Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | April 21, 2025, 1:14 p.m. | April 21, 2025, 1:33 p.m. |
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mmspol.dll,DrvDisableDriver
2056-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mmspol.dll,DrvDisableDriver
2460
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mmspol.dll,DrvQueryDriverInfo
2244-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mmspol.dll,DrvQueryDriverInfo
2532
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mmspol.dll,DrvEnableDriver
2156-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mmspol.dll,DrvEnableDriver
2588
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mmspol.dll,DrvResetConfigCache
2332-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mmspol.dll,DrvResetConfigCache
2636
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mmspol.dll,GenerateCopyFilePaths
2432-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mmspol.dll,GenerateCopyFilePaths
2788
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mmspol.dll,SpoolerCopyFileEvent
2644-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mmspol.dll,SpoolerCopyFileEvent
2832
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\mmspol.dll,
2804
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
196.251.118.210 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
host | 196.251.118.210 |
CAT-QuickHeal | HackTool.Mimikatz.S33893082 |
Skyhigh | Trojan-FWXX!5737EF577C12 |
ALYac | Gen:Variant.Mimikatz.10 |
VIPRE | Gen:Variant.Mimikatz.10 |
BitDefender | Gen:Variant.Mimikatz.10 |
Arcabit | Trojan.Mimikatz.10 |
VirIT | Trojan.Win32.Mimi.DQYA |
Symantec | Hacktool.Mimikatz |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/RiskWare.Mimikatz.BO |
Avast | Win32:CVE-2021-1675-G [Expl] |
Kaspersky | HEUR:Trojan-PSW.Win64.Mimikatz.gen |
MicroWorld-eScan | Gen:Variant.Mimikatz.10 |
Rising | Trojan.Agent!8.B1E (TFE:6:Z7hKCBfrpcB) |
Emsisoft | Gen:Variant.Mimikatz.10 (B) |
DrWeb | Tool.Mimikatz.1199 |
Zillya | Trojan.Mimikatz.Win64.482 |
TrendMicro | HKTL_MIMIKATZ64 |
McAfeeD | ti!F20E0114C803 |
CTX | dll.unknown.mimikatz |
Sophos | ATK/Mimikatz-CR |
Jiangmin | Trojan.PSW.Mimikatz.cyl |
Webroot | W32.Hacktool.Gen |
Detected | |
Antiy-AVL | Trojan[PSW]/Win64.Mimikatz |
Microsoft | Program:Win32/Wacapew.C!ml |
ZoneAlarm | ATK/Mimikatz-CR |
GData | Gen:Variant.Mimikatz.10 |
Varist | W64/Mimikatz.L |
AhnLab-V3 | Trojan/Win.Mimikatz.R445129 |
McAfee | Trojan-FWXX!5737EF577C12 |
Malwarebytes | Mimikatz.Spyware.Stealer.DDS |
Ikarus | Trojan.PSW.Mimikatz |
Panda | Trj/GdSda.A |
TrendMicro-HouseCall | HKTL_MIMIKATZ64 |
Tencent | Trojan.Win64.Mimikatz.a |
Yandex | RiskWare.Mimikatz!eQ4ZXKbwWQE |
huorong | HackTool/Mimikatz.e |
AVG | Win32:CVE-2021-1675-G [Expl] |