Analysis Report http://script.crazyegg.com
Overview
General Information
Detection
Score: | 0 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
No yara matches |
---|
Sigma Overview |
---|
No Sigma rule has matched |
---|
Signature Overview |
---|
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | File opened: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | Process Injection1 | Masquerading1 | OS Credential Dumping | File and Directory Discovery1 | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Non-Application Layer Protocol1 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Process Injection1 | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Application Layer Protocol1 | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe |
No Antivirus matches |
---|
No Antivirus matches |
---|
No Antivirus matches |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
www.crazyegg.com | 52.21.17.103 | true | false | high | |
script.crazyegg.com | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
No contacted IP infos |
---|
General Information |
---|
Joe Sandbox Version: | 31.0.0 Red Diamond |
Analysis ID: | 337211 |
Start date: | 08.01.2021 |
Start time: | 01:22:06 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 2m 49s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | http://script.crazyegg.com |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 15 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean0.win@3/15@3/0 |
Cookbook Comments: |
|
Warnings: | Show All
|
No simulations |
---|
No context |
---|
No context |
---|
No context |
---|
No context |
---|
No context |
---|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 30296 |
Entropy (8bit): | 1.8499716642978639 |
Encrypted: | false |
SSDEEP: | 192:r9IZzJZKE2KR9WP+thifYfhzM3ZBnTD/GsfXFfMjX:rOjKcU2+Nbf9K |
MD5: | 0D3BB5665A36E7788CA25E28E7911FE6 |
SHA1: | 743F876B82DE9F485CB986465C1E6E16F4240F2A |
SHA-256: | C1063C90DC48BD8AF0958E5701DC179D191123E84AAD7D9EAA3929BC3C3B7FC8 |
SHA-512: | 4374912C8E178ACBF4D617F234AE6BBD8E7BED06E7681101C0BBED3555021B2E7BE5B050F403B03FF4E77AAA687B46AAC8FBCA2643436B286D5CDA6B82403264 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 24164 |
Entropy (8bit): | 1.6283528067758901 |
Encrypted: | false |
SSDEEP: | 48:IwD7GcprqGwpaqhG4pQ8TGrapbSdrGQpBRoGHHpcQsTGUp84GzYpmrfYGopSl9jW:rVZyQqz683BSdFjRn2QkWcMjY4Jg |
MD5: | 7A5FCE6654BE83C122292B3B1A3EFB7C |
SHA1: | A8B51DD68BEDE648B79FD4805419CED1FA529627 |
SHA-256: | CF1211D50A9E449514D072265F79A3760B8E7383CAB8BD3673A2A84F824FF54D |
SHA-512: | AA7494A4FDEAE26D5B8BAFAE36A21318ECB87EFE11C8879D0547EE743DE2B1B7918BEBD3F86D80E1CBDC55CD1F0996DDA366C23B2BBE4D9AF17D2084871BF9A8 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 16984 |
Entropy (8bit): | 1.5645958456832894 |
Encrypted: | false |
SSDEEP: | 48:IwlGcprZ6GwpafhG4pQNTGrapbS1rGQpK4G7HpRWsTGIpG:r7ZZiQfz6N3BS1FADTW4A |
MD5: | 445201520A6A98BD16ED37B44D4FB78F |
SHA1: | 2B5A606E03BD0AA67A319D1E2A2D57E815FD2D72 |
SHA-256: | F66A6FABB670C4555DE371A35C05B905A2392AEF6428A9D6F11561330BA32BDF |
SHA-512: | 2CB31D53C9CB29A2BBC7238FD51F7E2F1D5F69EF1CA448080A1B79D44AA475A3EDCC75B7A8369EFB464FA007FFF7CA110D255F03969F545F2B8E67FDA5EB86AF |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 656 |
Entropy (8bit): | 5.110542098747094 |
Encrypted: | false |
SSDEEP: | 12:TMHdNMNxOER1b11nWimI002EtM3MHdNMNxOER1b11nWimI00OYGVbkEtMb:2d6NxOgRbSZHKd6NxOgRbSZ7YLb |
MD5: | C00AAC3BF47E0C00024AB6EEE381ECD0 |
SHA1: | 5A347D5107707E5A7179205CCC2C3FE57844826C |
SHA-256: | 5B258310DF0A7679432F95D45DF64CC8E684E90653E630A9B5B85F31AD26F6E5 |
SHA-512: | 87833AE2CC31D1D0370A8EEB28F5AA2186124CB8AB31BFC60C3A55E895DED57563C5985FAAB1140E2E9D5742BE2BDCFB6EDB6874FA838EBCE7FFFBBC0351E0D0 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 653 |
Entropy (8bit): | 5.092140075953097 |
Encrypted: | false |
SSDEEP: | 12:TMHdNMNxe2kqY1nWimI002EtM3MHdNMNxe2kqY1nWimI00OYGkak6EtMb:2d6NxroSZHKd6NxroSZ7Yza7b |
MD5: | 6F8A22D7345EDBE1A885AD3F0EDFA08D |
SHA1: | 503A721D173757F9C95C3B316E79B3FA5A977F8D |
SHA-256: | 391673B9B0ED609E0549BD89AC1A74131632AF48CE228DD1CA198E788AE6B2F7 |
SHA-512: | 43C8B0D4A77896420D27B491EF3E094A08B9272D4B324FA5A51F1C9B4C4788CE7CDB4E3E01B2DCEAB293271E3BCD8BAA58AA4F04C2744B31485E9980E1E92729 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 662 |
Entropy (8bit): | 5.129364517198806 |
Encrypted: | false |
SSDEEP: | 12:TMHdNMNxvLR1b11nWimI002EtM3MHdNMNxvLR1b11nWimI00OYGmZEtMb:2d6NxvdRbSZHKd6NxvdRbSZ7Yjb |
MD5: | 54B841C2C0AD9FFF723DD4BE7C553473 |
SHA1: | 37EF5AADB602851C5ED5ED69F90CD52D6BDF1488 |
SHA-256: | 9EDEA53A45D4E0307C5A846066A82829C0D8C7B1C9052855C39040EA372133E3 |
SHA-512: | C4B590508BB7C74A3C1383A455713B2E9113A6FFD2DCF9A7CB962DC05589B6ECBBBB606B78B70E8779F5A87B69AE8992391E2C3CDD6FBEE80373565A72ED20AC |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 647 |
Entropy (8bit): | 5.109924034777717 |
Encrypted: | false |
SSDEEP: | 12:TMHdNMNxi6SIS1nWimI002EtM3MHdNMNxi6SIS1nWimI00OYGd5EtMb:2d6NxXrISZHKd6NxXrISZ7YEjb |
MD5: | 3A3C3082873F51F874308E52A47BF154 |
SHA1: | EE88ADE79FCABDF57C015C826827A86AD8CD7535 |
SHA-256: | F20FD19C730AE742AFF2A1A5E3DB7480E69C34D6F344C40A5546C32C8E872BFE |
SHA-512: | FBB91A929BF6330E58367B4A491837CBD93A505EF566FACBC7B23443341F3A17AE590BF1E10E5F654548D6070D21B7127680DC7B52B9ECA2C4E9ABDB9C43305D |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 656 |
Entropy (8bit): | 5.141181565096405 |
Encrypted: | false |
SSDEEP: | 12:TMHdNMNxhGwR1b11nWimI002EtM3MHdNMNxhGwR1b11nWimI00OYG8K075EtMb:2d6NxQkRbSZHKd6NxQkRbSZ7YrKajb |
MD5: | 4AA29B423E62A973A0EB55D73393F38A |
SHA1: | 1A3362DBFE233185C6E27B96AE2A99B6564EDBB2 |
SHA-256: | 9D719C53B09F239BD2F179CA63EC150C9B8A2121813E8209DFECFA0494CEF362 |
SHA-512: | 643FDF91BEEDFEA914ECBDE966AEC79F9E8983E4EED4511948E26DA6C659543EEB63062F2DECC6B512E88D24BD4FE9EDC9C73E52B4303EEF9F5F4D71C990575E |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 653 |
Entropy (8bit): | 5.098219346803089 |
Encrypted: | false |
SSDEEP: | 12:TMHdNMNx0n6SIS1nWimI002EtM3MHdNMNx0n6SIS1nWimI00OYGxEtMb:2d6Nx06rISZHKd6Nx06rISZ7Ygb |
MD5: | FBA6E2557424B89EF5E80AA812A1E959 |
SHA1: | BE11D8BC0C054B5F19F1B52BB2695E01195DD2CF |
SHA-256: | 1F5DC36828BFD9AD2701D5E58D4C2DD03841A0770C087AECDCC332F22B820AC8 |
SHA-512: | A7B2DC740B58D181E9D879812AAFC2324FAE0FF8F8D5EE2A423E73B38CDE269D46D13B777EF7A29FE94965F44ED005D46D9B137923F4C65D0DDEC9395DE2C1E3 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 656 |
Entropy (8bit): | 5.134089984899133 |
Encrypted: | false |
SSDEEP: | 12:TMHdNMNxx6SIS1nWimI002EtM3MHdNMNxx6SIS1nWimI00OYG6Kq5EtMb:2d6NxwrISZHKd6NxwrISZ7Yhb |
MD5: | C5BB486CCBC9FAFAB13AB1AECBD447CC |
SHA1: | 1BD77197493240B6040EB4C1E831470002B361BC |
SHA-256: | BE93039922E998C8FA6EB1345D3DE328D931B2A59DDF8E0A2B0722AED6D235B9 |
SHA-512: | 5808A02A0E85EB6AA6C2E6B8035EBBAF89EEF3453B8C6E598E907273C76FA75A1EBF9F5C1909BE71FD9B0366A0AD438D72C1E95BF6974F559C3CA5BA1884CE53 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 659 |
Entropy (8bit): | 5.1141996100781615 |
Encrypted: | false |
SSDEEP: | 12:TMHdNMNxcM+1K+11nWimI002EtM3MHdNMNxcM+1K+11nWimI00OYGVEtMb:2d6NxeSZHKd6NxeSZ7Ykb |
MD5: | 55AF5098C3395E9A7A355F6DA6B408D6 |
SHA1: | 870E866CF32FE72671B587D57B09DA5AAF88A7DF |
SHA-256: | 99F3B4D0E3A78013DF8D32953C2B6B26C535119C3FADE1B073CA404C8B7F5BF2 |
SHA-512: | 88F85F08639CEA57CE12A558A6606B986C8E8B444DF1F38571CB0968C99A3302170625B89D4B5329EE987EEAFBF07D31780CCF24EF526E5D6503B12098AACE5D |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 653 |
Entropy (8bit): | 5.095262363004954 |
Encrypted: | false |
SSDEEP: | 12:TMHdNMNxfn6SIS1nWimI002EtM3MHdNMNxfn6SIS1nWimI00OYGe5EtMb:2d6NxyrISZHKd6NxyrISZ7YLjb |
MD5: | 5B83702DCF2589B989F05512E1560FF6 |
SHA1: | C4B2DA04F4F2151677DA2636C329FB061B1000CF |
SHA-256: | 69FF1CCA1CEDF8799AAB81D0363610A7ABB7AA8FC8EA4675B902BDA3BFC00159 |
SHA-512: | A8F414B03DA8DC72DEBD874C45C397002B229D98EA51478E6E39A28828A702F971A3EA0491A4BC585C5B55AA05AD5EB58DBD932B6844050BBEE7E26771163009 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 25441 |
Entropy (8bit): | 0.27918767598683664 |
Encrypted: | false |
SSDEEP: | 24:c9lLh9lLh9lIn9lIn9lRx/9lRJ9lTb9lTb9lSSU9lSSU9laAa/9laA:kBqoxxJhHWSVSEab |
MD5: | AB889A32AB9ACD33E816C2422337C69A |
SHA1: | 1190C6B34DED2D295827C2A88310D10A8B90B59B |
SHA-256: | 4D6EC54B8D244E63B0F04FBE2B97402A3DF722560AD12F218665BA440F4CEFDA |
SHA-512: | BD250855747BB4CEC61814D0E44F810156D390E3E9F120A12935EFDF80ACA33C4777AD66257CCA4E4003FEF0741692894980B9298F01C4CDD2D8A9C7BB522FB6 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 34357 |
Entropy (8bit): | 0.34974903966087534 |
Encrypted: | false |
SSDEEP: | 24:c9lLh9lLh9lIn9lIn9lRg9lRA9lTS9lTy9lSSd9lSSd9lwx9lwR9l2P9l2P9l/rp:kBqoxKAuvScS+iEOnrIrsl9jl |
MD5: | 5568C58209CC65C2DC12603B842B109C |
SHA1: | 862F0D28128F30B57D0425D0493E0620D59ECCE8 |
SHA-256: | 78C23C3802DBBC867EC5BC74286A1E607509597727CBB5C6196669AB9CF3F889 |
SHA-512: | 79F2975C24AC5FDAC59E8AED403AD35A702D096C4D0D39F06240568296DB07116A972C3AF8494B052BC410DAF482492CEA2F8B9C5150B8BA3D80BCA3431F182E |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 13029 |
Entropy (8bit): | 0.47414462713581684 |
Encrypted: | false |
SSDEEP: | 12:c9lCg5/9lCgeK9l26an9l26an9l8fR3gJF9l8fR3gL9lTq3gDPJZR+v:c9lLh9lLh9lIn9lIn9loO9lo+9lWkBZw |
MD5: | 5E246FF9BE7E1D6A690EF3AD0FC11CEF |
SHA1: | 81E5404265D27DE7F465E1D0861146369B867510 |
SHA-256: | 569FFF9FEC24F934257C0ED4AC277EB46D31E36976A77F9BC3CDFDE7743DD30C |
SHA-512: | 2CA38724C459D20660E17A2B2D7A9BEA68F580DE1808F49F116A211BC5EA0D09DAF652E1006D70D2B50818A94FDCD2BBB84A7DCB7AB0009C15AF64385A1CDB6C |
Malicious: | false |
Reputation: | low |
Preview: |
|
Static File Info |
---|
No static file info |
---|
Network Behavior |
---|
Snort IDS Alerts |
---|
Timestamp | Protocol | SID | Message | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|---|---|---|
01/08/21-01:22:55.794400 | TCP | 1201 | ATTACK-RESPONSES 403 Forbidden | 80 | 49740 | 104.19.148.8 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 8, 2021 01:22:50.290875912 CET | 51726 | 53 | 192.168.2.4 | 8.8.8.8 |
Jan 8, 2021 01:22:50.338745117 CET | 53 | 51726 | 8.8.8.8 | 192.168.2.4 |
Jan 8, 2021 01:22:54.505228996 CET | 56794 | 53 | 192.168.2.4 | 8.8.8.8 |
Jan 8, 2021 01:22:54.563107014 CET | 53 | 56794 | 8.8.8.8 | 192.168.2.4 |
Jan 8, 2021 01:22:55.535586119 CET | 56534 | 53 | 192.168.2.4 | 8.8.8.8 |
Jan 8, 2021 01:22:55.591941118 CET | 53 | 56534 | 8.8.8.8 | 192.168.2.4 |
Jan 8, 2021 01:23:11.875089884 CET | 56627 | 53 | 192.168.2.4 | 8.8.8.8 |
Jan 8, 2021 01:23:11.934384108 CET | 53 | 56627 | 8.8.8.8 | 192.168.2.4 |
Jan 8, 2021 01:23:12.281426907 CET | 56621 | 53 | 192.168.2.4 | 8.8.8.8 |
Jan 8, 2021 01:23:12.343488932 CET | 53 | 56621 | 8.8.8.8 | 192.168.2.4 |
Jan 8, 2021 01:23:13.630331993 CET | 63116 | 53 | 192.168.2.4 | 8.8.8.8 |
Jan 8, 2021 01:23:13.678284883 CET | 53 | 63116 | 8.8.8.8 | 192.168.2.4 |
Jan 8, 2021 01:23:14.122678995 CET | 64078 | 53 | 192.168.2.4 | 8.8.8.8 |
Jan 8, 2021 01:23:14.173543930 CET | 53 | 64078 | 8.8.8.8 | 192.168.2.4 |
Jan 8, 2021 01:23:14.423505068 CET | 64801 | 53 | 192.168.2.4 | 8.8.8.8 |
Jan 8, 2021 01:23:14.471534014 CET | 53 | 64801 | 8.8.8.8 | 192.168.2.4 |
Jan 8, 2021 01:23:18.291027069 CET | 61721 | 53 | 192.168.2.4 | 8.8.8.8 |
Jan 8, 2021 01:23:18.348846912 CET | 53 | 61721 | 8.8.8.8 | 192.168.2.4 |
Jan 8, 2021 01:23:24.496419907 CET | 51255 | 53 | 192.168.2.4 | 8.8.8.8 |
Jan 8, 2021 01:23:24.555593014 CET | 53 | 51255 | 8.8.8.8 | 192.168.2.4 |
Jan 8, 2021 01:23:25.218533993 CET | 61522 | 53 | 192.168.2.4 | 8.8.8.8 |
Jan 8, 2021 01:23:25.277911901 CET | 53 | 61522 | 8.8.8.8 | 192.168.2.4 |
Jan 8, 2021 01:23:25.505855083 CET | 51255 | 53 | 192.168.2.4 | 8.8.8.8 |
Jan 8, 2021 01:23:25.556718111 CET | 53 | 51255 | 8.8.8.8 | 192.168.2.4 |
Jan 8, 2021 01:23:26.223793983 CET | 61522 | 53 | 192.168.2.4 | 8.8.8.8 |
Jan 8, 2021 01:23:26.274715900 CET | 53 | 61522 | 8.8.8.8 | 192.168.2.4 |
Jan 8, 2021 01:23:26.505058050 CET | 51255 | 53 | 192.168.2.4 | 8.8.8.8 |
Jan 8, 2021 01:23:26.555891991 CET | 53 | 51255 | 8.8.8.8 | 192.168.2.4 |
Jan 8, 2021 01:23:27.240084887 CET | 61522 | 53 | 192.168.2.4 | 8.8.8.8 |
Jan 8, 2021 01:23:27.299278975 CET | 53 | 61522 | 8.8.8.8 | 192.168.2.4 |
Jan 8, 2021 01:23:28.570458889 CET | 51255 | 53 | 192.168.2.4 | 8.8.8.8 |
Jan 8, 2021 01:23:28.621526003 CET | 53 | 51255 | 8.8.8.8 | 192.168.2.4 |
Jan 8, 2021 01:23:29.255295992 CET | 61522 | 53 | 192.168.2.4 | 8.8.8.8 |
Jan 8, 2021 01:23:29.306226969 CET | 53 | 61522 | 8.8.8.8 | 192.168.2.4 |
Jan 8, 2021 01:23:32.583476067 CET | 51255 | 53 | 192.168.2.4 | 8.8.8.8 |
Jan 8, 2021 01:23:32.634497881 CET | 53 | 51255 | 8.8.8.8 | 192.168.2.4 |
Jan 8, 2021 01:23:33.380146980 CET | 61522 | 53 | 192.168.2.4 | 8.8.8.8 |
Jan 8, 2021 01:23:33.439815044 CET | 53 | 61522 | 8.8.8.8 | 192.168.2.4 |
Jan 8, 2021 01:23:35.952550888 CET | 52337 | 53 | 192.168.2.4 | 8.8.8.8 |
Jan 8, 2021 01:23:36.054187059 CET | 53 | 52337 | 8.8.8.8 | 192.168.2.4 |
Jan 8, 2021 01:23:36.538216114 CET | 55046 | 53 | 192.168.2.4 | 8.8.8.8 |
Jan 8, 2021 01:23:36.610626936 CET | 53 | 55046 | 8.8.8.8 | 192.168.2.4 |
Jan 8, 2021 01:23:36.928410053 CET | 49612 | 53 | 192.168.2.4 | 8.8.8.8 |
Jan 8, 2021 01:23:36.994760036 CET | 53 | 49612 | 8.8.8.8 | 192.168.2.4 |
Jan 8, 2021 01:23:37.164438009 CET | 49285 | 53 | 192.168.2.4 | 8.8.8.8 |
Jan 8, 2021 01:23:37.220938921 CET | 53 | 49285 | 8.8.8.8 | 192.168.2.4 |
Jan 8, 2021 01:23:37.619175911 CET | 50601 | 53 | 192.168.2.4 | 8.8.8.8 |
Jan 8, 2021 01:23:37.678275108 CET | 53 | 50601 | 8.8.8.8 | 192.168.2.4 |
Jan 8, 2021 01:23:38.094476938 CET | 60875 | 53 | 192.168.2.4 | 8.8.8.8 |
Jan 8, 2021 01:23:38.180318117 CET | 53 | 60875 | 8.8.8.8 | 192.168.2.4 |
Jan 8, 2021 01:23:38.691366911 CET | 56448 | 53 | 192.168.2.4 | 8.8.8.8 |
Jan 8, 2021 01:23:38.747718096 CET | 53 | 56448 | 8.8.8.8 | 192.168.2.4 |
Jan 8, 2021 01:23:39.299813032 CET | 59172 | 53 | 192.168.2.4 | 8.8.8.8 |
Jan 8, 2021 01:23:39.357932091 CET | 62420 | 53 | 192.168.2.4 | 8.8.8.8 |
Jan 8, 2021 01:23:39.359064102 CET | 53 | 59172 | 8.8.8.8 | 192.168.2.4 |
Jan 8, 2021 01:23:39.415534019 CET | 53 | 62420 | 8.8.8.8 | 192.168.2.4 |
Jan 8, 2021 01:23:39.916718960 CET | 60579 | 53 | 192.168.2.4 | 8.8.8.8 |
Jan 8, 2021 01:23:39.972862959 CET | 53 | 60579 | 8.8.8.8 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class |
---|---|---|---|---|---|---|---|
Jan 8, 2021 01:22:55.535586119 CET | 192.168.2.4 | 8.8.8.8 | 0xeb9a | Standard query (0) | A (IP address) | IN (0x0001) | |
Jan 8, 2021 01:23:11.875089884 CET | 192.168.2.4 | 8.8.8.8 | 0x1717 | Standard query (0) | A (IP address) | IN (0x0001) | |
Jan 8, 2021 01:23:12.281426907 CET | 192.168.2.4 | 8.8.8.8 | 0x5651 | Standard query (0) | A (IP address) | IN (0x0001) |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class |
---|---|---|---|---|---|---|---|---|---|
Jan 8, 2021 01:22:55.591941118 CET | 8.8.8.8 | 192.168.2.4 | 0xeb9a | No error (0) | script.crazyegg.com.cdn.cloudflare.net | CNAME (Canonical name) | IN (0x0001) | ||
Jan 8, 2021 01:23:11.934384108 CET | 8.8.8.8 | 192.168.2.4 | 0x1717 | No error (0) | script.crazyegg.com.cdn.cloudflare.net | CNAME (Canonical name) | IN (0x0001) | ||
Jan 8, 2021 01:23:12.343488932 CET | 8.8.8.8 | 192.168.2.4 | 0x5651 | No error (0) | 52.21.17.103 | A (IP address) | IN (0x0001) | ||
Jan 8, 2021 01:23:12.343488932 CET | 8.8.8.8 | 192.168.2.4 | 0x5651 | No error (0) | 52.72.111.31 | A (IP address) | IN (0x0001) |
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
Behavior |
---|
Click to jump to process
System Behavior |
---|
Start time: | 01:22:53 |
Start date: | 08/01/2021 |
Path: | C:\Program Files\internet explorer\iexplore.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d2f30000 |
File size: | 823560 bytes |
MD5 hash: | 6465CB92B25A7BC1DF8E01D8AC5E7596 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
Network Activities
Object Security Activities
LPC Port Activities
Start time: | 01:22:54 |
Start date: | 08/01/2021 |
Path: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x160000 |
File size: | 822536 bytes |
MD5 hash: | 071277CC2E3DF41EEEA8013E2AB58D5A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
Network Activities
Object Security Activities
LPC Port Activities
Disassembly |
---|