Name | Last modified | Size | Description | |
---|---|---|---|---|
Parent Directory | - | |||
2015-07-01_winnormal2.biargus | 2016-12-05 22:20 | 2.7G | ||
2015-07-01_winnormal2.capinfos | 2016-07-01 20:44 | 0 | ||
2015-07-01_winnormal2.dnstop | 2016-07-01 20:09 | 22K | ||
2015-07-01_winnormal2.html | 2016-07-04 07:18 | 283M | ||
2015-07-01_winnormal2.json | 2016-07-04 07:18 | 585M | ||
2015-07-01_winnormal2.passivedns | 2016-07-01 20:11 | 2.1M | ||
2015-07-01_winnormal2.pcap | 2016-06-22 22:04 | 12G | ||
2015-07-01_winnormal2.rrd | 2016-07-01 20:06 | 8.0M | ||
2015-07-01_winnormal2.tcpdstat | 2016-09-03 16:50 | 2.1K | ||
README.html | 2017-01-13 22:08 | 1.8K | ||
README.md | 2016-07-01 21:04 | 1.2K | ||
bro/ | 2022-01-30 11:48 | - | ||
c5d81a096cbc34edd0046e33cffbe070.exe.zip | 2016-07-01 20:05 | 157K | ||
fast-flux-dga-first-analysis.txt | 2017-01-13 22:08 | 16M | ||
Infected IP: 10.0.2.200
RobotHash
Started win normal 2
Open googlechrome
search "test page for me" in google
Accessed normally a link in www.linkedin.com
infected
I reopened the chrome browser because it was closed
Started the mail sink daemon
Rebooted because since 2016 May 20 that it is not sending packets
Poweroff