Analysis Report LTSVC.exe
Overview
General Information
Detection
Score: | 3 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
No yara matches |
---|
Sigma Overview |
---|
No Sigma rule has matched |
---|
Signature Overview |
---|
- • Compliance
- • Networking
- • System Summary
- • Data Obfuscation
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | Static PE information: |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Classification label: |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | Binary or memory string: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_0011900E |
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Last function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | Process Injection11 | Virtualization/Sandbox Evasion1 | OS Credential Dumping | Query Registry1 | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Data Obfuscation | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Disable or Modify Tools1 | LSASS Memory | Security Software Discovery11 | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Process Injection11 | Security Account Manager | Virtualization/Sandbox Evasion1 | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Obfuscated Files or Information1 | NTDS | System Information Discovery22 | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | Remote System Discovery1 | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
1% | Virustotal | Browse | ||
0% | ReversingLabs |
No Antivirus matches |
---|
No Antivirus matches |
---|
No Antivirus matches |
---|
No Antivirus matches |
---|
No contacted domains info |
---|
No contacted IP infos |
---|
General Information |
---|
Joe Sandbox Version: | 32.0.0 Black Diamond |
Analysis ID: | 422781 |
Start date: | 24.05.2021 |
Start time: | 15:37:07 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 7m 0s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | LTSVC.exe |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 27 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean3.winEXE@4/4@0/0 |
EGA Information: | Failed |
HDC Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
Warnings: | Show All
|
Time | Type | Description |
---|---|---|
15:38:04 | API Interceptor |
No context |
---|
No context |
---|
No context |
---|
No context |
---|
No context |
---|
Process: | C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 12614 |
Entropy (8bit): | 3.769401756167136 |
Encrypted: | false |
SSDEEP: | 192:WS2fN50ydlwnay/29llfLsPOvEpLa/u7spS274lts:QfNTX2aXvGa/u7spX4lts |
MD5: | 2880BBC65C387A1F29E226253AE3D04A |
SHA1: | B56B716CB760D0F15898336B5140AA61F899ACD6 |
SHA-256: | AD6081B6BD0C61EF3FD3478AF8CE92A926DA02360B3DD8841746D83B25F92976 |
SHA-512: | 4417C85EAA3FBAB1CD66DE06E34C8A28BC63AB2A0E2E93E646D0921EA08D9FD3BFE41E86E35B7CB5E5336EFA16663ACF7D5ABAB7BA8765FB144011AEDA4FC60D |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8074 |
Entropy (8bit): | 3.704065276151016 |
Encrypted: | false |
SSDEEP: | 192:Rrl7r3GLNiMHuUzg24O46YIwwDjgmfZr0SrCp1CWtfWw2m:RrlsNiSuf24p6YPwDjgmf10SSCkfr |
MD5: | 2B88ABE35191E4C674A9010DD1277BB3 |
SHA1: | C7CA016E914A8A0A0869A3166BC8C5623F036094 |
SHA-256: | A10BAB4FF9C62E80AD3F5E540B4F1D5A976A3002CC3B1B976B32435F8F1B91B5 |
SHA-512: | 8DB39B3F61058B6A48ADCBEB6458556F4864E82E1350FB68F14F7280E1F24EF0B8D650AFCC09E9BE181F33FEA9D7F1F464A6AE0490CEAAB57961A2B290306204 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4739 |
Entropy (8bit): | 4.467128567288201 |
Encrypted: | false |
SSDEEP: | 48:cvIwSD8zs+JgtBI9xlWSC8BW8fm8M4JFKkm+8EFTyq8vxm+8m1cmzAgzV7d:uITf0XUSNFJFKWWR1fAO9d |
MD5: | CFC41AC310FF841256D5650C2103B7C0 |
SHA1: | C6759620778C1A64A5593593E0C8794544929B79 |
SHA-256: | FD428F7B038075BD4B061F5715F1D00D41F7299AD154EC5D80A0D35E9DE5C856 |
SHA-512: | F6BAD371295974597728DD4CA24ED53932CB57280B928DF761D3672E3D54987F0D257772B9F5CA62A548E6D630717E064177A1C260AC8B4DB04BFEE181743B30 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Users\user\Desktop\LTSVC.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 887 |
Entropy (8bit): | 5.1222392562687435 |
Encrypted: | false |
SSDEEP: | 24:RwHtNaFN2r4CFNaFNm0uhdrC7U4APUrEe:eHtNOXONOm0mOUxgEe |
MD5: | 20C75699319C1A8E693434F0A0AF53F4 |
SHA1: | C05202104D56BE0E4138BFB71BDA3F1EDC8C0B34 |
SHA-256: | CB212E19A7CC07FBA1FE687D212027B018BC77965957491D1EF2F4006F9BF8AD |
SHA-512: | B662EF9F48DB234DDEF91E4AF3E75CFE38F27B473F516BDBD9A2B789389B86944769AB180697A073E7B6A202708BAAF375A9650BB33E2005C0962D63FC32FCD6 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 6.1317325451106255 |
TrID: |
|
File name: | LTSVC.exe |
File size: | 1666888 |
MD5: | 6c719219f6edc0e49f1505d21b1f0eff |
SHA1: | 3be4c6ae86af847275a848d42dade9a3540bfc57 |
SHA256: | dd0ebcab07e4a257cb6ac2f235e9a720615fc79a5a3a450541ff9650a73f7042 |
SHA512: | 0d26fb7a31d71d985bbe8358e8779c8bf863196b126473efc2759fecde70b99e59585e1170f1679681d35695ae2d22fc74fb2490924cb4bb47d8f4df40ac57dd |
SSDEEP: | 24576:VOQD0PQ514yHym9POA8g4dYmw806zmmdpEQ6hwk3otqpU:DD0Pm14yHym90dYmN0+m6iQ6hwk4tz |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...eA^`.........."...P.................. ........... ....................................@................................ |
File Icon |
---|
Icon Hash: | b08eccb2b2ecd2b2 |
General | |
---|---|
Entrypoint: | 0x1118d1de |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x11000000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT |
Time Stamp: | 0x605E4165 [Fri Mar 26 20:17:41 2021 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | v2.0.50727 |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Signature Valid: | true |
Signature Issuer: | CN=GlobalSign Extended Validation CodeSigning CA - SHA256 - G3, O=GlobalSign nv-sa, C=BE |
Signature Validation Error: | The operation completed successfully |
Error Number: | 0 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 474D674528677850C6B8DAAE19447779 |
Thumbprint SHA-1: | 07290735CAC17E851C608F28C3C03F68B94DDC35 |
Thumbprint SHA-256: | F6FEE5A4737C24588F48FBCA87BECE244656FCD80E4ADF0B31F9EE94CF1C9420 |
Serial: | 159CBD61D46835827A089BD0 |
Instruction |
---|
jmp dword ptr [11002000h] |
retn 5BF8h |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x18d190 | 0x4b | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x18e000 | 0x9e00 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x195400 | 0x1b48 | .rsrc |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x198000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x18d0fc | 0x1c | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x18b1e8 | 0x18b200 | False | 0.424625192779 | data | 6.12687234481 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
.rsrc | 0x18e000 | 0x9e00 | 0x9e00 | False | 0.25215090981 | data | 4.58047893213 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x198000 | 0xc | 0x200 | False | 0.044921875 | data | 0.101910425663 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
RT_ICON | 0x18e180 | 0x468 | GLS_BINARY_LSB_FIRST | ||
RT_ICON | 0x18e5f8 | 0x988 | data | ||
RT_ICON | 0x18ef90 | 0x10a8 | dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0 | ||
RT_ICON | 0x190048 | 0x25a8 | dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0 | ||
RT_ICON | 0x192600 | 0x4228 | dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 0, next used block 0 | ||
RT_GROUP_ICON | 0x196838 | 0x4c | data | ||
RT_VERSION | 0x196894 | 0x3a8 | data | ||
RT_MANIFEST | 0x196c4c | 0x1001 | XML 1.0 document, UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Description | Data |
---|---|
Translation | 0x0000 0x04b0 |
LegalCopyright | Copyright 2005-2015 LabTech Software |
Assembly Version | 210.82.7755.29326 |
InternalName | LTSVC.exe |
FileVersion | 210.82.7755.29326 |
CompanyName | LabTech Software |
Comments | Remote reporting and administration tool. |
ProductName | LabTech MSP |
ProductVersion | 3.0 |
FileDescription | LabTech Service |
OriginalFilename | LTSVC.exe |
Network Behavior |
---|
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
May 24, 2021 15:37:50.911567926 CEST | 64344 | 53 | 192.168.2.5 | 8.8.8.8 |
May 24, 2021 15:37:50.969238997 CEST | 53 | 64344 | 8.8.8.8 | 192.168.2.5 |
May 24, 2021 15:37:51.321475983 CEST | 62060 | 53 | 192.168.2.5 | 8.8.8.8 |
May 24, 2021 15:37:51.371126890 CEST | 53 | 62060 | 8.8.8.8 | 192.168.2.5 |
May 24, 2021 15:37:51.685807943 CEST | 61805 | 53 | 192.168.2.5 | 8.8.8.8 |
May 24, 2021 15:37:51.754277945 CEST | 53 | 61805 | 8.8.8.8 | 192.168.2.5 |
May 24, 2021 15:37:52.534930944 CEST | 54795 | 53 | 192.168.2.5 | 8.8.8.8 |
May 24, 2021 15:37:52.586572886 CEST | 53 | 54795 | 8.8.8.8 | 192.168.2.5 |
May 24, 2021 15:37:52.695518970 CEST | 49557 | 53 | 192.168.2.5 | 8.8.8.8 |
May 24, 2021 15:37:52.756100893 CEST | 53 | 49557 | 8.8.8.8 | 192.168.2.5 |
May 24, 2021 15:37:53.999545097 CEST | 61733 | 53 | 192.168.2.5 | 8.8.8.8 |
May 24, 2021 15:37:54.051851988 CEST | 53 | 61733 | 8.8.8.8 | 192.168.2.5 |
May 24, 2021 15:37:54.564791918 CEST | 65447 | 53 | 192.168.2.5 | 8.8.8.8 |
May 24, 2021 15:37:54.624133110 CEST | 53 | 65447 | 8.8.8.8 | 192.168.2.5 |
May 24, 2021 15:37:55.243189096 CEST | 52441 | 53 | 192.168.2.5 | 8.8.8.8 |
May 24, 2021 15:37:55.301314116 CEST | 53 | 52441 | 8.8.8.8 | 192.168.2.5 |
May 24, 2021 15:37:56.496846914 CEST | 62176 | 53 | 192.168.2.5 | 8.8.8.8 |
May 24, 2021 15:37:56.546195030 CEST | 53 | 62176 | 8.8.8.8 | 192.168.2.5 |
May 24, 2021 15:37:58.146553993 CEST | 59596 | 53 | 192.168.2.5 | 8.8.8.8 |
May 24, 2021 15:37:58.197179079 CEST | 53 | 59596 | 8.8.8.8 | 192.168.2.5 |
May 24, 2021 15:37:59.723550081 CEST | 65296 | 53 | 192.168.2.5 | 8.8.8.8 |
May 24, 2021 15:37:59.776124001 CEST | 53 | 65296 | 8.8.8.8 | 192.168.2.5 |
May 24, 2021 15:38:01.629211903 CEST | 63183 | 53 | 192.168.2.5 | 8.8.8.8 |
May 24, 2021 15:38:01.679328918 CEST | 53 | 63183 | 8.8.8.8 | 192.168.2.5 |
May 24, 2021 15:38:02.710369110 CEST | 60151 | 53 | 192.168.2.5 | 8.8.8.8 |
May 24, 2021 15:38:02.760061979 CEST | 53 | 60151 | 8.8.8.8 | 192.168.2.5 |
May 24, 2021 15:38:04.313112020 CEST | 56969 | 53 | 192.168.2.5 | 8.8.8.8 |
May 24, 2021 15:38:04.314493895 CEST | 55161 | 53 | 192.168.2.5 | 8.8.8.8 |
May 24, 2021 15:38:04.365657091 CEST | 53 | 56969 | 8.8.8.8 | 192.168.2.5 |
May 24, 2021 15:38:04.372848034 CEST | 53 | 55161 | 8.8.8.8 | 192.168.2.5 |
May 24, 2021 15:38:05.413750887 CEST | 54757 | 53 | 192.168.2.5 | 8.8.8.8 |
May 24, 2021 15:38:05.463536978 CEST | 53 | 54757 | 8.8.8.8 | 192.168.2.5 |
May 24, 2021 15:38:06.966394901 CEST | 49992 | 53 | 192.168.2.5 | 8.8.8.8 |
May 24, 2021 15:38:07.016088009 CEST | 53 | 49992 | 8.8.8.8 | 192.168.2.5 |
May 24, 2021 15:38:16.484643936 CEST | 60075 | 53 | 192.168.2.5 | 8.8.8.8 |
May 24, 2021 15:38:16.562484980 CEST | 53 | 60075 | 8.8.8.8 | 192.168.2.5 |
May 24, 2021 15:38:24.687164068 CEST | 59736 | 53 | 192.168.2.5 | 8.8.8.8 |
May 24, 2021 15:38:24.703183889 CEST | 51058 | 53 | 192.168.2.5 | 8.8.8.8 |
May 24, 2021 15:38:24.708192110 CEST | 52636 | 53 | 192.168.2.5 | 8.8.8.8 |
May 24, 2021 15:38:24.745512009 CEST | 53 | 59736 | 8.8.8.8 | 192.168.2.5 |
May 24, 2021 15:38:24.752518892 CEST | 53 | 51058 | 8.8.8.8 | 192.168.2.5 |
May 24, 2021 15:38:24.760869026 CEST | 53 | 52636 | 8.8.8.8 | 192.168.2.5 |
May 24, 2021 15:38:28.871155024 CEST | 55016 | 53 | 192.168.2.5 | 8.8.8.8 |
May 24, 2021 15:38:28.938971043 CEST | 53 | 55016 | 8.8.8.8 | 192.168.2.5 |
May 24, 2021 15:38:57.466895103 CEST | 64345 | 53 | 192.168.2.5 | 8.8.8.8 |
May 24, 2021 15:38:57.533468008 CEST | 53 | 64345 | 8.8.8.8 | 192.168.2.5 |
May 24, 2021 15:39:04.335458994 CEST | 57128 | 53 | 192.168.2.5 | 8.8.8.8 |
May 24, 2021 15:39:04.402666092 CEST | 53 | 57128 | 8.8.8.8 | 192.168.2.5 |
May 24, 2021 15:39:08.786279917 CEST | 54791 | 53 | 192.168.2.5 | 8.8.8.8 |
May 24, 2021 15:39:08.850893021 CEST | 53 | 54791 | 8.8.8.8 | 192.168.2.5 |
May 24, 2021 15:39:41.764441967 CEST | 50463 | 53 | 192.168.2.5 | 8.8.8.8 |
May 24, 2021 15:39:41.822890997 CEST | 53 | 50463 | 8.8.8.8 | 192.168.2.5 |
May 24, 2021 15:39:43.461764097 CEST | 50394 | 53 | 192.168.2.5 | 8.8.8.8 |
May 24, 2021 15:39:43.522617102 CEST | 53 | 50394 | 8.8.8.8 | 192.168.2.5 |
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
High Level Behavior Distribution |
---|
back
Click to dive into process behavior distribution
Behavior |
---|
Click to jump to process
System Behavior |
---|
Start time: | 15:37:58 |
Start date: | 24/05/2021 |
Path: | C:\Users\user\Desktop\LTSVC.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x110000 |
File size: | 1666888 bytes |
MD5 hash: | 6C719219F6EDC0E49F1505D21B1F0EFF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Reputation: | low |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
LPC Port Activities
Start time: | 15:37:59 |
Start date: | 24/05/2021 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7ecfc0000 |
File size: | 625664 bytes |
MD5 hash: | EA777DEEA782E8B4D7C7C33BBF8A4496 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
LPC Port Activities
Start time: | 15:38:00 |
Start date: | 24/05/2021 |
Path: | C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x10000000 |
File size: | 43664 bytes |
MD5 hash: | 9B2D2AE232F2D0EFAEF9D5EB2509BE79 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
Network Activities
Process Token Activities
Object Security Activities
LPC Port Activities
Disassembly |
---|
Code Analysis |
---|
Executed Functions |
---|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Non-executed Functions |
---|