Windows
Analysis Report
http://faceliker.com
Overview
Detection
Score: | 0 |
Range: | 0 - 100 |
Confidence: | 60% |
Signatures
Classification
- System is w10x64
chrome.exe (PID: 5452 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --s tart-maxim ized "abou t:blank" MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 3796 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --no-pre-r ead-main-d ll --field -trial-han dle=2308,i ,418349767 8686017889 ,158922542 3891486344 4,262144 - -disable-f eatures=Op timization GuideModel Downloadin g,Optimiza tionHints, Optimizati onHintsFet ching,Opti mizationTa rgetPredic tion --var iations-se ed-version =20250306- 183004.429 000 --mojo -platform- channel-ha ndle=2328 /prefetch: 3 MD5: E81F54E6C1129887AEA47E7D092680BF)
chrome.exe (PID: 1876 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt p://faceli ker.com" MD5: E81F54E6C1129887AEA47E7D092680BF)
- cleanup
- • Compliance
- • Networking
- • System Summary
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Window detected: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Process Injection | 1 Process Injection | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
google.com | 142.250.80.14 | true | false | high | |
www.google.com | 142.251.40.228 | true | false | high | |
faceliker.com | unknown | unknown | false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.251.40.228 | www.google.com | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.4 |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1649423 |
Start date and time: | 2025-03-26 19:16:51 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 2m 11s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | http://faceliker.com |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 18 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | UNKNOWN |
Classification: | unknown0.win@22/0@21/2 |
Cookbook Comments: |
|
- URL not reachable
- Exclude process from analysis
(whitelisted): audiodg.exe, sp psvc.exe, RuntimeBroker.exe, S hellExperienceHost.exe, SIHCli ent.exe, SgrmBroker.exe, backg roundTaskHost.exe, svchost.exe - Excluded IPs from analysis (wh
itelisted): 23.9.183.29, 142.2 50.80.35, 142.250.81.238, 142. 251.167.84, 142.251.40.142, 20 .12.23.50 - Excluded domains from analysis
(whitelisted): fs.microsoft.c om, clients2.google.com, accou nts.google.com, redirector.gvt 1.com, slscr.update.microsoft. com, clientservices.googleapis .com, clients.l.google.com, pr od.fs.microsoft.com.akadns.net , fs-wildcard.microsoft.com.ed gekey.net, fs-wildcard.microso ft.com.edgekey.net.globalredir .akadns.net, e16604.dscf.akama iedge.net, fe3cr.delivery.mp.m icrosoft.com - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtOpenFile calls found . - VT rate limit hit for: http:/
/faceliker.com
Download Network PCAP: filtered – full
- Total Packets: 40
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 26, 2025 19:17:58.098784924 CET | 49678 | 443 | 192.168.2.4 | 20.189.173.27 |
Mar 26, 2025 19:17:58.410854101 CET | 49678 | 443 | 192.168.2.4 | 20.189.173.27 |
Mar 26, 2025 19:17:58.676496029 CET | 49671 | 443 | 192.168.2.4 | 204.79.197.203 |
Mar 26, 2025 19:17:59.020226002 CET | 49678 | 443 | 192.168.2.4 | 20.189.173.27 |
Mar 26, 2025 19:18:00.223372936 CET | 49678 | 443 | 192.168.2.4 | 20.189.173.27 |
Mar 26, 2025 19:18:02.332763910 CET | 49681 | 80 | 192.168.2.4 | 2.17.190.73 |
Mar 26, 2025 19:18:02.645292044 CET | 49678 | 443 | 192.168.2.4 | 20.189.173.27 |
Mar 26, 2025 19:18:02.817168951 CET | 49680 | 443 | 192.168.2.4 | 204.79.197.222 |
Mar 26, 2025 19:18:07.484621048 CET | 49678 | 443 | 192.168.2.4 | 20.189.173.27 |
Mar 26, 2025 19:18:08.347645998 CET | 49671 | 443 | 192.168.2.4 | 204.79.197.203 |
Mar 26, 2025 19:18:09.591434956 CET | 49728 | 443 | 192.168.2.4 | 142.251.40.228 |
Mar 26, 2025 19:18:09.591473103 CET | 443 | 49728 | 142.251.40.228 | 192.168.2.4 |
Mar 26, 2025 19:18:09.591811895 CET | 49728 | 443 | 192.168.2.4 | 142.251.40.228 |
Mar 26, 2025 19:18:09.592019081 CET | 49728 | 443 | 192.168.2.4 | 142.251.40.228 |
Mar 26, 2025 19:18:09.592030048 CET | 443 | 49728 | 142.251.40.228 | 192.168.2.4 |
Mar 26, 2025 19:18:09.786057949 CET | 443 | 49728 | 142.251.40.228 | 192.168.2.4 |
Mar 26, 2025 19:18:09.792293072 CET | 443 | 49728 | 142.251.40.228 | 192.168.2.4 |
Mar 26, 2025 19:18:09.795092106 CET | 49728 | 443 | 192.168.2.4 | 142.251.40.228 |
Mar 26, 2025 19:18:09.796341896 CET | 49728 | 443 | 192.168.2.4 | 142.251.40.228 |
Mar 26, 2025 19:18:09.796351910 CET | 443 | 49728 | 142.251.40.228 | 192.168.2.4 |
Mar 26, 2025 19:18:09.796660900 CET | 443 | 49728 | 142.251.40.228 | 192.168.2.4 |
Mar 26, 2025 19:18:09.838888884 CET | 49728 | 443 | 192.168.2.4 | 142.251.40.228 |
Mar 26, 2025 19:18:17.093326092 CET | 49678 | 443 | 192.168.2.4 | 20.189.173.27 |
Mar 26, 2025 19:18:19.822134972 CET | 443 | 49728 | 142.251.40.228 | 192.168.2.4 |
Mar 26, 2025 19:18:19.822200060 CET | 443 | 49728 | 142.251.40.228 | 192.168.2.4 |
Mar 26, 2025 19:18:19.822571993 CET | 49728 | 443 | 192.168.2.4 | 142.251.40.228 |
Mar 26, 2025 19:18:21.647207022 CET | 49728 | 443 | 192.168.2.4 | 142.251.40.228 |
Mar 26, 2025 19:18:21.647259951 CET | 443 | 49728 | 142.251.40.228 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 26, 2025 19:18:05.678553104 CET | 53 | 51938 | 1.1.1.1 | 192.168.2.4 |
Mar 26, 2025 19:18:05.680917978 CET | 53 | 51371 | 1.1.1.1 | 192.168.2.4 |
Mar 26, 2025 19:18:06.253761053 CET | 53 | 50219 | 1.1.1.1 | 192.168.2.4 |
Mar 26, 2025 19:18:06.441565990 CET | 53 | 64719 | 1.1.1.1 | 192.168.2.4 |
Mar 26, 2025 19:18:09.500991106 CET | 57360 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 26, 2025 19:18:09.501338005 CET | 56779 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 26, 2025 19:18:09.589281082 CET | 53 | 57360 | 1.1.1.1 | 192.168.2.4 |
Mar 26, 2025 19:18:09.589358091 CET | 53 | 56779 | 1.1.1.1 | 192.168.2.4 |
Mar 26, 2025 19:18:11.516356945 CET | 53748 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 26, 2025 19:18:11.516496897 CET | 63215 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 26, 2025 19:18:11.606498003 CET | 53 | 63215 | 1.1.1.1 | 192.168.2.4 |
Mar 26, 2025 19:18:11.606517076 CET | 53 | 53748 | 1.1.1.1 | 192.168.2.4 |
Mar 26, 2025 19:18:11.804817915 CET | 64456 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 26, 2025 19:18:11.810583115 CET | 59678 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 26, 2025 19:18:11.810874939 CET | 57860 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 26, 2025 19:18:11.893246889 CET | 53 | 64456 | 1.1.1.1 | 192.168.2.4 |
Mar 26, 2025 19:18:11.898741961 CET | 53 | 59678 | 1.1.1.1 | 192.168.2.4 |
Mar 26, 2025 19:18:11.932889938 CET | 64318 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 26, 2025 19:18:11.933048964 CET | 63312 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 26, 2025 19:18:11.942478895 CET | 53 | 57860 | 1.1.1.1 | 192.168.2.4 |
Mar 26, 2025 19:18:12.023941040 CET | 53 | 64318 | 1.1.1.1 | 192.168.2.4 |
Mar 26, 2025 19:18:12.023966074 CET | 53 | 63312 | 1.1.1.1 | 192.168.2.4 |
Mar 26, 2025 19:18:12.054266930 CET | 54880 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 26, 2025 19:18:12.054534912 CET | 58445 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 26, 2025 19:18:12.143459082 CET | 53 | 54880 | 8.8.8.8 | 192.168.2.4 |
Mar 26, 2025 19:18:12.143496990 CET | 53 | 58445 | 1.1.1.1 | 192.168.2.4 |
Mar 26, 2025 19:18:13.074085951 CET | 64619 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 26, 2025 19:18:13.085541964 CET | 63762 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 26, 2025 19:18:13.162763119 CET | 53 | 64619 | 1.1.1.1 | 192.168.2.4 |
Mar 26, 2025 19:18:13.173832893 CET | 53 | 63762 | 1.1.1.1 | 192.168.2.4 |
Mar 26, 2025 19:18:18.238383055 CET | 55429 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 26, 2025 19:18:18.238383055 CET | 49635 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 26, 2025 19:18:18.328049898 CET | 53 | 55429 | 1.1.1.1 | 192.168.2.4 |
Mar 26, 2025 19:18:18.328079939 CET | 53 | 49635 | 1.1.1.1 | 192.168.2.4 |
Mar 26, 2025 19:18:18.329289913 CET | 58637 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 26, 2025 19:18:18.417682886 CET | 53 | 58637 | 1.1.1.1 | 192.168.2.4 |
Mar 26, 2025 19:18:23.453438044 CET | 53 | 54518 | 1.1.1.1 | 192.168.2.4 |
Mar 26, 2025 19:18:24.341444016 CET | 53281 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 26, 2025 19:18:24.341623068 CET | 57651 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 26, 2025 19:18:24.430604935 CET | 53 | 53281 | 1.1.1.1 | 192.168.2.4 |
Mar 26, 2025 19:18:24.430624962 CET | 53 | 57651 | 1.1.1.1 | 192.168.2.4 |
Mar 26, 2025 19:18:24.431948900 CET | 63829 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 26, 2025 19:18:24.520284891 CET | 53 | 63829 | 1.1.1.1 | 192.168.2.4 |
Mar 26, 2025 19:18:24.533768892 CET | 58269 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 26, 2025 19:18:24.533860922 CET | 49668 | 53 | 192.168.2.4 | 8.8.8.8 |
Mar 26, 2025 19:18:24.621855021 CET | 53 | 58269 | 1.1.1.1 | 192.168.2.4 |
Mar 26, 2025 19:18:24.621911049 CET | 53 | 49668 | 8.8.8.8 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Checksum | Code | Type |
---|---|---|---|---|---|
Mar 26, 2025 19:18:11.942544937 CET | 192.168.2.4 | 1.1.1.1 | c22c | (Port unreachable) | Destination Unreachable |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Mar 26, 2025 19:18:09.500991106 CET | 192.168.2.4 | 1.1.1.1 | 0x98d7 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 26, 2025 19:18:09.501338005 CET | 192.168.2.4 | 1.1.1.1 | 0xb3e8 | Standard query (0) | 65 | IN (0x0001) | false | |
Mar 26, 2025 19:18:11.516356945 CET | 192.168.2.4 | 1.1.1.1 | 0x8699 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 26, 2025 19:18:11.516496897 CET | 192.168.2.4 | 1.1.1.1 | 0x5bea | Standard query (0) | 65 | IN (0x0001) | false | |
Mar 26, 2025 19:18:11.804817915 CET | 192.168.2.4 | 1.1.1.1 | 0x6858 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 26, 2025 19:18:11.810583115 CET | 192.168.2.4 | 1.1.1.1 | 0x836d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 26, 2025 19:18:11.810874939 CET | 192.168.2.4 | 1.1.1.1 | 0x33fe | Standard query (0) | 65 | IN (0x0001) | false | |
Mar 26, 2025 19:18:11.932889938 CET | 192.168.2.4 | 1.1.1.1 | 0x6e6e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 26, 2025 19:18:11.933048964 CET | 192.168.2.4 | 1.1.1.1 | 0x1ad3 | Standard query (0) | 65 | IN (0x0001) | false | |
Mar 26, 2025 19:18:12.054266930 CET | 192.168.2.4 | 8.8.8.8 | 0x7480 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 26, 2025 19:18:12.054534912 CET | 192.168.2.4 | 1.1.1.1 | 0xd078 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 26, 2025 19:18:13.074085951 CET | 192.168.2.4 | 1.1.1.1 | 0x918e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 26, 2025 19:18:13.085541964 CET | 192.168.2.4 | 1.1.1.1 | 0x27ce | Standard query (0) | 65 | IN (0x0001) | false | |
Mar 26, 2025 19:18:18.238383055 CET | 192.168.2.4 | 1.1.1.1 | 0xc33e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 26, 2025 19:18:18.238383055 CET | 192.168.2.4 | 1.1.1.1 | 0x641a | Standard query (0) | 65 | IN (0x0001) | false | |
Mar 26, 2025 19:18:18.329289913 CET | 192.168.2.4 | 1.1.1.1 | 0x5dbf | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 26, 2025 19:18:24.341444016 CET | 192.168.2.4 | 1.1.1.1 | 0xdf77 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 26, 2025 19:18:24.341623068 CET | 192.168.2.4 | 1.1.1.1 | 0x83f0 | Standard query (0) | 65 | IN (0x0001) | false | |
Mar 26, 2025 19:18:24.431948900 CET | 192.168.2.4 | 1.1.1.1 | 0x847b | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 26, 2025 19:18:24.533768892 CET | 192.168.2.4 | 1.1.1.1 | 0xef52 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 26, 2025 19:18:24.533860922 CET | 192.168.2.4 | 8.8.8.8 | 0xa4dd | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Mar 26, 2025 19:18:09.589281082 CET | 1.1.1.1 | 192.168.2.4 | 0x98d7 | No error (0) | 142.251.40.228 | A (IP address) | IN (0x0001) | false | ||
Mar 26, 2025 19:18:09.589358091 CET | 1.1.1.1 | 192.168.2.4 | 0xb3e8 | No error (0) | 65 | IN (0x0001) | false | |||
Mar 26, 2025 19:18:11.606498003 CET | 1.1.1.1 | 192.168.2.4 | 0x5bea | Name error (3) | none | none | 65 | IN (0x0001) | false | |
Mar 26, 2025 19:18:11.606517076 CET | 1.1.1.1 | 192.168.2.4 | 0x8699 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Mar 26, 2025 19:18:11.893246889 CET | 1.1.1.1 | 192.168.2.4 | 0x6858 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Mar 26, 2025 19:18:11.898741961 CET | 1.1.1.1 | 192.168.2.4 | 0x836d | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Mar 26, 2025 19:18:11.942478895 CET | 1.1.1.1 | 192.168.2.4 | 0x33fe | Name error (3) | none | none | 65 | IN (0x0001) | false | |
Mar 26, 2025 19:18:12.023941040 CET | 1.1.1.1 | 192.168.2.4 | 0x6e6e | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Mar 26, 2025 19:18:12.023966074 CET | 1.1.1.1 | 192.168.2.4 | 0x1ad3 | Name error (3) | none | none | 65 | IN (0x0001) | false | |
Mar 26, 2025 19:18:12.143459082 CET | 8.8.8.8 | 192.168.2.4 | 0x7480 | No error (0) | 142.250.80.14 | A (IP address) | IN (0x0001) | false | ||
Mar 26, 2025 19:18:12.143496990 CET | 1.1.1.1 | 192.168.2.4 | 0xd078 | No error (0) | 142.250.80.14 | A (IP address) | IN (0x0001) | false | ||
Mar 26, 2025 19:18:13.162763119 CET | 1.1.1.1 | 192.168.2.4 | 0x918e | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Mar 26, 2025 19:18:13.173832893 CET | 1.1.1.1 | 192.168.2.4 | 0x27ce | Name error (3) | none | none | 65 | IN (0x0001) | false | |
Mar 26, 2025 19:18:18.328049898 CET | 1.1.1.1 | 192.168.2.4 | 0xc33e | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Mar 26, 2025 19:18:18.328079939 CET | 1.1.1.1 | 192.168.2.4 | 0x641a | Name error (3) | none | none | 65 | IN (0x0001) | false | |
Mar 26, 2025 19:18:18.417682886 CET | 1.1.1.1 | 192.168.2.4 | 0x5dbf | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Mar 26, 2025 19:18:24.430604935 CET | 1.1.1.1 | 192.168.2.4 | 0xdf77 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Mar 26, 2025 19:18:24.430624962 CET | 1.1.1.1 | 192.168.2.4 | 0x83f0 | Name error (3) | none | none | 65 | IN (0x0001) | false | |
Mar 26, 2025 19:18:24.520284891 CET | 1.1.1.1 | 192.168.2.4 | 0x847b | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Mar 26, 2025 19:18:24.621855021 CET | 1.1.1.1 | 192.168.2.4 | 0xef52 | No error (0) | 142.250.80.14 | A (IP address) | IN (0x0001) | false | ||
Mar 26, 2025 19:18:24.621911049 CET | 8.8.8.8 | 192.168.2.4 | 0xa4dd | No error (0) | 142.250.80.14 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 4 |
Start time: | 14:17:58 |
Start date: | 26/03/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff786830000 |
File size: | 3'388'000 bytes |
MD5 hash: | E81F54E6C1129887AEA47E7D092680BF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 5 |
Start time: | 14:18:04 |
Start date: | 26/03/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff786830000 |
File size: | 3'388'000 bytes |
MD5 hash: | E81F54E6C1129887AEA47E7D092680BF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 16 |
Start time: | 14:18:10 |
Start date: | 26/03/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff786830000 |
File size: | 3'388'000 bytes |
MD5 hash: | E81F54E6C1129887AEA47E7D092680BF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |