Windows
Analysis Report
SecuriteInfo.com.Trojan.Mardom.MN.10.17168.22190
Overview
General Information
Detection
Score: | 96 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe (PID: 7092 cmdline:
"C:\Users\ user\Deskt op\Securit eInfo.com. Trojan.Mar dom.MN.10. 17168.exe" MD5: 29C19B486AF12BE2B5CD16D74105BF8E) SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe (PID: 6604 cmdline:
C:\Users\u ser\Deskto p\Securite Info.com.T rojan.Mard om.MN.10.1 7168.exe MD5: 29C19B486AF12BE2B5CD16D74105BF8E) cmd.exe (PID: 2904 cmdline:
"cmd.exe" /C schtask s /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\ Users\user \AppData\R oaming\roa ming\roami ng.exe'" / f MD5: F3BDBE3BB6F734E357235F4D5898582D) conhost.exe (PID: 1292 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) schtasks.exe (PID: 492 cmdline:
schtasks / create /sc minute /m o 1 /tn "N afifas" /t r "'C:\Use rs\user\Ap pData\Roam ing\roamin g\roaming. exe'" /f MD5: 15FF7D8324231381BAD48A052F85DF04) cmd.exe (PID: 1320 cmdline:
cmd.exe" / C copy "C: \Users\use r\Desktop\ SecuriteIn fo.com.Tro jan.Mardom .MN.10.171 68.exe" "C :\Users\us er\AppData \Roaming\r oaming\roa ming.exe MD5: F3BDBE3BB6F734E357235F4D5898582D) conhost.exe (PID: 1268 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
roaming.exe (PID: 6412 cmdline:
C:\Users\u ser\AppDat a\Roaming\ roaming\ro aming.exe MD5: 29C19B486AF12BE2B5CD16D74105BF8E) roaming.exe (PID: 4244 cmdline:
C:\Users\u ser\AppDat a\Roaming\ roaming\ro aming.exe MD5: 29C19B486AF12BE2B5CD16D74105BF8E) cmd.exe (PID: 3256 cmdline:
"cmd.exe" /C schtask s /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\ Users\user \AppData\R oaming\roa ming\roami ng.exe'" / f MD5: F3BDBE3BB6F734E357235F4D5898582D) conhost.exe (PID: 2304 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) schtasks.exe (PID: 584 cmdline:
schtasks / create /sc minute /m o 1 /tn "N afifas" /t r "'C:\Use rs\user\Ap pData\Roam ing\roamin g\roaming. exe'" /f MD5: 15FF7D8324231381BAD48A052F85DF04) cmd.exe (PID: 5340 cmdline:
cmd.exe" / C copy "C: \Users\use r\AppData\ Roaming\ro aming\roam ing.exe" " C:\Users\u ser\AppDat a\Roaming\ roaming\ro aming.exe MD5: F3BDBE3BB6F734E357235F4D5898582D) conhost.exe (PID: 2296 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
MALWARE_Win_CobianRAT | Detects CobianRAT, a fork of Njrat | ditekSHen |
| |
MALWARE_Win_CobianRAT | Detects CobianRAT, a fork of Njrat | ditekSHen |
| |
MALWARE_Win_CobianRAT | Detects CobianRAT, a fork of Njrat | ditekSHen |
| |
MALWARE_Win_CobianRAT | Detects CobianRAT, a fork of Njrat | ditekSHen |
| |
MALWARE_Win_CobianRAT | Detects CobianRAT, a fork of Njrat | ditekSHen |
| |
Click to see the 15 entries |
- • AV Detection
- • Compliance
- • Software Vulnerabilities
- • Networking
- • Key, Mouse, Clipboard, Microphone and Screen Capturing
- • System Summary
- • Data Obfuscation
- • Persistence and Installation Behavior
- • Boot Survival
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: |
Source: | TCP traffic: |
Source: | DNS traffic detected: |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Code function: | ||
Source: | Code function: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Code function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | ReversingLabs: |
Source: | Static PE information: |
Source: | Key opened: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | File created: | Jump to behavior |
Source: | Classification label: |
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: |
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | File opened: |
Source: | Static PE information: |
Source: | Static PE information: |
Data Obfuscation |
---|
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | File created: | Jump to dropped file |
Boot Survival |
---|
Source: | Process created: |
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: |
Source: | Thread sleep time: | ||
Source: | Thread sleep count: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: |
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: |
Source: | Window / User API: |
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: |
Source: | Process token adjusted: | ||
Source: | Process token adjusted: |
Source: | Process queried: | ||
Source: | Process queried: |
Source: | Code function: |
Source: | Memory allocated: |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: |
Source: | Memory written: | ||
Source: | Memory written: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Binary or memory string: |
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: |
Source: | Key value queried: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 Valid Accounts | 1 Scheduled Task/Job | 1 Valid Accounts | 1 Valid Accounts | 1 Masquerading | 11 Input Capture | 11 Security Software Discovery | Remote Services | 11 Input Capture | Exfiltration Over Other Network Medium | 1 Encrypted Channel | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | 1 Native API | 1 Scheduled Task/Job | 1 Access Token Manipulation | 1 Valid Accounts | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | 1 Archive Collected Data | Exfiltration Over Bluetooth | 1 Non-Standard Port | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | 112 Process Injection | 1 Access Token Manipulation | Security Account Manager | 31 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | 1 Non-Application Layer Protocol | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | 1 Scheduled Task/Job | 1 Disable or Modify Tools | NTDS | 1 Application Window Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | 1 Application Layer Protocol | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | 31 Virtualization/Sandbox Evasion | LSA Secrets | 1 Remote System Discovery | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings | |
Replication Through Removable Media | Launchd | Rc.common | Rc.common | 112 Process Injection | Cached Domain Credentials | 12 System Information Discovery | VNC | GUI Input Capture | Exfiltration Over C2 Channel | Multiband Communication | Jamming or Denial of Service | Abuse Accessibility Features | |
External Remote Services | Scheduled Task | Startup Items | Startup Items | 21 Obfuscated Files or Information | DCSync | Network Sniffing | Windows Remote Management | Web Portal Capture | Exfiltration Over Alternative Protocol | Commonly Used Port | Rogue Wi-Fi Access Points | Data Encrypted for Impact | |
Drive-by Compromise | Command and Scripting Interpreter | Scheduled Task/Job | Scheduled Task/Job | 11 Software Packing | Proc Filesystem | Network Service Scanning | Shared Webroot | Credential API Hooking | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Application Layer Protocol | Downgrade to Insecure Protocols | Generate Fraudulent Advertising Revenue |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
41% | ReversingLabs | Win32.Trojan.Woreflint | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Joe Sandbox ML | |||
41% | ReversingLabs | Win32.Trojan.Woreflint |
Source | Detection | Scanner | Label | Link | Download |
---|---|---|---|---|---|
100% | Avira | TR/Dropper.MSIL.Gen | Download File | ||
100% | Avira | TR/Dropper.MSIL.Gen | Download File | ||
100% | Avira | TR/Dropper.MSIL.Gen | Download File | ||
100% | Avira | TR/Dropper.MSIL.Gen | Download File | ||
100% | Avira | TR/Dropper.MSIL.Gen | Download File | ||
100% | Avira | TR/Dropper.MSIL.Gen | Download File | ||
100% | Avira | TR/Dropper.MSIL.Gen | Download File | ||
100% | Avira | TR/Dropper.MSIL.Gen | Download File | ||
100% | Avira | TR/Dropper.MSIL.Gen | Download File | ||
100% | Avira | TR/Dropper.MSIL.Gen | Download File | ||
100% | Avira | TR/Dropper.MSIL.Gen | Download File | ||
100% | Avira | TR/Dropper.MSIL.Gen | Download File |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
anglekeys11.3utilities.com | 104.250.238.66 | true | false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.250.238.66 | anglekeys11.3utilities.com | Reserved | 13886 | CLOUD-SOUTHUS | false |
IP |
---|
192.168.2.1 |
Joe Sandbox Version: | 34.0.0 Boulder Opal |
Analysis ID: | 628657 |
Start date and time: 17/05/202220:47:42 | 2022-05-17 20:47:42 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 11m 59s |
Hypervisor based Inspection enabled: | false |
Report type: | light |
Sample file name: | SecuriteInfo.com.Trojan.Mardom.MN.10.17168.22190 (renamed file extension from 22190 to exe) |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 33 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal96.spyw.evad.winEXE@22/4@39/2 |
EGA Information: |
|
HDC Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, a udiodg.exe, BackgroundTransfer Host.exe, WMIADAP.exe, backgro undTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe - TCP Packets have been reduced
to 100 - Excluded domains from analysis
(whitelisted): ris.api.iris.m icrosoft.com, client.wns.windo ws.com, fs.microsoft.com, stor e-images.s-microsoft.com, logi n.live.com, sls.update.microso ft.com, displaycatalog.mp.micr osoft.com, img-prod-cms-rt-mic rosoft-com.akamaized.net, arc. msn.com - Execution Graph export aborted
for target roaming.exe, PID 4 244 because it is empty - Not all processes where analyz
ed, report is missing behavior information - Report creation exceeded maxim
um time and may have missing d isassembly code information. - Report size exceeded maximum c
apacity and may have missing b ehavior information. - Report size getting too big, t
oo many NtDeviceIoControlFile calls found. - VT rate limit hit for: Securi
teInfo.com.Trojan.Mardom.MN.10 .17168.exe
Time | Type | Description |
---|---|---|
20:49:12 | Task Scheduler | |
20:49:18 | API Interceptor |
Process: | C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 520 |
Entropy (8bit): | 5.345981753770044 |
Encrypted: | false |
SSDEEP: | 12:Q3La/KDLI4MWuPk21rkvoDLI4MWuCOKbbDLI4MWuPJKiUrRZ9I0ZKhav:ML9E4Ks29E4KnKDE4KhK3VZ9pKhk |
MD5: | CB16F02E4CEFD4F305114A67B4865184 |
SHA1: | 7A481FAE100B554EB754816608A7776954863CFF |
SHA-256: | 0428AA69397DC9399FEBFB4293F8FD06202C8A3C2E9B3F841EBA2DE87DB9FC25 |
SHA-512: | 1F96226886924B2F33578AB5F2B1306A77925FB86AC05615565C3F4EF7D93DB40F9ADD05CDA7F5435DEF58D1FEA1A33473EDDDAFFB0AF8161E73BC7CDBEAEF47 |
Malicious: | true |
Preview: |
Process: | C:\Users\user\AppData\Roaming\roaming\roaming.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 520 |
Entropy (8bit): | 5.345981753770044 |
Encrypted: | false |
SSDEEP: | 12:Q3La/KDLI4MWuPk21rkvoDLI4MWuCOKbbDLI4MWuPJKiUrRZ9I0ZKhav:ML9E4Ks29E4KnKDE4KhK3VZ9pKhk |
MD5: | CB16F02E4CEFD4F305114A67B4865184 |
SHA1: | 7A481FAE100B554EB754816608A7776954863CFF |
SHA-256: | 0428AA69397DC9399FEBFB4293F8FD06202C8A3C2E9B3F841EBA2DE87DB9FC25 |
SHA-512: | 1F96226886924B2F33578AB5F2B1306A77925FB86AC05615565C3F4EF7D93DB40F9ADD05CDA7F5435DEF58D1FEA1A33473EDDDAFFB0AF8161E73BC7CDBEAEF47 |
Malicious: | true |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 449536 |
Entropy (8bit): | 5.347530705213381 |
Encrypted: | false |
SSDEEP: | 6144:KqTkAQke6JRA6nGojT5W4bsirKOVbvJdCG:KwNQkHm6nGXOg |
MD5: | 29C19B486AF12BE2B5CD16D74105BF8E |
SHA1: | AF1DE887BA5EBA69D72EA84020F1FBA9A88D307B |
SHA-256: | AAA959BAA655FA3B2225252A1F8052BB189989911686D6482E45D6E0BDF1B829 |
SHA-512: | D28DC17037DF45C078993C73FFDCBBE854AC7E1852AD1A1091A5175E2E50AE7552EEF89EA4628166CC197949A1F338A76B269C652647E06EE1F33BD2CBFC2F13 |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | modified |
Size (bytes): | 26 |
Entropy (8bit): | 3.95006375643621 |
Encrypted: | false |
SSDEEP: | 3:ggPYV:rPYV |
MD5: | 187F488E27DB4AF347237FE461A079AD |
SHA1: | 6693BA299EC1881249D59262276A0D2CB21F8E64 |
SHA-256: | 255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309 |
SHA-512: | 89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E |
Malicious: | true |
Preview: |
File type: | |
Entropy (8bit): | 5.347530705213381 |
TrID: |
|
File name: | SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe |
File size: | 449536 |
MD5: | 29c19b486af12be2b5cd16d74105bf8e |
SHA1: | af1de887ba5eba69d72ea84020f1fba9a88d307b |
SHA256: | aaa959baa655fa3b2225252a1f8052bb189989911686d6482e45d6e0bdf1b829 |
SHA512: | d28dc17037df45c078993c73ffdcbbe854ac7e1852ad1a1091a5175e2e50ae7552eef89ea4628166cc197949a1f338a76b269c652647e06ee1f33bd2cbfc2f13 |
SSDEEP: | 6144:KqTkAQke6JRA6nGojT5W4bsirKOVbvJdCG:KwNQkHm6nGXOg |
TLSH: | 2DA4CDDC3A458962EE2E8C34CE04CBE56B93BE03214D75B75BEE11C6475E86398C5ACC |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......b.................T...........s... ........@.. .......................@......2.....@................................ |
Icon Hash: | e8b0e06c6de8c4e8 |
Entrypoint: | 0x4473ee |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | 32BIT_MACHINE, EXECUTABLE_IMAGE |
DLL Characteristics: | NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT |
Time Stamp: | 0x628399C6 [Tue May 17 12:49:10 2022 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | v4.0.30319 |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x473a0 | 0x4b | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x48000 | 0x2835e | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x72000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x453f4 | 0x45400 | False | 0.393977747067 | data | 5.44707584046 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
.rsrc | 0x48000 | 0x2835e | 0x28400 | False | 0.0654964091615 | data | 3.64922871351 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x72000 | 0xc | 0x200 | False | 0.044921875 | data | 0.101910425663 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
BMBMD | 0x48684 | 0xd | ASCII text, with no line terminators | English | United States |
CFAGO | 0x48694 | 0xd | ASCII text, with no line terminators | English | United States |
FMKDH | 0x486a4 | 0xd | ASCII text, with no line terminators | English | United States |
IBDHE | 0x486b4 | 0xd | ASCII text, with no line terminators | English | United States |
JKKFK | 0x486c4 | 0xd | ASCII text, with no line terminators | English | United States |
JMNEM | 0x486d4 | 0xd | ASCII text, with no line terminators | English | United States |
JNDIK | 0x486e4 | 0xd | ASCII text, with no line terminators | English | United States |
JNHDK | 0x486f4 | 0xd | ASCII text, with no line terminators | English | United States |
KFODF | 0x48704 | 0xd | ASCII text, with no line terminators | English | United States |
PLHES | 0x48714 | 0xd | ASCII text, with no line terminators | English | United States |
RFCDM | 0x48724 | 0xd | ASCII text, with no line terminators | English | United States |
SANCI | 0x48734 | 0xd | ASCII text, with no line terminators | English | United States |
RT_ICON | 0x48744 | 0x10828 | dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0 | ||
RT_ICON | 0x58f6c | 0x94a8 | data | ||
RT_ICON | 0x62414 | 0x5488 | data | ||
RT_ICON | 0x6789c | 0x4228 | dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 64767, next used block 4282318848 | ||
RT_ICON | 0x6bac4 | 0x25a8 | data | ||
RT_ICON | 0x6e06c | 0x10a8 | data | ||
RT_ICON | 0x6f114 | 0x988 | data | ||
RT_ICON | 0x6fa9c | 0x468 | GLS_BINARY_LSB_FIRST | ||
RT_GROUP_ICON | 0x6ff04 | 0x76 | data | ||
RT_VERSION | 0x6ff7c | 0x1f8 | data | English | United States |
RT_MANIFEST | 0x70174 | 0x1ea | XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Description | Data |
---|---|
LegalCopyright | |
FileVersion | , , , |
CompanyName | |
Comments | |
ProductName | |
ProductVersion | , , , |
FileDescription | |
Translation | 0x0409 0x04b0 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
- Total Packets: 89
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
May 17, 2022 20:49:17.073599100 CEST | 49768 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:17.265693903 CEST | 5552 | 49768 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:17.775856972 CEST | 49768 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:17.967212915 CEST | 5552 | 49768 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:18.479013920 CEST | 49768 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:18.671283960 CEST | 5552 | 49768 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:18.821175098 CEST | 49769 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:19.014730930 CEST | 5552 | 49769 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:19.557296991 CEST | 49769 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:19.749164104 CEST | 5552 | 49769 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:20.354226112 CEST | 49769 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:20.549035072 CEST | 5552 | 49769 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:20.762876034 CEST | 49771 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:20.954544067 CEST | 5552 | 49771 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:21.604331017 CEST | 49771 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:21.796752930 CEST | 5552 | 49771 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:22.401336908 CEST | 49771 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:22.595947027 CEST | 5552 | 49771 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:22.788963079 CEST | 49774 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:22.984390020 CEST | 5552 | 49774 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:23.557631016 CEST | 49774 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:23.750130892 CEST | 5552 | 49774 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:24.354554892 CEST | 49774 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:24.546391010 CEST | 5552 | 49774 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:26.083332062 CEST | 49775 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:26.274569035 CEST | 5552 | 49775 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:26.799226999 CEST | 49775 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:26.990642071 CEST | 5552 | 49775 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:27.604856014 CEST | 49775 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:27.795803070 CEST | 5552 | 49775 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:27.939872026 CEST | 49776 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:28.131268024 CEST | 5552 | 49776 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:28.792418957 CEST | 49776 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:28.983421087 CEST | 5552 | 49776 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:29.605003119 CEST | 49776 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:29.796561003 CEST | 5552 | 49776 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:30.044060946 CEST | 49777 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:30.235666037 CEST | 5552 | 49777 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:30.745712996 CEST | 49777 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:30.940150976 CEST | 5552 | 49777 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:31.558324099 CEST | 49777 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:31.751940012 CEST | 5552 | 49777 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:31.884510994 CEST | 49778 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:32.076971054 CEST | 5552 | 49778 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:32.745954037 CEST | 49778 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:32.939363956 CEST | 5552 | 49778 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:33.558475018 CEST | 49778 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:33.750824928 CEST | 5552 | 49778 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:33.983361959 CEST | 49781 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:34.175708055 CEST | 5552 | 49781 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:34.746057034 CEST | 49781 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:34.938884020 CEST | 5552 | 49781 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:35.558646917 CEST | 49781 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:35.751554966 CEST | 5552 | 49781 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:35.883851051 CEST | 49782 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:36.076284885 CEST | 5552 | 49782 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:36.668829918 CEST | 49782 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:36.861582994 CEST | 5552 | 49782 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:37.558872938 CEST | 49782 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:37.754796028 CEST | 5552 | 49782 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:37.999089003 CEST | 49785 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:38.194361925 CEST | 5552 | 49785 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:38.746368885 CEST | 49785 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:38.938764095 CEST | 5552 | 49785 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:39.558975935 CEST | 49785 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:39.751261950 CEST | 5552 | 49785 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:39.883466959 CEST | 49789 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:40.079190016 CEST | 5552 | 49789 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:40.746591091 CEST | 49789 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:40.937428951 CEST | 5552 | 49789 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:41.559144020 CEST | 49789 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:41.750462055 CEST | 5552 | 49789 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:42.244009018 CEST | 49790 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:42.435246944 CEST | 5552 | 49790 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:43.059248924 CEST | 49790 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:43.250402927 CEST | 5552 | 49790 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:43.856242895 CEST | 49790 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:44.047269106 CEST | 5552 | 49790 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:45.033214092 CEST | 49791 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:45.226063967 CEST | 5552 | 49791 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:45.762605906 CEST | 49791 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:45.954878092 CEST | 5552 | 49791 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:46.465833902 CEST | 49791 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:46.657638073 CEST | 5552 | 49791 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:46.871876955 CEST | 49793 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:47.063222885 CEST | 5552 | 49793 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:47.653441906 CEST | 49793 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:47.845843077 CEST | 5552 | 49793 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:48.363296032 CEST | 49793 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:48.560126066 CEST | 5552 | 49793 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:48.696625948 CEST | 49794 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:48.888470888 CEST | 5552 | 49794 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:49.470087051 CEST | 49794 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:49.661030054 CEST | 5552 | 49794 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:50.263017893 CEST | 49794 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:50.454238892 CEST | 5552 | 49794 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:50.721733093 CEST | 49799 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:50.913628101 CEST | 5552 | 49799 | 104.250.238.66 | 192.168.2.6 |
May 17, 2022 20:49:51.450794935 CEST | 49799 | 5552 | 192.168.2.6 | 104.250.238.66 |
May 17, 2022 20:49:51.642237902 CEST | 5552 | 49799 | 104.250.238.66 | 192.168.2.6 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
May 17, 2022 20:49:17.045411110 CEST | 60350 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:49:17.066694975 CEST | 53 | 60350 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:49:18.798120975 CEST | 51748 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:49:18.819116116 CEST | 53 | 51748 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:49:20.737488031 CEST | 49695 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:49:20.761272907 CEST | 53 | 49695 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:49:22.740173101 CEST | 61607 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:49:22.759896040 CEST | 53 | 61607 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:49:26.062243938 CEST | 56550 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:49:26.081792116 CEST | 53 | 56550 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:49:27.918045998 CEST | 52858 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:49:27.937510014 CEST | 53 | 52858 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:49:30.022228003 CEST | 50029 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:49:30.042073965 CEST | 53 | 50029 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:49:31.865009069 CEST | 59871 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:49:31.882610083 CEST | 53 | 59871 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:49:33.961075068 CEST | 57037 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:49:33.980600119 CEST | 53 | 57037 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:49:35.863197088 CEST | 60609 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:49:35.882124901 CEST | 53 | 60609 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:49:37.977292061 CEST | 54015 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:49:37.997297049 CEST | 53 | 54015 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:49:39.862668037 CEST | 54489 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:49:39.882005930 CEST | 53 | 54489 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:49:42.221235991 CEST | 52698 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:49:42.242500067 CEST | 53 | 52698 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:49:45.007783890 CEST | 53829 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:49:45.029057026 CEST | 53 | 53829 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:49:46.850269079 CEST | 58689 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:49:46.869879007 CEST | 53 | 58689 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:49:48.675764084 CEST | 50081 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:49:48.695035934 CEST | 53 | 50081 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:49:50.698481083 CEST | 65526 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:49:50.719392061 CEST | 53 | 65526 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:49:52.503679037 CEST | 52965 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:49:52.524297953 CEST | 53 | 52965 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:49:54.507745028 CEST | 52125 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:49:54.525068045 CEST | 53 | 52125 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:49:56.378643990 CEST | 55083 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:49:56.398061037 CEST | 53 | 55083 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:49:58.252378941 CEST | 56071 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:49:58.271869898 CEST | 53 | 56071 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:50:00.619097948 CEST | 53170 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:50:00.639024973 CEST | 53 | 53170 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:50:04.856456995 CEST | 64544 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:50:04.875591040 CEST | 53 | 64544 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:50:06.865632057 CEST | 63771 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:50:06.884969950 CEST | 53 | 63771 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:50:08.928145885 CEST | 55342 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:50:08.947736025 CEST | 53 | 55342 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:50:24.891429901 CEST | 64995 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:50:24.910933018 CEST | 53 | 64995 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:50:26.781111002 CEST | 57629 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:50:26.802314997 CEST | 53 | 57629 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:50:29.143615007 CEST | 50453 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:50:29.162911892 CEST | 53 | 50453 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:50:30.952631950 CEST | 55745 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:50:30.970324039 CEST | 53 | 55745 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:50:32.951894045 CEST | 64375 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:50:32.971400976 CEST | 53 | 64375 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:50:34.972531080 CEST | 63844 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:50:34.993850946 CEST | 53 | 63844 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:50:36.942893028 CEST | 57269 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:50:36.960410118 CEST | 53 | 57269 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:50:38.766648054 CEST | 51645 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:50:38.784041882 CEST | 53 | 51645 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:50:40.801650047 CEST | 65010 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:50:40.822791100 CEST | 53 | 65010 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:50:44.063421965 CEST | 49287 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:50:44.082752943 CEST | 53 | 49287 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:50:46.110245943 CEST | 51884 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:50:46.131514072 CEST | 53 | 51884 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:50:47.974157095 CEST | 64442 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:50:47.991703987 CEST | 53 | 64442 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:50:49.827730894 CEST | 56146 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:50:49.845042944 CEST | 53 | 56146 | 8.8.8.8 | 192.168.2.6 |
May 17, 2022 20:50:51.770347118 CEST | 57861 | 53 | 192.168.2.6 | 8.8.8.8 |
May 17, 2022 20:50:51.790035009 CEST | 53 | 57861 | 8.8.8.8 | 192.168.2.6 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class |
---|---|---|---|---|---|---|---|
May 17, 2022 20:49:17.045411110 CEST | 192.168.2.6 | 8.8.8.8 | 0xe96d | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:49:18.798120975 CEST | 192.168.2.6 | 8.8.8.8 | 0xfeb5 | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:49:20.737488031 CEST | 192.168.2.6 | 8.8.8.8 | 0x1304 | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:49:22.740173101 CEST | 192.168.2.6 | 8.8.8.8 | 0x9c7b | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:49:26.062243938 CEST | 192.168.2.6 | 8.8.8.8 | 0x6177 | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:49:27.918045998 CEST | 192.168.2.6 | 8.8.8.8 | 0x7ba | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:49:30.022228003 CEST | 192.168.2.6 | 8.8.8.8 | 0xf906 | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:49:31.865009069 CEST | 192.168.2.6 | 8.8.8.8 | 0x96dd | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:49:33.961075068 CEST | 192.168.2.6 | 8.8.8.8 | 0x9ab | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:49:35.863197088 CEST | 192.168.2.6 | 8.8.8.8 | 0x50b | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:49:37.977292061 CEST | 192.168.2.6 | 8.8.8.8 | 0x6e11 | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:49:39.862668037 CEST | 192.168.2.6 | 8.8.8.8 | 0xc548 | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:49:42.221235991 CEST | 192.168.2.6 | 8.8.8.8 | 0xe674 | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:49:45.007783890 CEST | 192.168.2.6 | 8.8.8.8 | 0xba7c | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:49:46.850269079 CEST | 192.168.2.6 | 8.8.8.8 | 0xea6e | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:49:48.675764084 CEST | 192.168.2.6 | 8.8.8.8 | 0x5b4b | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:49:50.698481083 CEST | 192.168.2.6 | 8.8.8.8 | 0x10a | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:49:52.503679037 CEST | 192.168.2.6 | 8.8.8.8 | 0x9184 | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:49:54.507745028 CEST | 192.168.2.6 | 8.8.8.8 | 0x6abc | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:49:56.378643990 CEST | 192.168.2.6 | 8.8.8.8 | 0xe8ee | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:49:58.252378941 CEST | 192.168.2.6 | 8.8.8.8 | 0x71ed | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:50:00.619097948 CEST | 192.168.2.6 | 8.8.8.8 | 0xc0a3 | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:50:04.856456995 CEST | 192.168.2.6 | 8.8.8.8 | 0x2517 | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:50:06.865632057 CEST | 192.168.2.6 | 8.8.8.8 | 0xfe4f | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:50:08.928145885 CEST | 192.168.2.6 | 8.8.8.8 | 0xec7b | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:50:24.891429901 CEST | 192.168.2.6 | 8.8.8.8 | 0x93e5 | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:50:26.781111002 CEST | 192.168.2.6 | 8.8.8.8 | 0xcae6 | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:50:29.143615007 CEST | 192.168.2.6 | 8.8.8.8 | 0x137b | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:50:30.952631950 CEST | 192.168.2.6 | 8.8.8.8 | 0x8cf8 | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:50:32.951894045 CEST | 192.168.2.6 | 8.8.8.8 | 0xd58d | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:50:34.972531080 CEST | 192.168.2.6 | 8.8.8.8 | 0x8fa7 | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:50:36.942893028 CEST | 192.168.2.6 | 8.8.8.8 | 0x8683 | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:50:38.766648054 CEST | 192.168.2.6 | 8.8.8.8 | 0x7d19 | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:50:40.801650047 CEST | 192.168.2.6 | 8.8.8.8 | 0xd4e | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:50:44.063421965 CEST | 192.168.2.6 | 8.8.8.8 | 0x63e7 | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:50:46.110245943 CEST | 192.168.2.6 | 8.8.8.8 | 0xf114 | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:50:47.974157095 CEST | 192.168.2.6 | 8.8.8.8 | 0xd56f | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:50:49.827730894 CEST | 192.168.2.6 | 8.8.8.8 | 0xc3fd | Standard query (0) | A (IP address) | IN (0x0001) | |
May 17, 2022 20:50:51.770347118 CEST | 192.168.2.6 | 8.8.8.8 | 0x8b16 | Standard query (0) | A (IP address) | IN (0x0001) |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class |
---|---|---|---|---|---|---|---|---|---|
May 17, 2022 20:49:17.066694975 CEST | 8.8.8.8 | 192.168.2.6 | 0xe96d | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:49:18.819116116 CEST | 8.8.8.8 | 192.168.2.6 | 0xfeb5 | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:49:20.761272907 CEST | 8.8.8.8 | 192.168.2.6 | 0x1304 | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:49:22.759896040 CEST | 8.8.8.8 | 192.168.2.6 | 0x9c7b | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:49:26.081792116 CEST | 8.8.8.8 | 192.168.2.6 | 0x6177 | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:49:27.937510014 CEST | 8.8.8.8 | 192.168.2.6 | 0x7ba | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:49:30.042073965 CEST | 8.8.8.8 | 192.168.2.6 | 0xf906 | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:49:31.882610083 CEST | 8.8.8.8 | 192.168.2.6 | 0x96dd | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:49:33.980600119 CEST | 8.8.8.8 | 192.168.2.6 | 0x9ab | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:49:35.882124901 CEST | 8.8.8.8 | 192.168.2.6 | 0x50b | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:49:37.997297049 CEST | 8.8.8.8 | 192.168.2.6 | 0x6e11 | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:49:39.882005930 CEST | 8.8.8.8 | 192.168.2.6 | 0xc548 | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:49:42.242500067 CEST | 8.8.8.8 | 192.168.2.6 | 0xe674 | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:49:45.029057026 CEST | 8.8.8.8 | 192.168.2.6 | 0xba7c | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:49:46.869879007 CEST | 8.8.8.8 | 192.168.2.6 | 0xea6e | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:49:48.695035934 CEST | 8.8.8.8 | 192.168.2.6 | 0x5b4b | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:49:50.719392061 CEST | 8.8.8.8 | 192.168.2.6 | 0x10a | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:49:52.524297953 CEST | 8.8.8.8 | 192.168.2.6 | 0x9184 | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:49:54.525068045 CEST | 8.8.8.8 | 192.168.2.6 | 0x6abc | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:49:56.398061037 CEST | 8.8.8.8 | 192.168.2.6 | 0xe8ee | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:49:58.271869898 CEST | 8.8.8.8 | 192.168.2.6 | 0x71ed | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:50:00.639024973 CEST | 8.8.8.8 | 192.168.2.6 | 0xc0a3 | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:50:04.875591040 CEST | 8.8.8.8 | 192.168.2.6 | 0x2517 | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:50:06.884969950 CEST | 8.8.8.8 | 192.168.2.6 | 0xfe4f | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:50:08.947736025 CEST | 8.8.8.8 | 192.168.2.6 | 0xec7b | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:50:24.910933018 CEST | 8.8.8.8 | 192.168.2.6 | 0x93e5 | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:50:26.802314997 CEST | 8.8.8.8 | 192.168.2.6 | 0xcae6 | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:50:29.162911892 CEST | 8.8.8.8 | 192.168.2.6 | 0x137b | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:50:30.970324039 CEST | 8.8.8.8 | 192.168.2.6 | 0x8cf8 | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:50:32.971400976 CEST | 8.8.8.8 | 192.168.2.6 | 0xd58d | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:50:34.993850946 CEST | 8.8.8.8 | 192.168.2.6 | 0x8fa7 | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:50:36.960410118 CEST | 8.8.8.8 | 192.168.2.6 | 0x8683 | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:50:38.784041882 CEST | 8.8.8.8 | 192.168.2.6 | 0x7d19 | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:50:40.822791100 CEST | 8.8.8.8 | 192.168.2.6 | 0xd4e | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:50:44.082752943 CEST | 8.8.8.8 | 192.168.2.6 | 0x63e7 | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:50:46.131514072 CEST | 8.8.8.8 | 192.168.2.6 | 0xf114 | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:50:47.991703987 CEST | 8.8.8.8 | 192.168.2.6 | 0xd56f | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:50:49.845042944 CEST | 8.8.8.8 | 192.168.2.6 | 0xc3fd | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) | ||
May 17, 2022 20:50:51.790035009 CEST | 8.8.8.8 | 192.168.2.6 | 0x8b16 | No error (0) | 104.250.238.66 | A (IP address) | IN (0x0001) |
Click to jump to process
Target ID: | 0 |
Start time: | 20:48:48 |
Start date: | 17/05/2022 |
Path: | C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1070000 |
File size: | 449536 bytes |
MD5 hash: | 29C19B486AF12BE2B5CD16D74105BF8E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Reputation: | low |
Target ID: | 5 |
Start time: | 20:49:07 |
Start date: | 17/05/2022 |
Path: | C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1070000 |
File size: | 449536 bytes |
MD5 hash: | 29C19B486AF12BE2B5CD16D74105BF8E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Reputation: | low |
Target ID: | 6 |
Start time: | 20:49:10 |
Start date: | 17/05/2022 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xed0000 |
File size: | 232960 bytes |
MD5 hash: | F3BDBE3BB6F734E357235F4D5898582D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 7 |
Start time: | 20:49:11 |
Start date: | 17/05/2022 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6406f0000 |
File size: | 625664 bytes |
MD5 hash: | EA777DEEA782E8B4D7C7C33BBF8A4496 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 8 |
Start time: | 20:49:11 |
Start date: | 17/05/2022 |
Path: | C:\Windows\SysWOW64\schtasks.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1c0000 |
File size: | 185856 bytes |
MD5 hash: | 15FF7D8324231381BAD48A052F85DF04 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 9 |
Start time: | 20:49:12 |
Start date: | 17/05/2022 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xed0000 |
File size: | 232960 bytes |
MD5 hash: | F3BDBE3BB6F734E357235F4D5898582D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 11 |
Start time: | 20:49:13 |
Start date: | 17/05/2022 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6406f0000 |
File size: | 625664 bytes |
MD5 hash: | EA777DEEA782E8B4D7C7C33BBF8A4496 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 23 |
Start time: | 20:50:04 |
Start date: | 17/05/2022 |
Path: | C:\Users\user\AppData\Roaming\roaming\roaming.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x60000 |
File size: | 449536 bytes |
MD5 hash: | 29C19B486AF12BE2B5CD16D74105BF8E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Antivirus matches: |
|
Reputation: | low |
Target ID: | 27 |
Start time: | 20:50:29 |
Start date: | 17/05/2022 |
Path: | C:\Users\user\AppData\Roaming\roaming\roaming.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x60000 |
File size: | 449536 bytes |
MD5 hash: | 29C19B486AF12BE2B5CD16D74105BF8E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Reputation: | low |
Target ID: | 28 |
Start time: | 20:50:32 |
Start date: | 17/05/2022 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xed0000 |
File size: | 232960 bytes |
MD5 hash: | F3BDBE3BB6F734E357235F4D5898582D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 29 |
Start time: | 20:50:33 |
Start date: | 17/05/2022 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6406f0000 |
File size: | 625664 bytes |
MD5 hash: | EA777DEEA782E8B4D7C7C33BBF8A4496 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 30 |
Start time: | 20:50:33 |
Start date: | 17/05/2022 |
Path: | C:\Windows\SysWOW64\schtasks.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1c0000 |
File size: | 185856 bytes |
MD5 hash: | 15FF7D8324231381BAD48A052F85DF04 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 31 |
Start time: | 20:50:34 |
Start date: | 17/05/2022 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xed0000 |
File size: | 232960 bytes |
MD5 hash: | F3BDBE3BB6F734E357235F4D5898582D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Target ID: | 32 |
Start time: | 20:50:36 |
Start date: | 17/05/2022 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6406f0000 |
File size: | 625664 bytes |
MD5 hash: | EA777DEEA782E8B4D7C7C33BBF8A4496 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |