Windows
Analysis Report
svchost.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- svchost.exe (PID: 2236 cmdline:
"C:\Users\ user\Deskt op\svchost .exe" MD5: F86AF47D52C3CD035C137D3A3097D06F)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PandaStealer | Yara detected Panda Stealer | Joe Security | ||
JoeSecurity_PandaStealer | Yara detected Panda Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth |
|
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Networking |
---|
Source: | Domain query: | |||
Source: | Network Connect: | Jump to behavior |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: | File source: | ||
Source: | File source: |
System Summary |
---|
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Matched rule: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Classification label: |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static file information: |
Data Obfuscation |
---|
Source: | Unpacked PE file: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Thread sleep count: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Anti Debugging |
---|
Source: | Thread information set: | Jump to behavior | ||
Source: | Thread information set: | Jump to behavior |
Source: | Open window title or class name: |
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Domain query: | |||
Source: | Network Connect: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Process Injection | 22 Virtualization/Sandbox Evasion | 1 OS Credential Dumping | 1 Query Registry | Remote Services | 1 Data from Local System | Exfiltration Over Other Network Medium | 2 Non-Application Layer Protocol | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 12 Software Packing | LSASS Memory | 211 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | 2 Application Layer Protocol | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | 1 Process Injection | Security Account Manager | 22 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | 1 Obfuscated Files or Information | NTDS | 1 Process Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | 1 System Information Discovery | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings | |
Replication Through Removable Media | Launchd | Rc.common | Rc.common | Steganography | Cached Domain Credentials | 1 Remote System Discovery | VNC | GUI Input Capture | Exfiltration Over C2 Channel | Multiband Communication | Jamming or Denial of Service | Abuse Accessibility Features |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
45% | Virustotal | Browse | ||
73% | ReversingLabs | Win32.Infostealer.Collest | ||
100% | Avira | HEUR/AGEN.1215869 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link | Download |
---|---|---|---|---|---|
100% | Avira | TR/Crypt.XPACK.Gen | Download File |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
asdqwezxc.ru.xsph.ru | 141.8.197.42 | true | false | high | |
a-0019.standard.a-msedge.net | 204.79.197.222 | true | false |
| unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
141.8.197.42 | asdqwezxc.ru.xsph.ru | Russian Federation | 35278 | SPRINTHOSTRU | false |
Joe Sandbox Version: | 35.0.0 Citrine |
Analysis ID: | 642465 |
Start date and time: 09/06/202214:20:27 | 2022-06-09 14:20:27 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 6m 28s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | svchost.exe |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 17 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@1/4@1/1 |
EGA Information: | Failed |
HDC Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
- Excluded IPs from analysis (whitelisted): 23.211.6.115
- Excluded domains from analysis (whitelisted): www.bing.com, fp.msedge.net, client.wns.windows.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, 1.perf.msedge.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenFile calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
141.8.197.42 | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
a-0019.standard.a-msedge.net | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
SPRINTHOSTRU | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Process: | C:\Users\user\Desktop\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 73728 |
Entropy (8bit): | 1.1874185457069584 |
Encrypted: | false |
SSDEEP: | 96:I3sa9uKnadsdUDitMkMC1mBKC7g1HFp/GeICEjWTPeKeWbS8pz/YLcs+P+qigSz4:I3rHdMHGTPVbSYgbCP46w/1Vumq |
MD5: | 72A43D390E478BA9664F03951692D109 |
SHA1: | 482FE43725D7A1614F6E24429E455CD0A920DF7C |
SHA-256: | 593D9DE27A8CA63553E9460E03FD190DCADD2B96BF63B438B4A92CB05A4D711C |
SHA-512: | FF2777DCDDC72561CF694E2347C5755F19A13D4AC2C1A80C74ADEBB1436C2987DFA0CFBE4BAFD8F853281B24CA03ED708BA3400F2144A5EB3F333CC255DAC7CE |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\svchost.exe |
File Type: | |
Category: | modified |
Size (bytes): | 742 |
Entropy (8bit): | 4.515082317145198 |
Encrypted: | false |
SSDEEP: | 12:ZKM31Si2YRiTRrUs/5xcIx4GmsD8UzmHzXi491M:QM3Y/YRAaixcIx4GmsDL6zX+ |
MD5: | 87D6CC6E3E96C4A7A6CC5BD94E8309F5 |
SHA1: | 5345AEDECD074E40FF98271294409B62DE20BB8F |
SHA-256: | 5AEE4331CA320EFC6B3F6577ED88012748DC49989446BEA0F781C054A8A0D6F2 |
SHA-512: | 13B846C17A697C5ABC9EBA8E3BDF212A21D2F37DFB62F46F584821FBF137D492FDE58394D8327B0465283E0902CE52C474C0DDA2D0BA5DA00BD47590BA51138B |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 220 |
Entropy (8bit): | 5.748777176436018 |
Encrypted: | false |
SSDEEP: | 6:PkopYZ/16NX0/tbD2Pdp9TaMbl/XyXqkxcP/Zv:copYZt4HveaPx4cP/R |
MD5: | 415BFCFE9CFCF8EA0AFC3C0BB7F45CFA |
SHA1: | 4673524F4CBEF9891DAF4A8CCA299A9891FC0BFF |
SHA-256: | C66AC6A7DDD74C5D3464DE4CBBA4CE47C9E96BE8C1C263DDB31096766D9B2891 |
SHA-512: | B67A94EEDE699131F6377047344FCE20A3404018BFCAC6FD998133512C906931E21DBB8726BB815EB11CB6B284FEE146EABF579858E3840B45FBD0D3CB00E5E4 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Local\Temp\BOFUPMJWUSFVSNIBDJEE\YIIRISLGTNNQOCHOPCL.YLTETORRWUHKSJIX
Download File
Process: | C:\Users\user\Desktop\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 811064 |
Entropy (8bit): | 7.946070685075506 |
Encrypted: | false |
SSDEEP: | 12288:fI4uRQYiMBxezLj95xgIbebxTKVrH7BHyTIRuwo5rNe3O5hmJ1DHMNkxnwlZX9S:fI4uRQJMKzv95x9UIdysRs+YhK1uX9S |
MD5: | 2A074A819C96D5E0E06F5B9E6F918BC8 |
SHA1: | CA644A51062C9BF85AC1F74D2C2E0F151B0083A0 |
SHA-256: | EC261C44DABBEEEF86F83B51326AA872612041C192BADC8DAB399D60B1DD0B1E |
SHA-512: | 09A615AB62A426840254D58FF2D076745C518FA445F4A5FEBBF1FD92916E6C855E46A5FB0C4810F3BFA871F261DD23B8092C286D8831CCB6801B98A23ADCBA8E |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.9889608228976465 |
TrID: |
|
File name: | svchost.exe |
File size: | 1493328 |
MD5: | f86af47d52c3cd035c137d3a3097d06f |
SHA1: | 5ec629884fea63bb82e2dffa441dca353d5f80e4 |
SHA256: | eb977a803d155ea25837fa400dff81e8336746e6ed9f563cfaee92a544104705 |
SHA512: | 5f39928faa0fb04f2abc80565eea16d3522073768e5acf729619a8d0cc549199826193b2eef1eb8d5dd0c664461522748c5b2c1c3568ffb0a0b851ec29ffc04e |
SSDEEP: | 24576:nkRRYVc2w2S8gtDXA9Ungu9yAsPRXtgcpOB82BgZlArww2hDpQzKt5pG:kfjvtD6A/yNRXNp+gZlAR2RSzKtu |
TLSH: | 0B6533D267227107F46E5EF9B3ECE982EF2853364538C0D30BC7E2A5B2877A14A95453 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......`..P$...$...$.......4...............0.......8.......%.......u.......3.......)...$...........&.......%...Rich$.................. |
Icon Hash: | 00828e8e8686b000 |
Entrypoint: | 0x42ac1a |
Entrypoint Section: | |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x5FCCE7D9 [Sun Dec 6 14:16:57 2020 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 24928d256eed9c0ac0a1e2a64ad5d83c |
Signature Valid: | false |
Signature Issuer: | CN=Microsoft Code Signing PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | AAEE394B1087AC1044A13D09468CDF1E |
Thumbprint SHA-1: | 2485A7AFA98E178CB8F30C9838346B514AEA4769 |
Thumbprint SHA-256: | C0772D3C9E20C3F4EBB09F5816D6DADA0D8FA86563C2D68898539EC1CD355A1B |
Serial: | 3300000187721772155940C709000000000187 |
Instruction |
---|
call 00007F54F4D4DDE6h |
jmp 00007F54F4D4DBFEh |
push 0044BB60h |
push dword ptr fs:[00000000h] |
mov eax, dword ptr [esp+10h] |
mov dword ptr [esp+10h], ebp |
lea ebp, dword ptr [esp+10h] |
sub esp, eax |
push ebx |
push esi |
push edi |
mov eax, dword ptr [00466ECCh] |
xor dword ptr [ebp-04h], eax |
xor eax, ebp |
push eax |
mov dword ptr [ebp-18h], esp |
push dword ptr [ebp-08h] |
mov eax, dword ptr [ebp-04h] |
mov dword ptr [ebp-04h], FFFFFFFEh |
mov dword ptr [ebp-08h], eax |
lea eax, dword ptr [ebp-10h] |
mov dword ptr fs:[00000000h], eax |
ret |
mov ecx, dword ptr [ebp-10h] |
mov dword ptr fs:[00000000h], ecx |
pop ecx |
pop edi |
pop edi |
pop esi |
pop ebx |
mov esp, ebp |
pop ebp |
push ecx |
ret |
int3 |
int3 |
int3 |
add esp, 04h |
jmp 00007F54F5136D8Dh |
sub eax, 0D28FD95h |
clc |
stc |
loopne 00007F54F4D4DDDEh |
imul esi, ebp, 90h |
xor byte ptr [277D298Eh], ch |
lds ecx, fword ptr [esi] |
salc |
lea ecx, dword ptr [EDFA7B94h] |
cli |
mov esi, 902A6054h |
imul ebx, dword ptr [ebx+77h], A8h |
inc eax |
inc ebx |
popfd |
cmc |
xchg eax, esi |
mov dh, 2Fh |
inc esi |
mov eax, C13DB70Ah |
cmp byte ptr [eax], FFFFFF96h |
sub byte ptr [ecx-74FBCF8Fh], dl |
fcmovnbe st(0), st(3) |
retn A9BCh |
pop ebx |
fidiv word ptr [esi-06h] |
xor eax, 47FFA7CAh |
fst qword ptr [esi-1F67CA6Dh] |
or eax, B71647ADh |
test al, BAh |
leave |
out dx, al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x32d050 | 0x290 | .micro |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x16a5a8 | 0x23a8 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x32d030 | 0x10 | .micro |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x32d000 | 0x18 | .micro |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
0x1000 | 0x86000 | 0x41c00 | False | 0.9988043607414449 | data | 7.998749454200034 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | |
0x87000 | 0x1b000 | 0xbc00 | False | 0.997319647606383 | data | 7.994094496471131 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | |
0xa2000 | 0x5000 | 0x600 | False | 0.802734375 | data | 6.701628443267699 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | |
0xa7000 | 0x7000 | 0x4e00 | False | 0.9823217147435898 | data | 7.955304346106002 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | |
0xae000 | 0x27f000 | 0x2ba00 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | |
.micro | 0x32d000 | 0xea000 | 0xe9800 | False | 0.9958825448340471 | data | 7.974038627658711 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
DLL | Import |
---|---|
kernel32.dll | GetModuleHandleA, GetProcAddress, ExitProcess, LoadLibraryA |
user32.dll | MessageBoxA |
advapi32.dll | RegCloseKey |
oleaut32.dll | SysFreeString |
gdi32.dll | CreateFontA |
shell32.dll | ShellExecuteA |
version.dll | GetFileVersionInfoA |
SHLWAPI.dll | PathFindExtensionW |
gdiplus.dll | GdipSaveImageToFile |
WININET.dll | InternetWriteFile |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jun 9, 2022 14:21:46.952979088 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.006584883 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.006706953 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.007730007 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.007888079 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.008369923 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.071840048 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.071871042 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.072060108 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.072190046 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.072215080 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.072283983 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.072309971 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.072361946 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.072422028 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.125600100 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.125720978 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.125749111 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.125761032 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.125924110 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.125937939 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.126157999 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.126946926 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.180526018 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.180546999 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.180557966 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.180654049 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.180716038 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.180799007 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.180845976 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.180949926 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.181332111 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.181344986 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.181479931 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.234474897 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.234559059 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.234589100 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.234888077 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.234940052 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.234972000 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.235002995 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.235027075 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.235053062 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.235260010 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.235315084 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.235318899 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.235343933 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.235344887 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.235362053 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.235371113 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.235399008 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.235605955 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.235644102 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.235672951 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.235723972 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.288664103 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.288691998 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.288703918 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.288722992 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.288829088 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.288878918 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.289082050 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.289115906 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.289403915 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.289521933 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.289676905 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.289716005 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.289880037 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.289959908 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.290035963 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.290076971 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.290327072 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.290576935 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.290724993 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.290885925 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.291049004 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.291238070 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.291361094 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.291364908 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.291376114 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.291424990 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.291430950 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.291491985 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.291507006 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.291522026 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.291539907 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.291611910 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.291722059 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.291743994 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.291877985 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.292505980 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.292656898 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.292669058 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.292735100 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.292784929 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.292928934 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.293023109 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.293054104 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.293111086 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.293333054 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.293363094 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.293401957 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.293421030 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.344630957 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.344662905 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.344680071 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.344722033 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.344752073 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.344804049 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.344824076 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.345007896 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.345192909 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.345330000 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.345463037 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.345520020 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.345602989 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.345644951 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.345679045 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.345705986 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.345747948 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.345797062 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.345824003 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.345890045 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.345926046 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.346159935 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.346191883 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.346208096 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.346239090 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.346278906 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.346290112 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.346319914 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.346498013 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.346615076 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.346713066 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.346781969 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.346828938 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.346857071 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.346899033 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.346957922 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.346981049 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.347225904 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.347249985 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.347269058 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.347337961 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.347487926 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.347610950 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.347623110 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.347631931 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.398612976 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.398638010 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.398649931 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.398660898 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.398880005 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.398966074 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.399097919 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.399214029 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.399302006 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.399338007 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.399350882 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.399362087 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.399363995 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.399373055 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.399426937 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.399476051 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.399544954 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.399596930 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.399696112 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.399753094 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.400165081 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.400207996 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.400233030 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.400549889 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.400696039 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.400731087 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.401158094 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.401175976 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.401527882 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.401639938 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.401721001 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.401791096 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.452620983 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.452672005 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.452742100 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.452903032 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.453097105 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.455213070 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.455248117 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.455318928 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.455348969 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.455485106 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.455830097 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.455857038 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.455921888 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.455949068 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.456096888 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.456343889 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.456521034 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.456585884 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.456614017 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.457104921 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:47.736341000 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:47.790251017 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:48.235774994 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:48.289609909 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:48.289776087 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:48.343395948 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:48.343425989 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:48.343597889 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:48.397713900 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:48.397845030 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:48.400820017 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:48.468919992 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:48.469115973 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:49.388959885 CEST | 80 | 49764 | 141.8.197.42 | 192.168.2.7 |
Jun 9, 2022 14:21:49.389036894 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Jun 9, 2022 14:21:50.325393915 CEST | 49764 | 80 | 192.168.2.7 | 141.8.197.42 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jun 9, 2022 14:21:46.850735903 CEST | 63557 | 53 | 192.168.2.7 | 8.8.8.8 |
Jun 9, 2022 14:21:46.933648109 CEST | 53 | 63557 | 8.8.8.8 | 192.168.2.7 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class |
---|---|---|---|---|---|---|---|
Jun 9, 2022 14:21:46.850735903 CEST | 192.168.2.7 | 8.8.8.8 | 0xf432 | Standard query (0) | A (IP address) | IN (0x0001) |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class |
---|---|---|---|---|---|---|---|---|---|
Jun 9, 2022 14:21:46.933648109 CEST | 8.8.8.8 | 192.168.2.7 | 0xf432 | No error (0) | 141.8.197.42 | A (IP address) | IN (0x0001) | ||
Jun 9, 2022 14:21:50.182743073 CEST | 8.8.8.8 | 192.168.2.7 | 0x6bd2 | No error (0) | a-0019.a.dns.azurefd.net | CNAME (Canonical name) | IN (0x0001) | ||
Jun 9, 2022 14:21:50.182743073 CEST | 8.8.8.8 | 192.168.2.7 | 0x6bd2 | No error (0) | a-0019.standard.a-msedge.net | CNAME (Canonical name) | IN (0x0001) | ||
Jun 9, 2022 14:21:50.182743073 CEST | 8.8.8.8 | 192.168.2.7 | 0x6bd2 | No error (0) | 204.79.197.222 | A (IP address) | IN (0x0001) |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
0 | 192.168.2.7 | 49764 | 141.8.197.42 | 80 | C:\Users\user\Desktop\svchost.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
Jun 9, 2022 14:21:47.007730007 CEST | 886 | OUT | |
Jun 9, 2022 14:21:47.007888079 CEST | 886 | OUT | |
Jun 9, 2022 14:21:47.008369923 CEST | 898 | OUT | |
Jun 9, 2022 14:21:47.072060108 CEST | 919 | OUT | |
Jun 9, 2022 14:21:47.072283983 CEST | 921 | OUT | |
Jun 9, 2022 14:21:47.072361946 CEST | 932 | OUT | |
Jun 9, 2022 14:21:47.072422028 CEST | 942 | OUT | |
Jun 9, 2022 14:21:47.126946926 CEST | 993 | OUT | |
Jun 9, 2022 14:21:47.180716038 CEST | 1073 | OUT | |
Jun 9, 2022 14:21:47.180799007 CEST | 1098 | OUT | |
Jun 9, 2022 14:21:47.180949926 CEST | 1116 | OUT | |
Jun 9, 2022 14:21:49.388959885 CEST | 1937 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 14:21:34 |
Start date: | 09/06/2022 |
Path: | C:\Users\user\Desktop\svchost.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xfd0000 |
File size: | 1493328 bytes |
MD5 hash: | F86AF47D52C3CD035C137D3A3097D06F |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Yara matches: |
|
Reputation: | low |