Windows Analysis Report justificante de la transfer.exe
Overview
General Information
Detection
AgentTesla GuLoader
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Found malware configuration
Potential malicious icon found
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Antivirus / Scanner detection for submitted sample
Yara detected GuLoader
Hides threads from debuggers
Installs a global keyboard hook
Writes to foreign memory regions
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to detect Any.run
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Tries to steal Mail credentials (via file access)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to call native functions
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Classification
|
{
"Exfil Mode": "SMTP",
"SMTP Info": "info@saludietnatural.es@Virginia1357@smtp.1and1.esernestbrown7711@gmail.com"
}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_GuLoader_2 | Yara detected GuLoader | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security |
Sigma Overview |
---|
No Sigma rule has matched |
---|
Jbx Signature Overview |
---|
- • AV Detection
- • Cryptography
- • Compliance
- • Networking
- • Key, Mouse, Clipboard, Microphone and Screen Capturing
- • System Summary
- • Data Obfuscation
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
- • Stealing of Sensitive Information
- • Remote Access Functionality
Click to jump to signature section
Show All Signature Results
AV Detection: |
---|
Found malware configuration |
Source: | Malware Configuration Extractor: |
Multi AV Scanner detection for submitted file |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Antivirus / Scanner detection for submitted sample |
Source: | Avira: |
Source: | Avira: |
Source: | Code function: | ||
Source: | Code function: |
Source: | Static PE information: |
Source: | File opened: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | JA3 fingerprint: |
Source: | IP Address: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | TCP traffic: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | DNS traffic detected: |
Source: | Code function: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Key, Mouse, Clipboard, Microphone and Screen Capturing: |
---|
Installs a global keyboard hook |
Source: | Windows user hook set: |
System Summary: |
---|
Potential malicious icon found |
Source: | Icon embedded in PE file: |
Source: | Static PE information: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Code function: | ||
Source: | Code function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Static PE information: |
Source: | Key opened: |
Source: | Section loaded: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Key value queried: |
Source: | Code function: | ||
Source: | Code function: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Classification label: |
Source: | File read: | Jump to behavior |
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | Window detected: |
Source: | File opened: |
Source: | Key opened: |
Source: | File opened: |
Data Obfuscation: |
---|
Yara detected GuLoader |
Source: | File source: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: |
Malware Analysis System Evasion: |
---|
Tries to detect Any.run |
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: |
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Found evasive API chain (trying to detect sleep duration tampering with parallel thread) |
Source: | Function Chain: | ||
Source: | Function Chain: |
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) |
Source: | WMI Queries: |
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) |
Source: | WMI Queries: |
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Thread delayed: |
Source: | Window / User API: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Process information queried: |
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: |
Source: | System information queried: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Anti Debugging: |
---|
Hides threads from debuggers |
Source: | Thread information set: | ||
Source: | Thread information set: |
Source: | Process token adjusted: |
Source: | Process queried: | ||
Source: | Process queried: |
Source: | Code function: |
Source: | Memory allocated: |
HIPS / PFW / Operating System Protection Evasion: |
---|
Writes to foreign memory regions |
Source: | Memory written: |
Source: | Process created: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: |
Source: | Key value queried: |
Stealing of Sensitive Information: |
---|
Yara detected AgentTesla |
Source: | File source: | ||
Source: | File source: |
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) |
Source: | Key opened: |
Tries to harvest and steal ftp login credentials |
Source: | File opened: | ||
Source: | File opened: |
Tries to steal Mail credentials (via file access) |
Source: | File opened: | ||
Source: | File opened: | ||
Source: | Key opened: | ||
Source: | Key opened: |
Tries to harvest and steal browser information (history, passwords, etc) |
Source: | File opened: | ||
Source: | File opened: |
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality: |
---|
Yara detected AgentTesla |
Source: | File source: | ||
Source: | File source: |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation211 | DLL Side-Loading1 | Access Token Manipulation1 | Disable or Modify Tools11 | OS Credential Dumping2 | Security Software Discovery421 | Remote Services | Email Collection1 | Exfiltration Over Other Network Medium | Encrypted Channel21 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Native API1 | Boot or Logon Initialization Scripts | Process Injection112 | Virtualization/Sandbox Evasion341 | Input Capture11 | Process Discovery2 | Remote Desktop Protocol | Input Capture11 | Exfiltration Over Bluetooth | Ingress Tool Transfer2 | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | DLL Side-Loading1 | Access Token Manipulation1 | Credentials in Registry1 | Virtualization/Sandbox Evasion341 | SMB/Windows Admin Shares | Archive Collected Data1 | Automated Exfiltration | Non-Application Layer Protocol2 | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Process Injection112 | NTDS | Application Window Discovery1 | Distributed Component Object Model | Data from Local System2 | Scheduled Transfer | Application Layer Protocol23 | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | Obfuscated Files or Information1 | LSA Secrets | File and Directory Discovery1 | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings | |
Replication Through Removable Media | Launchd | Rc.common | Rc.common | Software Packing1 | Cached Domain Credentials | System Information Discovery115 | VNC | GUI Input Capture | Exfiltration Over C2 Channel | Multiband Communication | Jamming or Denial of Service | Abuse Accessibility Features | |
External Remote Services | Scheduled Task | Startup Items | Startup Items | DLL Side-Loading1 | DCSync | Network Sniffing | Windows Remote Management | Web Portal Capture | Exfiltration Over Alternative Protocol | Commonly Used Port | Rogue Wi-Fi Access Points | Data Encrypted for Impact |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
33% | Virustotal | Browse | ||
16% | ReversingLabs | Win32.Trojan.Mucc | ||
100% | Avira | TR/AD.Nekark.xzcho |
No Antivirus matches |
---|
Source | Detection | Scanner | Label | Link | Download |
---|---|---|---|---|---|
100% | Avira | TR/AD.Nekark.xzcho | Download File |
No Antivirus matches |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
smtp.1and1.es | 212.227.15.158 | true | false | high | |
drive.google.com | 142.250.186.78 | true | false | high | |
googlehosted.l.googleusercontent.com | 172.217.18.97 | true | false | high | |
doc-0s-1s-docs.googleusercontent.com | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false |
| low | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.250.186.78 | drive.google.com | United States | 15169 | GOOGLEUS | false | |
172.217.18.97 | googlehosted.l.googleusercontent.com | United States | 15169 | GOOGLEUS | false | |
212.227.15.158 | smtp.1and1.es | Germany | 8560 | ONEANDONE-ASBrauerstrasse48DE | false |
General Information |
---|
Joe Sandbox Version: | 33.0.0 White Diamond |
Analysis ID: | 1413 |
Start date: | 29.09.2021 |
Start time: | 21:23:54 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 12m 36s |
Hypervisor based Inspection enabled: | false |
Report type: | light |
Sample file name: | justificante de la transfer.exe |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301 |
Run name: | Suspected Instruction Hammering |
Number of analysed new started processes analysed: | 22 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal100.rans.troj.spyw.evad.winEXE@4/1@3/3 |
EGA Information: | Failed |
HDC Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
Warnings: | Show All
|
Time | Type | Description |
---|---|---|
21:26:51 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
212.227.15.158 | Get hash | malicious | Browse | ||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
smtp.1and1.es | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
ONEANDONE-ASBrauerstrasse48DE | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
37f463bf4616ecd445d4a1937da06e19 | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
No context |
---|
Process: | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 30 |
Entropy (8bit): | 3.964735178725505 |
Encrypted: | false |
SSDEEP: | 3:IBVFBWAGRHneyy:ITqAGRHner |
MD5: | 9F754B47B351EF0FC32527B541420595 |
SHA1: | 006C66220B33E98C725B73495FE97B3291CE14D9 |
SHA-256: | 0219D77348D2F0510025E188D4EA84A8E73F856DEB5E0878D673079D05840591 |
SHA-512: | C6996379BCB774CE27EEEC0F173CBACC70CA02F3A773DD879E3A42DA554535A94A9C13308D14E873C71A338105804AFFF32302558111EE880BA0C41747A08532 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 5.882738453776636 |
TrID: |
|
File name: | justificante de la transfer.exe |
File size: | 126976 |
MD5: | 326f29a347549e64c9510a1e0bd6d043 |
SHA1: | d70b73a10e45d9569da0dc44f99d49b7cb886959 |
SHA256: | 99c1a96121410c61014d0115983f43fad64acc77d21914a9fb9e3c6ba262627a |
SHA512: | 611e7553ae486d8be162a24c249e264a519c7b2a3023009d791af382c8ffaee1ca45a3fb0be7a7a7915a760d284527a4c3bed4e7ac60dfda01940932d97916d7 |
SSDEEP: | 1536:8h0ZHEAZsxq4zf8JoJ5pn2dUAh8R+4ZMLoflfjxQ8dUw7K1LjP9L:8hYSxJJ5F2dzh8QmM0flfFQ8dUwyLz9 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L...L..S.....................P....................@................ |
File Icon |
---|
Icon Hash: | 20047c7c70f0e004 |
General | |
---|---|
Entrypoint: | 0x4015b8 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED |
DLL Characteristics: | |
Time Stamp: | 0x53BEB74C [Thu Jul 10 15:54:52 2014 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 71d5a9f33de2f7c250bf122de57cb463 |
Instruction |
---|
push 00401AB0h |
call 00007F3548F747C3h |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
xor byte ptr [eax], al |
add byte ptr [eax], al |
inc eax |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add cl, bh |
or ecx, dword ptr [eax+ebp*4] |
sbb byte ptr [eax+esi*2], dh |
dec ebp |
test byte ptr [esi+2E301F39h], ah |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x19f34 | 0x28 | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x1d000 | 0x2266 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x228 | 0x20 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x1000 | 0x148 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x19460 | 0x1a000 | False | 0.423574594351 | data | 6.26966318358 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
.data | 0x1b000 | 0x11c8 | 0x1000 | False | 0.00634765625 | data | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
.rsrc | 0x1d000 | 0x2266 | 0x3000 | False | 0.292399088542 | data | 3.30185971182 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
CUSTOM | 0x1ef68 | 0x2fe | MS Windows icon resource - 1 icon, 32x32, 16 colors | English | United States |
CUSTOM | 0x1eb2a | 0x43e | MS Windows icon resource - 2 icons, 32x32, 2 colors, 32x32, 16 colors, 4 bits/pixel | English | United States |
CUSTOM | 0x1da7c | 0x10ae | MS Windows icon resource - 3 icons, 32x32, 8 bits/pixel, 16x16, 32 bits/pixel | English | United States |
RT_ICON | 0x1d94c | 0x130 | data | ||
RT_ICON | 0x1d664 | 0x2e8 | data | ||
RT_ICON | 0x1d53c | 0x128 | GLS_BINARY_LSB_FIRST | ||
RT_GROUP_ICON | 0x1d50c | 0x30 | data | ||
RT_VERSION | 0x1d200 | 0x30c | data | English | United States |
DLL | Import |
---|---|
MSVBVM60.DLL | _CIcos, _adj_fptan, __vbaFreeVar, __vbaLenBstr, __vbaStrVarMove, __vbaFreeVarList, _adj_fdiv_m64, _adj_fprem1, __vbaRecAnsiToUni, __vbaSetSystemError, __vbaRecDestruct, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryDestruct, __vbaObjSet, __vbaOnError, __vbaCyAdd, _adj_fdiv_m16i, _adj_fdivr_m16i, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, __vbaAryConstruct2, DllFunctionCall, _adj_fpatan, __vbaRedim, __vbaRecUniToAnsi, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaFpCmpCy, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaStrVarVal, _CIlog, __vbaErrorOverflow, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarDup, __vbaRecDestructAnsi, _CIatan, __vbaStrMove, _allmul, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr |
Description | Data |
---|---|
Translation | 0x0409 0x04b0 |
LegalCopyright | AClassic |
InternalName | Unhypocritical |
FileVersion | 1.00 |
CompanyName | AClassic |
LegalTrademarks | AClassic |
Comments | AClassic |
ProductName | AClassic |
ProductVersion | 1.00 |
FileDescription | AClassic |
OriginalFilename | Unhypocritical.exe |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Network Behavior |
---|
Network Port Distribution |
---|
- Total Packets: 64
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Sep 29, 2021 21:26:40.662333965 CEST | 49823 | 443 | 192.168.11.20 | 142.250.186.78 |
Sep 29, 2021 21:26:40.662415981 CEST | 443 | 49823 | 142.250.186.78 | 192.168.11.20 |
Sep 29, 2021 21:26:40.662676096 CEST | 49823 | 443 | 192.168.11.20 | 142.250.186.78 |
Sep 29, 2021 21:26:40.677500963 CEST | 49823 | 443 | 192.168.11.20 | 142.250.186.78 |
Sep 29, 2021 21:26:40.677558899 CEST | 443 | 49823 | 142.250.186.78 | 192.168.11.20 |
Sep 29, 2021 21:26:40.725945950 CEST | 443 | 49823 | 142.250.186.78 | 192.168.11.20 |
Sep 29, 2021 21:26:40.726144075 CEST | 49823 | 443 | 192.168.11.20 | 142.250.186.78 |
Sep 29, 2021 21:26:40.726183891 CEST | 49823 | 443 | 192.168.11.20 | 142.250.186.78 |
Sep 29, 2021 21:26:40.728861094 CEST | 443 | 49823 | 142.250.186.78 | 192.168.11.20 |
Sep 29, 2021 21:26:40.729127884 CEST | 49823 | 443 | 192.168.11.20 | 142.250.186.78 |
Sep 29, 2021 21:26:40.843688965 CEST | 49823 | 443 | 192.168.11.20 | 142.250.186.78 |
Sep 29, 2021 21:26:40.843744993 CEST | 443 | 49823 | 142.250.186.78 | 192.168.11.20 |
Sep 29, 2021 21:26:40.844377995 CEST | 443 | 49823 | 142.250.186.78 | 192.168.11.20 |
Sep 29, 2021 21:26:40.844501972 CEST | 49823 | 443 | 192.168.11.20 | 142.250.186.78 |
Sep 29, 2021 21:26:40.847001076 CEST | 49823 | 443 | 192.168.11.20 | 142.250.186.78 |
Sep 29, 2021 21:26:40.889874935 CEST | 443 | 49823 | 142.250.186.78 | 192.168.11.20 |
Sep 29, 2021 21:26:41.413003922 CEST | 443 | 49823 | 142.250.186.78 | 192.168.11.20 |
Sep 29, 2021 21:26:41.413177013 CEST | 49823 | 443 | 192.168.11.20 | 142.250.186.78 |
Sep 29, 2021 21:26:41.413206100 CEST | 443 | 49823 | 142.250.186.78 | 192.168.11.20 |
Sep 29, 2021 21:26:41.413316011 CEST | 49823 | 443 | 192.168.11.20 | 142.250.186.78 |
Sep 29, 2021 21:26:41.413378000 CEST | 443 | 49823 | 142.250.186.78 | 192.168.11.20 |
Sep 29, 2021 21:26:41.413486004 CEST | 49823 | 443 | 192.168.11.20 | 142.250.186.78 |
Sep 29, 2021 21:26:41.413511992 CEST | 443 | 49823 | 142.250.186.78 | 192.168.11.20 |
Sep 29, 2021 21:26:41.413621902 CEST | 49823 | 443 | 192.168.11.20 | 142.250.186.78 |
Sep 29, 2021 21:26:41.466572046 CEST | 49823 | 443 | 192.168.11.20 | 142.250.186.78 |
Sep 29, 2021 21:26:41.466625929 CEST | 443 | 49823 | 142.250.186.78 | 192.168.11.20 |
Sep 29, 2021 21:26:41.496449947 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.496527910 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.496678114 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.496979952 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.497026920 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.544962883 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.545157909 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.547046900 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.547312021 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.550802946 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.550822020 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.551135063 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.551322937 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.551654100 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.593908072 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.781630039 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.781805992 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.781830072 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.781888962 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.781999111 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.782033920 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.782208920 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.782442093 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.782860994 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.783111095 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.783535004 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.783739090 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.783782959 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.784015894 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.784065962 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.784276962 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.784318924 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.784543037 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.791227102 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.791413069 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.791455030 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.791646004 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.791680098 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.791697979 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.791871071 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.791910887 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.792098999 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.792126894 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.792313099 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.792351961 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.792520046 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.792601109 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.792629957 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.792717934 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.792788029 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.793087006 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.793235064 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.793272972 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.793466091 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.793510914 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.793704033 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.794001102 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.794194937 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.794235945 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.794383049 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.794410944 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.794559002 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.794729948 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.794878960 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.794915915 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.795067072 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.795095921 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.795243025 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.795433044 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.795588970 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.795625925 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.795816898 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Sep 29, 2021 21:26:41.795847893 CEST | 443 | 49824 | 172.217.18.97 | 192.168.11.20 |
Sep 29, 2021 21:26:41.795993090 CEST | 49824 | 443 | 192.168.11.20 | 172.217.18.97 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Sep 29, 2021 21:25:44.018327951 CEST | 52009 | 53 | 192.168.11.20 | 1.1.1.1 |
Sep 29, 2021 21:25:44.027921915 CEST | 53 | 52009 | 1.1.1.1 | 192.168.11.20 |
Sep 29, 2021 21:25:44.126182079 CEST | 54188 | 53 | 192.168.11.20 | 1.1.1.1 |
Sep 29, 2021 21:25:44.313092947 CEST | 53 | 54188 | 1.1.1.1 | 192.168.11.20 |
Sep 29, 2021 21:26:06.424242020 CEST | 55072 | 53 | 192.168.11.20 | 1.1.1.1 |
Sep 29, 2021 21:26:06.433753014 CEST | 53 | 55072 | 1.1.1.1 | 192.168.11.20 |
Sep 29, 2021 21:26:07.435326099 CEST | 52961 | 53 | 192.168.11.20 | 1.1.1.1 |
Sep 29, 2021 21:26:07.444401026 CEST | 53 | 52961 | 1.1.1.1 | 192.168.11.20 |
Sep 29, 2021 21:26:27.158926964 CEST | 57422 | 53 | 192.168.11.20 | 1.1.1.1 |
Sep 29, 2021 21:26:27.167593002 CEST | 53 | 57422 | 1.1.1.1 | 192.168.11.20 |
Sep 29, 2021 21:26:34.782776117 CEST | 49371 | 53 | 192.168.11.20 | 1.1.1.1 |
Sep 29, 2021 21:26:34.797071934 CEST | 53 | 49371 | 1.1.1.1 | 192.168.11.20 |
Sep 29, 2021 21:26:40.640741110 CEST | 54508 | 53 | 192.168.11.20 | 1.1.1.1 |
Sep 29, 2021 21:26:40.649574041 CEST | 53 | 54508 | 1.1.1.1 | 192.168.11.20 |
Sep 29, 2021 21:26:41.467016935 CEST | 62003 | 53 | 192.168.11.20 | 1.1.1.1 |
Sep 29, 2021 21:26:41.495196104 CEST | 53 | 62003 | 1.1.1.1 | 192.168.11.20 |
Sep 29, 2021 21:27:44.372262955 CEST | 49699 | 53 | 192.168.11.20 | 1.1.1.1 |
Sep 29, 2021 21:27:44.380913019 CEST | 53 | 49699 | 1.1.1.1 | 192.168.11.20 |
Sep 29, 2021 21:28:13.287497997 CEST | 49465 | 53 | 192.168.11.20 | 1.1.1.1 |
Sep 29, 2021 21:28:13.299212933 CEST | 53 | 49465 | 1.1.1.1 | 192.168.11.20 |
Sep 29, 2021 21:28:34.340951920 CEST | 57250 | 53 | 192.168.11.20 | 1.1.1.1 |
Sep 29, 2021 21:28:34.349641085 CEST | 53 | 57250 | 1.1.1.1 | 192.168.11.20 |
Sep 29, 2021 21:31:42.708884954 CEST | 59495 | 53 | 192.168.11.20 | 1.1.1.1 |
Sep 29, 2021 21:31:42.718406916 CEST | 53 | 59495 | 1.1.1.1 | 192.168.11.20 |
Sep 29, 2021 21:32:44.401140928 CEST | 64054 | 53 | 192.168.11.20 | 1.1.1.1 |
Sep 29, 2021 21:32:44.411314011 CEST | 53 | 64054 | 1.1.1.1 | 192.168.11.20 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class |
---|---|---|---|---|---|---|---|
Sep 29, 2021 21:26:40.640741110 CEST | 192.168.11.20 | 1.1.1.1 | 0x2727 | Standard query (0) | A (IP address) | IN (0x0001) | |
Sep 29, 2021 21:26:41.467016935 CEST | 192.168.11.20 | 1.1.1.1 | 0xd41 | Standard query (0) | A (IP address) | IN (0x0001) | |
Sep 29, 2021 21:28:13.287497997 CEST | 192.168.11.20 | 1.1.1.1 | 0x28f9 | Standard query (0) | A (IP address) | IN (0x0001) |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class |
---|---|---|---|---|---|---|---|---|---|
Sep 29, 2021 21:26:40.649574041 CEST | 1.1.1.1 | 192.168.11.20 | 0x2727 | No error (0) | 142.250.186.78 | A (IP address) | IN (0x0001) | ||
Sep 29, 2021 21:26:41.495196104 CEST | 1.1.1.1 | 192.168.11.20 | 0xd41 | No error (0) | googlehosted.l.googleusercontent.com | CNAME (Canonical name) | IN (0x0001) | ||
Sep 29, 2021 21:26:41.495196104 CEST | 1.1.1.1 | 192.168.11.20 | 0xd41 | No error (0) | 172.217.18.97 | A (IP address) | IN (0x0001) | ||
Sep 29, 2021 21:28:13.299212933 CEST | 1.1.1.1 | 192.168.11.20 | 0x28f9 | No error (0) | 212.227.15.158 | A (IP address) | IN (0x0001) | ||
Sep 29, 2021 21:28:13.299212933 CEST | 1.1.1.1 | 192.168.11.20 | 0x28f9 | No error (0) | 212.227.15.142 | A (IP address) | IN (0x0001) |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
0 | 192.168.11.20 | 49823 | 142.250.186.78 | 443 | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
2021-09-29 19:26:40 UTC | 0 | OUT | |
2021-09-29 19:26:41 UTC | 0 | IN | |
2021-09-29 19:26:41 UTC | 1 | IN | |
2021-09-29 19:26:41 UTC | 1 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
1 | 192.168.11.20 | 49824 | 172.217.18.97 | 443 | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
2021-09-29 19:26:41 UTC | 1 | OUT | |
2021-09-29 19:26:41 UTC | 2 | IN |