicious: | false |
Reputation: | low |
IE Cache URL: | res://ieframe.dll/bullet.png |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 12105 |
Entropy (8bit): | 5.451485481468043 |
Encrypted: | false |
SSDEEP: | 192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f |
MD5: | 9234071287E637F85D721463C488704C |
SHA1: | CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152 |
SHA-256: | 65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649 |
SHA-512: | 87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384 |
Malicious: | false |
Reputation: | low |
IE Cache URL: | res://ieframe.dll/httpErrorPagesScripts.js |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 4113 |
Entropy (8bit): | 7.9370830126943375 |
Encrypted: | false |
SSDEEP: | 96:WNTJL8szf79M8FUjE39KJoUUuJPnvmKacs6Uq7qDMj1XPL:WNrzFoQSJPnvzs6rL |
MD5: | 5565250FCC163AA3A79F0B746416CE69 |
SHA1: | B97CC66471FCDEE07D0EE36C7FB03F342C231F8F |
SHA-256: | 51129C6C98A82EA491F89857C31146ECEC14C4AF184517450A7A20C699C84859 |
SHA-512: | E60EA153B0FECE4D311769391D3B763B14B9A140105A36A13DAD23C2906735EAAB9092236DEB8C68EF078E8864D6E288BEF7EF1731C1E9F1AD9B0170B95AC134 |
Malicious: | false |
Reputation: | low |
IE Cache URL: | res://ieframe.dll/info_48.png |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 2713 |
Entropy (8bit): | 4.1712007174415895 |
Encrypted: | false |
SSDEEP: | 24:r3avxU5hzsIVmVMeLmVMyHf63lboxMCLxvriN6LOAPAnQay78eLx5Tb87nVkEhML:upU0GVeLVGBXvrp4n/1a5TI7Ve/G79KX |
MD5: | 4BCFE9F8DB04948CDDB5E31FE6A7F984 |
SHA1: | 42464C70FC16F3F361C2419751ACD57D51613CDF |
SHA-256: | BEE0439FCF31DE76D6E2D7FD377A24A34AC8763D5BF4114DA5E1663009E24228 |
SHA-512: | BB0EF3D32310644285F4062AD5F27F30649C04C5A442361A5DBE3672BD8CB585160187070872A31D9F30B70397D81449623510365A371E73BDA580E00EEF0E4E |
Malicious: | false |
Reputation: | low |
IE Cache URL: | res://ieframe.dll/navcancl.htm |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 13029 |
Entropy (8bit): | 0.4807990196821939 |
Encrypted: | false |
SSDEEP: | 24:c9lLh9lLh9lIn9lIn9loyF9loO9lWYCeATCwQwyr2w:kBqoI5PYC3TC92w |
MD5: | F6DA78282DF1FD0CC0E96C6ADFA62D7B |
SHA1: | 3B2DE5E0A04C68A2ED66611A1539647DF6BF58E5 |
SHA-256: | 372E9A800E878C66EA66F12EDCE6FF58FB12254996986C57281533A5A5AC1847 |
SHA-512: | 61BC1FEB399E50FC6D585E65A94CE5ABFB445AC5C2160FBD70666B43FDEA9B2CCAFC8B2D9B1FBDF1AD93A2BD0BEEAD991EB097A9B989FE7AFFE541F163FD0B3C |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 34349 |
Entropy (8bit): | 0.3468655968646334 |
Encrypted: | false |
SSDEEP: | 24:c9lLh9lLh9lIn9lIn9lRg9lRA9lTS9lTy9lSSd9lSSd9lw79lwEk9l2N9l2N9l/D:kBqoxKAuvScS+EiIZ1I1U/h5 |
MD5: | 652F492F7D87E8C7F53AEFC5BE2FAD63 |
SHA1: | 9778877A0B403B95EE321A0D39C2AF4203900BE5 |
SHA-256: | 7C35E9078297CD1EFD509C9D47CF465BAC0D120895F1D46EC6D3B0CF4FADDFDC |
SHA-512: | 7032F4A0E871FE44F02C648334CA29FC9FDAC43ED8514C715D00A663DC2D30B0EFACB3E1AE779259E009DC94102288CA3ACA51843F1FC0F95AE8976C64D74174 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 25441 |
Entropy (8bit): | 0.3238696332961443 |
Encrypted: | false |
SSDEEP: | 24:c9lLh9lLh9lIn9lIn9lRx/9lRJ9lTb9lTb9lSSU9lSSU9laAa/9laAwXg:kBqoxxJhHWSVSEab |
MD5: | 44406CF3D657BB0D6B5C5FF4EE04FF73 |
SHA1: | A75910E6F4B28D21315D55CDE530BC02D8F3AFB3 |
SHA-256: | 54559846C66D77DB0C76A1D4D4D5D52A9F436131C427C028F748C332D5EB7FE2 |
SHA-512: | 4E8DFC7B65060E9683E43B484002A7DE37C8421A8FF3719294260D95527FF3E816173DA80A51522CEBDEE972CD0C8132543541F03DE07F8143E0675EBAA70AD3 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Static File Info |
---|
No static file info |
---|
Network Behavior |
---|
Network Port Distribution |
---|
- Total Packets: 20
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 10, 2020 21:57:15.605088949 CET | 49720 | 80 | 192.168.2.3 | 116.202.114.114 |
Dec 10, 2020 21:57:15.605736971 CET | 49721 | 80 | 192.168.2.3 | 116.202.114.114 |
Dec 10, 2020 21:57:15.627469063 CET | 80 | 49720 | 116.202.114.114 | 192.168.2.3 |
Dec 10, 2020 21:57:15.627626896 CET | 49720 | 80 | 192.168.2.3 | 116.202.114.114 |
Dec 10, 2020 21:57:15.628029108 CET | 80 | 49721 | 116.202.114.114 | 192.168.2.3 |
Dec 10, 2020 21:57:15.628142118 CET | 49721 | 80 | 192.168.2.3 | 116.202.114.114 |
Dec 10, 2020 21:57:15.628855944 CET | 49720 | 80 | 192.168.2.3 | 116.202.114.114 |
Dec 10, 2020 21:57:15.650984049 CET | 80 | 49720 | 116.202.114.114 | 192.168.2.3 |
Dec 10, 2020 21:57:15.654418945 CET | 80 | 49720 | 116.202.114.114 | 192.168.2.3 |
Dec 10, 2020 21:57:15.654500961 CET | 49720 | 80 | 192.168.2.3 | 116.202.114.114 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 10, 2020 21:57:09.418765068 CET | 60100 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 10, 2020 21:57:09.451730013 CET | 53 | 60100 | 8.8.8.8 | 192.168.2.3 |
Dec 10, 2020 21:57:10.409866095 CET | 53195 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 10, 2020 21:57:10.434272051 CET | 53 | 53195 | 8.8.8.8 | 192.168.2.3 |
Dec 10, 2020 21:57:11.572293997 CET | 50141 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 10, 2020 21:57:11.596645117 CET | 53 | 50141 | 8.8.8.8 | 192.168.2.3 |
Dec 10, 2020 21:57:12.875602961 CET | 53023 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 10, 2020 21:57:12.900060892 CET | 53 | 53023 | 8.8.8.8 | 192.168.2.3 |
Dec 10, 2020 21:57:13.667177916 CET | 49563 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 10, 2020 21:57:13.691607952 CET | 53 | 49563 | 8.8.8.8 | 192.168.2.3 |
Dec 10, 2020 21:57:14.450725079 CET | 51352 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 10, 2020 21:57:14.484752893 CET | 53 | 51352 | 8.8.8.8 | 192.168.2.3 |
Dec 10, 2020 21:57:14.742130041 CET | 59349 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 10, 2020 21:57:14.766546011 CET | 53 | 59349 | 8.8.8.8 | 192.168.2.3 |
Dec 10, 2020 21:57:15.560647964 CET | 57084 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 10, 2020 21:57:15.593636036 CET | 53 | 57084 | 8.8.8.8 | 192.168.2.3 |
Dec 10, 2020 21:57:16.050615072 CET | 58823 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 10, 2020 21:57:16.075059891 CET | 53 | 58823 | 8.8.8.8 | 192.168.2.3 |
Dec 10, 2020 21:57:17.009074926 CET | 57568 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 10, 2020 21:57:17.041919947 CET | 53 | 57568 | 8.8.8.8 | 192.168.2.3 |
Dec 10, 2020 21:57:17.902090073 CET | 50540 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 10, 2020 21:57:17.926407099 CET | 53 | 50540 | 8.8.8.8 | 192.168.2.3 |
Dec 10, 2020 21:57:18.856375933 CET | 54366 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 10, 2020 21:57:18.880717039 CET | 53 | 54366 | 8.8.8.8 | 192.168.2.3 |
Dec 10, 2020 21:57:19.887326002 CET | 53034 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 10, 2020 21:57:19.911648989 CET | 53 | 53034 | 8.8.8.8 | 192.168.2.3 |
Dec 10, 2020 21:57:36.349677086 CET | 57762 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 10, 2020 21:57:36.374238014 CET | 53 | 57762 | 8.8.8.8 | 192.168.2.3 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class |
---|---|---|---|---|---|---|---|
Dec 10, 2020 21:57:15.560647964 CET | 192.168.2.3 | 8.8.8.8 | 0x2d9c | Standard query (0) | A (IP address) | IN (0x0001) |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class |
---|---|---|---|---|---|---|---|---|---|
Dec 10, 2020 21:57:15.593636036 CET | 8.8.8.8 | 192.168.2.3 | 0x2d9c | No error (0) | generic.lb.lm5v.com | CNAME (Canonical name) | IN (0x0001) | ||
Dec 10, 2020 21:57:15.593636036 CET | 8.8.8.8 | 192.168.2.3 | 0x2d9c | No error (0) | 116.202.114.114 | A (IP address) | IN (0x0001) | ||
Dec 10, 2020 21:57:15.593636036 CET | 8.8.8.8 | 192.168.2.3 | 0x2d9c | No error (0) | 116.202.161.117 | A (IP address) | IN (0x0001) | ||
Dec 10, 2020 21:57:15.593636036 CET | 8.8.8.8 | 192.168.2.3 | 0x2d9c | No error (0) | 116.202.172.174 | A (IP address) | IN (0x0001) |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
0 | 192.168.2.3 | 49720 | 116.202.114.114 | 80 | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
Dec 10, 2020 21:57:15.628855944 CET | 74 | OUT | |
Dec 10, 2020 21:57:15.654418945 CET | 74 | IN |
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
Behavior |
---|
Click to jump to process
System Behavior |
---|
Start time: | 21:57:13 |
Start date: | 10/12/2020 |
Path: | C:\Program Files\internet explorer\iexplore.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d8cc0000 |
File size: | 823560 bytes |
MD5 hash: | 6465CB92B25A7BC1DF8E01D8AC5E7596 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
Network Activities
Object Security Activities
LPC Port Activities
Start time: | 21:57:13 |
Start date: | 10/12/2020 |
Path: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xbe0000 |
File size: | 822536 bytes |
MD5 hash: | 071277CC2E3DF41EEEA8013E2AB58D5A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
Network Activities
Object Security Activities
LPC Port Activities
Disassembly |
---|