Malware Analysis Report

2024-10-16 06:30

Sample ID 240613-selszstejb
Target a62911243226fb0a9f3be230b33e8333_JaffaCakes118
SHA256 ca77c246371c45b6d28fe230a0244008103949605d8a7f134a4dfd41bfc54c30
Tags
execution
score
3/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral7

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral11

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral21

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral8

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral9

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral16

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral17

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral18

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral13

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral15

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral12

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral6

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral10

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral14

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral19

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral20

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral22

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
3/10

SHA256

ca77c246371c45b6d28fe230a0244008103949605d8a7f134a4dfd41bfc54c30

Threat Level: Likely benign

The file a62911243226fb0a9f3be230b33e8333_JaffaCakes118 was found to be: Likely benign.

Malicious Activity Summary

execution

Command and Scripting Interpreter: JavaScript

Command and Scripting Interpreter: PowerShell

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-13 15:02

Signatures

N/A

Analysis: behavioral7

Detonation Overview

Submitted

2024-06-13 15:02

Reported

2024-06-13 15:04

Platform

win7-20240419-en

Max time kernel

121s

Max time network

121s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\dom-drag.js

Signatures

Command and Scripting Interpreter: JavaScript

execution

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\dom-drag.js

Network

N/A

Files

N/A

Analysis: behavioral11

Detonation Overview

Submitted

2024-06-13 15:02

Reported

2024-06-13 15:04

Platform

win7-20240508-en

Max time kernel

122s

Max time network

123s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\jquery-ui.js

Signatures

Command and Scripting Interpreter: JavaScript

execution

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\jquery-ui.js

Network

N/A

Files

N/A

Analysis: behavioral21

Detonation Overview

Submitted

2024-06-13 15:02

Reported

2024-06-13 15:04

Platform

win7-20240221-en

Max time kernel

120s

Max time network

122s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\wp_sap_answer.js

Signatures

Command and Scripting Interpreter: JavaScript

execution

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\wp_sap_answer.js

Network

N/A

Files

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 15:02

Reported

2024-06-13 15:04

Platform

win7-20240221-en

Max time kernel

118s

Max time network

118s

Command Line

powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\settings.ps1

Signatures

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Processes

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\settings.ps1

Network

N/A

Files

memory/2220-4-0x000007FEF628E000-0x000007FEF628F000-memory.dmp

memory/2220-7-0x000007FEF5FD0000-0x000007FEF696D000-memory.dmp

memory/2220-6-0x0000000002870000-0x0000000002878000-memory.dmp

memory/2220-5-0x000000001B670000-0x000000001B952000-memory.dmp

memory/2220-9-0x000007FEF5FD0000-0x000007FEF696D000-memory.dmp

memory/2220-8-0x000007FEF5FD0000-0x000007FEF696D000-memory.dmp

memory/2220-10-0x000007FEF5FD0000-0x000007FEF696D000-memory.dmp

memory/2220-11-0x000007FEF5FD0000-0x000007FEF696D000-memory.dmp

Analysis: behavioral4

Detonation Overview

Submitted

2024-06-13 15:02

Reported

2024-06-13 15:04

Platform

win10v2004-20240508-en

Max time kernel

51s

Max time network

51s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\Chart.js

Signatures

Command and Scripting Interpreter: JavaScript

execution

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\Chart.js

Network

Files

N/A

Analysis: behavioral5

Detonation Overview

Submitted

2024-06-13 15:02

Reported

2024-06-13 15:04

Platform

win7-20240611-en

Max time kernel

120s

Max time network

121s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\colorpicker.js

Signatures

Command and Scripting Interpreter: JavaScript

execution

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\colorpicker.js

Network

N/A

Files

N/A

Analysis: behavioral8

Detonation Overview

Submitted

2024-06-13 15:02

Reported

2024-06-13 15:04

Platform

win10v2004-20240611-en

Max time kernel

95s

Max time network

103s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\dom-drag.js

Signatures

Command and Scripting Interpreter: JavaScript

execution

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\dom-drag.js

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
BE 88.221.83.208:443 www.bing.com tcp
US 8.8.8.8:53 71.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 74.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 208.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 138.83.221.88.in-addr.arpa udp
IE 52.111.236.22:443 tcp
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp

Files

N/A

Analysis: behavioral9

Detonation Overview

Submitted

2024-06-13 15:02

Reported

2024-06-13 15:04

Platform

win7-20240508-en

Max time kernel

118s

Max time network

119s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\gradX.js

Signatures

Command and Scripting Interpreter: JavaScript

execution

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\gradX.js

Network

N/A

Files

N/A

Analysis: behavioral16

Detonation Overview

Submitted

2024-06-13 15:02

Reported

2024-06-13 15:04

Platform

win10v2004-20240508-en

Max time kernel

147s

Max time network

150s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\jquery.visible.min.js

Signatures

Command and Scripting Interpreter: JavaScript

execution

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\jquery.visible.min.js

Network

Files

N/A

Analysis: behavioral17

Detonation Overview

Submitted

2024-06-13 15:02

Reported

2024-06-13 15:04

Platform

win7-20240221-en

Max time kernel

120s

Max time network

122s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\wp_sap.js

Signatures

Command and Scripting Interpreter: JavaScript

execution

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\wp_sap.js

Network

N/A

Files

N/A

Analysis: behavioral18

Detonation Overview

Submitted

2024-06-13 15:02

Reported

2024-06-13 15:04

Platform

win10v2004-20240508-en

Max time kernel

51s

Max time network

51s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\wp_sap.js

Signatures

Command and Scripting Interpreter: JavaScript

execution

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\wp_sap.js

Network

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 15:02

Reported

2024-06-13 15:04

Platform

win10v2004-20240508-en

Max time kernel

51s

Max time network

51s

Command Line

powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\settings.ps1

Signatures

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Processes

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\settings.ps1

Network

Files

memory/712-0-0x00007FFF7CB13000-0x00007FFF7CB15000-memory.dmp

memory/712-1-0x00000187A0810000-0x00000187A0832000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_sojjpz25.gjr.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/712-11-0x00007FFF7CB10000-0x00007FFF7D5D1000-memory.dmp

memory/712-12-0x00007FFF7CB10000-0x00007FFF7D5D1000-memory.dmp

memory/712-15-0x00007FFF7CB10000-0x00007FFF7D5D1000-memory.dmp

memory/712-16-0x00007FFF7CB10000-0x00007FFF7D5D1000-memory.dmp

Analysis: behavioral13

Detonation Overview

Submitted

2024-06-13 15:02

Reported

2024-06-13 15:04

Platform

win7-20240611-en

Max time kernel

117s

Max time network

119s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\jquery.timepicker.js

Signatures

Command and Scripting Interpreter: JavaScript

execution

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\jquery.timepicker.js

Network

N/A

Files

N/A

Analysis: behavioral15

Detonation Overview

Submitted

2024-06-13 15:02

Reported

2024-06-13 15:05

Platform

win7-20240611-en

Max time kernel

119s

Max time network

123s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\jquery.visible.min.js

Signatures

Command and Scripting Interpreter: JavaScript

execution

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\jquery.visible.min.js

Network

N/A

Files

N/A

Analysis: behavioral12

Detonation Overview

Submitted

2024-06-13 15:02

Reported

2024-06-13 15:04

Platform

win10v2004-20240508-en

Max time kernel

51s

Max time network

51s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\jquery-ui.js

Signatures

Command and Scripting Interpreter: JavaScript

execution

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\jquery-ui.js

Network

Files

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-13 15:02

Reported

2024-06-13 15:05

Platform

win7-20240611-en

Max time kernel

121s

Max time network

125s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\Chart.js

Signatures

Command and Scripting Interpreter: JavaScript

execution

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\Chart.js

Network

N/A

Files

N/A

Analysis: behavioral6

Detonation Overview

Submitted

2024-06-13 15:02

Reported

2024-06-13 15:04

Platform

win10v2004-20240611-en

Max time kernel

91s

Max time network

93s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\colorpicker.js

Signatures

Command and Scripting Interpreter: JavaScript

execution

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\colorpicker.js

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
BE 2.17.107.115:443 www.bing.com tcp
US 8.8.8.8:53 2.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 129.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 115.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 21.121.18.2.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp

Files

N/A

Analysis: behavioral10

Detonation Overview

Submitted

2024-06-13 15:02

Reported

2024-06-13 15:04

Platform

win10v2004-20240611-en

Max time kernel

93s

Max time network

94s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\gradX.js

Signatures

Command and Scripting Interpreter: JavaScript

execution

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\gradX.js

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 13.107.21.237:443 g.bing.com tcp
US 8.8.8.8:53 140.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 237.21.107.13.in-addr.arpa udp
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
BE 2.17.107.115:443 www.bing.com tcp
US 8.8.8.8:53 115.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 216.143.123.92.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp

Files

N/A

Analysis: behavioral14

Detonation Overview

Submitted

2024-06-13 15:02

Reported

2024-06-13 15:04

Platform

win10v2004-20240611-en

Max time kernel

150s

Max time network

151s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\jquery.timepicker.js

Signatures

Command and Scripting Interpreter: JavaScript

execution

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\jquery.timepicker.js

Network

Country Destination Domain Proto
BE 88.221.83.235:443 www.bing.com tcp
US 8.8.8.8:53 145.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 140.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 235.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 31.121.18.2.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 udp

Files

N/A

Analysis: behavioral19

Detonation Overview

Submitted

2024-06-13 15:02

Reported

2024-06-13 15:04

Platform

win7-20240508-en

Max time kernel

117s

Max time network

117s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\wp_sap_admin.js

Signatures

Command and Scripting Interpreter: JavaScript

execution

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\wp_sap_admin.js

Network

N/A

Files

N/A

Analysis: behavioral20

Detonation Overview

Submitted

2024-06-13 15:02

Reported

2024-06-13 15:04

Platform

win10v2004-20240611-en

Max time kernel

91s

Max time network

94s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\wp_sap_admin.js

Signatures

Command and Scripting Interpreter: JavaScript

execution

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\wp_sap_admin.js

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
BE 2.17.107.130:443 www.bing.com tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 6.181.190.20.in-addr.arpa udp
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
US 8.8.8.8:53 130.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 114.83.221.88.in-addr.arpa udp

Files

N/A

Analysis: behavioral22

Detonation Overview

Submitted

2024-06-13 15:02

Reported

2024-06-13 15:05

Platform

win10v2004-20240226-en

Max time kernel

143s

Max time network

151s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\wp_sap_answer.js

Signatures

Command and Scripting Interpreter: JavaScript

execution

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\wp-survey-and-poll\templates\assets\js\wp_sap_answer.js

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1428 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 19.177.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 13.107.246.64:443 tcp
US 8.8.8.8:53 100.58.20.217.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 210.143.182.52.in-addr.arpa udp

Files

N/A