Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://internal-checker.com/personal.html

Overview

General Information

Sample URL:https://internal-checker.com/personal.html
Analysis ID:1487410
Infos:
Errors
  • URL not reachable

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file

Classification

  • System is w10x64
  • chrome.exe (PID: 5344 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 2484 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2060 --field-trial-handle=1960,i,9794118747827744498,10738390522671847428,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6360 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://internal-checker.com/personal.html" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: https://internal-checker.com/personal.htmlAvira URL Cloud: detection malicious, Label: phishing
Source: https://internal-checker.com/personal.htmlSlashNext: detection malicious, Label: Credential Stealing type: Phishing & Social Engineering
Source: https://internal-checker.com/personal.htmlVirustotal: Detection: 15%Perma Link
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:52630 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:52632 version: TLS 1.2
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
Source: global trafficDNS traffic detected: DNS query: internal-checker.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52626
Source: unknownNetwork traffic detected: HTTP traffic on port 52627 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52627
Source: unknownNetwork traffic detected: HTTP traffic on port 52626 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49672
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52640
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52630
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52641
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52631
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52632
Source: unknownNetwork traffic detected: HTTP traffic on port 52640 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52641 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52632 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52630 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52631 -> 443
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:52630 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:52632 version: TLS 1.2
Source: classification engineClassification label: mal56.win@18/0@4/4
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2060 --field-trial-handle=1960,i,9794118747827744498,10738390522671847428,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://internal-checker.com/personal.html"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2060 --field-trial-handle=1960,i,9794118747827744498,10738390522671847428,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath Interception1
Process Injection
1
Process Injection
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://internal-checker.com/personal.html100%Avira URL Cloudphishing
https://internal-checker.com/personal.html16%VirustotalBrowse
https://internal-checker.com/personal.html100%SlashNextCredential Stealing type: Phishing & Social Engineering
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
internal-checker.com
35.212.121.162
truefalse
    unknown
    bg.microsoft.map.fastly.net
    199.232.214.172
    truefalse
      unknown
      www.google.com
      216.58.206.68
      truefalse
        unknown
        fp2e7a.wpc.phicdn.net
        192.229.221.95
        truefalse
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          239.255.255.250
          unknownReserved
          unknownunknownfalse
          35.212.121.162
          internal-checker.comUnited States
          19527GOOGLE-2USfalse
          216.58.206.68
          www.google.comUnited States
          15169GOOGLEUSfalse
          IP
          192.168.2.4
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1487410
          Start date and time:2024-08-04 00:47:29 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 2m 12s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:browseurl.jbs
          Sample URL:https://internal-checker.com/personal.html
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:7
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal56.win@18/0@4/4
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • URL browsing timeout or error
          • URL not reachable
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 142.250.186.35, 64.233.167.84, 142.250.186.46, 34.104.35.123, 13.85.23.86, 199.232.214.172, 192.229.221.95, 20.166.126.56, 13.95.31.18, 142.250.185.227
          • Excluded domains from analysis (whitelisted): fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, clientservices.googleapis.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, ocsp.digicert.com, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, clients.l.google.com, www.gstatic.com, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtSetInformationFile calls found.
          No simulations
          No context
          No context
          No context
          No context
          No context
          No created / dropped files found
          No static file info
          TimestampSource PortDest PortSource IPDest IP
          Aug 4, 2024 00:48:16.154824972 CEST49675443192.168.2.4173.222.162.32
          Aug 4, 2024 00:48:25.206224918 CEST52626443192.168.2.435.212.121.162
          Aug 4, 2024 00:48:25.206335068 CEST4435262635.212.121.162192.168.2.4
          Aug 4, 2024 00:48:25.206434965 CEST52626443192.168.2.435.212.121.162
          Aug 4, 2024 00:48:25.207665920 CEST52627443192.168.2.435.212.121.162
          Aug 4, 2024 00:48:25.207705021 CEST4435262735.212.121.162192.168.2.4
          Aug 4, 2024 00:48:25.207859993 CEST52627443192.168.2.435.212.121.162
          Aug 4, 2024 00:48:25.227471113 CEST52627443192.168.2.435.212.121.162
          Aug 4, 2024 00:48:25.227484941 CEST4435262735.212.121.162192.168.2.4
          Aug 4, 2024 00:48:25.227770090 CEST52626443192.168.2.435.212.121.162
          Aug 4, 2024 00:48:25.227783918 CEST4435262635.212.121.162192.168.2.4
          Aug 4, 2024 00:48:25.764277935 CEST49675443192.168.2.4173.222.162.32
          Aug 4, 2024 00:48:27.569679022 CEST52630443192.168.2.4184.28.90.27
          Aug 4, 2024 00:48:27.569735050 CEST44352630184.28.90.27192.168.2.4
          Aug 4, 2024 00:48:27.569828033 CEST52630443192.168.2.4184.28.90.27
          Aug 4, 2024 00:48:27.572077990 CEST52630443192.168.2.4184.28.90.27
          Aug 4, 2024 00:48:27.572094917 CEST44352630184.28.90.27192.168.2.4
          Aug 4, 2024 00:48:27.727742910 CEST52631443192.168.2.4216.58.206.68
          Aug 4, 2024 00:48:27.727790117 CEST44352631216.58.206.68192.168.2.4
          Aug 4, 2024 00:48:27.727978945 CEST52631443192.168.2.4216.58.206.68
          Aug 4, 2024 00:48:27.728399038 CEST52631443192.168.2.4216.58.206.68
          Aug 4, 2024 00:48:27.728426933 CEST44352631216.58.206.68192.168.2.4
          Aug 4, 2024 00:48:28.217888117 CEST44352630184.28.90.27192.168.2.4
          Aug 4, 2024 00:48:28.217968941 CEST52630443192.168.2.4184.28.90.27
          Aug 4, 2024 00:48:28.232969046 CEST52630443192.168.2.4184.28.90.27
          Aug 4, 2024 00:48:28.232985973 CEST44352630184.28.90.27192.168.2.4
          Aug 4, 2024 00:48:28.233354092 CEST44352630184.28.90.27192.168.2.4
          Aug 4, 2024 00:48:28.277789116 CEST52630443192.168.2.4184.28.90.27
          Aug 4, 2024 00:48:28.365128040 CEST44352631216.58.206.68192.168.2.4
          Aug 4, 2024 00:48:28.398808956 CEST52631443192.168.2.4216.58.206.68
          Aug 4, 2024 00:48:28.398866892 CEST44352631216.58.206.68192.168.2.4
          Aug 4, 2024 00:48:28.400450945 CEST44352631216.58.206.68192.168.2.4
          Aug 4, 2024 00:48:28.400535107 CEST52631443192.168.2.4216.58.206.68
          Aug 4, 2024 00:48:28.425700903 CEST52630443192.168.2.4184.28.90.27
          Aug 4, 2024 00:48:28.440268993 CEST52631443192.168.2.4216.58.206.68
          Aug 4, 2024 00:48:28.440361977 CEST44352631216.58.206.68192.168.2.4
          Aug 4, 2024 00:48:28.472502947 CEST44352630184.28.90.27192.168.2.4
          Aug 4, 2024 00:48:28.483402967 CEST52631443192.168.2.4216.58.206.68
          Aug 4, 2024 00:48:28.483422995 CEST44352631216.58.206.68192.168.2.4
          Aug 4, 2024 00:48:28.528608084 CEST52631443192.168.2.4216.58.206.68
          Aug 4, 2024 00:48:28.615118980 CEST44352630184.28.90.27192.168.2.4
          Aug 4, 2024 00:48:28.615183115 CEST44352630184.28.90.27192.168.2.4
          Aug 4, 2024 00:48:28.615250111 CEST52630443192.168.2.4184.28.90.27
          Aug 4, 2024 00:48:28.644980907 CEST52630443192.168.2.4184.28.90.27
          Aug 4, 2024 00:48:28.644999027 CEST44352630184.28.90.27192.168.2.4
          Aug 4, 2024 00:48:28.838079929 CEST52632443192.168.2.4184.28.90.27
          Aug 4, 2024 00:48:28.838131905 CEST44352632184.28.90.27192.168.2.4
          Aug 4, 2024 00:48:28.838367939 CEST52632443192.168.2.4184.28.90.27
          Aug 4, 2024 00:48:28.838633060 CEST52632443192.168.2.4184.28.90.27
          Aug 4, 2024 00:48:28.838654041 CEST44352632184.28.90.27192.168.2.4
          Aug 4, 2024 00:48:29.491275072 CEST44352632184.28.90.27192.168.2.4
          Aug 4, 2024 00:48:29.491379976 CEST52632443192.168.2.4184.28.90.27
          Aug 4, 2024 00:48:29.493128061 CEST52632443192.168.2.4184.28.90.27
          Aug 4, 2024 00:48:29.493141890 CEST44352632184.28.90.27192.168.2.4
          Aug 4, 2024 00:48:29.494168043 CEST44352632184.28.90.27192.168.2.4
          Aug 4, 2024 00:48:29.496220112 CEST52632443192.168.2.4184.28.90.27
          Aug 4, 2024 00:48:29.536545992 CEST44352632184.28.90.27192.168.2.4
          Aug 4, 2024 00:48:29.765455008 CEST44352632184.28.90.27192.168.2.4
          Aug 4, 2024 00:48:29.765552998 CEST44352632184.28.90.27192.168.2.4
          Aug 4, 2024 00:48:29.765640974 CEST52632443192.168.2.4184.28.90.27
          Aug 4, 2024 00:48:29.766760111 CEST52632443192.168.2.4184.28.90.27
          Aug 4, 2024 00:48:29.766783953 CEST44352632184.28.90.27192.168.2.4
          Aug 4, 2024 00:48:38.753789902 CEST49672443192.168.2.4173.222.162.32
          Aug 4, 2024 00:48:38.753850937 CEST44349672173.222.162.32192.168.2.4
          Aug 4, 2024 00:48:39.219521046 CEST44352631216.58.206.68192.168.2.4
          Aug 4, 2024 00:48:39.219599009 CEST44352631216.58.206.68192.168.2.4
          Aug 4, 2024 00:48:39.219743013 CEST52631443192.168.2.4216.58.206.68
          Aug 4, 2024 00:48:39.555042982 CEST52631443192.168.2.4216.58.206.68
          Aug 4, 2024 00:48:39.555090904 CEST44352631216.58.206.68192.168.2.4
          Aug 4, 2024 00:48:42.711972952 CEST5261480192.168.2.4199.232.210.172
          Aug 4, 2024 00:48:42.717583895 CEST8052614199.232.210.172192.168.2.4
          Aug 4, 2024 00:48:42.717632055 CEST5261480192.168.2.4199.232.210.172
          Aug 4, 2024 00:48:55.239588022 CEST52627443192.168.2.435.212.121.162
          Aug 4, 2024 00:48:55.239727974 CEST52626443192.168.2.435.212.121.162
          Aug 4, 2024 00:48:55.240000010 CEST4435262635.212.121.162192.168.2.4
          Aug 4, 2024 00:48:55.240011930 CEST4435262735.212.121.162192.168.2.4
          Aug 4, 2024 00:48:55.240092993 CEST52627443192.168.2.435.212.121.162
          Aug 4, 2024 00:48:55.240101099 CEST52626443192.168.2.435.212.121.162
          Aug 4, 2024 00:48:56.575572014 CEST52640443192.168.2.435.212.121.162
          Aug 4, 2024 00:48:56.575634003 CEST4435264035.212.121.162192.168.2.4
          Aug 4, 2024 00:48:56.575701952 CEST52640443192.168.2.435.212.121.162
          Aug 4, 2024 00:48:56.575927019 CEST52641443192.168.2.435.212.121.162
          Aug 4, 2024 00:48:56.575959921 CEST4435264135.212.121.162192.168.2.4
          Aug 4, 2024 00:48:56.576020956 CEST52641443192.168.2.435.212.121.162
          Aug 4, 2024 00:48:56.576319933 CEST52640443192.168.2.435.212.121.162
          Aug 4, 2024 00:48:56.576347113 CEST4435264035.212.121.162192.168.2.4
          Aug 4, 2024 00:48:56.576677084 CEST52641443192.168.2.435.212.121.162
          Aug 4, 2024 00:48:56.576688051 CEST4435264135.212.121.162192.168.2.4
          TimestampSource PortDest PortSource IPDest IP
          Aug 4, 2024 00:48:23.130095959 CEST53545071.1.1.1192.168.2.4
          Aug 4, 2024 00:48:23.182543993 CEST53508791.1.1.1192.168.2.4
          Aug 4, 2024 00:48:24.227953911 CEST53608341.1.1.1192.168.2.4
          Aug 4, 2024 00:48:25.112545967 CEST6397553192.168.2.41.1.1.1
          Aug 4, 2024 00:48:25.112818003 CEST5316053192.168.2.41.1.1.1
          Aug 4, 2024 00:48:25.168788910 CEST53639751.1.1.1192.168.2.4
          Aug 4, 2024 00:48:25.307234049 CEST53531601.1.1.1192.168.2.4
          Aug 4, 2024 00:48:27.718004942 CEST5012753192.168.2.41.1.1.1
          Aug 4, 2024 00:48:27.718641043 CEST5745253192.168.2.41.1.1.1
          Aug 4, 2024 00:48:27.725390911 CEST53501271.1.1.1192.168.2.4
          Aug 4, 2024 00:48:27.725430012 CEST53574521.1.1.1192.168.2.4
          Aug 4, 2024 00:48:41.505924940 CEST53563021.1.1.1192.168.2.4
          Aug 4, 2024 00:48:42.981172085 CEST138138192.168.2.4192.168.2.255
          Aug 4, 2024 00:48:55.107942104 CEST53608811.1.1.1192.168.2.4
          Aug 4, 2024 00:49:00.662843943 CEST53599531.1.1.1192.168.2.4
          TimestampSource IPDest IPChecksumCodeType
          Aug 4, 2024 00:48:25.313179016 CEST192.168.2.41.1.1.1c232(Port unreachable)Destination Unreachable
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Aug 4, 2024 00:48:25.112545967 CEST192.168.2.41.1.1.10x3b2eStandard query (0)internal-checker.comA (IP address)IN (0x0001)false
          Aug 4, 2024 00:48:25.112818003 CEST192.168.2.41.1.1.10x95c2Standard query (0)internal-checker.com65IN (0x0001)false
          Aug 4, 2024 00:48:27.718004942 CEST192.168.2.41.1.1.10xc60fStandard query (0)www.google.comA (IP address)IN (0x0001)false
          Aug 4, 2024 00:48:27.718641043 CEST192.168.2.41.1.1.10xf4bbStandard query (0)www.google.com65IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Aug 4, 2024 00:48:25.168788910 CEST1.1.1.1192.168.2.40x3b2eNo error (0)internal-checker.com35.212.121.162A (IP address)IN (0x0001)false
          Aug 4, 2024 00:48:27.725390911 CEST1.1.1.1192.168.2.40xc60fNo error (0)www.google.com216.58.206.68A (IP address)IN (0x0001)false
          Aug 4, 2024 00:48:27.725430012 CEST1.1.1.1192.168.2.40xf4bbNo error (0)www.google.com65IN (0x0001)false
          Aug 4, 2024 00:48:40.293550968 CEST1.1.1.1192.168.2.40xf63cNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
          Aug 4, 2024 00:48:40.293550968 CEST1.1.1.1192.168.2.40xf63cNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
          Aug 4, 2024 00:48:41.702820063 CEST1.1.1.1192.168.2.40x96dcNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
          Aug 4, 2024 00:48:41.702820063 CEST1.1.1.1192.168.2.40x96dcNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
          Aug 4, 2024 00:48:53.864983082 CEST1.1.1.1192.168.2.40x5642No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
          Aug 4, 2024 00:48:53.864983082 CEST1.1.1.1192.168.2.40x5642No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
          • fs.microsoft.com
          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          0192.168.2.452630184.28.90.27443
          TimestampBytes transferredDirectionData
          2024-08-03 22:48:28 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          Accept-Encoding: identity
          User-Agent: Microsoft BITS/7.8
          Host: fs.microsoft.com
          2024-08-03 22:48:28 UTC467INHTTP/1.1 200 OK
          Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
          Content-Type: application/octet-stream
          ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
          Last-Modified: Tue, 16 May 2017 22:58:00 GMT
          Server: ECAcc (chd/0712)
          X-CID: 11
          X-Ms-ApiVersion: Distribute 1.2
          X-Ms-Region: prod-eus2-z1
          Cache-Control: public, max-age=29705
          Date: Sat, 03 Aug 2024 22:48:28 GMT
          Connection: close
          X-CID: 2


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          1192.168.2.452632184.28.90.27443
          TimestampBytes transferredDirectionData
          2024-08-03 22:48:29 UTC239OUTGET /fs/windows/config.json HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          Accept-Encoding: identity
          If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
          Range: bytes=0-2147483646
          User-Agent: Microsoft BITS/7.8
          Host: fs.microsoft.com
          2024-08-03 22:48:29 UTC514INHTTP/1.1 200 OK
          ApiVersion: Distribute 1.1
          Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
          Content-Type: application/octet-stream
          ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
          Last-Modified: Tue, 16 May 2017 22:58:00 GMT
          Server: ECAcc (lpl/EF06)
          X-CID: 11
          X-Ms-ApiVersion: Distribute 1.2
          X-Ms-Region: prod-weu-z1
          Cache-Control: public, max-age=29634
          Date: Sat, 03 Aug 2024 22:48:29 GMT
          Content-Length: 55
          Connection: close
          X-CID: 2
          2024-08-03 22:48:29 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
          Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


          Click to jump to process

          Click to jump to process

          Click to jump to process

          Target ID:0
          Start time:18:48:18
          Start date:03/08/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
          Imagebase:0x7ff76e190000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:2
          Start time:18:48:21
          Start date:03/08/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2060 --field-trial-handle=1960,i,9794118747827744498,10738390522671847428,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
          Imagebase:0x7ff76e190000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:3
          Start time:18:48:23
          Start date:03/08/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://internal-checker.com/personal.html"
          Imagebase:0x7ff76e190000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          No disassembly