Analysis Report http://api.btloader.com
Overview
General Information
Detection
Score: | 0 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 60% |
Signatures
Classification
Analysis Advice |
---|
Joe Sandbox was unable to browse the URL (domain or webserver down or HTTPS issue), try to browse the URL again later |
Some HTTP requests failed (404). It is likely the sample will exhibit less behavior |
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
No yara matches |
---|
Sigma Overview |
---|
No Sigma rule has matched |
---|
Signature Overview |
---|
- • Compliance
- • Networking
- • System Summary
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | File opened: | Jump to behavior |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | Process Injection1 | Masquerading1 | OS Credential Dumping | File and Directory Discovery1 | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Non-Application Layer Protocol3 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Process Injection1 | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Application Layer Protocol3 | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Ingress Tool Transfer3 | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
1% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe |
No Antivirus matches |
---|
No Antivirus matches |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
1% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
1% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
api.btloader.com | 130.211.23.194 | true | false |
| unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
130.211.23.194 | api.btloader.com | United States | 15169 | GOOGLEUS | false |
General Information |
---|
Joe Sandbox Version: | 32.0.0 Black Diamond |
Analysis ID: | 433998 |
Start date: | 14.06.2021 |
Start time: | 09:33:38 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 2m 45s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | http://api.btloader.com |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 5 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | UNKNOWN |
Classification: | unknown0.win@3/14@1/1 |
Cookbook Comments: |
|
Warnings: | Show All
|
Errors: |
|
No simulations |
---|
No context |
---|
No context |
---|
No context |
---|
No context |
---|
No context |
---|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 30296 |
Entropy (8bit): | 1.8479992824306049 |
Encrypted: | false |
SSDEEP: | 192:r2ZhZB2AWRtWifkmunzM5GnBNUnDdsf9mZnjX:rynwXjnRyywi |
MD5: | AC7B146AC1EA2D6F1F658C5B331339A4 |
SHA1: | 411D8C7135BC84E278E2B552BECE62E18CAA626E |
SHA-256: | 608330BF67B61DA7B7168258E3B2C43E3C9BB809FF02FD8C9967490AF2754DF5 |
SHA-512: | 53FCEFB21523A0D8EFC4898269A8EE04046B57659FA335A056CDADC71CEDB4BA94362DCD2D51FB891326C6D8BFFA48A81A6D5C45043B2E1717190FD2766E4C19 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 24160 |
Entropy (8bit): | 1.6239904847769502 |
Encrypted: | false |
SSDEEP: | 48:Iwz6GcprhhGwpaa6G4pQcIGrapbS1GQpBOGHHpcLTGUp8QGzYpm92GopGXncGyXg:rz+Zh7Qa66cWBS/jd2lWkMUsXyg |
MD5: | B786819ED2EBAFA28C1640CB83E09F4E |
SHA1: | 4AA012FACE3EF6F60C3F2EFA0FC36AB3AFF0B3F9 |
SHA-256: | C2FBAF30C82B6BC80B960259E57682569C053A9B777474DDFFF16E05C8A25458 |
SHA-512: | 098D1968D1575063240A9BEE52AA39D5360EA2A7D84B6EEB70F7D7AF3396E6A7B098CC4E05636E9F1DF137BE886693F6DF15B1B7CFF65732474F1204D4628929 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 16984 |
Entropy (8bit): | 1.5615326731315606 |
Encrypted: | false |
SSDEEP: | 48:IwV7GcprkGwpat7G4pQJGrapbSgTGQpKebG7HpRRTGIpG:r/ZcQD6pBSMAZTHA |
MD5: | 53046658240F9840272F727BF8093CE8 |
SHA1: | 5AAD5AF991473372E6E0ECE488327476EB7C825F |
SHA-256: | C63BE03241436539372698E8BB906460DBEE2DCF528E75A7ED4856CD225D5D1B |
SHA-512: | B2F2FCB581EAC851C3B00F909051E19A4504A759895518F6FA5A0A16C34CF30C1F616A9A0C8F486261D9AFD532E683BE11C9163F7E5A10427A34E09B16FA4E7E |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 6495 |
Entropy (8bit): | 3.8998802417135856 |
Encrypted: | false |
SSDEEP: | 48:up4d0yV4VkBXvLutC5N9J/1a5TI7kZ3GUXn3GFa7K083GJehBu01kptk7KwyBwpM:uKp6yN9JaKktZX36a7x05hwW7RM |
MD5: | F65C729DC2D457B7A1093813F1253192 |
SHA1: | 5006C9B50108CF582BE308411B157574E5A893FC |
SHA-256: | B82BFB6FA37FD5D56AC7C00536F150C0F244C81F1FC2D4FEFBBDC5E175C71B4F |
SHA-512: | 717AFF18F105F342103D36270D642CC17BD9921FF0DBC87E3E3C2D897F490F4ECFAB29CF998D6D99C4951C3EABB356FE759C3483A33704CE9FCC1F546EBCBBC7 |
Malicious: | false |
Reputation: | low |
IE Cache URL: | res://ieframe.dll/http_404.htm |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 4113 |
Entropy (8bit): | 7.9370830126943375 |
Encrypted: | false |
SSDEEP: | 96:WNTJL8szf79M8FUjE39KJoUUuJPnvmKacs6Uq7qDMj1XPL:WNrzFoQSJPnvzs6rL |
MD5: | 5565250FCC163AA3A79F0B746416CE69 |
SHA1: | B97CC66471FCDEE07D0EE36C7FB03F342C231F8F |
SHA-256: | 51129C6C98A82EA491F89857C31146ECEC14C4AF184517450A7A20C699C84859 |
SHA-512: | E60EA153B0FECE4D311769391D3B763B14B9A140105A36A13DAD23C2906735EAAB9092236DEB8C68EF078E8864D6E288BEF7EF1731C1E9F1AD9B0170B95AC134 |
Malicious: | false |
Reputation: | low |
IE Cache URL: | res://ieframe.dll/info_48.png |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 748 |
Entropy (8bit): | 7.249606135668305 |
Encrypted: | false |
SSDEEP: | 12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE |
MD5: | C4F558C4C8B56858F15C09037CD6625A |
SHA1: | EE497CC061D6A7A59BB66DEFEA65F9A8145BA240 |
SHA-256: | 39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781 |
SHA-512: | D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44 |
Malicious: | false |
Reputation: | low |
IE Cache URL: | res://ieframe.dll/down.png |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 4720 |
Entropy (8bit): | 5.164796203267696 |
Encrypted: | false |
SSDEEP: | 96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk |
MD5: | D65EC06F21C379C87040B83CC1ABAC6B |
SHA1: | 208D0A0BB775661758394BE7E4AFB18357E46C8B |
SHA-256: | A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F |
SHA-512: | 8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E |
Malicious: | false |
Reputation: | low |
IE Cache URL: | res://ieframe.dll/errorPageStrings.js |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 453 |
Entropy (8bit): | 5.019973044227213 |
Encrypted: | false |
SSDEEP: | 6:3llVuiPjlXJYhg5suRd8PImMo23C/kHrJ8yA/NIeYoWg78C/vTFvbKLAh3:V/XPYhiPRd8j7+9LoIrobtHTdbKi |
MD5: | 20F0110ED5E4E0D5384A496E4880139B |
SHA1: | 51F5FC61D8BF19100DF0F8AADAA57FCD9C086255 |
SHA-256: | 1471693BE91E53C2640FE7BAEECBC624530B088444222D93F2815DFCE1865D5B |
SHA-512: | 5F52C117E346111D99D3B642926139178A80B9EC03147C00E27F07AAB47FE38E9319FE983444F3E0E36DEF1E86DD7C56C25E44B14EFDC3F13B45EDEDA064DB5A |
Malicious: | false |
Reputation: | low |
IE Cache URL: | res://ieframe.dll/background_gradient.jpg |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 12105 |
Entropy (8bit): | 5.451485481468043 |
Encrypted: | false |
SSDEEP: | 192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f |
MD5: | 9234071287E637F85D721463C488704C |
SHA1: | CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152 |
SHA-256: | 65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649 |
SHA-512: | 87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384 |
Malicious: | false |
Reputation: | low |
IE Cache URL: | res://ieframe.dll/httpErrorPagesScripts.js |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 2168 |
Entropy (8bit): | 5.207912016937144 |
Encrypted: | false |
SSDEEP: | 24:5+j5xU5k5N0ndgvoyeP0yyiyQCDr3nowMVworDtX3orKxWxDnCMA0da+hieyuSQK:5Q5K5k5pvFehWrrarrZIrHd3FIQfOS6 |
MD5: | F4FE1CB77E758E1BA56B8A8EC20417C5 |
SHA1: | F4EDA06901EDB98633A686B11D02F4925F827BF0 |
SHA-256: | 8D018639281B33DA8EB3CE0B21D11E1D414E59024C3689F92BE8904EB5779B5F |
SHA-512: | 62514AB345B6648C5442200A8E9530DFB88A0355E262069E0A694289C39A4A1C06C6143E5961074BFAC219949102A416C09733F24E8468984B96843DC222B436 |
Malicious: | false |
Reputation: | low |
IE Cache URL: | res://ieframe.dll/ErrorPageTemplate.css |
Preview: |
|
Process: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 447 |
Entropy (8bit): | 7.304718288205936 |
Encrypted: | false |
SSDEEP: | 12:6v/71Cyt/JNTWxGdr+kZDWO7+4dKIv0b1GKuxu+R:/yBJNTqsSk9BTwE05su+R |
MD5: | 26F971D87CA00E23BD2D064524AEF838 |
SHA1: | 7440BEFF2F4F8FABC9315608A13BF26CABAD27D9 |
SHA-256: | 1D8E5FD3C1FD384C0A7507E7283C7FE8F65015E521B84569132A7EABEDC9D41D |
SHA-512: | C62EB51BE301BB96C80539D66A73CD17CA2021D5D816233853A37DB72E04050271E581CC99652F3D8469B390003CA6C62DAD2A9D57164C620B7777AE99AA1B15 |
Malicious: | false |
Reputation: | low |
IE Cache URL: | res://ieframe.dll/bullet.png |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 13029 |
Entropy (8bit): | 0.4723857120089621 |
Encrypted: | false |
SSDEEP: | 24:c9lLh9lLh9lIn9lIn9loVS9loVC9lWVhnUEnIbIyVEV3:kBqoIfpx |
MD5: | 43E0F28F92BEFEA04ACE7905072D77CC |
SHA1: | 41B3EA6090D5D719F19A41766404CCCE7C0CB187 |
SHA-256: | 7081DDA9D13C3705CD0A2320630FCC54BC3EFB4EFB13CB08311B0A038AFC4280 |
SHA-512: | 9239782C45C9514051443C8FD644BAF9C4A62EFDC7FA3016C88B82474EA4E9418DF28FB9605617CF9D50663C482FE71ECB152EAD60806E81EABC6AFABF4ED697 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 25441 |
Entropy (8bit): | 0.27918767598683664 |
Encrypted: | false |
SSDEEP: | 24:c9lLh9lLh9lIn9lIn9lRx/9lRJ9lTb9lTb9lSSU9lSSU9laAa/9laA:kBqoxxJhHWSVSEab |
MD5: | AB889A32AB9ACD33E816C2422337C69A |
SHA1: | 1190C6B34DED2D295827C2A88310D10A8B90B59B |
SHA-256: | 4D6EC54B8D244E63B0F04FBE2B97402A3DF722560AD12F218665BA440F4CEFDA |
SHA-512: | BD250855747BB4CEC61814D0E44F810156D390E3E9F120A12935EFDF80ACA33C4777AD66257CCA4E4003FEF0741692894980B9298F01C4CDD2D8A9C7BB522FB6 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 34353 |
Entropy (8bit): | 0.34550913988649845 |
Encrypted: | false |
SSDEEP: | 24:c9lLh9lLh9lIn9lIn9lRg9lRA9lTS9lTy9lSSd9lSSd9lwT9lwT9l2l9l2l9l/9k:kBqoxKAuvScS+sKQx9I94XnO |
MD5: | 4F15045E616430976927A518BA4112EE |
SHA1: | 307171D577189396A51F7E95533B9D4B9954CB15 |
SHA-256: | BD04BC118B8B12B47CC182CFE9B115255D2C2C82D0465551A3233C7AAE28DC5B |
SHA-512: | C073E5715BA1120534EE50CE08292A8F9FC972E8F872F12ADE2E27E3EF9E68C96963FF2FEAE5A208CEB848F8E2EC279140976F5F613DBAF21AA9823FFEEE9874 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Static File Info |
---|
No static file info |
---|
Network Behavior |
---|
Network Port Distribution |
---|
- Total Packets: 30
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jun 14, 2021 09:34:36.822216988 CEST | 49734 | 80 | 192.168.2.4 | 130.211.23.194 |
Jun 14, 2021 09:34:36.823146105 CEST | 49735 | 80 | 192.168.2.4 | 130.211.23.194 |
Jun 14, 2021 09:34:36.873328924 CEST | 80 | 49735 | 130.211.23.194 | 192.168.2.4 |
Jun 14, 2021 09:34:36.873486042 CEST | 49735 | 80 | 192.168.2.4 | 130.211.23.194 |
Jun 14, 2021 09:34:36.874603987 CEST | 49735 | 80 | 192.168.2.4 | 130.211.23.194 |
Jun 14, 2021 09:34:36.875374079 CEST | 80 | 49734 | 130.211.23.194 | 192.168.2.4 |
Jun 14, 2021 09:34:36.875524998 CEST | 49734 | 80 | 192.168.2.4 | 130.211.23.194 |
Jun 14, 2021 09:34:36.924686909 CEST | 80 | 49735 | 130.211.23.194 | 192.168.2.4 |
Jun 14, 2021 09:34:37.039510965 CEST | 80 | 49735 | 130.211.23.194 | 192.168.2.4 |
Jun 14, 2021 09:34:37.040106058 CEST | 49735 | 80 | 192.168.2.4 | 130.211.23.194 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jun 14, 2021 09:34:28.571413040 CEST | 53097 | 53 | 192.168.2.4 | 8.8.8.8 |
Jun 14, 2021 09:34:28.622524023 CEST | 53 | 53097 | 8.8.8.8 | 192.168.2.4 |
Jun 14, 2021 09:34:29.461055994 CEST | 49257 | 53 | 192.168.2.4 | 8.8.8.8 |
Jun 14, 2021 09:34:29.513972998 CEST | 53 | 49257 | 8.8.8.8 | 192.168.2.4 |
Jun 14, 2021 09:34:29.787749052 CEST | 62389 | 53 | 192.168.2.4 | 8.8.8.8 |
Jun 14, 2021 09:34:29.838020086 CEST | 53 | 62389 | 8.8.8.8 | 192.168.2.4 |
Jun 14, 2021 09:34:29.863974094 CEST | 49910 | 53 | 192.168.2.4 | 8.8.8.8 |
Jun 14, 2021 09:34:29.918442011 CEST | 53 | 49910 | 8.8.8.8 | 192.168.2.4 |
Jun 14, 2021 09:34:30.037357092 CEST | 55854 | 53 | 192.168.2.4 | 8.8.8.8 |
Jun 14, 2021 09:34:30.090131044 CEST | 53 | 55854 | 8.8.8.8 | 192.168.2.4 |
Jun 14, 2021 09:34:33.052150965 CEST | 64549 | 53 | 192.168.2.4 | 8.8.8.8 |
Jun 14, 2021 09:34:33.110927105 CEST | 53 | 64549 | 8.8.8.8 | 192.168.2.4 |
Jun 14, 2021 09:34:34.182657003 CEST | 63153 | 53 | 192.168.2.4 | 8.8.8.8 |
Jun 14, 2021 09:34:34.241410971 CEST | 53 | 63153 | 8.8.8.8 | 192.168.2.4 |
Jun 14, 2021 09:34:35.419507980 CEST | 52991 | 53 | 192.168.2.4 | 8.8.8.8 |
Jun 14, 2021 09:34:35.477838039 CEST | 53 | 52991 | 8.8.8.8 | 192.168.2.4 |
Jun 14, 2021 09:34:35.518454075 CEST | 53700 | 53 | 192.168.2.4 | 8.8.8.8 |
Jun 14, 2021 09:34:35.568495989 CEST | 53 | 53700 | 8.8.8.8 | 192.168.2.4 |
Jun 14, 2021 09:34:36.752123117 CEST | 51726 | 53 | 192.168.2.4 | 8.8.8.8 |
Jun 14, 2021 09:34:36.811847925 CEST | 53 | 51726 | 8.8.8.8 | 192.168.2.4 |
Jun 14, 2021 09:34:36.863177061 CEST | 56794 | 53 | 192.168.2.4 | 8.8.8.8 |
Jun 14, 2021 09:34:36.916501045 CEST | 53 | 56794 | 8.8.8.8 | 192.168.2.4 |
Jun 14, 2021 09:34:38.456026077 CEST | 56534 | 53 | 192.168.2.4 | 8.8.8.8 |
Jun 14, 2021 09:34:38.507179022 CEST | 53 | 56534 | 8.8.8.8 | 192.168.2.4 |
Jun 14, 2021 09:34:39.756434917 CEST | 56627 | 53 | 192.168.2.4 | 8.8.8.8 |
Jun 14, 2021 09:34:39.806432962 CEST | 53 | 56627 | 8.8.8.8 | 192.168.2.4 |
Jun 14, 2021 09:34:40.684123039 CEST | 56621 | 53 | 192.168.2.4 | 8.8.8.8 |
Jun 14, 2021 09:34:40.742743969 CEST | 53 | 56621 | 8.8.8.8 | 192.168.2.4 |
Jun 14, 2021 09:34:41.517076969 CEST | 63116 | 53 | 192.168.2.4 | 8.8.8.8 |
Jun 14, 2021 09:34:41.567176104 CEST | 53 | 63116 | 8.8.8.8 | 192.168.2.4 |
Jun 14, 2021 09:34:43.600970030 CEST | 64078 | 53 | 192.168.2.4 | 8.8.8.8 |
Jun 14, 2021 09:34:43.650928020 CEST | 53 | 64078 | 8.8.8.8 | 192.168.2.4 |
Jun 14, 2021 09:34:44.952768087 CEST | 64801 | 53 | 192.168.2.4 | 8.8.8.8 |
Jun 14, 2021 09:34:45.004776955 CEST | 53 | 64801 | 8.8.8.8 | 192.168.2.4 |
Jun 14, 2021 09:34:45.872181892 CEST | 61721 | 53 | 192.168.2.4 | 8.8.8.8 |
Jun 14, 2021 09:34:45.925064087 CEST | 53 | 61721 | 8.8.8.8 | 192.168.2.4 |
Jun 14, 2021 09:34:48.588537931 CEST | 51255 | 53 | 192.168.2.4 | 8.8.8.8 |
Jun 14, 2021 09:34:48.639358044 CEST | 53 | 51255 | 8.8.8.8 | 192.168.2.4 |
Jun 14, 2021 09:34:53.087533951 CEST | 61522 | 53 | 192.168.2.4 | 8.8.8.8 |
Jun 14, 2021 09:34:53.140542984 CEST | 53 | 61522 | 8.8.8.8 | 192.168.2.4 |
Jun 14, 2021 09:34:54.508927107 CEST | 52337 | 53 | 192.168.2.4 | 8.8.8.8 |
Jun 14, 2021 09:34:54.562210083 CEST | 53 | 52337 | 8.8.8.8 | 192.168.2.4 |
Jun 14, 2021 09:34:55.439815998 CEST | 55046 | 53 | 192.168.2.4 | 8.8.8.8 |
Jun 14, 2021 09:34:55.493043900 CEST | 53 | 55046 | 8.8.8.8 | 192.168.2.4 |
Jun 14, 2021 09:34:56.394273043 CEST | 49612 | 53 | 192.168.2.4 | 8.8.8.8 |
Jun 14, 2021 09:34:56.455624104 CEST | 53 | 49612 | 8.8.8.8 | 192.168.2.4 |
Jun 14, 2021 09:34:57.429343939 CEST | 49285 | 53 | 192.168.2.4 | 8.8.8.8 |
Jun 14, 2021 09:34:57.491137981 CEST | 53 | 49285 | 8.8.8.8 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class |
---|---|---|---|---|---|---|---|
Jun 14, 2021 09:34:36.752123117 CEST | 192.168.2.4 | 8.8.8.8 | 0x6844 | Standard query (0) | A (IP address) | IN (0x0001) |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class |
---|---|---|---|---|---|---|---|---|---|
Jun 14, 2021 09:34:36.811847925 CEST | 8.8.8.8 | 192.168.2.4 | 0x6844 | No error (0) | 130.211.23.194 | A (IP address) | IN (0x0001) |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
0 | 192.168.2.4 | 49735 | 130.211.23.194 | 80 | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
Jun 14, 2021 09:34:36.874603987 CEST | 2513 | OUT | |
Jun 14, 2021 09:34:37.039510965 CEST | 2514 | IN |
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
Behavior |
---|
Click to jump to process
System Behavior |
---|
Start time: | 09:34:34 |
Start date: | 14/06/2021 |
Path: | C:\Program Files\internet explorer\iexplore.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6377f0000 |
File size: | 823560 bytes |
MD5 hash: | 6465CB92B25A7BC1DF8E01D8AC5E7596 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
Network Activities
Object Security Activities
LPC Port Activities
Start time: | 09:34:35 |
Start date: | 14/06/2021 |
Path: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xde0000 |
File size: | 822536 bytes |
MD5 hash: | 071277CC2E3DF41EEEA8013E2AB58D5A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
Network Activities
Object Security Activities
LPC Port Activities
Disassembly |
---|