Analysis

Category Package Started Completed Duration Log(s)
FILE 2025-11-20 07:38:02 2025-11-20 07:38:31 29 seconds Show Analysis Log
2025-11-20 02:01:42,109 [root] INFO: Date set to: 20251120T07:38:01, timeout set to: 200
2025-11-20 07:38:01,017 [root] DEBUG: Starting analyzer from: C:\g4ngb5il
2025-11-20 07:38:01,018 [root] DEBUG: Storing results at: C:\KeQEql
2025-11-20 07:38:01,018 [root] DEBUG: Pipe server name: \\.\PIPE\QkdMLo
2025-11-20 07:38:01,019 [root] DEBUG: Python path: C:\Users\Admin\AppData\Local\Programs\Python\Python313-32
2025-11-20 07:38:01,019 [root] INFO: analysis running as an admin
2025-11-20 07:38:01,020 [root] DEBUG: no analysis package configured, picking one for you
2025-11-20 07:38:01,021 [root] INFO: analysis package selected: "generic"
2025-11-20 07:38:01,021 [root] DEBUG: importing analysis package module: "modules.packages.generic"...
2025-11-20 07:38:01,060 [root] DEBUG: imported analysis package "generic"
2025-11-20 07:38:01,060 [root] DEBUG: initializing analysis package "generic"...
2025-11-20 07:38:01,060 [lib.common.common] INFO: wrapping
2025-11-20 07:38:01,061 [lib.core.compound] INFO: C:\Temp already exists, skipping creation
2025-11-20 07:38:01,061 [root] DEBUG: New location of moved file: C:\Temp\eicar.com
2025-11-20 07:38:01,061 [root] INFO: Analyzer: Package modules.packages.generic does not specify a DLL option
2025-11-20 07:38:01,061 [root] INFO: Analyzer: Package modules.packages.generic does not specify a DLL_64 option
2025-11-20 07:38:01,062 [root] INFO: Analyzer: Package modules.packages.generic does not specify a loader option
2025-11-20 07:38:01,062 [root] INFO: Analyzer: Package modules.packages.generic does not specify a loader_64 option
2025-11-20 07:38:01,107 [root] DEBUG: Imported auxiliary module "modules.auxiliary.browser"
2025-11-20 07:38:01,168 [root] DEBUG: Imported auxiliary module "modules.auxiliary.digisig"
2025-11-20 07:38:01,193 [root] DEBUG: Imported auxiliary module "modules.auxiliary.disguise"
2025-11-20 07:38:01,219 [root] DEBUG: Imported auxiliary module "modules.auxiliary.human"
2025-11-20 07:38:01,229 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageChops'
2025-11-20 07:38:01,297 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageGrab'
2025-11-20 07:38:01,357 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageDraw'
2025-11-20 07:38:01,643 [lib.api.screenshot] INFO: Please upgrade Pillow to >= 5.4.1 for best performance
2025-11-20 07:38:01,644 [root] DEBUG: Imported auxiliary module "modules.auxiliary.screenshots"
2025-11-20 07:38:01,648 [root] DEBUG: Imported auxiliary module "modules.auxiliary.tlsdump"
2025-11-20 07:38:01,649 [root] DEBUG: Initialized auxiliary module "Browser"
2025-11-20 07:38:01,649 [root] DEBUG: attempting to configure 'Browser' from data
2025-11-20 07:38:01,651 [root] DEBUG: module Browser does not support data configuration, ignoring
2025-11-20 07:38:01,651 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.browser"...
2025-11-20 07:38:01,652 [root] DEBUG: Started auxiliary module modules.auxiliary.browser
2025-11-20 07:38:01,652 [root] DEBUG: Initialized auxiliary module "DigiSig"
2025-11-20 07:38:01,653 [root] DEBUG: attempting to configure 'DigiSig' from data
2025-11-20 07:38:01,653 [root] DEBUG: module DigiSig does not support data configuration, ignoring
2025-11-20 07:38:01,653 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.digisig"...
2025-11-20 07:38:01,653 [modules.auxiliary.digisig] DEBUG: Checking for a digital signature
2025-11-20 07:38:02,585 [modules.auxiliary.digisig] DEBUG: File format not recognized
2025-11-20 07:38:02,585 [modules.auxiliary.digisig] INFO: Uploading signature results to aux/DigiSig.json
2025-11-20 07:38:02,587 [root] DEBUG: Started auxiliary module modules.auxiliary.digisig
2025-11-20 07:38:02,587 [root] DEBUG: Initialized auxiliary module "Disguise"
2025-11-20 07:38:02,587 [root] DEBUG: attempting to configure 'Disguise' from data
2025-11-20 07:38:02,588 [root] DEBUG: module Disguise does not support data configuration, ignoring
2025-11-20 07:38:02,588 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.disguise"...
2025-11-20 07:38:02,589 [modules.auxiliary.disguise] INFO: Disguising GUID to 9c410b02-8e97-47d5-b0f6-efc962d118f5
2025-11-20 07:38:02,589 [root] DEBUG: Started auxiliary module modules.auxiliary.disguise
2025-11-20 07:38:02,590 [root] DEBUG: Initialized auxiliary module "Human"
2025-11-20 07:38:02,590 [root] DEBUG: attempting to configure 'Human' from data
2025-11-20 07:38:02,590 [root] DEBUG: module Human does not support data configuration, ignoring
2025-11-20 07:38:02,590 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.human"...
2025-11-20 07:38:02,591 [root] DEBUG: Started auxiliary module modules.auxiliary.human
2025-11-20 07:38:02,592 [root] DEBUG: Initialized auxiliary module "Screenshots"
2025-11-20 07:38:02,592 [root] DEBUG: attempting to configure 'Screenshots' from data
2025-11-20 07:38:02,593 [root] DEBUG: module Screenshots does not support data configuration, ignoring
2025-11-20 07:38:02,593 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.screenshots"...
2025-11-20 07:38:02,594 [root] DEBUG: Started auxiliary module modules.auxiliary.screenshots
2025-11-20 07:38:02,594 [root] DEBUG: Initialized auxiliary module "TLSDumpMasterSecrets"
2025-11-20 07:38:02,595 [root] DEBUG: attempting to configure 'TLSDumpMasterSecrets' from data
2025-11-20 07:38:02,595 [root] DEBUG: module TLSDumpMasterSecrets does not support data configuration, ignoring
2025-11-20 07:38:02,595 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.tlsdump"...
2025-11-20 07:38:02,598 [modules.auxiliary.tlsdump] INFO: lsass.exe found, pid 608
2025-11-20 07:38:02,767 [lib.api.process] INFO: Monitor config for <Process 608 lsass.exe>: C:\g4ngb5il\dll\608.ini
2025-11-20 07:38:02,769 [lib.api.process] INFO: Option 'tlsdump' with value '1' sent to monitor
2025-11-20 07:38:02,777 [lib.api.process] INFO: 64-bit DLL to inject is C:\g4ngb5il\dll\CEqvWzbT.dll, loader C:\g4ngb5il\bin\VUAoKDbg.exe
2025-11-20 07:38:02,796 [root] DEBUG: Loader: Injecting process 608 with C:\g4ngb5il\dll\CEqvWzbT.dll.
2025-11-20 07:38:02,814 [root] DEBUG: 608: Python path set to 'C:\Users\Admin\AppData\Local\Programs\Python\Python313-32'.
2025-11-20 07:38:02,815 [root] DEBUG: 608: Disabling sleep skipping.
2025-11-20 07:38:02,816 [root] DEBUG: 608: TLS secret dump mode enabled.
2025-11-20 07:38:02,851 [root] DEBUG: 608: RtlInsertInvertedFunctionTable 0x00007FFEE348090E, LdrpInvertedFunctionTableSRWLock 0x00007FFEE35DD4F0
2025-11-20 07:38:02,853 [root] DEBUG: 608: Monitor initialised: 64-bit capemon loaded in process 608 at 0x00007FFEB9770000, thread 1616, image base 0x00007FF60EE30000, stack from 0x000000A5F4C72000-0x000000A5F4C80000
2025-11-20 07:38:02,853 [root] DEBUG: 608: Commandline: C:\Windows\system32\lsass.exe
2025-11-20 07:38:02,866 [root] DEBUG: 608: Hooked 5 out of 5 functions
2025-11-20 07:38:02,868 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread.
2025-11-20 07:38:02,869 [root] DEBUG: Successfully injected DLL C:\g4ngb5il\dll\CEqvWzbT.dll.
2025-11-20 07:38:02,873 [lib.api.process] INFO: Injected into 64-bit <Process 608 lsass.exe>
2025-11-20 07:38:02,873 [root] DEBUG: Started auxiliary module modules.auxiliary.tlsdump
2025-11-20 07:38:06,063 [root] INFO: Restarting WMI Service
2025-11-20 07:38:08,208 [root] DEBUG: package modules.packages.generic does not support configure, ignoring
2025-11-20 07:38:08,209 [root] WARNING: configuration error for package modules.packages.generic: error importing data.packages.generic: No module named 'data.packages'
2025-11-20 07:38:08,210 [lib.core.compound] INFO: C:\Temp already exists, skipping creation
2025-11-20 07:38:08,212 [lib.api.process] INFO: Successfully executed process from path "C:\Windows\system32\cmd.exe" with arguments "/c start /wait "" "C:\Temp\eicar.com"" with pid 1984
2025-11-20 07:38:08,212 [lib.api.process] INFO: Monitor config for <Process 1984 cmd.exe>: C:\g4ngb5il\dll\1984.ini
2025-11-20 07:38:08,216 [lib.api.process] INFO: 32-bit DLL to inject is C:\g4ngb5il\dll\SEXkwiMD.dll, loader C:\g4ngb5il\bin\guTaJgS.exe
2025-11-20 07:38:08,265 [root] DEBUG: Loader: Injecting process 1984 (thread 992) with C:\g4ngb5il\dll\SEXkwiMD.dll.
2025-11-20 07:38:08,268 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2025-11-20 07:38:08,269 [root] DEBUG: Successfully injected DLL C:\g4ngb5il\dll\SEXkwiMD.dll.
2025-11-20 07:38:08,272 [lib.api.process] INFO: Injected into 32-bit <Process 1984 cmd.exe>
2025-11-20 07:38:10,283 [lib.api.process] INFO: Successfully resumed <Process 1984 cmd.exe>
2025-11-20 07:38:10,459 [root] DEBUG: 1984: Python path set to 'C:\Users\Admin\AppData\Local\Programs\Python\Python313-32'.
2025-11-20 07:38:10,461 [root] DEBUG: 1984: Disabling sleep skipping.
2025-11-20 07:38:10,462 [root] DEBUG: 1984: Dropped file limit defaulting to 100.
2025-11-20 07:38:10,485 [root] DEBUG: 1984: YaraInit: Compiled 43 rule files
2025-11-20 07:38:10,489 [root] DEBUG: 1984: YaraInit: Compiled rules saved to file C:\g4ngb5il\data\yara\capemon.yac
2025-11-20 07:38:10,491 [root] DEBUG: 1984: YaraScan: Scanning 0x00610000, size 0x595ee
2025-11-20 07:38:10,496 [root] DEBUG: 1984: YaraScan hit: FindFixAndRun
2025-11-20 07:38:10,497 [root] DEBUG: 1984: Monitor initialised: 32-bit capemon loaded in process 1984 at 0x731a0000, thread 992, image base 0x610000, stack from 0x2673000-0x2770000
2025-11-20 07:38:10,498 [root] DEBUG: 1984: Commandline: "C:\Windows\system32\cmd.exe" /c start /wait "" "C:\Temp\eicar.com"
2025-11-20 07:38:10,558 [root] DEBUG: 1984: hook_api: LdrpCallInitRoutine export address 0x76FC2B50 obtained via GetFunctionAddress
2025-11-20 07:38:10,605 [root] WARNING: b'Unable to place hook on GetCommandLineA'
2025-11-20 07:38:10,606 [root] DEBUG: 1984: set_hooks: Unable to hook GetCommandLineA
2025-11-20 07:38:10,607 [root] WARNING: b'Unable to place hook on GetCommandLineW'
2025-11-20 07:38:10,608 [root] DEBUG: 1984: set_hooks: Unable to hook GetCommandLineW
2025-11-20 07:38:10,623 [root] DEBUG: 1984: Hooked 625 out of 627 functions
2025-11-20 07:38:10,628 [root] DEBUG: 1984: set_hooks_exe: Hooked FindFixAndRun at 0x0061AD60
2025-11-20 07:38:10,632 [root] DEBUG: 1984: Syscall hook installed, syscall logging level 1
2025-11-20 07:38:10,641 [root] DEBUG: 1984: RestoreHeaders: Restored original import table.
2025-11-20 07:38:10,642 [root] INFO: Loaded monitor into process with pid 1984
2025-11-20 07:38:10,644 [root] DEBUG: 1984: caller_dispatch: Added region at 0x00610000 to tracked regions list (ntdll::memcpy returns to 0x006268FA, thread 992).
2025-11-20 07:38:10,645 [root] DEBUG: 1984: YaraScan: Scanning 0x00610000, size 0x595ee
2025-11-20 07:38:10,650 [root] DEBUG: 1984: ProcessImageBase: Main module image at 0x00610000 unmodified (entropy change 0.000000e+00)
2025-11-20 07:38:10,698 [root] DEBUG: 1984: InstrumentationCallback: Added region at 0x75A163AC (base 0x758D0000) to tracked regions list (thread 992).
2025-11-20 07:38:10,699 [root] DEBUG: 1984: ProcessTrackedRegion: Region at 0x758D0000 mapped as \Device\HarddiskVolume2\Windows\SysWOW64\KernelBase.dll is in known range, skipping
2025-11-20 07:38:10,715 [root] DEBUG: 1984: DLL loaded at 0x741F0000: C:\Windows\SYSTEM32\VERSION (0x8000 bytes).
2025-11-20 07:38:10,716 [root] DEBUG: 1984: DLL loaded at 0x73540000: C:\Windows\SYSTEM32\NtVdm64 (0x9000 bytes).
2025-11-20 07:38:10,739 [root] DEBUG: 1984: NtTerminateProcess hook: Attempting to dump process 1984
2025-11-20 07:38:10,741 [root] DEBUG: 1984: VerifyCodeSection: Executable code does not match, 0x9d62 of 0x2bfcb matching
2025-11-20 07:38:10,742 [root] DEBUG: 1984: DoProcessDump: Code modification detected, dumping Imagebase at 0x00610000.
2025-11-20 07:38:10,743 [root] DEBUG: 1984: DumpImageInCurrentProcess: Attempting to dump virtual PE image.
2025-11-20 07:38:10,743 [root] DEBUG: 1984: DumpProcess: Instantiating PeParser with address: 0x00610000.
2025-11-20 07:38:10,744 [root] DEBUG: 1984: DumpProcess: Module entry point VA is 0x00016B20.
2025-11-20 07:38:10,753 [lib.common.results] INFO: Uploading file C:\KeQEql\CAPE\1984_424325410384204112025 to procdump\fb5ba2cbe8fe7e1424289757374950772da9dd0957f9f5a3de5bd3c285fb5dc6; Size is 346624; Max size: 100000000
2025-11-20 07:38:10,768 [root] DEBUG: 1984: DumpProcess: Module image dump success - dump size 0x54a00.
2025-11-20 07:38:10,777 [root] INFO: Process with pid 1984 has terminated
2025-11-20 07:38:16,351 [root] INFO: Process list is empty, terminating analysis
2025-11-20 07:38:17,363 [root] INFO: Created shutdown mutex
2025-11-20 07:38:18,377 [root] INFO: Shutting down package
2025-11-20 07:38:18,378 [root] INFO: Stopping auxiliary modules
2025-11-20 07:38:18,378 [root] INFO: Stopping auxiliary module: Browser
2025-11-20 07:38:18,378 [root] INFO: Stopping auxiliary module: Human
2025-11-20 07:38:18,394 [root] INFO: Stopping auxiliary module: Screenshots
2025-11-20 07:38:19,114 [root] INFO: Finishing auxiliary modules
2025-11-20 07:38:19,114 [root] INFO: Shutting down pipe server and dumping dropped files
2025-11-20 07:38:19,115 [root] WARNING: Folder at path "C:\KeQEql\debugger" does not exist, skipping
2025-11-20 07:38:19,115 [root] WARNING: Folder at path "C:\KeQEql\tlsdump" does not exist, skipping
2025-11-20 07:38:19,122 [root] INFO: Analysis completed

    

    

    

Machine

Name Label Manager Started On Shutdown On Route
MalwareGuest MalwareGuest Proxmox 2025-11-20 07:38:02 2025-11-20 07:38:30 internet

Reports: JSON

Processing ( 0.23 seconds )

  • 0.178 NetworkAnalysis
  • 0.027 AnalysisInfo
  • 0.023 BehaviorAnalysis
  • 0.002 Debug

Signatures ( 0.07 seconds )

  • 0.009 antiav_detectreg
  • 0.004 infostealer_ftp
  • 0.004 suspicious_tld
  • 0.004 ransomware_files
  • 0.004 territorial_disputes_sigs
  • 0.003 antiav_detectfile
  • 0.003 ransomware_extensions
  • 0.002 network_dyndns
  • 0.002 antianalysis_detectfile
  • 0.002 antianalysis_detectreg
  • 0.002 infostealer_bitcoin
  • 0.002 infostealer_im
  • 0.002 infostealer_mail
  • 0.001 network_torgateway
  • 0.001 antivm_generic_diskreg
  • 0.001 antivm_parallels_keys
  • 0.001 antivm_vbox_files
  • 0.001 antivm_vbox_keys
  • 0.001 antivm_vmware_keys
  • 0.001 antivm_xen_keys
  • 0.001 geodo_banking_trojan
  • 0.001 browser_security
  • 0.001 disables_backups
  • 0.001 disables_browser_warn
  • 0.001 disables_power_options
  • 0.001 echelon_files
  • 0.001 poullight_files
  • 0.001 masquerade_process_name
  • 0.001 network_dns_opennic
  • 0.001 network_dns_paste_site
  • 0.001 network_dns_temp_file_storage
  • 0.001 revil_mutexes
  • 0.001 recon_fingerprint
  • 0.001 ursnif_behavior
  • 0.001 suspicious_command_tools
  • 0.001 uses_windows_utilities

Reporting ( 0.00 seconds )

  • 0.001 JsonDump

Signatures

Network activity detected but not expressed in monitor API logs
domain: mozilla.map.fastly.net
Queries the computer locale (possible geofencing)
Possible date expiration check, exits too soon after checking local time
process: cmd.exe, PID 1984
Checks system language via registry key (possible geofencing)
regkey: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\CustomLocale\ru-RU
regkey: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\ExtendedLocale\ru-RU

Screenshots

No screenshots available.
No playback available.

Hosts

No hosts contacted.

DNS

Name Response Post-Analysis Lookup
mozilla.map.fastly.net [VT] A 151.101.65.91 [VT]
A 151.101.129.91 [VT]
A 151.101.193.91 [VT]
A 151.101.1.91 [VT]
151.101.1.91 [VT]
mozilla.map.fastly.net [VT] AAAA 2a04:4e42::347 [VT]
AAAA 2a04:4e42:200::347 [VT]
AAAA 2a04:4e42:600::347 [VT]
AAAA 2a04:4e42:400::347 [VT]
151.101.1.91 [VT]

Summary

C:\Temp
C:\Temp\eicar.com
C:\Windows\SysWOW64\ru-RU\cmd.exe.mui
C:\Windows\sysnative\ru-RU\cmd.exe.mui
C:\Windows\System32\ru-RU\KERNELBASE.dll.mui
C:\Windows\sysnative\ru-RU\KERNELBASE.dll.mui
HKEY_CURRENT_USER
HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\System
HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Command Processor\DisableUNCCheck
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Command Processor\EnableExtensions
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Command Processor\DelayedExpansion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Command Processor\DefaultColor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Command Processor\CompletionChar
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Command Processor\PathCompletionChar
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Command Processor\AutoRun
HKEY_CURRENT_USER\Software\Microsoft\Command Processor
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Nls\CustomLocale
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\CustomLocale\ru-RU
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Nls\ExtendedLocale
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\ExtendedLocale\ru-RU
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager\ResourcePolicies
HKEY_LOCAL_MACHINE\Software\Microsoft\LanguageOverlay\OverlayPackages\ru-RU
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\GRE_Initialize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\GRE_Initialize\DisableMetaFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\GRE_Initialize\DisableUmpdBufferSizeCheck
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Command Processor\DisableUNCCheck
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Command Processor\EnableExtensions
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Command Processor\DelayedExpansion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Command Processor\DefaultColor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Command Processor\CompletionChar
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Command Processor\PathCompletionChar
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Command Processor\AutoRun
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\CustomLocale\ru-RU
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\ExtendedLocale\ru-RU
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager\ResourcePolicies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\GRE_Initialize\DisableMetaFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\GRE_Initialize\DisableUmpdBufferSizeCheck
"C:\Temp\eicar.com"
No results
Sorry! No behavior.
Sorry! No strace.
Sorry! No tracee.

No hosts contacted.

No TCP connections recorded.

No UDP connections recorded.

No domains contacted.

HTTP Requests

No HTTP(s) requests performed.

SMTP traffic

No SMTP traffic performed.

IRC traffic

No IRC requests performed.

No ICMP traffic performed.

CIF Results

No CIF Results

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Suricata HTTP

No Suricata HTTP

Sorry! No Suricata Extracted files.
Sorry! No dropped files.
Sorry! No process dumps.