Edit tour

Windows Analysis Report
http://rtbbtech.com/scriΡt/s2iurl.php

Overview

General Information

Sample URL:http://rtbbtech.com/scriΡt/s2iurl.php
Analysis ID:1674510
Infos:

Detection

Score:0
Range:0 - 100
Confidence:100%

Signatures

No high impact signatures.

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • chrome.exe (PID: 6988 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: E81F54E6C1129887AEA47E7D092680BF)
    • chrome.exe (PID: 5492 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1996,i,867063595383197125,4220782996507775682,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=2020 /prefetch:3 MD5: E81F54E6C1129887AEA47E7D092680BF)
    • chrome.exe (PID: 6652 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=printing.mojom.UnsandboxedPrintBackendHost --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1996,i,867063595383197125,4220782996507775682,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=5056 /prefetch:8 MD5: E81F54E6C1129887AEA47E7D092680BF)
  • chrome.exe (PID: 7348 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://rtbbtech.com/script/s2iurl.php" MD5: E81F54E6C1129887AEA47E7D092680BF)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownHTTPS traffic detected: 142.250.69.4:443 -> 192.168.2.5:49701 version: TLS 1.2
Source: unknownHTTPS traffic detected: 142.250.69.4:443 -> 192.168.2.5:49701 version: TLS 1.2
Source: unknownHTTPS traffic detected: 172.67.213.29:443 -> 192.168.2.5:49702 version: TLS 1.2
Source: unknownHTTPS traffic detected: 150.171.28.254:443 -> 192.168.2.5:49704 version: TLS 1.2
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.14
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.14
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.14
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.14
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.14
Source: unknownTCP traffic detected without corresponding DNS query: 192.178.49.195
Source: unknownTCP traffic detected without corresponding DNS query: 192.178.49.195
Source: unknownTCP traffic detected without corresponding DNS query: 192.178.49.195
Source: unknownTCP traffic detected without corresponding DNS query: 192.178.49.195
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.14
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.227.208
Source: unknownTCP traffic detected without corresponding DNS query: 150.171.28.254
Source: unknownTCP traffic detected without corresponding DNS query: 150.171.28.254
Source: unknownTCP traffic detected without corresponding DNS query: 150.171.28.254
Source: unknownTCP traffic detected without corresponding DNS query: 150.171.28.254
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.14
Source: unknownTCP traffic detected without corresponding DNS query: 192.178.49.195
Source: unknownTCP traffic detected without corresponding DNS query: 192.178.49.195
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /script/s2iurl.php HTTP/1.1Host: rtbbtech.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /r/r4.crl HTTP/1.1Cache-Control: max-age = 3000Connection: Keep-AliveAccept: */*If-Modified-Since: Thu, 25 Jul 2024 14:48:00 GMTUser-Agent: Microsoft-CryptoAPI/10.0Host: c.pki.goog
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: rtbbtech.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49675
Source: unknownNetwork traffic detected: HTTP traffic on port 49676 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
Source: unknownHTTPS traffic detected: 142.250.69.4:443 -> 192.168.2.5:49701 version: TLS 1.2
Source: unknownHTTPS traffic detected: 142.250.69.4:443 -> 192.168.2.5:49701 version: TLS 1.2
Source: unknownHTTPS traffic detected: 172.67.213.29:443 -> 192.168.2.5:49702 version: TLS 1.2
Source: unknownHTTPS traffic detected: 150.171.28.254:443 -> 192.168.2.5:49704 version: TLS 1.2
Source: classification engineClassification label: clean0.win@23/0@6/3
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1996,i,867063595383197125,4220782996507775682,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=2020 /prefetch:3
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=printing.mojom.UnsandboxedPrintBackendHost --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1996,i,867063595383197125,4220782996507775682,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=5056 /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://rtbbtech.com/script/s2iurl.php"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1996,i,867063595383197125,4220782996507775682,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=2020 /prefetch:3Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=printing.mojom.UnsandboxedPrintBackendHost --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1996,i,867063595383197125,4220782996507775682,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=5056 /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath Interception1
Process Injection
1
Process Injection
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1674510 URL: http://rtbbtech.com/script/... Startdate: 25/04/2025 Architecture: WINDOWS Score: 0 5 chrome.exe 2 2->5         started        8 chrome.exe 2->8         started        dnsIp3 15 192.168.2.5, 138, 443, 49670 unknown unknown 5->15 10 chrome.exe 5->10         started        13 chrome.exe 5->13         started        process4 dnsIp5 17 www.google.com 142.250.69.4, 443, 49701, 49709 GOOGLEUS United States 10->17 19 172.67.213.29, 443, 49702 CLOUDFLARENETUS United States 10->19 21 rtbbtech.com 10->21

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
http://rtbbtech.com/script/s2iurl.php0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
rtbbtech.com
104.21.53.132
truefalse
    high
    www.google.com
    142.250.69.4
    truefalse
      high
      NameMaliciousAntivirus DetectionReputation
      http://c.pki.goog/r/r4.crlfalse
        high
        https://rtbbtech.com/script/s2iurl.phpfalse
          high
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          142.250.69.4
          www.google.comUnited States
          15169GOOGLEUSfalse
          172.67.213.29
          unknownUnited States
          13335CLOUDFLARENETUSfalse
          IP
          192.168.2.5
          Joe Sandbox version:42.0.0 Malachite
          Analysis ID:1674510
          Start date and time:2025-04-25 23:15:41 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 2m 48s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:browseurl.jbs
          Sample URL:http://rtbbtech.com/scriΡt/s2iurl.php
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:14
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:CLEAN
          Classification:clean0.win@23/0@6/3
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 84.201.221.23, 74.125.137.84, 192.178.49.174, 142.250.68.227, 192.178.49.206, 184.29.183.29, 4.245.163.56
          • Excluded domains from analysis (whitelisted): fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, clientservices.googleapis.com, fe3cr.delivery.mp.microsoft.com, c2a9c95e369881c67228a6591cac2686.clo.footprintdns.com, ax-ring.msedge.net, clients2.google.com, edgedl.me.gvt1.com, redirector.gvt1.com, update.googleapis.com, clients.l.google.com, c.pki.goog
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtOpenFile calls found.
          • VT rate limit hit for: http://rtbbtech.com/script/s2iurl.php
          No simulations
          No context
          No context
          No context
          No context
          No context
          No created / dropped files found
          No static file info

          Download Network PCAP: filteredfull

          • Total Packets: 43
          • 443 (HTTPS)
          • 53 (DNS)
          TimestampSource PortDest PortSource IPDest IP
          Apr 25, 2025 23:16:27.143150091 CEST49672443192.168.2.5204.79.197.203
          Apr 25, 2025 23:16:31.955670118 CEST49672443192.168.2.5204.79.197.203
          Apr 25, 2025 23:16:32.857464075 CEST49676443192.168.2.520.189.173.14
          Apr 25, 2025 23:16:33.158811092 CEST49676443192.168.2.520.189.173.14
          Apr 25, 2025 23:16:33.783824921 CEST49676443192.168.2.520.189.173.14
          Apr 25, 2025 23:16:34.986979008 CEST49676443192.168.2.520.189.173.14
          Apr 25, 2025 23:16:37.550771952 CEST49676443192.168.2.520.189.173.14
          Apr 25, 2025 23:16:37.598700047 CEST4969780192.168.2.5192.178.49.195
          Apr 25, 2025 23:16:37.746882915 CEST8049697192.178.49.195192.168.2.5
          Apr 25, 2025 23:16:37.747087955 CEST4969780192.168.2.5192.178.49.195
          Apr 25, 2025 23:16:37.747232914 CEST4969780192.168.2.5192.178.49.195
          Apr 25, 2025 23:16:37.895433903 CEST8049697192.178.49.195192.168.2.5
          Apr 25, 2025 23:16:37.895857096 CEST8049697192.178.49.195192.168.2.5
          Apr 25, 2025 23:16:37.940649033 CEST4969780192.168.2.5192.178.49.195
          Apr 25, 2025 23:16:41.401182890 CEST49701443192.168.2.5142.250.69.4
          Apr 25, 2025 23:16:41.401211977 CEST44349701142.250.69.4192.168.2.5
          Apr 25, 2025 23:16:41.401350975 CEST49701443192.168.2.5142.250.69.4
          Apr 25, 2025 23:16:41.401499987 CEST49701443192.168.2.5142.250.69.4
          Apr 25, 2025 23:16:41.401514053 CEST44349701142.250.69.4192.168.2.5
          Apr 25, 2025 23:16:41.567019939 CEST49672443192.168.2.5204.79.197.203
          Apr 25, 2025 23:16:41.718303919 CEST44349701142.250.69.4192.168.2.5
          Apr 25, 2025 23:16:41.718375921 CEST49701443192.168.2.5142.250.69.4
          Apr 25, 2025 23:16:41.719575882 CEST49701443192.168.2.5142.250.69.4
          Apr 25, 2025 23:16:41.719588041 CEST44349701142.250.69.4192.168.2.5
          Apr 25, 2025 23:16:41.719779968 CEST44349701142.250.69.4192.168.2.5
          Apr 25, 2025 23:16:41.770095110 CEST49701443192.168.2.5142.250.69.4
          Apr 25, 2025 23:16:42.365319014 CEST49676443192.168.2.520.189.173.14
          Apr 25, 2025 23:16:42.385824919 CEST49702443192.168.2.5172.67.213.29
          Apr 25, 2025 23:16:42.385854006 CEST44349702172.67.213.29192.168.2.5
          Apr 25, 2025 23:16:42.387372971 CEST49702443192.168.2.5172.67.213.29
          Apr 25, 2025 23:16:42.387670040 CEST49702443192.168.2.5172.67.213.29
          Apr 25, 2025 23:16:42.387681961 CEST44349702172.67.213.29192.168.2.5
          Apr 25, 2025 23:16:42.701170921 CEST44349702172.67.213.29192.168.2.5
          Apr 25, 2025 23:16:42.701361895 CEST49702443192.168.2.5172.67.213.29
          Apr 25, 2025 23:16:42.703819990 CEST49702443192.168.2.5172.67.213.29
          Apr 25, 2025 23:16:42.703826904 CEST44349702172.67.213.29192.168.2.5
          Apr 25, 2025 23:16:42.704092026 CEST44349702172.67.213.29192.168.2.5
          Apr 25, 2025 23:16:42.707401991 CEST49702443192.168.2.5172.67.213.29
          Apr 25, 2025 23:16:42.752273083 CEST44349702172.67.213.29192.168.2.5
          Apr 25, 2025 23:16:43.105189085 CEST44349702172.67.213.29192.168.2.5
          Apr 25, 2025 23:16:43.105231047 CEST44349702172.67.213.29192.168.2.5
          Apr 25, 2025 23:16:43.105277061 CEST49702443192.168.2.5172.67.213.29
          Apr 25, 2025 23:16:43.105761051 CEST49702443192.168.2.5172.67.213.29
          Apr 25, 2025 23:16:43.105771065 CEST44349702172.67.213.29192.168.2.5
          Apr 25, 2025 23:16:50.532469988 CEST49675443192.168.2.52.23.227.208
          Apr 25, 2025 23:16:50.532495975 CEST443496752.23.227.208192.168.2.5
          Apr 25, 2025 23:16:51.009242058 CEST49704443192.168.2.5150.171.28.254
          Apr 25, 2025 23:16:51.009264946 CEST44349704150.171.28.254192.168.2.5
          Apr 25, 2025 23:16:51.009361029 CEST49704443192.168.2.5150.171.28.254
          Apr 25, 2025 23:16:51.009639978 CEST49704443192.168.2.5150.171.28.254
          Apr 25, 2025 23:16:51.009651899 CEST44349704150.171.28.254192.168.2.5
          Apr 25, 2025 23:16:51.450156927 CEST44349704150.171.28.254192.168.2.5
          Apr 25, 2025 23:16:51.450216055 CEST49704443192.168.2.5150.171.28.254
          Apr 25, 2025 23:16:51.756331921 CEST44349701142.250.69.4192.168.2.5
          Apr 25, 2025 23:16:51.756380081 CEST44349701142.250.69.4192.168.2.5
          Apr 25, 2025 23:16:51.756419897 CEST49701443192.168.2.5142.250.69.4
          Apr 25, 2025 23:16:51.971537113 CEST49676443192.168.2.520.189.173.14
          Apr 25, 2025 23:16:52.369469881 CEST49701443192.168.2.5142.250.69.4
          Apr 25, 2025 23:16:52.369487047 CEST44349701142.250.69.4192.168.2.5
          Apr 25, 2025 23:17:38.066910982 CEST4969780192.168.2.5192.178.49.195
          Apr 25, 2025 23:17:38.215720892 CEST8049697192.178.49.195192.168.2.5
          Apr 25, 2025 23:17:38.215778112 CEST4969780192.168.2.5192.178.49.195
          Apr 25, 2025 23:17:41.316852093 CEST49709443192.168.2.5142.250.69.4
          Apr 25, 2025 23:17:41.316900015 CEST44349709142.250.69.4192.168.2.5
          Apr 25, 2025 23:17:41.317044973 CEST49709443192.168.2.5142.250.69.4
          Apr 25, 2025 23:17:41.317209959 CEST49709443192.168.2.5142.250.69.4
          Apr 25, 2025 23:17:41.317223072 CEST44349709142.250.69.4192.168.2.5
          Apr 25, 2025 23:17:41.631625891 CEST44349709142.250.69.4192.168.2.5
          Apr 25, 2025 23:17:41.632009983 CEST49709443192.168.2.5142.250.69.4
          Apr 25, 2025 23:17:41.632042885 CEST44349709142.250.69.4192.168.2.5
          Apr 25, 2025 23:17:51.622217894 CEST44349709142.250.69.4192.168.2.5
          Apr 25, 2025 23:17:51.622286081 CEST44349709142.250.69.4192.168.2.5
          Apr 25, 2025 23:17:51.622447968 CEST49709443192.168.2.5142.250.69.4
          Apr 25, 2025 23:17:52.365523100 CEST49709443192.168.2.5142.250.69.4
          Apr 25, 2025 23:17:52.365560055 CEST44349709142.250.69.4192.168.2.5
          TimestampSource PortDest PortSource IPDest IP
          Apr 25, 2025 23:16:37.106297016 CEST53511161.1.1.1192.168.2.5
          Apr 25, 2025 23:16:37.109474897 CEST53518431.1.1.1192.168.2.5
          Apr 25, 2025 23:16:37.960660934 CEST53632911.1.1.1192.168.2.5
          Apr 25, 2025 23:16:38.214148045 CEST53600061.1.1.1192.168.2.5
          Apr 25, 2025 23:16:41.256341934 CEST6124753192.168.2.51.1.1.1
          Apr 25, 2025 23:16:41.260018110 CEST6370353192.168.2.51.1.1.1
          Apr 25, 2025 23:16:41.396673918 CEST53612471.1.1.1192.168.2.5
          Apr 25, 2025 23:16:41.400279999 CEST53637031.1.1.1192.168.2.5
          Apr 25, 2025 23:16:42.201606035 CEST6038253192.168.2.51.1.1.1
          Apr 25, 2025 23:16:42.201606035 CEST5442853192.168.2.51.1.1.1
          Apr 25, 2025 23:16:42.215572119 CEST5969653192.168.2.51.1.1.1
          Apr 25, 2025 23:16:42.215856075 CEST5924753192.168.2.51.1.1.1
          Apr 25, 2025 23:16:42.343127966 CEST53544281.1.1.1192.168.2.5
          Apr 25, 2025 23:16:42.359400988 CEST53592471.1.1.1192.168.2.5
          Apr 25, 2025 23:16:42.364391088 CEST53603821.1.1.1192.168.2.5
          Apr 25, 2025 23:16:42.368211985 CEST53596961.1.1.1192.168.2.5
          Apr 25, 2025 23:16:55.312932014 CEST53584401.1.1.1192.168.2.5
          Apr 25, 2025 23:17:14.113809109 CEST53514841.1.1.1192.168.2.5
          Apr 25, 2025 23:17:34.258753061 CEST138138192.168.2.5192.168.2.255
          Apr 25, 2025 23:17:36.550812006 CEST53579111.1.1.1192.168.2.5
          Apr 25, 2025 23:17:36.679286003 CEST53615631.1.1.1192.168.2.5
          Apr 25, 2025 23:17:39.957623005 CEST53496701.1.1.1192.168.2.5
          TimestampSource IPDest IPChecksumCodeType
          Apr 25, 2025 23:16:42.364620924 CEST192.168.2.51.1.1.1c203(Port unreachable)Destination Unreachable
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Apr 25, 2025 23:16:41.256341934 CEST192.168.2.51.1.1.10x5a92Standard query (0)www.google.comA (IP address)IN (0x0001)false
          Apr 25, 2025 23:16:41.260018110 CEST192.168.2.51.1.1.10x3a9dStandard query (0)www.google.com65IN (0x0001)false
          Apr 25, 2025 23:16:42.201606035 CEST192.168.2.51.1.1.10xa58Standard query (0)rtbbtech.comA (IP address)IN (0x0001)false
          Apr 25, 2025 23:16:42.201606035 CEST192.168.2.51.1.1.10xea44Standard query (0)rtbbtech.com65IN (0x0001)false
          Apr 25, 2025 23:16:42.215572119 CEST192.168.2.51.1.1.10xba64Standard query (0)rtbbtech.comA (IP address)IN (0x0001)false
          Apr 25, 2025 23:16:42.215856075 CEST192.168.2.51.1.1.10xea88Standard query (0)rtbbtech.com65IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Apr 25, 2025 23:16:41.396673918 CEST1.1.1.1192.168.2.50x5a92No error (0)www.google.com142.250.69.4A (IP address)IN (0x0001)false
          Apr 25, 2025 23:16:41.400279999 CEST1.1.1.1192.168.2.50x3a9dNo error (0)www.google.com65IN (0x0001)false
          Apr 25, 2025 23:16:42.343127966 CEST1.1.1.1192.168.2.50xea44No error (0)rtbbtech.com65IN (0x0001)false
          Apr 25, 2025 23:16:42.359400988 CEST1.1.1.1192.168.2.50xea88No error (0)rtbbtech.com65IN (0x0001)false
          Apr 25, 2025 23:16:42.364391088 CEST1.1.1.1192.168.2.50xa58No error (0)rtbbtech.com104.21.53.132A (IP address)IN (0x0001)false
          Apr 25, 2025 23:16:42.364391088 CEST1.1.1.1192.168.2.50xa58No error (0)rtbbtech.com172.67.213.29A (IP address)IN (0x0001)false
          Apr 25, 2025 23:16:42.368211985 CEST1.1.1.1192.168.2.50xba64No error (0)rtbbtech.com172.67.213.29A (IP address)IN (0x0001)false
          Apr 25, 2025 23:16:42.368211985 CEST1.1.1.1192.168.2.50xba64No error (0)rtbbtech.com104.21.53.132A (IP address)IN (0x0001)false
          • rtbbtech.com
          • c.pki.goog
          Session IDSource IPSource PortDestination IPDestination Port
          0192.168.2.549697192.178.49.19580
          TimestampBytes transferredDirectionData
          Apr 25, 2025 23:16:37.747232914 CEST200OUTGET /r/r4.crl HTTP/1.1
          Cache-Control: max-age = 3000
          Connection: Keep-Alive
          Accept: */*
          If-Modified-Since: Thu, 25 Jul 2024 14:48:00 GMT
          User-Agent: Microsoft-CryptoAPI/10.0
          Host: c.pki.goog
          Apr 25, 2025 23:16:37.895857096 CEST1242INHTTP/1.1 200 OK
          Accept-Ranges: bytes
          Content-Security-Policy-Report-Only: require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/cacerts
          Cross-Origin-Resource-Policy: cross-origin
          Cross-Origin-Opener-Policy: same-origin; report-to="cacerts"
          Report-To: {"group":"cacerts","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/cacerts"}]}
          Content-Length: 530
          X-Content-Type-Options: nosniff
          Server: sffe
          X-XSS-Protection: 0
          Date: Fri, 25 Apr 2025 21:10:42 GMT
          Expires: Fri, 25 Apr 2025 22:00:42 GMT
          Cache-Control: public, max-age=3000
          Age: 355
          Last-Modified: Thu, 03 Apr 2025 14:18:00 GMT
          Content-Type: application/pkix-crl
          Vary: Accept-Encoding
          Data Raw: 30 82 02 0e 30 82 01 93 02 01 01 30 0a 06 08 2a 86 48 ce 3d 04 03 03 30 47 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 22 30 20 06 03 55 04 0a 13 19 47 6f 6f 67 6c 65 20 54 72 75 73 74 20 53 65 72 76 69 63 65 73 20 4c 4c 43 31 14 30 12 06 03 55 04 03 13 0b 47 54 53 20 52 6f 6f 74 20 52 34 17 0d 32 35 30 34 30 33 30 38 30 30 30 30 5a 17 0d 32 36 30 32 32 38 30 37 35 39 35 39 5a 30 81 e9 30 2f 02 10 6e 47 a9 ce 4f 46 c2 3d e2 49 ea cc 38 94 53 73 17 0d 31 39 30 39 33 30 30 30 30 30 30 30 5a 30 0c 30 0a 06 03 55 1d 15 04 03 0a 01 05 30 2c 02 0d 01 f0 9c 5b 70 05 a6 dc 86 e2 f9 9e f3 17 0d 32 30 30 31 33 31 30 30 30 30 30 30 5a 30 0c 30 0a 06 03 55 1d 15 04 03 0a 01 05 30 2c 02 0d 01 fe a5 81 44 7e 3b fd 3b b8 1c 24 98 17 0d 32 33 30 36 31 33 30 30 30 30 30 30 5a 30 0c 30 0a 06 03 55 1d 15 04 03 0a 01 05 30 2c 02 0d 02 16 68 25 e1 70 04 40 61 24 91 f5 40 17 0d 32 35 30 34 30 33 30 38 30 30 30 30 5a 30 0c 30 0a 06 03 55 1d 15 04 03 0a 01 05 30 2c 02 0d 02 00 8e b2 58 e7 b5 94 0c 1f f9 00 44 17 0d 32 35 30 [TRUNCATED]
          Data Ascii: 000*H=0G10UUS1"0 UGoogle Trust Services LLC10UGTS Root R4250403080000Z260228075959Z00/nGOF=I8Ss190930000000Z00U0,[p200131000000Z00U0,D~;;$230613000000Z00U0,h%p@a$@250403080000Z00U0,XD250403080000Z00U/0-0U0U#0LtI6>j0*H=i0f1>2en:IN@g=;bQZ~`NX1?^4y[$\4{;$zDeU6O


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          0192.168.2.549702172.67.213.294435492C:\Program Files\Google\Chrome\Application\chrome.exe
          TimestampBytes transferredDirectionData
          2025-04-25 21:16:42 UTC679OUTGET /script/s2iurl.php HTTP/1.1
          Host: rtbbtech.com
          Connection: keep-alive
          Upgrade-Insecure-Requests: 1
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36
          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
          sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"
          sec-ch-ua-mobile: ?0
          sec-ch-ua-platform: "Windows"
          Sec-Fetch-Site: none
          Sec-Fetch-Mode: navigate
          Sec-Fetch-User: ?1
          Sec-Fetch-Dest: document
          Accept-Encoding: gzip, deflate, br, zstd
          Accept-Language: en-US,en;q=0.9
          2025-04-25 21:16:43 UTC238INHTTP/1.1 204 No Content
          Date: Fri, 25 Apr 2025 21:16:43 GMT
          Connection: close
          Server: cloudflare
          Access-Control-Allow-Origin: *
          Via: 1.1 google
          Cf-Cache-Status: DYNAMIC
          CF-RAY: 9360dcf07dd7cb7d-LAX
          alt-svc: h3=":443"; ma=86400


          020406080s020406080100

          Click to jump to process

          020406080s0.0050100MB

          Click to jump to process

          Target ID:0
          Start time:17:16:30
          Start date:25/04/2025
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
          Imagebase:0x7ff63d180000
          File size:3'388'000 bytes
          MD5 hash:E81F54E6C1129887AEA47E7D092680BF
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:3
          Start time:17:16:35
          Start date:25/04/2025
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1996,i,867063595383197125,4220782996507775682,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=2020 /prefetch:3
          Imagebase:0x7ff63d180000
          File size:3'388'000 bytes
          MD5 hash:E81F54E6C1129887AEA47E7D092680BF
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:7
          Start time:17:16:38
          Start date:25/04/2025
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=printing.mojom.UnsandboxedPrintBackendHost --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1996,i,867063595383197125,4220782996507775682,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=5056 /prefetch:8
          Imagebase:0x7ff63d180000
          File size:3'388'000 bytes
          MD5 hash:E81F54E6C1129887AEA47E7D092680BF
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:10
          Start time:17:16:41
          Start date:25/04/2025
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://rtbbtech.com/script/s2iurl.php"
          Imagebase:0x7ff63d180000
          File size:3'388'000 bytes
          MD5 hash:E81F54E6C1129887AEA47E7D092680BF
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true
          There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
          There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

          No disassembly