Edit tour
Windows
Analysis Report
GtD4y3sR6p
Overview
General Information
Detection
Wannacry
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Wannacry ransomware
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Changes security center settings (notifications, updates, antivirus, firewall)
Machine Learning detection for sample
Connects to many IPs within the same subnet mask (likely port scanning)
Connects to many different private IPs (likely to spread or exploit)
Machine Learning detection for dropped file
Drops executables to the windows directory (C:\Windows) and starts them
Connects to many different private IPs via SMB (likely to spread or exploit)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Creates files inside the system directory
Sample execution stops while process was sleeping (likely an evasion)
JA3 SSL client fingerprint seen in connection with other malware
Found dropped PE file which has not been started or loaded
PE file contains executable resources (Code or Archives)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
PE file does not import any functions
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Drops PE files to the windows directory (C:\Windows)
Connects to several IPs in different countries
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Queries disk information (often used to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Classification
- System is w10x64
- loaddll32.exe (PID: 6420 cmdline:
loaddll32. exe "C:\Us ers\user\D esktop\GtD 4y3sR6p.dl l" MD5: 7DEB5DB86C0AC789123DEC286286B938) - cmd.exe (PID: 6436 cmdline:
cmd.exe /C rundll32. exe "C:\Us ers\user\D esktop\GtD 4y3sR6p.dl l",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D) - rundll32.exe (PID: 6456 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\GtD4 y3sR6p.dll ",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D) - mssecsvr.exe (PID: 6484 cmdline:
C:\WINDOWS \mssecsvr. exe MD5: 327173D02D4B0201179CDA6BAAC0543B) - rundll32.exe (PID: 6444 cmdline:
rundll32.e xe C:\User s\user\Des ktop\GtD4y 3sR6p.dll, PlayGame MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D) - rundll32.exe (PID: 6588 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\GtD4 y3sR6p.dll ",PlayGame MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D) - mssecsvr.exe (PID: 6648 cmdline:
C:\WINDOWS \mssecsvr. exe MD5: 327173D02D4B0201179CDA6BAAC0543B)
- mssecsvr.exe (PID: 6612 cmdline:
C:\WINDOWS \mssecsvr. exe -m sec urity MD5: 327173D02D4B0201179CDA6BAAC0543B)
- svchost.exe (PID: 7028 cmdline:
C:\Windows \System32\ svchost.ex e -k Local SystemNetw orkRestric ted -p -s NcbService MD5: 32569E403279B3FD2EDB7EBD036273FA)
- svchost.exe (PID: 5632 cmdline:
c:\windows \system32\ svchost.ex e -k local service -p -s CDPSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
- svchost.exe (PID: 4696 cmdline:
c:\windows \system32\ svchost.ex e -k netwo rkservice -p -s DoSv c MD5: 32569E403279B3FD2EDB7EBD036273FA)
- svchost.exe (PID: 3228 cmdline:
C:\Windows \System32\ svchost.ex e -k Netwo rkService -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
- SgrmBroker.exe (PID: 6292 cmdline:
C:\Windows \system32\ SgrmBroker .exe MD5: D3170A3F3A9626597EEE1888686E3EA6)
- svchost.exe (PID: 4712 cmdline:
c:\windows \system32\ svchost.ex e -k local servicenet workrestri cted -p -s wscsvc MD5: 32569E403279B3FD2EDB7EBD036273FA) - MpCmdRun.exe (PID: 10468 cmdline:
"C:\Progra m Files\Wi ndows Defe nder\mpcmd run.exe" - wdenable MD5: A267555174BFA53844371226F482B86B) - conhost.exe (PID: 10568 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
- svchost.exe (PID: 7392 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
- svchost.exe (PID: 7740 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: 32569E403279B3FD2EDB7EBD036273FA)
- svchost.exe (PID: 8288 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
- svchost.exe (PID: 2560 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
- svchost.exe (PID: 9528 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
WannaCry_Ransomware | Detects WannaCry Ransomware | Florian Roth (with the help of binar.ly) |
| |
JoeSecurity_Wannacry | Yara detected Wannacry ransomware | Joe Security | ||
wanna_cry_ransomware_generic | detects wannacry ransomware on disk and in virtual page | us-cert code analysis team |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
WannaCry_Ransomware | Detects WannaCry Ransomware | Florian Roth (with the help of binar.ly) |
| |
wanna_cry_ransomware_generic | detects wannacry ransomware on disk and in virtual page | us-cert code analysis team |
| |
WannaCry_Ransomware | Detects WannaCry Ransomware | Florian Roth (with the help of binar.ly) |
| |
WannaCry_Ransomware_Gen | Detects WannaCry Ransomware | Florian Roth (based on rule by US CERT) |
| |
JoeSecurity_Wannacry | Yara detected Wannacry ransomware | Joe Security | ||
Click to see the 1 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Wannacry | Yara detected Wannacry ransomware | Joe Security | ||
wanna_cry_ransomware_generic | detects wannacry ransomware on disk and in virtual page | us-cert code analysis team |
| |
wanna_cry_ransomware_generic | detects wannacry ransomware on disk and in virtual page | us-cert code analysis team |
| |
JoeSecurity_Wannacry | Yara detected Wannacry ransomware | Joe Security | ||
JoeSecurity_Wannacry | Yara detected Wannacry ransomware | Joe Security | ||
Click to see the 21 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
WannaCry_Ransomware | Detects WannaCry Ransomware | Florian Roth (with the help of binar.ly) |
| |
wanna_cry_ransomware_generic | detects wannacry ransomware on disk and in virtual page | us-cert code analysis team |
| |
WannaCry_Ransomware | Detects WannaCry Ransomware | Florian Roth (with the help of binar.ly) |
| |
wanna_cry_ransomware_generic | detects wannacry ransomware on disk and in virtual page | us-cert code analysis team |
| |
WannaCry_Ransomware | Detects WannaCry Ransomware | Florian Roth (with the help of binar.ly) |
| |
Click to see the 86 entries |
⊘No Sigma rule has matched
Timestamp: | 192.168.2.38.8.8.856417532830018 07/20/22-15:21:34.579433 |
SID: | 2830018 |
Source Port: | 56417 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.38.8.8.864851532830018 07/20/22-15:21:31.086137 |
SID: | 2830018 |
Source Port: | 64851 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.38.8.8.849316532830018 07/20/22-15:21:32.213435 |
SID: | 2830018 |
Source Port: | 49316 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Avira: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | URL Reputation: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | URL Reputation: | ||
Source: | Avira URL Cloud: |
Source: | Virustotal: | Perma Link |
Source: | Avira: |
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: |
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: |
Exploits |
---|
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior |
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior | ||
Source: | TCP traffic: | Jump to behavior |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Networking |
---|
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: |
Source: | TCP traffic: |