File name:

SetupVCD5520.exe

Full analysis: https://app.any.run/tasks/a4d0479e-1378-4f13-ae26-60e8b6625264
Verdict: Malicious activity
Analysis date: January 27, 2024, 18:14:25
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

DEC8EDA3A1AF6A8039987FE854A84A91

SHA1:

B869A7C4F1F8E2CEEB9B248CCC41782F005B02A1

SHA256:

B69AB416FA1C2DB43D9D4A900ABBF5E1AD6DAF0AB914AFCDFA74B25AF390747F

SSDEEP:

24576:wihLOEdf7GOApNkiGz7CyNjP6xs1pBeNORUvL4nOTgr4EWl8DXfX8aGko77ISC4F:wiBOEdvvz7CyhgNrMn34ElXf0kxh4EW

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • SetupVCD5520.exe (PID: 2692)
      • DevCon.exe (PID: 2504)
      • drvinst.exe (PID: 2256)
      • drvinst.exe (PID: 2824)
      • nst9412.tmp (PID: 1388)
    • Creates a writable file in the system directory

      • nst9412.tmp (PID: 1388)
      • drvinst.exe (PID: 2256)
      • drvinst.exe (PID: 2824)
  • SUSPICIOUS

    • Starts itself from another location

      • SetupVCD5520.exe (PID: 2692)
    • Starts application with an unusual extension

      • SetupVCD5520.exe (PID: 2692)
    • Executable content was dropped or overwritten

      • SetupVCD5520.exe (PID: 2692)
      • DevCon.exe (PID: 2504)
      • drvinst.exe (PID: 2256)
      • drvinst.exe (PID: 2824)
      • nst9412.tmp (PID: 1388)
    • Creates files in the driver directory

      • nst9412.tmp (PID: 1388)
      • drvinst.exe (PID: 2256)
      • drvinst.exe (PID: 2824)
    • Reads security settings of Internet Explorer

      • DevCon.exe (PID: 2504)
    • Checks Windows Trust Settings

      • DevCon.exe (PID: 2504)
      • drvinst.exe (PID: 2256)
      • drvinst.exe (PID: 2824)
      • drvinst.exe (PID: 2784)
    • Reads settings of System Certificates

      • DevCon.exe (PID: 2504)
      • rundll32.exe (PID: 1576)
    • Drops a system driver (possible attempt to evade defenses)

      • nst9412.tmp (PID: 1388)
      • DevCon.exe (PID: 2504)
      • drvinst.exe (PID: 2256)
      • drvinst.exe (PID: 2824)
    • Image mount has been detect

      • drvinst.exe (PID: 2824)
      • drvinst.exe (PID: 2784)
    • The process executes via Task Scheduler

      • ExecuteWithUAC.exe (PID: 3800)
    • The process creates files with name similar to system file names

      • nst9412.tmp (PID: 1388)
  • INFO

    • Checks supported languages

      • SetupVCD5520.exe (PID: 2692)
      • DevCon.exe (PID: 2804)
      • DevCon.exe (PID: 2504)
      • drvinst.exe (PID: 2256)
      • drvinst.exe (PID: 2824)
      • drvinst.exe (PID: 2784)
      • VCDDaemon.exe (PID: 3248)
      • SetRegACL.exe (PID: 3452)
      • ExecuteWithUAC.exe (PID: 3708)
      • ExecuteWithUAC.exe (PID: 3800)
      • VCDDaemon.exe (PID: 3816)
      • nst9412.tmp (PID: 1388)
    • Create files in a temporary directory

      • SetupVCD5520.exe (PID: 2692)
      • DevCon.exe (PID: 2504)
      • nst9412.tmp (PID: 1388)
    • Reads the computer name

      • nst9412.tmp (PID: 1388)
      • DevCon.exe (PID: 2804)
      • DevCon.exe (PID: 2504)
      • drvinst.exe (PID: 2256)
      • drvinst.exe (PID: 2824)
      • drvinst.exe (PID: 2784)
      • VCDDaemon.exe (PID: 3248)
      • ExecuteWithUAC.exe (PID: 3708)
      • VCDDaemon.exe (PID: 3816)
    • Reads the machine GUID from the registry

      • DevCon.exe (PID: 2504)
      • drvinst.exe (PID: 2256)
      • drvinst.exe (PID: 2824)
      • drvinst.exe (PID: 2784)
      • VCDDaemon.exe (PID: 3816)
    • Reads security settings of Internet Explorer

      • rundll32.exe (PID: 1576)
    • Process checks computer location settings

      • drvinst.exe (PID: 2784)
    • Creates files in the program directory

      • nst9412.tmp (PID: 1388)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | NSIS - Nullsoft Scriptable Install System (87.8)
.exe | InstallShield setup (4.4)
.exe | Win32 Executable MS Visual C++ (generic) (3.2)
.exe | Win64 Executable (generic) (2.8)
.dll | Win32 Dynamic Link Library (generic) (0.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:02:22 16:43:00+01:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 59392
InitializedDataSize: 23040
UninitializedDataSize: -
EntryPoint: 0x9723
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
59
Monitored processes
15
Malicious processes
6
Suspicious processes
0

Behavior graph

Click at the process to see the details
start setupvcd5520.exe nst9412.tmp devcon.exe no specs devcon.exe drvinst.exe rundll32.exe no specs drvinst.exe drvinst.exe no specs vcddaemon.exe no specs setregacl.exe no specs rundll32.exe no specs executewithuac.exe no specs executewithuac.exe no specs vcddaemon.exe no specs setupvcd5520.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1388nst9412.tmp /DOITC:\Users\admin\AppData\Local\Temp\nst9411.tmp\nst9412.tmp
SetupVCD5520.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\nst9411.tmp\nst9412.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1576rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{3d618dc8-e0f0-321c-81a3-cf31aa80667f} Global\{64d3408a-6da8-290d-5605-2d221f233e6e} C:\Windows\System32\DriverStore\Temp\{2437f065-f5b0-207e-6959-cf10aa35ed7e}\vclone.inf C:\Windows\System32\DriverStore\Temp\{2437f065-f5b0-207e-6959-cf10aa35ed7e}\VClone.catC:\Windows\System32\rundll32.exedrvinst.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
2256DrvInst.exe "4" "0" "C:\Users\admin\AppData\Local\Temp\{21277cb4-d525-693e-defa-bf6357e21d38}\vclone.inf" "0" "64f288aa3" "000003EC" "WinSta0\Default" "000005D8" "208" "c:\users\admin\appdata\local\temp\nst945f.tmp"C:\Windows\System32\drvinst.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\drvinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
2504"C:\Users\admin\AppData\Local\Temp\nst945F.tmp\DevCon.exe" install VClone.inf "root\vclone"C:\Users\admin\AppData\Local\Temp\nst945F.tmp\DevCon.exe
nst9412.tmp
User:
admin
Company:
Windows (R) Codename Longhorn DDK provider
Integrity Level:
HIGH
Description:
Windows Setup API
Exit code:
0
Version:
6.0.6001.18000 built by: WinDDK
Modules
Images
c:\users\admin\appdata\local\temp\nst945f.tmp\devcon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2692"C:\Users\admin\AppData\Local\Temp\SetupVCD5520.exe" C:\Users\admin\AppData\Local\Temp\SetupVCD5520.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\setupvcd5520.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2784DrvInst.exe "1" "200" "SCSI\CdRom&Ven_ELBY&Prod_CLONEDRIVE&Rev_1.4\1&2afd7d61&0&000000" "" "" "6bc255963" "00000000" "00000550" "000005F8"C:\Windows\System32\drvinst.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\drvinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
2804"C:\Users\admin\AppData\Local\Temp\nst945F.tmp\DevCon.exe" status "root\vclone"C:\Users\admin\AppData\Local\Temp\nst945F.tmp\DevCon.exenst9412.tmp
User:
admin
Company:
Windows (R) Codename Longhorn DDK provider
Integrity Level:
HIGH
Description:
Windows Setup API
Exit code:
0
Version:
6.0.6001.18000 built by: WinDDK
Modules
Images
c:\users\admin\appdata\local\temp\nst945f.tmp\devcon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2824DrvInst.exe "2" "211" "ROOT\SCSIADAPTER\0000" "C:\Windows\INF\oem2.inf" "vclone.inf:Models:miniport:5.4.7.0:root\vclone" "64f288aa3" "000003EC" "000005E8" "000005F0"C:\Windows\System32\drvinst.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\drvinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
3248"C:\Program Files\Elaborate Bytes\VirtualCloneDrive\VCDDaemon.exe" /uC:\Program Files\Elaborate Bytes\VirtualCloneDrive\VCDDaemon.exenst9412.tmp
User:
admin
Company:
Elaborate Bytes AG
Integrity Level:
HIGH
Description:
Virtual CloneDrive Daemon
Exit code:
0
Version:
5.5.1.0
Modules
Images
c:\program files\elaborate bytes\virtualclonedrive\vcddaemon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\elbyvcd.dll
c:\windows\system32\elbycdio.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
3452"C:\Program Files\Elaborate Bytes\VirtualCloneDrive\SetRegACL.exe" Software\Microsoft\Windows\CurrentVersion\Explorer\DriveIcons 64C:\Program Files\Elaborate Bytes\VirtualCloneDrive\SetRegACL.exenst9412.tmp
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\program files\elaborate bytes\virtualclonedrive\setregacl.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
Total events
18 086
Read events
17 978
Write events
108
Delete events
0

Modification events

(PID) Process:(1388) nst9412.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:GlobalAssocChangedCounter
Value:
115
(PID) Process:(2504) DevCon.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2504) DevCon.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EnterpriseCertificates\Root\Certificates\9F6134C5FA75E4FDDE631B232BE961D6D4B97DB6
Operation:writeName:Blob
Value:
0300000001000000140000009F6134C5FA75E4FDDE631B232BE961D6D4B97DB6200000000100000047030000308203433082022BA00302010202147327B7C17D5AE708EF73F1F45A79D78B4E99A29F300D06092A864886F70D01010B05003031310B3009060355040613025553310F300D06035504080C06426F73746F6E3111300F060355040A0C084469676943657274301E170D3233303932393130353030335A170D3339303530383130353030335A3031310B3009060355040613025553310F300D06035504080C06426F73746F6E3111300F060355040A0C08446967694365727430820122300D06092A864886F70D01010105000382010F003082010A0282010100D91B7A55548F44F3E97C493153B75B055695736B184640D7335A2E6218083B5A1BEE2695209350E57A3EB76FBC604CB3B250DF3D9D0C560D1FBDFE30108D233A3C555100BE1A3F8E543C0B253E06E91B6D5F9CB3A093009BC8B4D3A0EB19DB59E56DA7E3D637847970D6C2AEB4A1FCF3896A7C080FE68759BAA62E6AAA8B7C7CBDA176DDC72F8D259A16D3469E31F19D2959904611D730D7D26FCFED789A0C49698FDFABF3F6727D08C61A073BB11E85C96486D49B0E0D38364C008A5EB964F8813C5DF004F9E76D2F8DB90702D800032674959BF0DF823785419101CEA928A10ACBAE7E48FE19202F3CB7BCF416476D17CB64C5570FCED443BD75D9F2C632FF0203010001A3533051301D0603551D0E041604145D6CA352CEFC713CBBC5E21F663C3639FD19D4D7301F0603551D230418301680145D6CA352CEFC713CBBC5E21F663C3639FD19D4D7300F0603551D130101FF040530030101FF300D06092A864886F70D01010B05000382010100AF2218E4CA18144728FCC76EA14958061522FD4A018BED1A4BFCC5CCE70BC6AE9DF7D3795C9A010D53628E2B6E7C10D6B07E53546235A5EE480E5A434E312154BF1E39AAC27D2C18D4F41CBBECFE4538CEF93EF62C17D187A7F720F4A9478410D09620C9F8B293B5786A5440BC0743B7B7753CF66FBA498B7E083BC267597238DC031B9BB131F997D9B8164AAED0D6E328420E53E1969DA6CD035078179677A7177BB2BF9C87CF592910CD380E8501B92040A39469C782BA383BEAE498C060FCC7C429BC10B7B6B7A0659C9BE03DC13DB46C638CF5E3B22A303726906DC8DD91C64501EBFC282A3A497EC430CACC066EE4BF9C5C8F2F2A05D0C1921A9E3E85E3
(PID) Process:(2504) DevCon.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EnterpriseCertificates\Root\Certificates\9F6134C5FA75E4FDDE631B232BE961D6D4B97DB6
Operation:writeName:Blob
Value:
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
(PID) Process:(2504) DevCon.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EnterpriseCertificates\Root\Certificates\9F6134C5FA75E4FDDE631B232BE961D6D4B97DB6
Operation:writeName:Blob
Value:
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
(PID) Process:(2256) drvinst.exeKey:HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1576) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2256) drvinst.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
40000000000000003811FC442B2FDA01740A0000480C0000D5070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(2256) drvinst.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
40000000000000003811FC442B2FDA01740A0000480C0000D0070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(2256) drvinst.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
74
Executable files
30
Suspicious files
66
Text files
93
Unknown types
0

Dropped files

PID
Process
Filename
Type
1388nst9412.tmpC:\Users\admin\AppData\Local\Temp\nst945F.tmp\InstallHelp.dllexecutable
MD5:E7715D8590B80E295D9168B1CF168C34
SHA256:B7AA5E64BF55719817E08718D99D509014585A4336426D46F6BDC91957D836C2
1388nst9412.tmpC:\ProgramData\Microsoft\Windows\Start Menu\Programs\Elaborate Bytes\VirtualCloneDrive\Manual.lnkbinary
MD5:FFB3BC5DC536BA515FC18027080F3F0B
SHA256:9E886F06C430201C293886F40B26D17D68E99239188C6D7B282B17C3F3E9696D
2692SetupVCD5520.exeC:\Users\admin\AppData\Local\Temp\nst9411.tmp\nst9412.tmpexecutable
MD5:DEC8EDA3A1AF6A8039987FE854A84A91
SHA256:B69AB416FA1C2DB43D9D4A900ABBF5E1AD6DAF0AB914AFCDFA74B25AF390747F
1388nst9412.tmpC:\Program Files\Elaborate Bytes\VirtualCloneDrive\DevCon.exeexecutable
MD5:DD1232788611EF3471281C702A2FE90A
SHA256:0B329EF478FE62CD4A52290D0D892DA1FBE322039CBF64D75C051C32CD4271C7
1388nst9412.tmpC:\Program Files\Elaborate Bytes\VirtualCloneDrive\vcd-uninst.exeexecutable
MD5:689C34FDC60E7D2B3B50AE6528F2C218
SHA256:4137A357D55366746C5F6FC7ED186CA584E8DEB577F81CE81AFB2C3C50C19D02
1388nst9412.tmpC:\Program Files\Elaborate Bytes\VirtualCloneDrive\Daemon.exeexecutable
MD5:9AE3C40B59CF7DE2404B0A114F1E4EB2
SHA256:344CECB43C6124A30C19D199F694683729624710F8035AD289C9BF57BD659344
1388nst9412.tmpC:\ProgramData\Microsoft\Windows\Start Menu\Programs\Elaborate Bytes\VirtualCloneDrive\Uninstall.lnkbinary
MD5:EC1341E5BBBAF6DA0E3E7F64E7A37964
SHA256:CC12EDCFCC9176EF2883545DF4684127C2DD03360BC635AF062AF2247FDF89E1
1388nst9412.tmpC:\Program Files\Elaborate Bytes\VirtualCloneDrive\HelpLauncher.exeexecutable
MD5:9881A7049383E3C402ACD33D33B6D8E7
SHA256:88ED5539A9F8D68A8557AEFD59DC2B03F174CEACDA0CB491CB6F79260B613D3F
1388nst9412.tmpC:\Program Files\Elaborate Bytes\VirtualCloneDrive\ElbyDVD.exeexecutable
MD5:A9A1C572EBCF9D20705495FE114AFDD1
SHA256:D261721408B9B0FD9B3F34AC5AEA9C5A95B949FEFDBB5A99A3683B66E00D8A3E
1388nst9412.tmpC:\Program Files\Elaborate Bytes\VirtualCloneDrive\manual\changes_vcd.txttext
MD5:561BA6EE30C115343F3D1D6263B0C10D
SHA256:52544A14AB1B7548D6DCE7BAC7AA0877CA2E8DA005384EE7DAEC89B44C52CC8D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
No debug info