Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
http://osregist.xyz/tdrig/CNBR.html

Overview

General Information

Sample URL:http://osregist.xyz/tdrig/CNBR.html
Analysis ID:1577675
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
AI detected suspicious URL
Performs DNS queries to domains with low reputation

Classification

  • System is w10x64
  • chrome.exe (PID: 908 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 5796 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=2000,i,11288441768828276705,11025632544745743959,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6580 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://osregist.xyz/tdrig/CNBR.html" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://osregist.xyz/tdrig/CNBR.htmlAvira URL Cloud: detection malicious, Label: malware
Source: http://osregist.xyz/favicon.icoAvira URL Cloud: Label: malware

Phishing

barindex
Source: EmailJoe Sandbox AI: AI detected Typosquatting in URL: http://osregist.xyz

Networking

barindex
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDNS query: osregist.xyz
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDNS query: osregist.xyz
Source: unknownTCP traffic detected without corresponding DNS query: 212.229.88.11
Source: unknownTCP traffic detected without corresponding DNS query: 212.229.88.11
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownTCP traffic detected without corresponding DNS query: 212.229.88.11
Source: unknownTCP traffic detected without corresponding DNS query: 212.229.88.11
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /tdrig/CNBR.html HTTP/1.1Host: osregist.xyzConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: osregist.xyzConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Referer: http://osregist.xyz/tdrig/CNBR.htmlAccept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: osregist.xyz
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Wed, 18 Dec 2024 15:26:26 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: keep-aliveContent-Encoding: gzipData Raw: 62 31 0d 0a 1f 8b 08 00 00 00 00 00 04 03 ed 90 c1 0a c2 30 10 44 ef 82 ff b0 7e 40 9a 16 7a f0 b0 e4 22 0a 1e f4 e2 17 a4 ee da 04 d2 44 62 04 fb f7 26 da 82 78 f6 e8 71 67 df 0c c3 a0 49 83 53 cb 05 1a d6 a4 30 d9 e4 58 b5 75 0b c7 90 60 17 ee 9e 50 be 45 94 2f 24 a3 5d a0 b1 58 ce ec 13 47 85 a6 f9 76 64 05 e5 f4 2e d9 19 9a 2e df 5b ff 90 4d d5 ac ab fa 13 91 73 a8 9c 0b ad 84 00 0d 57 4d 64 7d 0f 29 00 d9 9b ee 1c c3 e1 b4 df 82 f6 04 1b 13 c3 c0 70 89 96 3d b9 11 38 c6 10 b3 a3 67 10 a2 14 fc 47 fc 72 8b 27 bc bc fa bf 2b 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: b10D~@z"Db&xqgIS0Xu`PE/$]XGvd..[MsWMd})p=8gGr'+0
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49812
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: classification engineClassification label: mal64.troj.win@16/4@4/4
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=2000,i,11288441768828276705,11025632544745743959,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://osregist.xyz/tdrig/CNBR.html"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=2000,i,11288441768828276705,11025632544745743959,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Browser Extensions
1
Process Injection
1
Process Injection
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media3
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive4
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture3
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
http://osregist.xyz/tdrig/CNBR.html100%Avira URL Cloudmalware
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://osregist.xyz/favicon.ico100%Avira URL Cloudmalware
NameIPActiveMaliciousAntivirus DetectionReputation
osregist.xyz
185.255.135.223
truetrue
    unknown
    www.google.com
    216.58.211.196
    truefalse
      high
      NameMaliciousAntivirus DetectionReputation
      http://osregist.xyz/tdrig/CNBR.htmltrue
        unknown
        http://osregist.xyz/favicon.icofalse
        • Avira URL Cloud: malware
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        239.255.255.250
        unknownReserved
        unknownunknownfalse
        185.255.135.223
        osregist.xyzRussian Federation
        50113SUPERSERVERSDATACENTERRUtrue
        216.58.211.196
        www.google.comUnited States
        15169GOOGLEUSfalse
        IP
        192.168.2.4
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1577675
        Start date and time:2024-12-18 16:25:04 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 3m 17s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:browseurl.jbs
        Sample URL:http://osregist.xyz/tdrig/CNBR.html
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:8
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal64.troj.win@16/4@4/4
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 172.217.19.206, 142.250.201.35, 74.125.71.84, 142.250.201.14, 142.251.37.174, 142.250.200.206, 172.217.17.46, 199.232.214.172, 192.229.221.95, 142.251.37.195, 2.16.229.162, 20.12.23.50, 13.107.246.63
        • Excluded domains from analysis (whitelisted): fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, clientservices.googleapis.com, fe3cr.delivery.mp.microsoft.com, clients2.google.com, ocsp.digicert.com, edgedl.me.gvt1.com, redirector.gvt1.com, update.googleapis.com, clients.l.google.com
        • Not all processes where analyzed, report is missing behavior information
        • VT rate limit hit for: http://osregist.xyz/tdrig/CNBR.html
        No simulations
        No context
        No context
        No context
        No context
        No context
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:gzip compressed data, max speed, from Unix, original size modulo 2^32 555
        Category:downloaded
        Size (bytes):177
        Entropy (8bit):6.75252970245425
        Encrypted:false
        SSDEEP:3:FttIVhlT7HSLpRHrlFWvFG9x271YFJFg2BrITl1tJOeV5kylDzct+2SVTYVNxZDI:XtIwXOIQ1YFvnBi0O57lvz2mTUf0
        MD5:857A89FC2FEF6D7680720F437ED33969
        SHA1:82131F294532D0CA8C01893853F0593376D3F5C7
        SHA-256:2E003F5140C3D85CD407BDED801FD484C221672FBDCDE459A1DA4970452CA623
        SHA-512:9A8AF49A3EB6F6E06DCAEA0C6772569F860BE40E20CEB6DDB0E1D438DA5DA133B1D9F7651105B8464B3B138092C53287363A146B3C4E5819358D7B85B66C8ED5
        Malicious:false
        Reputation:low
        URL:http://osregist.xyz/favicon.ico
        Preview:..............0.D...~@..z.."..........Db...&.x..qg...I.S....0..X.u..`..P.E./$.]..X...G...vd.........[..M.....s.......WMd}.).............p..=..8....g....G.r.'....+...
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:gzip compressed data, max speed, from Unix, original size modulo 2^32 324
        Category:downloaded
        Size (bytes):207
        Entropy (8bit):7.018653216090081
        Encrypted:false
        SSDEEP:3:FttcAEXM9DfEQhNQ6rnouHR9O3/LdcJCqN2B7CMXwemJKrlxIdcOn2yzO67sln:XtcwIgpnouHbYZcHYJCWnmW6UyAln
        MD5:A49EB9D19BB650758DC6BAC8F881A7DC
        SHA1:41BDA0FDB35C684FAC65751D967AB9E7505B1C0B
        SHA-256:5F5A533E5D5070A7AD1AE4672550B3F82E87FF3CCED9104BD4C048D349ED01A2
        SHA-512:14270CC2784C363E552ADF4105086928411A5AA9ED161E1F8FA786001F681175C1092A9548CEBA2FA9F52B716D4E1484EC413796BAB1DB6825434A3FBA8738B4
        Malicious:false
        Reputation:low
        URL:http://osregist.xyz/tdrig/CNBR.html
        Preview:..............D1.B[.....4.Ov.E/.4/..iX/f.4.#}..C}.d.}.j.(GK.1....e.........-.....4.....~.bXN.]....f'...h.X....9....-}..g.Q....c..k,Lp.^.k./p.y.rV.......:.fz6=v.N.....\....k.lz.~.......R..D...
        No static file info
        TimestampSource PortDest PortSource IPDest IP
        Dec 18, 2024 16:26:17.735466957 CET8049723212.229.88.11192.168.2.4
        Dec 18, 2024 16:26:17.735688925 CET4972380192.168.2.4212.229.88.11
        Dec 18, 2024 16:26:17.742131948 CET4972380192.168.2.4212.229.88.11
        Dec 18, 2024 16:26:17.862144947 CET8049723212.229.88.11192.168.2.4
        Dec 18, 2024 16:26:18.128315926 CET49675443192.168.2.4173.222.162.32
        Dec 18, 2024 16:26:22.717503071 CET49738443192.168.2.4216.58.211.196
        Dec 18, 2024 16:26:22.717547894 CET44349738216.58.211.196192.168.2.4
        Dec 18, 2024 16:26:22.717607975 CET49738443192.168.2.4216.58.211.196
        Dec 18, 2024 16:26:22.717813969 CET49738443192.168.2.4216.58.211.196
        Dec 18, 2024 16:26:22.717829943 CET44349738216.58.211.196192.168.2.4
        Dec 18, 2024 16:26:24.136125088 CET44349738216.58.211.196192.168.2.4
        Dec 18, 2024 16:26:24.136476994 CET49738443192.168.2.4216.58.211.196
        Dec 18, 2024 16:26:24.136503935 CET44349738216.58.211.196192.168.2.4
        Dec 18, 2024 16:26:24.138159037 CET44349738216.58.211.196192.168.2.4
        Dec 18, 2024 16:26:24.138233900 CET49738443192.168.2.4216.58.211.196
        Dec 18, 2024 16:26:24.139503002 CET49738443192.168.2.4216.58.211.196
        Dec 18, 2024 16:26:24.139592886 CET44349738216.58.211.196192.168.2.4
        Dec 18, 2024 16:26:24.189801931 CET49738443192.168.2.4216.58.211.196
        Dec 18, 2024 16:26:24.189846039 CET44349738216.58.211.196192.168.2.4
        Dec 18, 2024 16:26:24.236658096 CET49738443192.168.2.4216.58.211.196
        Dec 18, 2024 16:26:25.223679066 CET4974080192.168.2.4185.255.135.223
        Dec 18, 2024 16:26:25.224034071 CET4974180192.168.2.4185.255.135.223
        Dec 18, 2024 16:26:25.343348026 CET8049740185.255.135.223192.168.2.4
        Dec 18, 2024 16:26:25.343425989 CET4974080192.168.2.4185.255.135.223
        Dec 18, 2024 16:26:25.343529940 CET8049741185.255.135.223192.168.2.4
        Dec 18, 2024 16:26:25.343668938 CET4974080192.168.2.4185.255.135.223
        Dec 18, 2024 16:26:25.343676090 CET4974180192.168.2.4185.255.135.223
        Dec 18, 2024 16:26:25.463407993 CET8049740185.255.135.223192.168.2.4
        Dec 18, 2024 16:26:26.664170980 CET8049740185.255.135.223192.168.2.4
        Dec 18, 2024 16:26:26.710645914 CET4974080192.168.2.4185.255.135.223
        Dec 18, 2024 16:26:26.728197098 CET4974080192.168.2.4185.255.135.223
        Dec 18, 2024 16:26:26.847872019 CET8049740185.255.135.223192.168.2.4
        Dec 18, 2024 16:26:27.158957958 CET8049740185.255.135.223192.168.2.4
        Dec 18, 2024 16:26:27.205652952 CET4974080192.168.2.4185.255.135.223
        Dec 18, 2024 16:26:32.559746981 CET8049724212.229.88.11192.168.2.4
        Dec 18, 2024 16:26:32.559920073 CET4972480192.168.2.4212.229.88.11
        Dec 18, 2024 16:26:32.560002089 CET4972480192.168.2.4212.229.88.11
        Dec 18, 2024 16:26:32.679661989 CET8049724212.229.88.11192.168.2.4
        Dec 18, 2024 16:26:33.920212984 CET44349738216.58.211.196192.168.2.4
        Dec 18, 2024 16:26:33.920294046 CET44349738216.58.211.196192.168.2.4
        Dec 18, 2024 16:26:33.920347929 CET49738443192.168.2.4216.58.211.196
        Dec 18, 2024 16:26:35.238452911 CET49738443192.168.2.4216.58.211.196
        Dec 18, 2024 16:26:35.238500118 CET44349738216.58.211.196192.168.2.4
        Dec 18, 2024 16:27:10.346204996 CET4974180192.168.2.4185.255.135.223
        Dec 18, 2024 16:27:10.465920925 CET8049741185.255.135.223192.168.2.4
        Dec 18, 2024 16:27:12.174339056 CET4974080192.168.2.4185.255.135.223
        Dec 18, 2024 16:27:12.294496059 CET8049740185.255.135.223192.168.2.4
        Dec 18, 2024 16:27:22.550319910 CET49812443192.168.2.4216.58.211.196
        Dec 18, 2024 16:27:22.550384998 CET44349812216.58.211.196192.168.2.4
        Dec 18, 2024 16:27:22.550471067 CET49812443192.168.2.4216.58.211.196
        Dec 18, 2024 16:27:22.550694942 CET49812443192.168.2.4216.58.211.196
        Dec 18, 2024 16:27:22.550712109 CET44349812216.58.211.196192.168.2.4
        Dec 18, 2024 16:27:23.955074072 CET44349812216.58.211.196192.168.2.4
        Dec 18, 2024 16:27:23.962414980 CET49812443192.168.2.4216.58.211.196
        Dec 18, 2024 16:27:23.962450981 CET44349812216.58.211.196192.168.2.4
        Dec 18, 2024 16:27:23.963624954 CET44349812216.58.211.196192.168.2.4
        Dec 18, 2024 16:27:23.964131117 CET49812443192.168.2.4216.58.211.196
        Dec 18, 2024 16:27:23.964312077 CET44349812216.58.211.196192.168.2.4
        Dec 18, 2024 16:27:24.017508030 CET49812443192.168.2.4216.58.211.196
        Dec 18, 2024 16:27:26.466061115 CET8049741185.255.135.223192.168.2.4
        Dec 18, 2024 16:27:26.466136932 CET4974180192.168.2.4185.255.135.223
        Dec 18, 2024 16:27:27.238476992 CET4974180192.168.2.4185.255.135.223
        Dec 18, 2024 16:27:27.358378887 CET8049741185.255.135.223192.168.2.4
        Dec 18, 2024 16:27:33.750420094 CET44349812216.58.211.196192.168.2.4
        Dec 18, 2024 16:27:33.750505924 CET44349812216.58.211.196192.168.2.4
        Dec 18, 2024 16:27:33.750597000 CET49812443192.168.2.4216.58.211.196
        Dec 18, 2024 16:27:35.238945007 CET49812443192.168.2.4216.58.211.196
        Dec 18, 2024 16:27:35.239025116 CET44349812216.58.211.196192.168.2.4
        TimestampSource PortDest PortSource IPDest IP
        Dec 18, 2024 16:26:17.601138115 CET138138192.168.2.4192.168.2.255
        Dec 18, 2024 16:26:18.695103884 CET53491931.1.1.1192.168.2.4
        Dec 18, 2024 16:26:18.753659964 CET53574731.1.1.1192.168.2.4
        Dec 18, 2024 16:26:21.546128988 CET53568931.1.1.1192.168.2.4
        Dec 18, 2024 16:26:22.487612963 CET6142953192.168.2.41.1.1.1
        Dec 18, 2024 16:26:22.487673044 CET6446853192.168.2.41.1.1.1
        Dec 18, 2024 16:26:22.625152111 CET53644681.1.1.1192.168.2.4
        Dec 18, 2024 16:26:22.716485023 CET53614291.1.1.1192.168.2.4
        Dec 18, 2024 16:26:24.649538994 CET6225753192.168.2.41.1.1.1
        Dec 18, 2024 16:26:24.650110006 CET6298953192.168.2.41.1.1.1
        Dec 18, 2024 16:26:25.221328974 CET53622571.1.1.1192.168.2.4
        Dec 18, 2024 16:26:25.223028898 CET53629891.1.1.1192.168.2.4
        Dec 18, 2024 16:26:38.522377968 CET53614851.1.1.1192.168.2.4
        Dec 18, 2024 16:26:57.203624010 CET53605391.1.1.1192.168.2.4
        Dec 18, 2024 16:27:18.392940998 CET53634971.1.1.1192.168.2.4
        Dec 18, 2024 16:27:20.061881065 CET53594621.1.1.1192.168.2.4
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Dec 18, 2024 16:26:22.487612963 CET192.168.2.41.1.1.10x4757Standard query (0)www.google.comA (IP address)IN (0x0001)false
        Dec 18, 2024 16:26:22.487673044 CET192.168.2.41.1.1.10x776dStandard query (0)www.google.com65IN (0x0001)false
        Dec 18, 2024 16:26:24.649538994 CET192.168.2.41.1.1.10xc989Standard query (0)osregist.xyzA (IP address)IN (0x0001)false
        Dec 18, 2024 16:26:24.650110006 CET192.168.2.41.1.1.10x1b41Standard query (0)osregist.xyz65IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Dec 18, 2024 16:26:22.625152111 CET1.1.1.1192.168.2.40x776dNo error (0)www.google.com65IN (0x0001)false
        Dec 18, 2024 16:26:22.716485023 CET1.1.1.1192.168.2.40x4757No error (0)www.google.com216.58.211.196A (IP address)IN (0x0001)false
        Dec 18, 2024 16:26:25.221328974 CET1.1.1.1192.168.2.40xc989No error (0)osregist.xyz185.255.135.223A (IP address)IN (0x0001)false
        • osregist.xyz
        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        0192.168.2.449740185.255.135.223805796C:\Program Files\Google\Chrome\Application\chrome.exe
        TimestampBytes transferredDirectionData
        Dec 18, 2024 16:26:25.343668938 CET442OUTGET /tdrig/CNBR.html HTTP/1.1
        Host: osregist.xyz
        Connection: keep-alive
        Upgrade-Insecure-Requests: 1
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
        Accept-Encoding: gzip, deflate
        Accept-Language: en-US,en;q=0.9
        Dec 18, 2024 16:26:26.664170980 CET467INHTTP/1.1 200 OK
        Server: nginx/1.18.0
        Date: Wed, 18 Dec 2024 15:26:26 GMT
        Content-Type: text/html
        Last-Modified: Fri, 29 Nov 2024 10:58:55 GMT
        Transfer-Encoding: chunked
        Connection: keep-alive
        ETag: W/"67499e6f-144"
        Content-Encoding: gzip
        Data Raw: 63 66 0d 0a 1f 8b 08 00 00 00 00 00 04 03 0d 8f cb 15 44 31 08 42 5b 12 ff 2e d5 bc d4 34 e5 4f 76 1c 45 2f d0 8f 34 2f d8 bb 8d 69 58 2f 66 fc 34 ab 23 7d ba f9 43 7d a2 64 dd 7d bb 6a d6 28 47 4b ce be 31 14 a8 8c a4 65 8e f3 05 06 f1 e9 ae a4 f0 14 c3 8f 2d f9 93 98 90 fd 34 98 eb 92 1f ca b5 e0 7e 2e 62 58 4e 2e 5d ac d0 f5 db 66 27 f6 ad e6 68 9b 58 98 c8 d2 ba a4 39 07 12 19 c0 2d 7d b7 c6 67 9d 51 94 a9 f2 95 96 07 63 aa ed 83 ac 6b 2c 4c 70 0e 5e e6 6b e4 2f 70 ee 79 0f 72 56 a5 17 91 b8 ca fe e5 3a b5 66 7a 36 3d 76 99 4e 9e 01 8d dc 1d 5c c2 97 af 97 b8 6b b7 6c 7a ad 7e f7 cc a3 7f 84 13 7f 91 52 b7 10 44 01 00 00 0d 0a 30 0d 0a 0d 0a
        Data Ascii: cfD1B[.4OvE/4/iX/f4#}C}d}j(GK1e-4~.bXN.]f'hX9-}gQck,Lp^k/pyrV:fz6=vN\klz~RD0
        Dec 18, 2024 16:26:26.728197098 CET383OUTGET /favicon.ico HTTP/1.1
        Host: osregist.xyz
        Connection: keep-alive
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
        Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
        Referer: http://osregist.xyz/tdrig/CNBR.html
        Accept-Encoding: gzip, deflate
        Accept-Language: en-US,en;q=0.9
        Dec 18, 2024 16:26:27.158957958 CET374INHTTP/1.1 404 Not Found
        Server: nginx/1.18.0
        Date: Wed, 18 Dec 2024 15:26:26 GMT
        Content-Type: text/html
        Transfer-Encoding: chunked
        Connection: keep-alive
        Content-Encoding: gzip
        Data Raw: 62 31 0d 0a 1f 8b 08 00 00 00 00 00 04 03 ed 90 c1 0a c2 30 10 44 ef 82 ff b0 7e 40 9a 16 7a f0 b0 e4 22 0a 1e f4 e2 17 a4 ee da 04 d2 44 62 04 fb f7 26 da 82 78 f6 e8 71 67 df 0c c3 a0 49 83 53 cb 05 1a d6 a4 30 d9 e4 58 b5 75 0b c7 90 60 17 ee 9e 50 be 45 94 2f 24 a3 5d a0 b1 58 ce ec 13 47 85 a6 f9 76 64 05 e5 f4 2e d9 19 9a 2e df 5b ff 90 4d d5 ac ab fa 13 91 73 a8 9c 0b ad 84 00 0d 57 4d 64 7d 0f 29 00 d9 9b ee 1c c3 e1 b4 df 82 f6 04 1b 13 c3 c0 70 89 96 3d b9 11 38 c6 10 b3 a3 67 10 a2 14 fc 47 fc 72 8b 27 bc bc fa bf 2b 02 00 00 0d 0a 30 0d 0a 0d 0a
        Data Ascii: b10D~@z"Db&xqgIS0Xu`PE/$]XGvd..[MsWMd})p=8gGr'+0
        Dec 18, 2024 16:27:12.174339056 CET6OUTData Raw: 00
        Data Ascii:


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        1192.168.2.449741185.255.135.223805796C:\Program Files\Google\Chrome\Application\chrome.exe
        TimestampBytes transferredDirectionData
        Dec 18, 2024 16:27:10.346204996 CET6OUTData Raw: 00
        Data Ascii:


        Click to jump to process

        Click to jump to process

        Click to jump to process

        Target ID:0
        Start time:10:26:12
        Start date:18/12/2024
        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
        Imagebase:0x7ff76e190000
        File size:3'242'272 bytes
        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        Target ID:2
        Start time:10:26:16
        Start date:18/12/2024
        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=2000,i,11288441768828276705,11025632544745743959,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
        Imagebase:0x7ff76e190000
        File size:3'242'272 bytes
        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        Target ID:5
        Start time:10:26:23
        Start date:18/12/2024
        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://osregist.xyz/tdrig/CNBR.html"
        Imagebase:0x7ff76e190000
        File size:3'242'272 bytes
        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        No disassembly