Windows
Analysis Report
https://app.getresponse.com/click.html?x=a62b&lc=S1yUj1&mc=Ju&s=BtBp5yX&u=tPdUS&z=EFZsBPz&#Yi5raGFuQGVjdS5lZHUuYXU=
Overview
General Information
Detection
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
chrome.exe (PID: 1792 cmdline:
C:\Program Files\Goo gle\Chrome \Applicati on\chrome. exe" --sta rt-maximiz ed "about: blank MD5: 8D1C4713ACB7CC2AAAEE4477C58A80BA) chrome.exe (PID: 6028 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-G B --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =1916 --fi eld-trial- handle=185 6,i,620156 9344014229 303,174510 4721072747 3039,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 8D1C4713ACB7CC2AAAEE4477C58A80BA)
chrome.exe (PID: 5284 cmdline:
C:\Program Files\Goo gle\Chrome \Applicati on\chrome. exe" "http s://app.ge tresponse. com/click. html?x=a62 b&lc=S1yUj 1&mc=Ju&s= BtBp5yX&u= tPdUS&z=EF ZsBPz&#Yi5 raGFuQGVjd S5lZHUuYXU = MD5: 8D1C4713ACB7CC2AAAEE4477C58A80BA)
- cleanup
- • AV Detection
- • Compliance
- • Networking
- • System Summary
- • Boot Survival
Click to jump to signature section
AV Detection |
---|
Source: | SlashNext: |
Source: | Directory created: | Jump to behavior |
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: |
Source: | Classification label: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Window detected: |
Source: | Directory created: | Jump to behavior |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 3 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | 1 Encrypted Channel | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | 4 Non-Application Layer Protocol | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | 5 Application Layer Protocol | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | 3 Ingress Tool Transfer | SIM Card Swap | Carrier Billing Fraud |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
100% | SlashNext | Credential Stealing type: Phishing & Social Engineering |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
accounts.google.com | 142.251.2.84 | true | false | high | |
www.google.com | 142.251.2.147 | true | false | high | |
app.getresponse.com | 104.160.64.9 | true | false | high | |
clients.l.google.com | 142.251.2.139 | true | false | high | |
clients2.google.com | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.251.2.147 | www.google.com | United States | 15169 | GOOGLEUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.251.2.139 | clients.l.google.com | United States | 15169 | GOOGLEUS | false | |
104.160.64.9 | app.getresponse.com | United States | 46469 | GETRESPONSE-IMPLIXUS | false | |
142.251.2.84 | accounts.google.com | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.1 |
Joe Sandbox Version: | 38.0.0 Beryl |
Analysis ID: | 1305960 |
Start date and time: | 2023-09-08 09:13:11 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 4m 48s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | https://app.getresponse.com/click.html?x=a62b&lc=S1yUj1&mc=Ju&s=BtBp5yX&u=tPdUS&z=EFZsBPz&#Yi5raGFuQGVjdS5lZHUuYXU= |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 19 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal48.win@23/7@8/6 |
EGA Information: | Failed |
HCA Information: |
|
- Exclude process from analysis
(whitelisted): dllhost.exe, Ba ckgroundTransferHost.exe, back groundTaskHost.exe, SgrmBroker .exe, svchost.exe - Excluded IPs from analysis (wh
itelisted): 23.206.188.204, 23 .206.188.212, 23.36.117.247, 1 42.251.2.94, 34.104.35.123, 14 2.250.101.94 - Excluded domains from analysis
(whitelisted): geover.prod.do .dsp.mp.microsoft.com, fs.micr osoft.com, geo.prod.do.dsp.mp. microsoft.com, tse1.mm.bing.ne t, store-images.s-microsoft.co m-c.edgekey.net, clientservice s.googleapis.com, a1449.dscg2. akamai.net, arc.msn.com, ris.a pi.iris.microsoft.com, kv601.p rod.do.dsp.mp.microsoft.com, e 12564.dspb.akamaiedge.net, edg edl.me.gvt1.com, store-images. s-microsoft.com, update.google apis.com, img-prod-cms-rt-micr osoft-com.akamaized.net - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtSetInformationFile c alls found. - VT rate limit hit for: https:
//app.getresponse.com/click.ht ml?x=a62b&lc=S1yUj1&mc =Ju&s=BtBp5yX&u=tPdUS& amp;z=EFZsBPz&#Yi5raGFuQGV jdS5lZHUuYXU=
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2675 |
Entropy (8bit): | 4.01641303245589 |
Encrypted: | false |
SSDEEP: | 48:8Jicd+yRmHvidAKZdA1o9ehwiZUklqeh4BA3:8JiGRTP |
MD5: | 23E0A11A275C7DC49649CDA31A883615 |
SHA1: | 321AFEEB34ACD38CA3B0DD908DC7D73F81507147 |
SHA-256: | B1FAEF674F17B4BA66EAF22655A3FE14443B24BDBE6A5E8D3E7D13D3F3340679 |
SHA-512: | 873DF0D9A7D25F116A4D489DE9B22541CB6FD17BE7B2E8C4F9C7633B1557B17432BD11D68284F3EE5469D633DBB33D556FE65E4C60042BA17451E4CFF1F5AF9F |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 4.034174402761696 |
Encrypted: | false |
SSDEEP: | 48:8Jicd+yRmHvidAKZdA1t9eh/iZUkAQkqehfBA2:8JiGRX9QS |
MD5: | 390829C58BFECA4B07167E6CB8280092 |
SHA1: | E02602C47568C4C06B7BFB82E7F212B92A8C5C86 |
SHA-256: | FCB697B6CFCE70A9D388DA046B12AA9984FD1209C78B6956866BCD8D1A9571A4 |
SHA-512: | 49154C94EC69AF463BE5AF074491CDB6CB9293C280B890F92A6B37CF285D7C4402601FC68F4CF3790A2CD9674B6C3B6352955BE43F9A123BA632FD5CAAB1B3A4 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2691 |
Entropy (8bit): | 4.046314995946268 |
Encrypted: | false |
SSDEEP: | 48:8Jicd+yRmHvidAKZdA14J9eh7sFiZUkmgqeh7s5BABX:8JiGRBnj |
MD5: | A6E6FA54CF7D6D56E8C44A256AE5FD6A |
SHA1: | BBC6E7E7026C03D95C37DA7EDC3B949CEA80F783 |
SHA-256: | 43CE6E9309D6CFFBA2EFFC3F5258D19C7C6ABB66C9F01D278273D60F2AFE90AE |
SHA-512: | 0599CFB3C82D55D53D43CA04BDCB5C54E4E2F39F0628D3B7836A9194F613D4063BF46F9A292E47B47EA6765F7C07AFFF7E271587E2BAFC0A9FE66CB9AC8F8409 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 4.03170943545513 |
Encrypted: | false |
SSDEEP: | 48:8Jicd+yRmHvidAKZdA1u9ehDiZUkwqeh7BAR:8JiGRCx |
MD5: | 2503B718D701316589666AE39F0070EF |
SHA1: | 47DF3E9813C85CC1E6FB23418407C48696D0921F |
SHA-256: | 9398932DB5F480B69E40D3F23E6724E1DD13C14B3985F30C54DE9FAB18C7B513 |
SHA-512: | 1C536683A33A1119D1F0570E8DBF2FBCBAC23298D782D17054C29085CE43CA1972AFF076F95053B4F0A23101EB67F0163ED0D71B96A83B215F1B235DEFE5DB0C |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 4.0199469193616375 |
Encrypted: | false |
SSDEEP: | 48:8Jicd+yRmHvidAKZdA1c9ehBiZUk1W1qehtBAC:8JiGRS9N |
MD5: | 6753BF44F3FBFD8A39827B63FDA2D7F4 |
SHA1: | C26F829B6B4D4C370AD28A67562F7EC44AF0145C |
SHA-256: | 6D338093FD51ED8289442EB29F3EB36FB572FD28FE4CFCF012BD8B1246F0B9A3 |
SHA-512: | 58CF71C4FFDFC617F5BD9D322806CAB3C6B64205A1ED5FCF4D2573D6FC83F7D6BCC5C119A9BE708D812BFA09C228F53B28BF865C20CE04DC3EDCB21FE65D4D59 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 4.035128922992682 |
Encrypted: | false |
SSDEEP: | 48:8Jicd+yRmHvidAKZdA1duTn9ehOuTbbiZUk5OjqehOuTbjBAyT+:8JiGRbTqTbxWOvTbjPT |
MD5: | 50CA53EA7AF9C0B55C512356557AE972 |
SHA1: | 82C20E4C8E73E617DA2C9FDB9020F0706B1C268D |
SHA-256: | E277AF10A071A92DBE124891F3B38F4F1E705BB6232FF34A16EE52589E1FBA23 |
SHA-512: | 80620DCAD310DC8405E688C6D2023438DBEDF901D5C35C924756DDC3BF9DB7D65F879E46F8529FE7B1DBB4AC031B1EB3857EAAE28AADA945F45EA6C3E0621684 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 6396 |
Entropy (8bit): | 5.905111963532518 |
Encrypted: | false |
SSDEEP: | 96:lVmMSEIjnDvVTzln4/Qz5tfsMSUcp1hmZbuHrr9fQA0xs+9g2Ts8O:lVmRDlzln4/Q7UM4hmZ89CxsYTsR |
MD5: | 1026A33872A4D10B19DB1278F52B8971 |
SHA1: | 6CAEE057B98B4875189E8A76103039FC7A643BB9 |
SHA-256: | 91DB17F0AD927A17C418BD62621400AFB159F2651D7D37A5D8FEBD2B4C909898 |
SHA-512: | 97C46E69818D57AED872065B52AC69850D838AFBC585E25F1520E0B83698806B14FF4FBA23BE06C118388D4440BCBA3883CEB76744AB8B463A39A942425C94B2 |
Malicious: | false |
Reputation: | low |
URL: | https://app.getresponse.com/error404.html |
Preview: |
Download Network PCAP: filtered – full
- Total Packets: 73
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Sep 8, 2023 09:14:05.228044033 CEST | 49720 | 443 | 192.168.2.4 | 142.251.2.84 |
Sep 8, 2023 09:14:05.228115082 CEST | 443 | 49720 | 142.251.2.84 | 192.168.2.4 |
Sep 8, 2023 09:14:05.228216887 CEST | 49720 | 443 | 192.168.2.4 | 142.251.2.84 |
Sep 8, 2023 09:14:05.229878902 CEST | 49720 | 443 | 192.168.2.4 | 142.251.2.84 |
Sep 8, 2023 09:14:05.229902029 CEST | 443 | 49720 | 142.251.2.84 | 192.168.2.4 |
Sep 8, 2023 09:14:05.236346960 CEST | 49722 | 443 | 192.168.2.4 | 142.251.2.139 |
Sep 8, 2023 09:14:05.236490965 CEST | 443 | 49722 | 142.251.2.139 | 192.168.2.4 |
Sep 8, 2023 09:14:05.236608982 CEST | 49722 | 443 | 192.168.2.4 | 142.251.2.139 |
Sep 8, 2023 09:14:05.237145901 CEST | 49722 | 443 | 192.168.2.4 | 142.251.2.139 |
Sep 8, 2023 09:14:05.237220049 CEST | 443 | 49722 | 142.251.2.139 | 192.168.2.4 |
Sep 8, 2023 09:14:05.675623894 CEST | 443 | 49720 | 142.251.2.84 | 192.168.2.4 |
Sep 8, 2023 09:14:05.676265955 CEST | 49720 | 443 | 192.168.2.4 | 142.251.2.84 |
Sep 8, 2023 09:14:05.676301003 CEST | 443 | 49720 | 142.251.2.84 | 192.168.2.4 |
Sep 8, 2023 09:14:05.677083969 CEST | 443 | 49722 | 142.251.2.139 | 192.168.2.4 |
Sep 8, 2023 09:14:05.677347898 CEST | 49722 | 443 | 192.168.2.4 | 142.251.2.139 |
Sep 8, 2023 09:14:05.677411079 CEST | 443 | 49722 | 142.251.2.139 | 192.168.2.4 |
Sep 8, 2023 09:14:05.677598000 CEST | 443 | 49720 | 142.251.2.84 | 192.168.2.4 |
Sep 8, 2023 09:14:05.677700996 CEST | 49720 | 443 | 192.168.2.4 | 142.251.2.84 |
Sep 8, 2023 09:14:05.677922010 CEST | 443 | 49722 | 142.251.2.139 | 192.168.2.4 |
Sep 8, 2023 09:14:05.678020954 CEST | 49722 | 443 | 192.168.2.4 | 142.251.2.139 |
Sep 8, 2023 09:14:05.678756952 CEST | 443 | 49722 | 142.251.2.139 | 192.168.2.4 |
Sep 8, 2023 09:14:05.678852081 CEST | 49722 | 443 | 192.168.2.4 | 142.251.2.139 |
Sep 8, 2023 09:14:05.683196068 CEST | 49720 | 443 | 192.168.2.4 | 142.251.2.84 |
Sep 8, 2023 09:14:05.683324099 CEST | 443 | 49720 | 142.251.2.84 | 192.168.2.4 |
Sep 8, 2023 09:14:05.684101105 CEST | 49722 | 443 | 192.168.2.4 | 142.251.2.139 |
Sep 8, 2023 09:14:05.684223890 CEST | 443 | 49722 | 142.251.2.139 | 192.168.2.4 |
Sep 8, 2023 09:14:05.684355974 CEST | 49720 | 443 | 192.168.2.4 | 142.251.2.84 |
Sep 8, 2023 09:14:05.684365988 CEST | 443 | 49720 | 142.251.2.84 | 192.168.2.4 |
Sep 8, 2023 09:14:05.684581041 CEST | 49722 | 443 | 192.168.2.4 | 142.251.2.139 |
Sep 8, 2023 09:14:05.684608936 CEST | 443 | 49722 | 142.251.2.139 | 192.168.2.4 |
Sep 8, 2023 09:14:05.891477108 CEST | 443 | 49720 | 142.251.2.84 | 192.168.2.4 |
Sep 8, 2023 09:14:05.891482115 CEST | 443 | 49722 | 142.251.2.139 | 192.168.2.4 |
Sep 8, 2023 09:14:05.891643047 CEST | 49720 | 443 | 192.168.2.4 | 142.251.2.84 |
Sep 8, 2023 09:14:05.891644955 CEST | 49722 | 443 | 192.168.2.4 | 142.251.2.139 |
Sep 8, 2023 09:14:06.129817009 CEST | 443 | 49722 | 142.251.2.139 | 192.168.2.4 |
Sep 8, 2023 09:14:06.129976988 CEST | 443 | 49722 | 142.251.2.139 | 192.168.2.4 |
Sep 8, 2023 09:14:06.130040884 CEST | 49722 | 443 | 192.168.2.4 | 142.251.2.139 |
Sep 8, 2023 09:14:06.131570101 CEST | 49722 | 443 | 192.168.2.4 | 142.251.2.139 |
Sep 8, 2023 09:14:06.131609917 CEST | 443 | 49722 | 142.251.2.139 | 192.168.2.4 |
Sep 8, 2023 09:14:06.161348104 CEST | 443 | 49720 | 142.251.2.84 | 192.168.2.4 |
Sep 8, 2023 09:14:06.161623955 CEST | 443 | 49720 | 142.251.2.84 | 192.168.2.4 |
Sep 8, 2023 09:14:06.161691904 CEST | 49720 | 443 | 192.168.2.4 | 142.251.2.84 |
Sep 8, 2023 09:14:06.174110889 CEST | 49720 | 443 | 192.168.2.4 | 142.251.2.84 |
Sep 8, 2023 09:14:06.174145937 CEST | 443 | 49720 | 142.251.2.84 | 192.168.2.4 |
Sep 8, 2023 09:14:07.367460966 CEST | 49725 | 443 | 192.168.2.4 | 104.160.64.9 |
Sep 8, 2023 09:14:07.367526054 CEST | 443 | 49725 | 104.160.64.9 | 192.168.2.4 |
Sep 8, 2023 09:14:07.367635012 CEST | 49725 | 443 | 192.168.2.4 | 104.160.64.9 |
Sep 8, 2023 09:14:07.368472099 CEST | 49726 | 443 | 192.168.2.4 | 104.160.64.9 |
Sep 8, 2023 09:14:07.368524075 CEST | 443 | 49726 | 104.160.64.9 | 192.168.2.4 |
Sep 8, 2023 09:14:07.368586063 CEST | 49726 | 443 | 192.168.2.4 | 104.160.64.9 |
Sep 8, 2023 09:14:07.372615099 CEST | 49726 | 443 | 192.168.2.4 | 104.160.64.9 |
Sep 8, 2023 09:14:07.372644901 CEST | 443 | 49726 | 104.160.64.9 | 192.168.2.4 |
Sep 8, 2023 09:14:07.372891903 CEST | 49725 | 443 | 192.168.2.4 | 104.160.64.9 |
Sep 8, 2023 09:14:07.372911930 CEST | 443 | 49725 | 104.160.64.9 | 192.168.2.4 |
Sep 8, 2023 09:14:07.896985054 CEST | 443 | 49725 | 104.160.64.9 | 192.168.2.4 |
Sep 8, 2023 09:14:07.897353888 CEST | 49725 | 443 | 192.168.2.4 | 104.160.64.9 |
Sep 8, 2023 09:14:07.897393942 CEST | 443 | 49725 | 104.160.64.9 | 192.168.2.4 |
Sep 8, 2023 09:14:07.898792028 CEST | 443 | 49725 | 104.160.64.9 | 192.168.2.4 |
Sep 8, 2023 09:14:07.898889065 CEST | 49725 | 443 | 192.168.2.4 | 104.160.64.9 |
Sep 8, 2023 09:14:07.899825096 CEST | 443 | 49726 | 104.160.64.9 | 192.168.2.4 |
Sep 8, 2023 09:14:07.900223017 CEST | 49726 | 443 | 192.168.2.4 | 104.160.64.9 |
Sep 8, 2023 09:14:07.900253057 CEST | 443 | 49726 | 104.160.64.9 | 192.168.2.4 |
Sep 8, 2023 09:14:07.901680946 CEST | 443 | 49726 | 104.160.64.9 | 192.168.2.4 |
Sep 8, 2023 09:14:07.901750088 CEST | 49726 | 443 | 192.168.2.4 | 104.160.64.9 |
Sep 8, 2023 09:14:07.920450926 CEST | 49725 | 443 | 192.168.2.4 | 104.160.64.9 |
Sep 8, 2023 09:14:07.920697927 CEST | 443 | 49725 | 104.160.64.9 | 192.168.2.4 |
Sep 8, 2023 09:14:07.924779892 CEST | 49726 | 443 | 192.168.2.4 | 104.160.64.9 |
Sep 8, 2023 09:14:07.924967051 CEST | 443 | 49726 | 104.160.64.9 | 192.168.2.4 |
Sep 8, 2023 09:14:07.925399065 CEST | 49725 | 443 | 192.168.2.4 | 104.160.64.9 |
Sep 8, 2023 09:14:07.925424099 CEST | 443 | 49725 | 104.160.64.9 | 192.168.2.4 |
Sep 8, 2023 09:14:08.006143093 CEST | 49726 | 443 | 192.168.2.4 | 104.160.64.9 |
Sep 8, 2023 09:14:08.006191015 CEST | 443 | 49726 | 104.160.64.9 | 192.168.2.4 |
Sep 8, 2023 09:14:08.006234884 CEST | 49725 | 443 | 192.168.2.4 | 104.160.64.9 |
Sep 8, 2023 09:14:08.207844973 CEST | 49726 | 443 | 192.168.2.4 | 104.160.64.9 |
Sep 8, 2023 09:14:08.400221109 CEST | 443 | 49725 | 104.160.64.9 | 192.168.2.4 |
Sep 8, 2023 09:14:08.400427103 CEST | 443 | 49725 | 104.160.64.9 | 192.168.2.4 |
Sep 8, 2023 09:14:08.400563955 CEST | 49725 | 443 | 192.168.2.4 | 104.160.64.9 |
Sep 8, 2023 09:14:08.401293039 CEST | 49725 | 443 | 192.168.2.4 | 104.160.64.9 |
Sep 8, 2023 09:14:08.401313066 CEST | 443 | 49725 | 104.160.64.9 | 192.168.2.4 |
Sep 8, 2023 09:14:08.401365042 CEST | 49725 | 443 | 192.168.2.4 | 104.160.64.9 |
Sep 8, 2023 09:14:08.401386023 CEST | 49725 | 443 | 192.168.2.4 | 104.160.64.9 |
Sep 8, 2023 09:14:08.414413929 CEST | 49726 | 443 | 192.168.2.4 | 104.160.64.9 |
Sep 8, 2023 09:14:08.455481052 CEST | 443 | 49726 | 104.160.64.9 | 192.168.2.4 |
Sep 8, 2023 09:14:08.609806061 CEST | 49728 | 443 | 192.168.2.4 | 142.251.2.147 |
Sep 8, 2023 09:14:08.609878063 CEST | 443 | 49728 | 142.251.2.147 | 192.168.2.4 |
Sep 8, 2023 09:14:08.609963894 CEST | 49728 | 443 | 192.168.2.4 | 142.251.2.147 |
Sep 8, 2023 09:14:08.611078024 CEST | 49728 | 443 | 192.168.2.4 | 142.251.2.147 |
Sep 8, 2023 09:14:08.611114979 CEST | 443 | 49728 | 142.251.2.147 | 192.168.2.4 |
Sep 8, 2023 09:14:08.648745060 CEST | 443 | 49726 | 104.160.64.9 | 192.168.2.4 |
Sep 8, 2023 09:14:08.648840904 CEST | 443 | 49726 | 104.160.64.9 | 192.168.2.4 |
Sep 8, 2023 09:14:08.648859978 CEST | 443 | 49726 | 104.160.64.9 | 192.168.2.4 |
Sep 8, 2023 09:14:08.648933887 CEST | 49726 | 443 | 192.168.2.4 | 104.160.64.9 |
Sep 8, 2023 09:14:08.648960114 CEST | 443 | 49726 | 104.160.64.9 | 192.168.2.4 |
Sep 8, 2023 09:14:08.648974895 CEST | 49726 | 443 | 192.168.2.4 | 104.160.64.9 |
Sep 8, 2023 09:14:08.649019957 CEST | 49726 | 443 | 192.168.2.4 | 104.160.64.9 |
Sep 8, 2023 09:14:08.649039030 CEST | 443 | 49726 | 104.160.64.9 | 192.168.2.4 |
Sep 8, 2023 09:14:08.649178028 CEST | 443 | 49726 | 104.160.64.9 | 192.168.2.4 |
Sep 8, 2023 09:14:08.649260998 CEST | 49726 | 443 | 192.168.2.4 | 104.160.64.9 |
Sep 8, 2023 09:14:08.653805017 CEST | 49726 | 443 | 192.168.2.4 | 104.160.64.9 |
Sep 8, 2023 09:14:08.653831959 CEST | 443 | 49726 | 104.160.64.9 | 192.168.2.4 |
Sep 8, 2023 09:14:09.054040909 CEST | 443 | 49728 | 142.251.2.147 | 192.168.2.4 |
Sep 8, 2023 09:14:09.054454088 CEST | 49728 | 443 | 192.168.2.4 | 142.251.2.147 |
Sep 8, 2023 09:14:09.054516077 CEST | 443 | 49728 | 142.251.2.147 | 192.168.2.4 |
Sep 8, 2023 09:14:09.055818081 CEST | 443 | 49728 | 142.251.2.147 | 192.168.2.4 |
Sep 8, 2023 09:14:09.055936098 CEST | 49728 | 443 | 192.168.2.4 | 142.251.2.147 |
Sep 8, 2023 09:14:09.266961098 CEST | 49728 | 443 | 192.168.2.4 | 142.251.2.147 |
Sep 8, 2023 09:14:09.267411947 CEST | 443 | 49728 | 142.251.2.147 | 192.168.2.4 |
Sep 8, 2023 09:14:09.391731977 CEST | 49728 | 443 | 192.168.2.4 | 142.251.2.147 |
Sep 8, 2023 09:14:09.391788960 CEST | 443 | 49728 | 142.251.2.147 | 192.168.2.4 |
Sep 8, 2023 09:14:09.501075983 CEST | 49728 | 443 | 192.168.2.4 | 142.251.2.147 |
Sep 8, 2023 09:14:19.091378927 CEST | 443 | 49728 | 142.251.2.147 | 192.168.2.4 |
Sep 8, 2023 09:14:19.091567993 CEST | 443 | 49728 | 142.251.2.147 | 192.168.2.4 |
Sep 8, 2023 09:14:19.091694117 CEST | 49728 | 443 | 192.168.2.4 | 142.251.2.147 |
Sep 8, 2023 09:14:20.359342098 CEST | 49728 | 443 | 192.168.2.4 | 142.251.2.147 |
Sep 8, 2023 09:14:20.359414101 CEST | 443 | 49728 | 142.251.2.147 | 192.168.2.4 |
Sep 8, 2023 09:15:08.477193117 CEST | 49757 | 443 | 192.168.2.4 | 142.251.2.147 |
Sep 8, 2023 09:15:08.477251053 CEST | 443 | 49757 | 142.251.2.147 | 192.168.2.4 |
Sep 8, 2023 09:15:08.477442980 CEST | 49757 | 443 | 192.168.2.4 | 142.251.2.147 |
Sep 8, 2023 09:15:08.478847027 CEST | 49757 | 443 | 192.168.2.4 | 142.251.2.147 |
Sep 8, 2023 09:15:08.478876114 CEST | 443 | 49757 | 142.251.2.147 | 192.168.2.4 |
Sep 8, 2023 09:15:08.917926073 CEST | 443 | 49757 | 142.251.2.147 | 192.168.2.4 |
Sep 8, 2023 09:15:08.918780088 CEST | 49757 | 443 | 192.168.2.4 | 142.251.2.147 |
Sep 8, 2023 09:15:08.918828964 CEST | 443 | 49757 | 142.251.2.147 | 192.168.2.4 |
Sep 8, 2023 09:15:08.920121908 CEST | 443 | 49757 | 142.251.2.147 | 192.168.2.4 |
Sep 8, 2023 09:15:08.921478987 CEST | 49757 | 443 | 192.168.2.4 | 142.251.2.147 |
Sep 8, 2023 09:15:08.921785116 CEST | 443 | 49757 | 142.251.2.147 | 192.168.2.4 |
Sep 8, 2023 09:15:08.974025965 CEST | 49757 | 443 | 192.168.2.4 | 142.251.2.147 |
Sep 8, 2023 09:15:18.966661930 CEST | 443 | 49757 | 142.251.2.147 | 192.168.2.4 |
Sep 8, 2023 09:15:18.966804981 CEST | 443 | 49757 | 142.251.2.147 | 192.168.2.4 |
Sep 8, 2023 09:15:18.967070103 CEST | 49757 | 443 | 192.168.2.4 | 142.251.2.147 |
Sep 8, 2023 09:15:19.616621971 CEST | 49757 | 443 | 192.168.2.4 | 142.251.2.147 |
Sep 8, 2023 09:15:19.616691113 CEST | 443 | 49757 | 142.251.2.147 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Sep 8, 2023 09:14:05.025688887 CEST | 51816 | 53 | 192.168.2.4 | 8.8.8.8 |
Sep 8, 2023 09:14:05.026082039 CEST | 51391 | 53 | 192.168.2.4 | 8.8.8.8 |
Sep 8, 2023 09:14:05.026679993 CEST | 49785 | 53 | 192.168.2.4 | 8.8.8.8 |
Sep 8, 2023 09:14:05.026941061 CEST | 63872 | 53 | 192.168.2.4 | 8.8.8.8 |
Sep 8, 2023 09:14:05.224482059 CEST | 53 | 51816 | 8.8.8.8 | 192.168.2.4 |
Sep 8, 2023 09:14:05.225260973 CEST | 53 | 51391 | 8.8.8.8 | 192.168.2.4 |
Sep 8, 2023 09:14:05.227535963 CEST | 53 | 49817 | 8.8.8.8 | 192.168.2.4 |
Sep 8, 2023 09:14:05.232702017 CEST | 53 | 49785 | 8.8.8.8 | 192.168.2.4 |
Sep 8, 2023 09:14:05.234257936 CEST | 53 | 63872 | 8.8.8.8 | 192.168.2.4 |
Sep 8, 2023 09:14:06.751760960 CEST | 53 | 64803 | 8.8.8.8 | 192.168.2.4 |
Sep 8, 2023 09:14:07.130135059 CEST | 64829 | 53 | 192.168.2.4 | 8.8.8.8 |
Sep 8, 2023 09:14:07.133250952 CEST | 54388 | 53 | 192.168.2.4 | 8.8.8.8 |
Sep 8, 2023 09:14:07.330931902 CEST | 53 | 64829 | 8.8.8.8 | 192.168.2.4 |
Sep 8, 2023 09:14:07.335298061 CEST | 53 | 54388 | 8.8.8.8 | 192.168.2.4 |
Sep 8, 2023 09:14:08.408518076 CEST | 53653 | 53 | 192.168.2.4 | 8.8.8.8 |
Sep 8, 2023 09:14:08.409308910 CEST | 52086 | 53 | 192.168.2.4 | 8.8.8.8 |
Sep 8, 2023 09:14:08.607076883 CEST | 53 | 53653 | 8.8.8.8 | 192.168.2.4 |
Sep 8, 2023 09:14:08.607654095 CEST | 53 | 52086 | 8.8.8.8 | 192.168.2.4 |
Sep 8, 2023 09:15:04.216015100 CEST | 53 | 57676 | 8.8.8.8 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Sep 8, 2023 09:14:05.025688887 CEST | 192.168.2.4 | 8.8.8.8 | 0x55dc | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Sep 8, 2023 09:14:05.026082039 CEST | 192.168.2.4 | 8.8.8.8 | 0x5987 | Standard query (0) | 65 | IN (0x0001) | false | |
Sep 8, 2023 09:14:05.026679993 CEST | 192.168.2.4 | 8.8.8.8 | 0xfb87 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Sep 8, 2023 09:14:05.026941061 CEST | 192.168.2.4 | 8.8.8.8 | 0x170 | Standard query (0) | 65 | IN (0x0001) | false | |
Sep 8, 2023 09:14:07.130135059 CEST | 192.168.2.4 | 8.8.8.8 | 0xde27 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Sep 8, 2023 09:14:07.133250952 CEST | 192.168.2.4 | 8.8.8.8 | 0x8108 | Standard query (0) | 65 | IN (0x0001) | false | |
Sep 8, 2023 09:14:08.408518076 CEST | 192.168.2.4 | 8.8.8.8 | 0x71fb | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Sep 8, 2023 09:14:08.409308910 CEST | 192.168.2.4 | 8.8.8.8 | 0xd776 | Standard query (0) | 65 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Sep 8, 2023 09:14:05.224482059 CEST | 8.8.8.8 | 192.168.2.4 | 0x55dc | No error (0) | 142.251.2.84 | A (IP address) | IN (0x0001) | false | ||
Sep 8, 2023 09:14:05.232702017 CEST | 8.8.8.8 | 192.168.2.4 | 0xfb87 | No error (0) | clients.l.google.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Sep 8, 2023 09:14:05.232702017 CEST | 8.8.8.8 | 192.168.2.4 | 0xfb87 | No error (0) | 142.251.2.139 | A (IP address) | IN (0x0001) | false | ||
Sep 8, 2023 09:14:05.232702017 CEST | 8.8.8.8 | 192.168.2.4 | 0xfb87 | No error (0) | 142.251.2.113 | A (IP address) | IN (0x0001) | false | ||
Sep 8, 2023 09:14:05.232702017 CEST | 8.8.8.8 | 192.168.2.4 | 0xfb87 | No error (0) | 142.251.2.101 | A (IP address) | IN (0x0001) | false | ||
Sep 8, 2023 09:14:05.232702017 CEST | 8.8.8.8 | 192.168.2.4 | 0xfb87 | No error (0) | 142.251.2.138 | A (IP address) | IN (0x0001) | false | ||
Sep 8, 2023 09:14:05.232702017 CEST | 8.8.8.8 | 192.168.2.4 | 0xfb87 | No error (0) | 142.251.2.102 | A (IP address) | IN (0x0001) | false | ||
Sep 8, 2023 09:14:05.232702017 CEST | 8.8.8.8 | 192.168.2.4 | 0xfb87 | No error (0) | 142.251.2.100 | A (IP address) | IN (0x0001) | false | ||
Sep 8, 2023 09:14:05.234257936 CEST | 8.8.8.8 | 192.168.2.4 | 0x170 | No error (0) | clients.l.google.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Sep 8, 2023 09:14:07.330931902 CEST | 8.8.8.8 | 192.168.2.4 | 0xde27 | No error (0) | 104.160.64.9 | A (IP address) | IN (0x0001) | false | ||
Sep 8, 2023 09:14:08.607076883 CEST | 8.8.8.8 | 192.168.2.4 | 0x71fb | No error (0) | 142.251.2.147 | A (IP address) | IN (0x0001) | false | ||
Sep 8, 2023 09:14:08.607076883 CEST | 8.8.8.8 | 192.168.2.4 | 0x71fb | No error (0) | 142.251.2.99 | A (IP address) | IN (0x0001) | false | ||
Sep 8, 2023 09:14:08.607076883 CEST | 8.8.8.8 | 192.168.2.4 | 0x71fb | No error (0) | 142.251.2.103 | A (IP address) | IN (0x0001) | false | ||
Sep 8, 2023 09:14:08.607076883 CEST | 8.8.8.8 | 192.168.2.4 | 0x71fb | No error (0) | 142.251.2.106 | A (IP address) | IN (0x0001) | false | ||
Sep 8, 2023 09:14:08.607076883 CEST | 8.8.8.8 | 192.168.2.4 | 0x71fb | No error (0) | 142.251.2.105 | A (IP address) | IN (0x0001) | false | ||
Sep 8, 2023 09:14:08.607076883 CEST | 8.8.8.8 | 192.168.2.4 | 0x71fb | No error (0) | 142.251.2.104 | A (IP address) | IN (0x0001) | false | ||
Sep 8, 2023 09:14:08.607654095 CEST | 8.8.8.8 | 192.168.2.4 | 0xd776 | No error (0) | 65 | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
0 | 192.168.2.4 | 49720 | 142.251.2.84 | 443 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
2023-09-08 07:14:05 UTC | 0 | OUT | |
2023-09-08 07:14:05 UTC | 0 | OUT | |
2023-09-08 07:14:06 UTC | 2 | IN | |
2023-09-08 07:14:06 UTC | 4 | IN | |
2023-09-08 07:14:06 UTC | 4 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
1 | 192.168.2.4 | 49722 | 142.251.2.139 | 443 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
2023-09-08 07:14:05 UTC | 0 | OUT | |
2023-09-08 07:14:06 UTC | 1 | IN | |
2023-09-08 07:14:06 UTC | 2 | IN | |
2023-09-08 07:14:06 UTC | 2 | IN | |
2023-09-08 07:14:06 UTC | 2 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
2 | 192.168.2.4 | 49725 | 104.160.64.9 | 443 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
2023-09-08 07:14:07 UTC | 4 | OUT | |
2023-09-08 07:14:08 UTC | 5 | IN | |
2023-09-08 07:14:08 UTC | 6 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
3 | 192.168.2.4 | 49726 | 104.160.64.9 | 443 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
2023-09-08 07:14:08 UTC | 6 | OUT | |
2023-09-08 07:14:08 UTC | 6 | IN | |
2023-09-08 07:14:08 UTC | 6 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 2 |
Start time: | 09:14:01 |
Start date: | 08/09/2023 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7c94b0000 |
File size: | 3'219'224 bytes |
MD5 hash: | 8D1C4713ACB7CC2AAAEE4477C58A80BA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 4 |
Start time: | 09:14:02 |
Start date: | 08/09/2023 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7c94b0000 |
File size: | 3'219'224 bytes |
MD5 hash: | 8D1C4713ACB7CC2AAAEE4477C58A80BA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 5 |
Start time: | 09:14:06 |
Start date: | 08/09/2023 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7c94b0000 |
File size: | 3'219'224 bytes |
MD5 hash: | 8D1C4713ACB7CC2AAAEE4477C58A80BA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |