Windows
Analysis Report
http://brounelink.com
Overview
Detection
Score: | 72 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
chrome.exe (PID: 6044 cmdline:
C:\Program Files\Goo gle\Chrome \Applicati on\chrome. exe" --sta rt-maximiz ed "about: blank MD5: 8D1C4713ACB7CC2AAAEE4477C58A80BA) chrome.exe (PID: 3128 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =1956 --fi eld-trial- handle=187 2,i,884680 9057498325 788,147951 7642764623 95,262144 --disable- features=O ptimizatio nGuideMode lDownloadi ng,Optimiz ationHints ,Optimizat ionHintsFe tching,Opt imizationT argetPredi ction /pre fetch:8 MD5: 8D1C4713ACB7CC2AAAEE4477C58A80BA)
chrome.exe (PID: 6128 cmdline:
C:\Program Files\Goo gle\Chrome \Applicati on\chrome. exe" "http ://brounel ink.com MD5: 8D1C4713ACB7CC2AAAEE4477C58A80BA)
- cleanup
- • AV Detection
- • Phishing
- • Compliance
- • Networking
- • System Summary
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link |
Source: | Virustotal: | Perma Link |
Source: | Avira URL Cloud: |
Source: | HTTP Parser: |
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior |
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | HTTP traffic detected: |
Source: | Classification label: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Process Injection | 2 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | 1 Encrypted Channel | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | 4 Non-Application Layer Protocol | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | 5 Application Layer Protocol | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | 3 Ingress Tool Transfer | SIM Card Swap | Carrier Billing Fraud |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
14% | Virustotal | Browse | ||
100% | Avira URL Cloud | malware |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
14% | Virustotal | Browse | ||
9% | Virustotal | Browse | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
accounts.google.com | 142.251.40.205 | true | false | high | |
www.google.com | 142.250.72.100 | true | false | high | |
clients.l.google.com | 142.251.41.14 | true | false | high | |
brounelink.com | 5.149.255.154 | true | false | unknown | |
clients2.google.com | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown | |
false | high | ||
false | high | ||
false |
| unknown | |
false |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.251.41.14 | clients.l.google.com | United States | 15169 | GOOGLEUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.251.40.205 | accounts.google.com | United States | 15169 | GOOGLEUS | false | |
142.250.72.100 | www.google.com | United States | 15169 | GOOGLEUS | false | |
5.149.255.154 | brounelink.com | United Kingdom | 59711 | HZ-NL-ASGB | false |
IP |
---|
192.168.2.1 |
Joe Sandbox Version: | 38.0.0 Beryl |
Analysis ID: | 1306959 |
Start date and time: | 2023-09-11 03:16:04 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 4m 6s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | http://brounelink.com |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 16 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal72.win@24/7@8/6 |
EGA Information: | Failed |
HCA Information: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, B ackgroundTransferHost.exe, bac kgroundTaskHost.exe, conhost.e xe, svchost.exe - Excluded IPs from analysis (wh
itelisted): 142.250.80.35, 34. 104.35.123, 142.251.40.99 - Excluded domains from analysis
(whitelisted): edgedl.me.gvt1 .com, update.googleapis.com, t se1.mm.bing.net, clientservice s.googleapis.com, arc.msn.com - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtSetInformationFile c alls found.
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1558 |
Entropy (8bit): | 5.11458514637545 |
Encrypted: | false |
SSDEEP: | 48:OBOCrYJ4rYJVwUCLHDy43HV713XEyMmZ3teTHn:LCrYJ4rYJVwUCHZ3Z13XtdUTH |
MD5: | EE002CB9E51BB8DFA89640A406A1090A |
SHA1: | 49EE3AD535947D8821FFDEB67FFC9BC37D1EBBB2 |
SHA-256: | 3DBD2C90050B652D63656481C3E5871C52261575292DB77D4EA63419F187A55B |
SHA-512: | D1FDCC436B8CA8C68D4DC7077F84F803A535BF2CE31D9EB5D0C466B62D6567B2C59974995060403ED757E92245DB07E70C6BDDBF1C3519FED300CC5B9BF9177C |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1862 |
Entropy (8bit): | 6.007795404172325 |
Encrypted: | false |
SSDEEP: | 48:p/hUksmAdtpkakrNx9vNmUBQjoktzT4hIZ1Di:R9fQtia4LVmV8SzJZc |
MD5: | 1D63DDAD86600A3CAD88D67A6CB132C7 |
SHA1: | 11A475F32BC8125564E19D76065D46FDBFF6F1C3 |
SHA-256: | 78933430FF577532242F8FA44C9E87D3A4D30F08B0FBC5AF48663ABB16F5F52E |
SHA-512: | AE69344AE3EA0322ECFB6AB99EDF65F7B35D40D06EE5541A38992CA0397738FDD97839B816AD20A19DE0EE2D6EDD9E436657AE0A007CD0DA4157FA1C0B139E8E |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 3785 |
Entropy (8bit): | 5.9760383777426895 |
Encrypted: | false |
SSDEEP: | 48:YDsaFVa7e+LaC8MRxFp9PCCJEMYhWYEWCi60PKEy/++taBDETAo7Usjcs3CFOL3h:UDyi+m0plhYvPuW+ozdswsDm4+y |
MD5: | 4C5679DCB8C4DEDFECBE6CF659A4BB19 |
SHA1: | 32654A6213F24DAD48271D725CA8FC3F3B342CDD |
SHA-256: | BC610ECBDAB3C114D5C2D1EA43573ADB181D0CA5E93FD7982E624DAE96A80A3B |
SHA-512: | C638A465540711E75C601F6F9ADE444D596A9CDD7894E39A58E0896926CD9CE95F637E4BA66850F89FAFBA73E7D4564F296E7F2EF3551CFB0F0CA7948E354975 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 66 |
Entropy (8bit): | 3.8008506520558254 |
Encrypted: | false |
SSDEEP: | 3:SbzQRXmduB0RgWjQVRtUSqRGn:SnQR1b37tUSqRGn |
MD5: | CD5C5BE8BB4AF01A611849D1A2C6DB93 |
SHA1: | 54F31907FE7801B6BA896F84F8380D102B5ED18F |
SHA-256: | 2B0AA4025B5A730B4E82B9C8F68DC7EF2862AB9E06392F4D2E58045E4436F5BD |
SHA-512: | B49A0FE14C66CC52E70330738712816D3645F19AF215B4F85C97F5D27290C595E19B39636AEF2E8E2C6F7AC160180EF9641F5DEBAB16F6B23394E56EF885F336 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 78 |
Entropy (8bit): | 4.461657354427988 |
Encrypted: | false |
SSDEEP: | 3:rR6TAulhFphifFIPgS1Cc/:F6VlMyPgS1Cc/ |
MD5: | 443A81033B27A223C24CF48E4D9AAE1D |
SHA1: | 9ED8E922D5DF302FD3D603E56E4376277FE999EC |
SHA-256: | 065FF5566111FE5BE882FBA23A9C019C0FE093E137F5B65B4A192517F6372824 |
SHA-512: | 6428762F32CA76D822C3C84FAE2F11B9F2EECDCA43BFD50DAC4AC1CC39FB58A8936695393FF48360477EB03B8BFF8D5BD8EA1697257B07ED687A7AEA062C84B8 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 548 |
Entropy (8bit): | 4.688532577858027 |
Encrypted: | false |
SSDEEP: | 12:TjeRHVIdtklI5r8INGlTF5TF5TF5TF5TF5TFK:neRH68DTPTPTPTPTPTc |
MD5: | 370E16C3B7DBA286CFF055F93B9A94D8 |
SHA1: | 65F3537C3C798F7DA146C55AEF536F7B5D0CB943 |
SHA-256: | D465172175D35D493FB1633E237700022BD849FA123164790B168B8318ACB090 |
SHA-512: | 75CD6A0AC7D6081D35140ABBEA018D1A2608DD936E2E21F61BF69E063F6FA16DD31C62392F5703D7A7C828EE3D4ECC838E73BFF029A98CED8986ACB5C8364966 |
Malicious: | false |
Reputation: | low |
URL: | http://brounelink.com/favicon.ico |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 548 |
Entropy (8bit): | 4.660801881684815 |
Encrypted: | false |
SSDEEP: | 12:TvgsoCVIogs01lI5r8INGlTF5TF5TF5TF5TF5TFK:cEQtnDTPTPTPTPTPTc |
MD5: | 4B074B0B59693FA9F94FB71B175FB187 |
SHA1: | 0004D4F82B546013424B2E0DE084395071EEF98B |
SHA-256: | 25FB23868EBF48348F9E438E00CB9B9D9B3A054F32482A781C762CC4F9CC6393 |
SHA-512: | F928E9FAA0BC776FC5D8A0326981853709D437B7B1C2E238894BFB2ACBB627442C425CBB00D369C52D15876B6C795E67F7580341686696D569A908A6ADD4B444 |
Malicious: | false |
Reputation: | low |
URL: | http://brounelink.com/ |
Preview: |
Download Network PCAP: filtered – full
- Total Packets: 63
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Sep 11, 2023 03:16:57.382385015 CEST | 49698 | 443 | 192.168.2.3 | 142.251.40.205 |
Sep 11, 2023 03:16:57.382488012 CEST | 443 | 49698 | 142.251.40.205 | 192.168.2.3 |
Sep 11, 2023 03:16:57.382601976 CEST | 49698 | 443 | 192.168.2.3 | 142.251.40.205 |
Sep 11, 2023 03:16:57.383379936 CEST | 49699 | 443 | 192.168.2.3 | 142.251.41.14 |
Sep 11, 2023 03:16:57.383460999 CEST | 443 | 49699 | 142.251.41.14 | 192.168.2.3 |
Sep 11, 2023 03:16:57.383550882 CEST | 49699 | 443 | 192.168.2.3 | 142.251.41.14 |
Sep 11, 2023 03:16:57.384501934 CEST | 49699 | 443 | 192.168.2.3 | 142.251.41.14 |
Sep 11, 2023 03:16:57.384540081 CEST | 443 | 49699 | 142.251.41.14 | 192.168.2.3 |
Sep 11, 2023 03:16:57.384776115 CEST | 49698 | 443 | 192.168.2.3 | 142.251.40.205 |
Sep 11, 2023 03:16:57.384833097 CEST | 443 | 49698 | 142.251.40.205 | 192.168.2.3 |
Sep 11, 2023 03:16:57.662909985 CEST | 443 | 49699 | 142.251.41.14 | 192.168.2.3 |
Sep 11, 2023 03:16:57.664036989 CEST | 49699 | 443 | 192.168.2.3 | 142.251.41.14 |
Sep 11, 2023 03:16:57.664076090 CEST | 443 | 49699 | 142.251.41.14 | 192.168.2.3 |
Sep 11, 2023 03:16:57.664679050 CEST | 443 | 49699 | 142.251.41.14 | 192.168.2.3 |
Sep 11, 2023 03:16:57.664788961 CEST | 49699 | 443 | 192.168.2.3 | 142.251.41.14 |
Sep 11, 2023 03:16:57.666081905 CEST | 443 | 49699 | 142.251.41.14 | 192.168.2.3 |
Sep 11, 2023 03:16:57.666182041 CEST | 49699 | 443 | 192.168.2.3 | 142.251.41.14 |
Sep 11, 2023 03:16:57.668246984 CEST | 49699 | 443 | 192.168.2.3 | 142.251.41.14 |
Sep 11, 2023 03:16:57.668359041 CEST | 443 | 49699 | 142.251.41.14 | 192.168.2.3 |
Sep 11, 2023 03:16:57.668492079 CEST | 49699 | 443 | 192.168.2.3 | 142.251.41.14 |
Sep 11, 2023 03:16:57.668517113 CEST | 443 | 49699 | 142.251.41.14 | 192.168.2.3 |
Sep 11, 2023 03:16:57.708250046 CEST | 49699 | 443 | 192.168.2.3 | 142.251.41.14 |
Sep 11, 2023 03:16:57.713912010 CEST | 443 | 49698 | 142.251.40.205 | 192.168.2.3 |
Sep 11, 2023 03:16:57.720583916 CEST | 49698 | 443 | 192.168.2.3 | 142.251.40.205 |
Sep 11, 2023 03:16:57.720654011 CEST | 443 | 49698 | 142.251.40.205 | 192.168.2.3 |
Sep 11, 2023 03:16:57.722105026 CEST | 443 | 49698 | 142.251.40.205 | 192.168.2.3 |
Sep 11, 2023 03:16:57.722251892 CEST | 49698 | 443 | 192.168.2.3 | 142.251.40.205 |
Sep 11, 2023 03:16:57.724648952 CEST | 49698 | 443 | 192.168.2.3 | 142.251.40.205 |
Sep 11, 2023 03:16:57.724802971 CEST | 443 | 49698 | 142.251.40.205 | 192.168.2.3 |
Sep 11, 2023 03:16:57.724875927 CEST | 49698 | 443 | 192.168.2.3 | 142.251.40.205 |
Sep 11, 2023 03:16:57.767488003 CEST | 443 | 49698 | 142.251.40.205 | 192.168.2.3 |
Sep 11, 2023 03:16:57.770701885 CEST | 49698 | 443 | 192.168.2.3 | 142.251.40.205 |
Sep 11, 2023 03:16:57.770741940 CEST | 443 | 49698 | 142.251.40.205 | 192.168.2.3 |
Sep 11, 2023 03:16:57.817645073 CEST | 49698 | 443 | 192.168.2.3 | 142.251.40.205 |
Sep 11, 2023 03:16:57.870028019 CEST | 443 | 49699 | 142.251.41.14 | 192.168.2.3 |
Sep 11, 2023 03:16:57.870429993 CEST | 443 | 49699 | 142.251.41.14 | 192.168.2.3 |
Sep 11, 2023 03:16:57.870549917 CEST | 49699 | 443 | 192.168.2.3 | 142.251.41.14 |
Sep 11, 2023 03:16:57.872695923 CEST | 49699 | 443 | 192.168.2.3 | 142.251.41.14 |
Sep 11, 2023 03:16:57.872747898 CEST | 443 | 49699 | 142.251.41.14 | 192.168.2.3 |
Sep 11, 2023 03:16:57.986828089 CEST | 443 | 49698 | 142.251.40.205 | 192.168.2.3 |
Sep 11, 2023 03:16:57.986968994 CEST | 49698 | 443 | 192.168.2.3 | 142.251.40.205 |
Sep 11, 2023 03:16:57.987025023 CEST | 443 | 49698 | 142.251.40.205 | 192.168.2.3 |
Sep 11, 2023 03:16:57.987813950 CEST | 443 | 49698 | 142.251.40.205 | 192.168.2.3 |
Sep 11, 2023 03:16:57.987920046 CEST | 49698 | 443 | 192.168.2.3 | 142.251.40.205 |
Sep 11, 2023 03:16:57.988137007 CEST | 49698 | 443 | 192.168.2.3 | 142.251.40.205 |
Sep 11, 2023 03:16:57.988174915 CEST | 443 | 49698 | 142.251.40.205 | 192.168.2.3 |
Sep 11, 2023 03:16:58.446791887 CEST | 49702 | 80 | 192.168.2.3 | 5.149.255.154 |
Sep 11, 2023 03:16:58.447676897 CEST | 49703 | 80 | 192.168.2.3 | 5.149.255.154 |
Sep 11, 2023 03:16:58.613598108 CEST | 80 | 49702 | 5.149.255.154 | 192.168.2.3 |
Sep 11, 2023 03:16:58.613734007 CEST | 49702 | 80 | 192.168.2.3 | 5.149.255.154 |
Sep 11, 2023 03:16:58.614217997 CEST | 80 | 49703 | 5.149.255.154 | 192.168.2.3 |
Sep 11, 2023 03:16:58.614341021 CEST | 49703 | 80 | 192.168.2.3 | 5.149.255.154 |
Sep 11, 2023 03:16:58.615845919 CEST | 49703 | 80 | 192.168.2.3 | 5.149.255.154 |
Sep 11, 2023 03:16:58.782380104 CEST | 80 | 49703 | 5.149.255.154 | 192.168.2.3 |
Sep 11, 2023 03:16:58.782427073 CEST | 80 | 49703 | 5.149.255.154 | 192.168.2.3 |
Sep 11, 2023 03:16:58.823618889 CEST | 49703 | 80 | 192.168.2.3 | 5.149.255.154 |
Sep 11, 2023 03:16:59.348927975 CEST | 49703 | 80 | 192.168.2.3 | 5.149.255.154 |
Sep 11, 2023 03:16:59.516105890 CEST | 80 | 49703 | 5.149.255.154 | 192.168.2.3 |
Sep 11, 2023 03:16:59.557694912 CEST | 49703 | 80 | 192.168.2.3 | 5.149.255.154 |
Sep 11, 2023 03:17:01.235830069 CEST | 49705 | 443 | 192.168.2.3 | 142.250.72.100 |
Sep 11, 2023 03:17:01.235939026 CEST | 443 | 49705 | 142.250.72.100 | 192.168.2.3 |
Sep 11, 2023 03:17:01.236043930 CEST | 49705 | 443 | 192.168.2.3 | 142.250.72.100 |
Sep 11, 2023 03:17:01.236536026 CEST | 49705 | 443 | 192.168.2.3 | 142.250.72.100 |
Sep 11, 2023 03:17:01.236577034 CEST | 443 | 49705 | 142.250.72.100 | 192.168.2.3 |
Sep 11, 2023 03:17:01.446969032 CEST | 443 | 49705 | 142.250.72.100 | 192.168.2.3 |
Sep 11, 2023 03:17:01.447490931 CEST | 49705 | 443 | 192.168.2.3 | 142.250.72.100 |
Sep 11, 2023 03:17:01.447571039 CEST | 443 | 49705 | 142.250.72.100 | 192.168.2.3 |
Sep 11, 2023 03:17:01.448923111 CEST | 443 | 49705 | 142.250.72.100 | 192.168.2.3 |
Sep 11, 2023 03:17:01.449021101 CEST | 49705 | 443 | 192.168.2.3 | 142.250.72.100 |
Sep 11, 2023 03:17:01.450653076 CEST | 49705 | 443 | 192.168.2.3 | 142.250.72.100 |
Sep 11, 2023 03:17:01.450783014 CEST | 443 | 49705 | 142.250.72.100 | 192.168.2.3 |
Sep 11, 2023 03:17:01.504937887 CEST | 49705 | 443 | 192.168.2.3 | 142.250.72.100 |
Sep 11, 2023 03:17:01.505013943 CEST | 443 | 49705 | 142.250.72.100 | 192.168.2.3 |
Sep 11, 2023 03:17:01.552229881 CEST | 49705 | 443 | 192.168.2.3 | 142.250.72.100 |
Sep 11, 2023 03:17:11.428459883 CEST | 443 | 49705 | 142.250.72.100 | 192.168.2.3 |
Sep 11, 2023 03:17:11.428653955 CEST | 443 | 49705 | 142.250.72.100 | 192.168.2.3 |
Sep 11, 2023 03:17:11.428766966 CEST | 49705 | 443 | 192.168.2.3 | 142.250.72.100 |
Sep 11, 2023 03:17:12.459696054 CEST | 49705 | 443 | 192.168.2.3 | 142.250.72.100 |
Sep 11, 2023 03:17:12.459779024 CEST | 443 | 49705 | 142.250.72.100 | 192.168.2.3 |
Sep 11, 2023 03:17:43.631127119 CEST | 49702 | 80 | 192.168.2.3 | 5.149.255.154 |
Sep 11, 2023 03:17:43.798954010 CEST | 80 | 49702 | 5.149.255.154 | 192.168.2.3 |
Sep 11, 2023 03:17:44.521945000 CEST | 49703 | 80 | 192.168.2.3 | 5.149.255.154 |
Sep 11, 2023 03:17:44.688966036 CEST | 80 | 49703 | 5.149.255.154 | 192.168.2.3 |
Sep 11, 2023 03:17:58.781380892 CEST | 80 | 49702 | 5.149.255.154 | 192.168.2.3 |
Sep 11, 2023 03:17:58.781486988 CEST | 49702 | 80 | 192.168.2.3 | 5.149.255.154 |
Sep 11, 2023 03:17:59.603547096 CEST | 49702 | 80 | 192.168.2.3 | 5.149.255.154 |
Sep 11, 2023 03:17:59.770239115 CEST | 80 | 49702 | 5.149.255.154 | 192.168.2.3 |
Sep 11, 2023 03:18:01.149424076 CEST | 49722 | 443 | 192.168.2.3 | 142.250.72.100 |
Sep 11, 2023 03:18:01.149545908 CEST | 443 | 49722 | 142.250.72.100 | 192.168.2.3 |
Sep 11, 2023 03:18:01.149760962 CEST | 49722 | 443 | 192.168.2.3 | 142.250.72.100 |
Sep 11, 2023 03:18:01.150218964 CEST | 49722 | 443 | 192.168.2.3 | 142.250.72.100 |
Sep 11, 2023 03:18:01.150259018 CEST | 443 | 49722 | 142.250.72.100 | 192.168.2.3 |
Sep 11, 2023 03:18:01.352973938 CEST | 443 | 49722 | 142.250.72.100 | 192.168.2.3 |
Sep 11, 2023 03:18:01.353355885 CEST | 49722 | 443 | 192.168.2.3 | 142.250.72.100 |
Sep 11, 2023 03:18:01.353410006 CEST | 443 | 49722 | 142.250.72.100 | 192.168.2.3 |
Sep 11, 2023 03:18:01.354043961 CEST | 443 | 49722 | 142.250.72.100 | 192.168.2.3 |
Sep 11, 2023 03:18:01.354594946 CEST | 49722 | 443 | 192.168.2.3 | 142.250.72.100 |
Sep 11, 2023 03:18:01.354727983 CEST | 443 | 49722 | 142.250.72.100 | 192.168.2.3 |
Sep 11, 2023 03:18:01.397598982 CEST | 49722 | 443 | 192.168.2.3 | 142.250.72.100 |
Sep 11, 2023 03:18:04.518431902 CEST | 80 | 49703 | 5.149.255.154 | 192.168.2.3 |
Sep 11, 2023 03:18:04.518784046 CEST | 49703 | 80 | 192.168.2.3 | 5.149.255.154 |
Sep 11, 2023 03:18:05.603660107 CEST | 49703 | 80 | 192.168.2.3 | 5.149.255.154 |
Sep 11, 2023 03:18:05.774112940 CEST | 80 | 49703 | 5.149.255.154 | 192.168.2.3 |
Sep 11, 2023 03:18:11.338181973 CEST | 443 | 49722 | 142.250.72.100 | 192.168.2.3 |
Sep 11, 2023 03:18:11.338277102 CEST | 443 | 49722 | 142.250.72.100 | 192.168.2.3 |
Sep 11, 2023 03:18:11.338386059 CEST | 49722 | 443 | 192.168.2.3 | 142.250.72.100 |
Sep 11, 2023 03:18:11.604274988 CEST | 49722 | 443 | 192.168.2.3 | 142.250.72.100 |
Sep 11, 2023 03:18:11.604341984 CEST | 443 | 49722 | 142.250.72.100 | 192.168.2.3 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Sep 11, 2023 03:16:57.278346062 CEST | 51959 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 11, 2023 03:16:57.278587103 CEST | 54203 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 11, 2023 03:16:57.279130936 CEST | 50842 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 11, 2023 03:16:57.279424906 CEST | 53210 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 11, 2023 03:16:57.376368999 CEST | 53 | 50874 | 8.8.8.8 | 192.168.2.3 |
Sep 11, 2023 03:16:57.377568007 CEST | 53 | 51959 | 8.8.8.8 | 192.168.2.3 |
Sep 11, 2023 03:16:57.377775908 CEST | 53 | 54203 | 8.8.8.8 | 192.168.2.3 |
Sep 11, 2023 03:16:57.377950907 CEST | 53 | 53210 | 8.8.8.8 | 192.168.2.3 |
Sep 11, 2023 03:16:57.378722906 CEST | 53 | 50842 | 8.8.8.8 | 192.168.2.3 |
Sep 11, 2023 03:16:58.074461937 CEST | 53 | 61261 | 8.8.8.8 | 192.168.2.3 |
Sep 11, 2023 03:16:58.310106039 CEST | 56452 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 11, 2023 03:16:58.311014891 CEST | 59489 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 11, 2023 03:16:58.419821978 CEST | 53 | 56452 | 8.8.8.8 | 192.168.2.3 |
Sep 11, 2023 03:16:58.495748043 CEST | 53 | 59489 | 8.8.8.8 | 192.168.2.3 |
Sep 11, 2023 03:17:01.093081951 CEST | 60000 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 11, 2023 03:17:01.093691111 CEST | 54193 | 53 | 192.168.2.3 | 8.8.8.8 |
Sep 11, 2023 03:17:01.190656900 CEST | 53 | 60000 | 8.8.8.8 | 192.168.2.3 |
Sep 11, 2023 03:17:01.190844059 CEST | 53 | 54193 | 8.8.8.8 | 192.168.2.3 |
Sep 11, 2023 03:17:56.900572062 CEST | 53 | 61871 | 8.8.8.8 | 192.168.2.3 |
Timestamp | Source IP | Dest IP | Checksum | Code | Type |
---|---|---|---|---|---|
Sep 11, 2023 03:16:58.495857954 CEST | 192.168.2.3 | 8.8.8.8 | d031 | (Port unreachable) | Destination Unreachable |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Sep 11, 2023 03:16:57.278346062 CEST | 192.168.2.3 | 8.8.8.8 | 0xd87b | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Sep 11, 2023 03:16:57.278587103 CEST | 192.168.2.3 | 8.8.8.8 | 0x1f62 | Standard query (0) | 65 | IN (0x0001) | false | |
Sep 11, 2023 03:16:57.279130936 CEST | 192.168.2.3 | 8.8.8.8 | 0x38b3 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Sep 11, 2023 03:16:57.279424906 CEST | 192.168.2.3 | 8.8.8.8 | 0x590c | Standard query (0) | 65 | IN (0x0001) | false | |
Sep 11, 2023 03:16:58.310106039 CEST | 192.168.2.3 | 8.8.8.8 | 0xf065 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Sep 11, 2023 03:16:58.311014891 CEST | 192.168.2.3 | 8.8.8.8 | 0xb077 | Standard query (0) | 65 | IN (0x0001) | false | |
Sep 11, 2023 03:17:01.093081951 CEST | 192.168.2.3 | 8.8.8.8 | 0xfe3c | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Sep 11, 2023 03:17:01.093691111 CEST | 192.168.2.3 | 8.8.8.8 | 0x8504 | Standard query (0) | 65 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Sep 11, 2023 03:16:57.377568007 CEST | 8.8.8.8 | 192.168.2.3 | 0xd87b | No error (0) | clients.l.google.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Sep 11, 2023 03:16:57.377568007 CEST | 8.8.8.8 | 192.168.2.3 | 0xd87b | No error (0) | 142.251.41.14 | A (IP address) | IN (0x0001) | false | ||
Sep 11, 2023 03:16:57.377775908 CEST | 8.8.8.8 | 192.168.2.3 | 0x1f62 | No error (0) | clients.l.google.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Sep 11, 2023 03:16:57.378722906 CEST | 8.8.8.8 | 192.168.2.3 | 0x38b3 | No error (0) | 142.251.40.205 | A (IP address) | IN (0x0001) | false | ||
Sep 11, 2023 03:16:58.419821978 CEST | 8.8.8.8 | 192.168.2.3 | 0xf065 | No error (0) | 5.149.255.154 | A (IP address) | IN (0x0001) | false | ||
Sep 11, 2023 03:16:58.419821978 CEST | 8.8.8.8 | 192.168.2.3 | 0xf065 | No error (0) | 5.149.248.141 | A (IP address) | IN (0x0001) | false | ||
Sep 11, 2023 03:16:58.419821978 CEST | 8.8.8.8 | 192.168.2.3 | 0xf065 | No error (0) | 5.149.254.180 | A (IP address) | IN (0x0001) | false | ||
Sep 11, 2023 03:16:58.419821978 CEST | 8.8.8.8 | 192.168.2.3 | 0xf065 | No error (0) | 79.141.160.71 | A (IP address) | IN (0x0001) | false | ||
Sep 11, 2023 03:16:58.419821978 CEST | 8.8.8.8 | 192.168.2.3 | 0xf065 | No error (0) | 5.149.254.210 | A (IP address) | IN (0x0001) | false | ||
Sep 11, 2023 03:16:58.419821978 CEST | 8.8.8.8 | 192.168.2.3 | 0xf065 | No error (0) | 79.141.160.87 | A (IP address) | IN (0x0001) | false | ||
Sep 11, 2023 03:17:01.190656900 CEST | 8.8.8.8 | 192.168.2.3 | 0xfe3c | No error (0) | 142.250.72.100 | A (IP address) | IN (0x0001) | false | ||
Sep 11, 2023 03:17:01.190844059 CEST | 8.8.8.8 | 192.168.2.3 | 0x8504 | No error (0) | 65 | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
0 | 192.168.2.3 | 49699 | 142.251.41.14 | 443 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | kBytes transferred | Direction | Data |
---|
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
1 | 192.168.2.3 | 49698 | 142.251.40.205 | 443 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | kBytes transferred | Direction | Data |
---|
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
2 | 192.168.2.3 | 49703 | 5.149.255.154 | 80 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
Sep 11, 2023 03:16:58.615845919 CEST | 482 | OUT | |
Sep 11, 2023 03:16:58.782427073 CEST | 548 | IN | |
Sep 11, 2023 03:16:59.348927975 CEST | 549 | OUT | |
Sep 11, 2023 03:16:59.516105890 CEST | 550 | IN | |
Sep 11, 2023 03:17:44.521945000 CEST | 623 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
3 | 192.168.2.3 | 49702 | 5.149.255.154 | 80 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
Sep 11, 2023 03:17:43.631127119 CEST | 623 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
0 | 192.168.2.3 | 49699 | 142.251.41.14 | 443 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
2023-09-11 01:16:57 UTC | 0 | OUT | |
2023-09-11 01:16:57 UTC | 1 | IN | |
2023-09-11 01:16:57 UTC | 2 | IN | |
2023-09-11 01:16:57 UTC | 2 | IN | |
2023-09-11 01:16:57 UTC | 2 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
1 | 192.168.2.3 | 49698 | 142.251.40.205 | 443 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
2023-09-11 01:16:57 UTC | 0 | OUT | |
2023-09-11 01:16:57 UTC | 1 | OUT | |
2023-09-11 01:16:57 UTC | 2 | IN | |
2023-09-11 01:16:57 UTC | 4 | IN | |
2023-09-11 01:16:57 UTC | 4 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 03:16:53 |
Start date: | 11/09/2023 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff67bb30000 |
File size: | 3'219'224 bytes |
MD5 hash: | 8D1C4713ACB7CC2AAAEE4477C58A80BA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 1 |
Start time: | 03:16:55 |
Start date: | 11/09/2023 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff67bb30000 |
File size: | 3'219'224 bytes |
MD5 hash: | 8D1C4713ACB7CC2AAAEE4477C58A80BA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 2 |
Start time: | 03:16:57 |
Start date: | 11/09/2023 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff67bb30000 |
File size: | 3'219'224 bytes |
MD5 hash: | 8D1C4713ACB7CC2AAAEE4477C58A80BA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |