File name:

SetupVCD5520.exe

Full analysis: https://app.any.run/tasks/a4d0479e-1378-4f13-ae26-60e8b6625264
Verdict: Malicious activity
Analysis date: January 27, 2024, 18:14:25
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

DEC8EDA3A1AF6A8039987FE854A84A91

SHA1:

B869A7C4F1F8E2CEEB9B248CCC41782F005B02A1

SHA256:

B69AB416FA1C2DB43D9D4A900ABBF5E1AD6DAF0AB914AFCDFA74B25AF390747F

SSDEEP:

24576:wihLOEdf7GOApNkiGz7CyNjP6xs1pBeNORUvL4nOTgr4EWl8DXfX8aGko77ISC4F:wiBOEdvvz7CyhgNrMn34ElXf0kxh4EW

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • SetupVCD5520.exe (PID: 2692)
      • nst9412.tmp (PID: 1388)
      • DevCon.exe (PID: 2504)
      • drvinst.exe (PID: 2256)
      • drvinst.exe (PID: 2824)
    • Creates a writable file in the system directory

      • nst9412.tmp (PID: 1388)
      • drvinst.exe (PID: 2256)
      • drvinst.exe (PID: 2824)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • SetupVCD5520.exe (PID: 2692)
      • nst9412.tmp (PID: 1388)
      • DevCon.exe (PID: 2504)
      • drvinst.exe (PID: 2256)
      • drvinst.exe (PID: 2824)
    • Starts itself from another location

      • SetupVCD5520.exe (PID: 2692)
    • Starts application with an unusual extension

      • SetupVCD5520.exe (PID: 2692)
    • Creates files in the driver directory

      • nst9412.tmp (PID: 1388)
      • drvinst.exe (PID: 2256)
      • drvinst.exe (PID: 2824)
    • The process creates files with name similar to system file names

      • nst9412.tmp (PID: 1388)
    • Drops a system driver (possible attempt to evade defenses)

      • nst9412.tmp (PID: 1388)
      • DevCon.exe (PID: 2504)
      • drvinst.exe (PID: 2256)
      • drvinst.exe (PID: 2824)
    • Reads security settings of Internet Explorer

      • DevCon.exe (PID: 2504)
    • Checks Windows Trust Settings

      • DevCon.exe (PID: 2504)
      • drvinst.exe (PID: 2256)
      • drvinst.exe (PID: 2824)
      • drvinst.exe (PID: 2784)
    • Reads settings of System Certificates

      • DevCon.exe (PID: 2504)
      • rundll32.exe (PID: 1576)
    • Image mount has been detect

      • drvinst.exe (PID: 2824)
      • drvinst.exe (PID: 2784)
    • The process executes via Task Scheduler

      • ExecuteWithUAC.exe (PID: 3800)
  • INFO

    • Create files in a temporary directory

      • SetupVCD5520.exe (PID: 2692)
      • nst9412.tmp (PID: 1388)
      • DevCon.exe (PID: 2504)
    • Checks supported languages

      • SetupVCD5520.exe (PID: 2692)
      • nst9412.tmp (PID: 1388)
      • DevCon.exe (PID: 2804)
      • DevCon.exe (PID: 2504)
      • drvinst.exe (PID: 2256)
      • drvinst.exe (PID: 2784)
      • SetRegACL.exe (PID: 3452)
      • VCDDaemon.exe (PID: 3248)
      • drvinst.exe (PID: 2824)
      • ExecuteWithUAC.exe (PID: 3800)
      • VCDDaemon.exe (PID: 3816)
      • ExecuteWithUAC.exe (PID: 3708)
    • Reads the computer name

      • nst9412.tmp (PID: 1388)
      • DevCon.exe (PID: 2804)
      • DevCon.exe (PID: 2504)
      • drvinst.exe (PID: 2256)
      • drvinst.exe (PID: 2824)
      • drvinst.exe (PID: 2784)
      • VCDDaemon.exe (PID: 3248)
      • ExecuteWithUAC.exe (PID: 3708)
      • VCDDaemon.exe (PID: 3816)
    • Creates files in the program directory

      • nst9412.tmp (PID: 1388)
    • Reads the machine GUID from the registry

      • DevCon.exe (PID: 2504)
      • drvinst.exe (PID: 2256)
      • drvinst.exe (PID: 2784)
      • drvinst.exe (PID: 2824)
      • VCDDaemon.exe (PID: 3816)
    • Reads security settings of Internet Explorer

      • rundll32.exe (PID: 1576)
    • Process checks computer location settings

      • drvinst.exe (PID: 2784)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | NSIS - Nullsoft Scriptable Install System (87.8)
.exe | InstallShield setup (4.4)
.exe | Win32 Executable MS Visual C++ (generic) (3.2)
.exe | Win64 Executable (generic) (2.8)
.dll | Win32 Dynamic Link Library (generic) (0.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:02:22 16:43:00+01:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 59392
InitializedDataSize: 23040
UninitializedDataSize: -
EntryPoint: 0x9723
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
59
Monitored processes
15
Malicious processes
6
Suspicious processes
0

Behavior graph

Click at the process to see the details
start setupvcd5520.exe nst9412.tmp devcon.exe no specs devcon.exe drvinst.exe rundll32.exe no specs drvinst.exe drvinst.exe no specs vcddaemon.exe no specs setregacl.exe no specs rundll32.exe no specs executewithuac.exe no specs executewithuac.exe no specs vcddaemon.exe no specs setupvcd5520.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1388nst9412.tmp /DOITC:\Users\admin\AppData\Local\Temp\nst9411.tmp\nst9412.tmp
SetupVCD5520.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\nst9411.tmp\nst9412.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1576rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{3d618dc8-e0f0-321c-81a3-cf31aa80667f} Global\{64d3408a-6da8-290d-5605-2d221f233e6e} C:\Windows\System32\DriverStore\Temp\{2437f065-f5b0-207e-6959-cf10aa35ed7e}\vclone.inf C:\Windows\System32\DriverStore\Temp\{2437f065-f5b0-207e-6959-cf10aa35ed7e}\VClone.catC:\Windows\System32\rundll32.exedrvinst.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
2256DrvInst.exe "4" "0" "C:\Users\admin\AppData\Local\Temp\{21277cb4-d525-693e-defa-bf6357e21d38}\vclone.inf" "0" "64f288aa3" "000003EC" "WinSta0\Default" "000005D8" "208" "c:\users\admin\appdata\local\temp\nst945f.tmp"C:\Windows\System32\drvinst.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\drvinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
2504"C:\Users\admin\AppData\Local\Temp\nst945F.tmp\DevCon.exe" install VClone.inf "root\vclone"C:\Users\admin\AppData\Local\Temp\nst945F.tmp\DevCon.exe
nst9412.tmp
User:
admin
Company:
Windows (R) Codename Longhorn DDK provider
Integrity Level:
HIGH
Description:
Windows Setup API
Exit code:
0
Version:
6.0.6001.18000 built by: WinDDK
Modules
Images
c:\users\admin\appdata\local\temp\nst945f.tmp\devcon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2692"C:\Users\admin\AppData\Local\Temp\SetupVCD5520.exe" C:\Users\admin\AppData\Local\Temp\SetupVCD5520.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\setupvcd5520.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2784DrvInst.exe "1" "200" "SCSI\CdRom&Ven_ELBY&Prod_CLONEDRIVE&Rev_1.4\1&2afd7d61&0&000000" "" "" "6bc255963" "00000000" "00000550" "000005F8"C:\Windows\System32\drvinst.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\drvinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
2804"C:\Users\admin\AppData\Local\Temp\nst945F.tmp\DevCon.exe" status "root\vclone"C:\Users\admin\AppData\Local\Temp\nst945F.tmp\DevCon.exenst9412.tmp
User:
admin
Company:
Windows (R) Codename Longhorn DDK provider
Integrity Level:
HIGH
Description:
Windows Setup API
Exit code:
0
Version:
6.0.6001.18000 built by: WinDDK
Modules
Images
c:\users\admin\appdata\local\temp\nst945f.tmp\devcon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2824DrvInst.exe "2" "211" "ROOT\SCSIADAPTER\0000" "C:\Windows\INF\oem2.inf" "vclone.inf:Models:miniport:5.4.7.0:root\vclone" "64f288aa3" "000003EC" "000005E8" "000005F0"C:\Windows\System32\drvinst.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\drvinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
3248"C:\Program Files\Elaborate Bytes\VirtualCloneDrive\VCDDaemon.exe" /uC:\Program Files\Elaborate Bytes\VirtualCloneDrive\VCDDaemon.exenst9412.tmp
User:
admin
Company:
Elaborate Bytes AG
Integrity Level:
HIGH
Description:
Virtual CloneDrive Daemon
Exit code:
0
Version:
5.5.1.0
Modules
Images
c:\program files\elaborate bytes\virtualclonedrive\vcddaemon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\elbyvcd.dll
c:\windows\system32\elbycdio.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
3452"C:\Program Files\Elaborate Bytes\VirtualCloneDrive\SetRegACL.exe" Software\Microsoft\Windows\CurrentVersion\Explorer\DriveIcons 64C:\Program Files\Elaborate Bytes\VirtualCloneDrive\SetRegACL.exenst9412.tmp
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\program files\elaborate bytes\virtualclonedrive\setregacl.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
Total events
18 086
Read events
17 978
Write events
108
Delete events
0

Modification events

(PID) Process:(1388) nst9412.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:GlobalAssocChangedCounter
Value:
115
(PID) Process:(2504) DevCon.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2504) DevCon.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EnterpriseCertificates\Root\Certificates\9F6134C5FA75E4FDDE631B232BE961D6D4B97DB6
Operation:writeName:Blob
Value:
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
(PID) Process:(2504) DevCon.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EnterpriseCertificates\Root\Certificates\9F6134C5FA75E4FDDE631B232BE961D6D4B97DB6
Operation:writeName:Blob
Value:
0F00000001000000200000009065F32AFC2CFEA7F452D2D6BE94D20C877EFC1C05433D9935696193FDCC05D80300000001000000140000009F6134C5FA75E4FDDE631B232BE961D6D4B97DB6200000000100000047030000308203433082022BA00302010202147327B7C17D5AE708EF73F1F45A79D78B4E99A29F300D06092A864886F70D01010B05003031310B3009060355040613025553310F300D06035504080C06426F73746F6E3111300F060355040A0C084469676943657274301E170D3233303932393130353030335A170D3339303530383130353030335A3031310B3009060355040613025553310F300D06035504080C06426F73746F6E3111300F060355040A0C08446967694365727430820122300D06092A864886F70D01010105000382010F003082010A0282010100D91B7A55548F44F3E97C493153B75B055695736B184640D7335A2E6218083B5A1BEE2695209350E57A3EB76FBC604CB3B250DF3D9D0C560D1FBDFE30108D233A3C555100BE1A3F8E543C0B253E06E91B6D5F9CB3A093009BC8B4D3A0EB19DB59E56DA7E3D637847970D6C2AEB4A1FCF3896A7C080FE68759BAA62E6AAA8B7C7CBDA176DDC72F8D259A16D3469E31F19D2959904611D730D7D26FCFED789A0C49698FDFABF3F6727D08C61A073BB11E85C96486D49B0E0D38364C008A5EB964F8813C5DF004F9E76D2F8DB90702D800032674959BF0DF823785419101CEA928A10ACBAE7E48FE19202F3CB7BCF416476D17CB64C5570FCED443BD75D9F2C632FF0203010001A3533051301D0603551D0E041604145D6CA352CEFC713CBBC5E21F663C3639FD19D4D7301F0603551D230418301680145D6CA352CEFC713CBBC5E21F663C3639FD19D4D7300F0603551D130101FF040530030101FF300D06092A864886F70D01010B05000382010100AF2218E4CA18144728FCC76EA14958061522FD4A018BED1A4BFCC5CCE70BC6AE9DF7D3795C9A010D53628E2B6E7C10D6B07E53546235A5EE480E5A434E312154BF1E39AAC27D2C18D4F41CBBECFE4538CEF93EF62C17D187A7F720F4A9478410D09620C9F8B293B5786A5440BC0743B7B7753CF66FBA498B7E083BC267597238DC031B9BB131F997D9B8164AAED0D6E328420E53E1969DA6CD035078179677A7177BB2BF9C87CF592910CD380E8501B92040A39469C782BA383BEAE498C060FCC7C429BC10B7B6B7A0659C9BE03DC13DB46C638CF5E3B22A303726906DC8DD91C64501EBFC282A3A497EC430CACC066EE4BF9C5C8F2F2A05D0C1921A9E3E85E3
(PID) Process:(2504) DevCon.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EnterpriseCertificates\Root\Certificates\9F6134C5FA75E4FDDE631B232BE961D6D4B97DB6
Operation:writeName:Blob
Value:
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
(PID) Process:(2256) drvinst.exeKey:HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1576) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2256) drvinst.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
40000000000000003811FC442B2FDA01740A0000480C0000D5070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(2256) drvinst.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
40000000000000003811FC442B2FDA01740A0000480C0000D0070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(2256) drvinst.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
74
Executable files
30
Suspicious files
66
Text files
93
Unknown types
0

Dropped files

PID
Process
Filename
Type
1388nst9412.tmpC:\Program Files\Elaborate Bytes\VirtualCloneDrive\vcd-uninst.exeexecutable
MD5:689C34FDC60E7D2B3B50AE6528F2C218
SHA256:4137A357D55366746C5F6FC7ED186CA584E8DEB577F81CE81AFB2C3C50C19D02
1388nst9412.tmpC:\Users\admin\AppData\Local\Temp\nst945F.tmp\InstallHelp.dllexecutable
MD5:E7715D8590B80E295D9168B1CF168C34
SHA256:B7AA5E64BF55719817E08718D99D509014585A4336426D46F6BDC91957D836C2
1388nst9412.tmpC:\Users\admin\AppData\Local\Temp\nst945F.tmp\ExecuteWithUAC.exeexecutable
MD5:549E70189FA7B3034A8E58A48CB353C0
SHA256:BB23AC0440D9DE37D035E68895C53C559DF4F31C8D0905033AB40AD0A2910E77
2692SetupVCD5520.exeC:\Users\admin\AppData\Local\Temp\nst9411.tmp\nst9412.tmpexecutable
MD5:DEC8EDA3A1AF6A8039987FE854A84A91
SHA256:B69AB416FA1C2DB43D9D4A900ABBF5E1AD6DAF0AB914AFCDFA74B25AF390747F
1388nst9412.tmpC:\Program Files\Elaborate Bytes\VirtualCloneDrive\ExecuteWithUAC.exeexecutable
MD5:549E70189FA7B3034A8E58A48CB353C0
SHA256:BB23AC0440D9DE37D035E68895C53C559DF4F31C8D0905033AB40AD0A2910E77
1388nst9412.tmpC:\Program Files\Elaborate Bytes\VirtualCloneDrive\InstallHelp.dllexecutable
MD5:E7715D8590B80E295D9168B1CF168C34
SHA256:B7AA5E64BF55719817E08718D99D509014585A4336426D46F6BDC91957D836C2
1388nst9412.tmpC:\Program Files\Elaborate Bytes\VirtualCloneDrive\manual\de\drive.htmlhtml
MD5:5AC08AFD6BBE947C675CD326E474CF58
SHA256:DDC841523DA9ADA30F56ABAE336699B968819FD2E23DE07812258823F66823BF
1388nst9412.tmpC:\Program Files\Elaborate Bytes\VirtualCloneDrive\manual\changes_vcd.txttext
MD5:561BA6EE30C115343F3D1D6263B0C10D
SHA256:52544A14AB1B7548D6DCE7BAC7AA0877CA2E8DA005384EE7DAEC89B44C52CC8D
1388nst9412.tmpC:\Program Files\Elaborate Bytes\VirtualCloneDrive\manual\de\images\drive_shell.gifimage
MD5:9FF265B511E76F76B75522CEB1C0AC7B
SHA256:58313A6273C2EA5B333D6B170E0C534F88B14946C55D8B1E81DCEE0130BDFB2C
1388nst9412.tmpC:\Program Files\Elaborate Bytes\VirtualCloneDrive\manual\de\images\drive_select.gifimage
MD5:F8477BFE5372BEB19302BE80275288E8
SHA256:6741EBD69674A1CA090A35D2B29127BEA1165666C47E39AA134DC6065C3272F3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
No debug info