Windows
Analysis Report
https://smbc-iukhu.shop/
Overview
Detection
Score: | 56 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
chrome.exe (PID: 7116 cmdline:
C:\Program Files\Goo gle\Chrome \Applicati on\chrome. exe" --sta rt-maximiz ed "about: blank MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) chrome.exe (PID: 1816 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2324 --fi eld-trial- handle=225 2,i,117012 4782817132 1703,67746 1483461812 1191,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
chrome.exe (PID: 6564 cmdline:
C:\Program Files\Goo gle\Chrome \Applicati on\chrome. exe" "http s://smbc-i ukhu.shop/ MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
- • AV Detection
- • Compliance
- • Networking
- • System Summary
- • Boot Survival
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | Avira URL Cloud: |
Source: | HTTPS traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | HTTPS traffic detected: |
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | File created: | Jump to behavior |
Source: | Classification label: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: |
Source: | File created: | Jump to behavior |
Source: | Window detected: |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact | Resource Development | Reconnaissance |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 11 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | 1 Encrypted Channel | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Abuse Accessibility Features | Acquire Infrastructure | Gather Victim Identity Information |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | 4 Non-Application Layer Protocol | SIM Card Swap | Obtain Device Cloud Backups | Network Denial of Service | Domains | Credentials |
Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | 5 Application Layer Protocol | Data Encrypted for Impact | DNS Server | Email Addresses | ||
Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Traffic Duplication | 3 Ingress Tool Transfer | Data Destruction | Virtual Private Server | Employee Names |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | phishing |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | phishing |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
accounts.google.com | 142.250.217.77 | true | false | high | |
smbc-iukhu.shop | 134.122.188.254 | true | false | unknown | |
www.google.com | 142.251.215.228 | true | false | high | |
clients.l.google.com | 142.251.211.238 | true | false | high | |
clients2.google.com | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true | unknown | ||
false | unknown | ||
false |
| unknown | |
false | high | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.251.215.228 | www.google.com | United States | 15169 | GOOGLEUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.250.217.77 | accounts.google.com | United States | 15169 | GOOGLEUS | false | |
142.251.211.238 | clients.l.google.com | United States | 15169 | GOOGLEUS | false | |
134.122.188.254 | smbc-iukhu.shop | United States | 64050 | BCPL-SGBGPNETGlobalASNSG | false |
IP |
---|
192.168.2.5 |
Joe Sandbox Version: | 38.0.0 Ammolite |
Analysis ID: | 1340118 |
Start date and time: | 2023-11-10 00:50:18 +01:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 3m 0s |
Hypervisor based Inspection enabled: | false |
Report type: | light |
Cookbook file name: | browseurl.jbs |
Sample URL: | https://smbc-iukhu.shop/ |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal56.win@16/7@8/6 |
EGA Information: | Failed |
HCA Information: |
|
- Exclude process from analysis
(whitelisted): dllhost.exe, WM IADAP.exe, SIHClient.exe, svch ost.exe - TCP Packets have been reduced
to 100 - Excluded IPs from analysis (wh
itelisted): 142.251.33.67, 34. 104.35.123, 8.253.133.112, 192 .229.211.108, 69.164.40.8, 142 .250.217.67 - Excluded domains from analysis
(whitelisted): fs.microsoft.c om, ocsp.digicert.com, edgedl. me.gvt1.com, slscr.update.micr osoft.com, update.googleapis.c om, ctldl.windowsupdate.com, c lientservices.googleapis.com, fe3cr.delivery.mp.microsoft.co m - Not all processes where analyz
ed, report is missing behavior information - VT rate limit hit for: https:
//smbc-iukhu.shop/
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.961397985317389 |
Encrypted: | false |
SSDEEP: | 48:8Pad6TG2xEHHidAKZdA19ehwiZUklqehTy+3:8rHxAoy |
MD5: | D9F2FEB6545403A3CD4425F900D09A01 |
SHA1: | 24D8A81CB7246F934E3658E2E3EB73A990E91998 |
SHA-256: | 2753FD04C22E3E47A1E77323679434F161FBBE21356792C9302FCAB9463C521D |
SHA-512: | 72264C53E474FDC2E02799E83343D9485CF426A9972758403953D00F2D9CAE6DC0EF8E6F73A30FEA83BA6B309BED537D8A80AB26EE9BA02FBB7E72FD59B1E019 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.9781556611970688 |
Encrypted: | false |
SSDEEP: | 48:8Fad6TG2xEHHidAKZdA1weh/iZUkAQkqehYy+2:8NHx69Q1y |
MD5: | EEBF04CF37481BE1D2E7C6E8C9F4413A |
SHA1: | 445E1D271404A4226201D9C252A05ADB8E635235 |
SHA-256: | 18ADAAD8C3302611863F4B869A219968A0F3240913B54E5EB36819F48AA88CCC |
SHA-512: | 7D88D812DBCC640B3EE216B309DF080701A01C64FF1DD47EA0F5C7B8364209C7740CE642195D3E9C0FC34BBDE8C12E0B301B411C24FD8A67DC19D3C4A01CB9BE |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2693 |
Entropy (8bit): | 3.9906531944039427 |
Encrypted: | false |
SSDEEP: | 48:8xXd6TG2sHHidAKZdA14tseh7sFiZUkmgqeh7sSy+BX:8xMHKnsy |
MD5: | E4CAFBCA1B15E8BE78F9C8CBC739F020 |
SHA1: | 5C9E1802D23FA641B170EC1BC31A0C52219EFC82 |
SHA-256: | 48DCE1CE6D30E0F8DFA432A27396FB5466F27D713A6D5F1FA77DBDE63492145B |
SHA-512: | 4F4442B4C9535BBF8074448D0FA0DF0BB50F7B83FEF1CCCA6FAB2CDC1673433787C7EF312351075950C26EC551518825AB9A742AFA207A518978F4EE5FDFC72E |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.97492389540256 |
Encrypted: | false |
SSDEEP: | 48:8rad6TG2xEHHidAKZdA1vehDiZUkwqeh0y+R:8HHxhay |
MD5: | FA0E49905756B442022553E1CEE8F0E9 |
SHA1: | F7287086B23B741584D18992212552B0040930A0 |
SHA-256: | 62F189599B5E8281FEB5CD73E68B2BFE1E7C73EC60B83499A206BD9603EB42EB |
SHA-512: | 8001D86A40171606FC24B91438A36A98C4C0CCAD3441CAEFA97B08D0E19D3F7A6E41E7C8C975F2D30DC54A575E1A708BF2C1D3D7246E8FAB9DBEE956D500AEE6 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.964860744015915 |
Encrypted: | false |
SSDEEP: | 48:85ad6TG2xEHHidAKZdA1hehBiZUk1W1qehGy+C:8hHxh9my |
MD5: | 9871DF27BD2756961A66B40CFFFFE56F |
SHA1: | 276AD19EEA4862317C43719A51D7CCBDD9A6F36B |
SHA-256: | 037D18304F4F30649393B801497B8C020CEAD5907ADF00E031EBBFBF881CA0B0 |
SHA-512: | 9D212131C86854918B5B8E4229A39FFF235691D60B1D8E11E60D7278FDCD0EF076F743062D31D7757C9F45181FCCEA4ACB7020F785A4BF8AC59D0A454753F74C |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2683 |
Entropy (8bit): | 3.9718512642519612 |
Encrypted: | false |
SSDEEP: | 48:8fad6TG2xEHHidAKZdA1duT+ehOuTbbiZUk5OjqehOuTbsy+yT+:8bHxdT/TbxWOvTbsy7T |
MD5: | ECC0C66919F35925D91B454E617A12B4 |
SHA1: | 1BA0B6F13AC3BAADA1E8E7BBA0E5DBC939E41C80 |
SHA-256: | 9F160071B11BA46E0DB488E0DD68BB83AFDE9F6739F9F3344A2E7F246F2A6AAC |
SHA-512: | 5D292B04FD8A44418E6FBD4D196C2AFE342B8A4236DD986865EB108DEDA12A111383A7C9DC087F90B7FABDAEEC9B68081F03273C122F50C121F2CD54790A9103 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 262 |
Entropy (8bit): | 5.156537462468349 |
Encrypted: | false |
SSDEEP: | 6:pn0+Dy9xwGObRmEr6VnetdzRx3G0CezoIRVFQL38oD:J0+oxBeRmR9etdzRxGezHLO8+ |
MD5: | 8826F6D1433DBF12A01F5B739B3F9C3E |
SHA1: | 70329EFEA6E794463FAD8F27A6D988E58FDD572C |
SHA-256: | 8184890882B399895394737209202BF8BA2D45BF630C26D9F1378008EB247C5C |
SHA-512: | 4BB4364AB58847D6F06DFBF91A7F4DE9460BB4442814DF35377CF77B97EB347962CB7DE2DC02D952762F5FCE7E40AE1E43E270816913946FCF1F1FD4007D3694 |
Malicious: | false |
Reputation: | low |
URL: | https://smbc-iukhu.shop/favicon.ico |
Preview: |
- Total Packets: 62
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 10, 2023 00:51:05.685044050 CET | 49674 | 443 | 192.168.2.5 | 23.1.237.91 |
Nov 10, 2023 00:51:05.685050011 CET | 49675 | 443 | 192.168.2.5 | 23.1.237.91 |
Nov 10, 2023 00:51:05.778779984 CET | 49673 | 443 | 192.168.2.5 | 23.1.237.91 |
Nov 10, 2023 00:51:12.697973967 CET | 49705 | 443 | 192.168.2.5 | 142.251.211.238 |
Nov 10, 2023 00:51:12.698052883 CET | 443 | 49705 | 142.251.211.238 | 192.168.2.5 |
Nov 10, 2023 00:51:12.698132038 CET | 49705 | 443 | 192.168.2.5 | 142.251.211.238 |
Nov 10, 2023 00:51:12.698661089 CET | 49705 | 443 | 192.168.2.5 | 142.251.211.238 |
Nov 10, 2023 00:51:12.698703051 CET | 443 | 49705 | 142.251.211.238 | 192.168.2.5 |
Nov 10, 2023 00:51:12.699361086 CET | 49706 | 443 | 192.168.2.5 | 142.250.217.77 |
Nov 10, 2023 00:51:12.699453115 CET | 443 | 49706 | 142.250.217.77 | 192.168.2.5 |
Nov 10, 2023 00:51:12.699522972 CET | 49706 | 443 | 192.168.2.5 | 142.250.217.77 |
Nov 10, 2023 00:51:12.699665070 CET | 49706 | 443 | 192.168.2.5 | 142.250.217.77 |
Nov 10, 2023 00:51:12.699695110 CET | 443 | 49706 | 142.250.217.77 | 192.168.2.5 |
Nov 10, 2023 00:51:13.044611931 CET | 443 | 49705 | 142.251.211.238 | 192.168.2.5 |
Nov 10, 2023 00:51:13.045203924 CET | 49705 | 443 | 192.168.2.5 | 142.251.211.238 |
Nov 10, 2023 00:51:13.045233011 CET | 443 | 49705 | 142.251.211.238 | 192.168.2.5 |
Nov 10, 2023 00:51:13.046159029 CET | 443 | 49705 | 142.251.211.238 | 192.168.2.5 |
Nov 10, 2023 00:51:13.046241045 CET | 49705 | 443 | 192.168.2.5 | 142.251.211.238 |
Nov 10, 2023 00:51:13.047296047 CET | 443 | 49706 | 142.250.217.77 | 192.168.2.5 |
Nov 10, 2023 00:51:13.047372103 CET | 443 | 49705 | 142.251.211.238 | 192.168.2.5 |
Nov 10, 2023 00:51:13.047455072 CET | 49705 | 443 | 192.168.2.5 | 142.251.211.238 |
Nov 10, 2023 00:51:13.047519922 CET | 49706 | 443 | 192.168.2.5 | 142.250.217.77 |
Nov 10, 2023 00:51:13.047545910 CET | 443 | 49706 | 142.250.217.77 | 192.168.2.5 |
Nov 10, 2023 00:51:13.049046040 CET | 443 | 49706 | 142.250.217.77 | 192.168.2.5 |
Nov 10, 2023 00:51:13.049151897 CET | 49706 | 443 | 192.168.2.5 | 142.250.217.77 |
Nov 10, 2023 00:51:13.049169064 CET | 49705 | 443 | 192.168.2.5 | 142.251.211.238 |
Nov 10, 2023 00:51:13.049261093 CET | 443 | 49705 | 142.251.211.238 | 192.168.2.5 |
Nov 10, 2023 00:51:13.049752951 CET | 49705 | 443 | 192.168.2.5 | 142.251.211.238 |
Nov 10, 2023 00:51:13.049762964 CET | 443 | 49705 | 142.251.211.238 | 192.168.2.5 |
Nov 10, 2023 00:51:13.050277948 CET | 49706 | 443 | 192.168.2.5 | 142.250.217.77 |
Nov 10, 2023 00:51:13.050379992 CET | 443 | 49706 | 142.250.217.77 | 192.168.2.5 |
Nov 10, 2023 00:51:13.050399065 CET | 49706 | 443 | 192.168.2.5 | 142.250.217.77 |
Nov 10, 2023 00:51:13.097260952 CET | 443 | 49706 | 142.250.217.77 | 192.168.2.5 |
Nov 10, 2023 00:51:13.157213926 CET | 49705 | 443 | 192.168.2.5 | 142.251.211.238 |
Nov 10, 2023 00:51:13.157517910 CET | 49706 | 443 | 192.168.2.5 | 142.250.217.77 |
Nov 10, 2023 00:51:13.157578945 CET | 443 | 49706 | 142.250.217.77 | 192.168.2.5 |
Nov 10, 2023 00:51:13.266545057 CET | 49706 | 443 | 192.168.2.5 | 142.250.217.77 |
Nov 10, 2023 00:51:13.361294031 CET | 443 | 49705 | 142.251.211.238 | 192.168.2.5 |
Nov 10, 2023 00:51:13.361423016 CET | 443 | 49705 | 142.251.211.238 | 192.168.2.5 |
Nov 10, 2023 00:51:13.361515045 CET | 49705 | 443 | 192.168.2.5 | 142.251.211.238 |
Nov 10, 2023 00:51:13.361963987 CET | 49705 | 443 | 192.168.2.5 | 142.251.211.238 |
Nov 10, 2023 00:51:13.361979008 CET | 443 | 49705 | 142.251.211.238 | 192.168.2.5 |
Nov 10, 2023 00:51:13.372338057 CET | 443 | 49706 | 142.250.217.77 | 192.168.2.5 |
Nov 10, 2023 00:51:13.372503996 CET | 49706 | 443 | 192.168.2.5 | 142.250.217.77 |
Nov 10, 2023 00:51:13.372562885 CET | 443 | 49706 | 142.250.217.77 | 192.168.2.5 |
Nov 10, 2023 00:51:13.372750044 CET | 443 | 49706 | 142.250.217.77 | 192.168.2.5 |
Nov 10, 2023 00:51:13.372833967 CET | 49706 | 443 | 192.168.2.5 | 142.250.217.77 |
Nov 10, 2023 00:51:13.373588085 CET | 49706 | 443 | 192.168.2.5 | 142.250.217.77 |
Nov 10, 2023 00:51:13.373615980 CET | 443 | 49706 | 142.250.217.77 | 192.168.2.5 |
Nov 10, 2023 00:51:14.879332066 CET | 49710 | 443 | 192.168.2.5 | 134.122.188.254 |
Nov 10, 2023 00:51:14.879375935 CET | 443 | 49710 | 134.122.188.254 | 192.168.2.5 |
Nov 10, 2023 00:51:14.879503012 CET | 49710 | 443 | 192.168.2.5 | 134.122.188.254 |
Nov 10, 2023 00:51:14.879991055 CET | 49710 | 443 | 192.168.2.5 | 134.122.188.254 |
Nov 10, 2023 00:51:14.880001068 CET | 443 | 49710 | 134.122.188.254 | 192.168.2.5 |
Nov 10, 2023 00:51:14.880808115 CET | 49711 | 443 | 192.168.2.5 | 134.122.188.254 |
Nov 10, 2023 00:51:14.880877018 CET | 443 | 49711 | 134.122.188.254 | 192.168.2.5 |
Nov 10, 2023 00:51:14.880956888 CET | 49711 | 443 | 192.168.2.5 | 134.122.188.254 |
Nov 10, 2023 00:51:14.881194115 CET | 49711 | 443 | 192.168.2.5 | 134.122.188.254 |
Nov 10, 2023 00:51:14.881212950 CET | 443 | 49711 | 134.122.188.254 | 192.168.2.5 |
Nov 10, 2023 00:51:15.079507113 CET | 49713 | 443 | 192.168.2.5 | 142.251.215.228 |
Nov 10, 2023 00:51:15.079591990 CET | 443 | 49713 | 142.251.215.228 | 192.168.2.5 |
Nov 10, 2023 00:51:15.079679966 CET | 49713 | 443 | 192.168.2.5 | 142.251.215.228 |
Nov 10, 2023 00:51:15.079982996 CET | 49713 | 443 | 192.168.2.5 | 142.251.215.228 |
Nov 10, 2023 00:51:15.080015898 CET | 443 | 49713 | 142.251.215.228 | 192.168.2.5 |
Nov 10, 2023 00:51:15.299604893 CET | 49674 | 443 | 192.168.2.5 | 23.1.237.91 |
Nov 10, 2023 00:51:15.299626112 CET | 49675 | 443 | 192.168.2.5 | 23.1.237.91 |
Nov 10, 2023 00:51:15.393392086 CET | 49673 | 443 | 192.168.2.5 | 23.1.237.91 |
Nov 10, 2023 00:51:15.405616999 CET | 443 | 49713 | 142.251.215.228 | 192.168.2.5 |
Nov 10, 2023 00:51:15.405920029 CET | 49713 | 443 | 192.168.2.5 | 142.251.215.228 |
Nov 10, 2023 00:51:15.405982971 CET | 443 | 49713 | 142.251.215.228 | 192.168.2.5 |
Nov 10, 2023 00:51:15.407450914 CET | 443 | 49713 | 142.251.215.228 | 192.168.2.5 |
Nov 10, 2023 00:51:15.407529116 CET | 49713 | 443 | 192.168.2.5 | 142.251.215.228 |
Nov 10, 2023 00:51:15.412460089 CET | 49713 | 443 | 192.168.2.5 | 142.251.215.228 |
Nov 10, 2023 00:51:15.412731886 CET | 443 | 49713 | 142.251.215.228 | 192.168.2.5 |
Nov 10, 2023 00:51:15.456167936 CET | 49713 | 443 | 192.168.2.5 | 142.251.215.228 |
Nov 10, 2023 00:51:15.456182003 CET | 443 | 49713 | 142.251.215.228 | 192.168.2.5 |
Nov 10, 2023 00:51:15.503541946 CET | 49713 | 443 | 192.168.2.5 | 142.251.215.228 |
Nov 10, 2023 00:51:15.562360048 CET | 443 | 49711 | 134.122.188.254 | 192.168.2.5 |
Nov 10, 2023 00:51:15.562773943 CET | 49711 | 443 | 192.168.2.5 | 134.122.188.254 |
Nov 10, 2023 00:51:15.562796116 CET | 443 | 49711 | 134.122.188.254 | 192.168.2.5 |
Nov 10, 2023 00:51:15.563889980 CET | 443 | 49711 | 134.122.188.254 | 192.168.2.5 |
Nov 10, 2023 00:51:15.563961983 CET | 49711 | 443 | 192.168.2.5 | 134.122.188.254 |
Nov 10, 2023 00:51:15.568908930 CET | 49711 | 443 | 192.168.2.5 | 134.122.188.254 |
Nov 10, 2023 00:51:15.569065094 CET | 443 | 49710 | 134.122.188.254 | 192.168.2.5 |
Nov 10, 2023 00:51:15.569143057 CET | 443 | 49711 | 134.122.188.254 | 192.168.2.5 |
Nov 10, 2023 00:51:15.569614887 CET | 49710 | 443 | 192.168.2.5 | 134.122.188.254 |
Nov 10, 2023 00:51:15.569643974 CET | 443 | 49710 | 134.122.188.254 | 192.168.2.5 |
Nov 10, 2023 00:51:15.569701910 CET | 49711 | 443 | 192.168.2.5 | 134.122.188.254 |
Nov 10, 2023 00:51:15.569716930 CET | 443 | 49711 | 134.122.188.254 | 192.168.2.5 |
Nov 10, 2023 00:51:15.570719957 CET | 443 | 49710 | 134.122.188.254 | 192.168.2.5 |
Nov 10, 2023 00:51:15.570785046 CET | 49710 | 443 | 192.168.2.5 | 134.122.188.254 |
Nov 10, 2023 00:51:15.574377060 CET | 49710 | 443 | 192.168.2.5 | 134.122.188.254 |
Nov 10, 2023 00:51:15.574441910 CET | 443 | 49710 | 134.122.188.254 | 192.168.2.5 |
Nov 10, 2023 00:51:15.612116098 CET | 49711 | 443 | 192.168.2.5 | 134.122.188.254 |
Nov 10, 2023 00:51:15.628565073 CET | 49710 | 443 | 192.168.2.5 | 134.122.188.254 |
Nov 10, 2023 00:51:15.628582001 CET | 443 | 49710 | 134.122.188.254 | 192.168.2.5 |
Nov 10, 2023 00:51:15.672353029 CET | 49710 | 443 | 192.168.2.5 | 134.122.188.254 |
Nov 10, 2023 00:51:16.575999975 CET | 443 | 49711 | 134.122.188.254 | 192.168.2.5 |
Nov 10, 2023 00:51:16.576194048 CET | 443 | 49711 | 134.122.188.254 | 192.168.2.5 |
Nov 10, 2023 00:51:16.576384068 CET | 49711 | 443 | 192.168.2.5 | 134.122.188.254 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 10, 2023 00:51:12.544295073 CET | 58892 | 53 | 192.168.2.5 | 1.1.1.1 |
Nov 10, 2023 00:51:12.544490099 CET | 59105 | 53 | 192.168.2.5 | 1.1.1.1 |
Nov 10, 2023 00:51:12.545030117 CET | 60868 | 53 | 192.168.2.5 | 1.1.1.1 |
Nov 10, 2023 00:51:12.545314074 CET | 52807 | 53 | 192.168.2.5 | 1.1.1.1 |
Nov 10, 2023 00:51:12.656135082 CET | 53 | 63239 | 1.1.1.1 | 192.168.2.5 |
Nov 10, 2023 00:51:12.697160959 CET | 53 | 58892 | 1.1.1.1 | 192.168.2.5 |
Nov 10, 2023 00:51:12.697386026 CET | 53 | 59105 | 1.1.1.1 | 192.168.2.5 |
Nov 10, 2023 00:51:12.697976112 CET | 53 | 52807 | 1.1.1.1 | 192.168.2.5 |
Nov 10, 2023 00:51:12.698405981 CET | 53 | 60868 | 1.1.1.1 | 192.168.2.5 |
Nov 10, 2023 00:51:13.564239979 CET | 53 | 49231 | 1.1.1.1 | 192.168.2.5 |
Nov 10, 2023 00:51:14.072614908 CET | 51756 | 53 | 192.168.2.5 | 1.1.1.1 |
Nov 10, 2023 00:51:14.072827101 CET | 55280 | 53 | 192.168.2.5 | 1.1.1.1 |
Nov 10, 2023 00:51:14.865958929 CET | 53 | 51756 | 1.1.1.1 | 192.168.2.5 |
Nov 10, 2023 00:51:14.878551006 CET | 53 | 55280 | 1.1.1.1 | 192.168.2.5 |
Nov 10, 2023 00:51:14.924968958 CET | 57493 | 53 | 192.168.2.5 | 1.1.1.1 |
Nov 10, 2023 00:51:14.925282955 CET | 50242 | 53 | 192.168.2.5 | 1.1.1.1 |
Nov 10, 2023 00:51:15.077838898 CET | 53 | 57493 | 1.1.1.1 | 192.168.2.5 |
Nov 10, 2023 00:51:15.077861071 CET | 53 | 50242 | 1.1.1.1 | 192.168.2.5 |
Nov 10, 2023 00:51:30.614343882 CET | 53 | 58399 | 1.1.1.1 | 192.168.2.5 |
Nov 10, 2023 00:51:49.626811981 CET | 53 | 49752 | 1.1.1.1 | 192.168.2.5 |
Nov 10, 2023 00:52:12.169095993 CET | 53 | 50477 | 1.1.1.1 | 192.168.2.5 |
Nov 10, 2023 00:52:12.468657017 CET | 53 | 53349 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 10, 2023 00:51:12.544295073 CET | 192.168.2.5 | 1.1.1.1 | 0xe73e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 10, 2023 00:51:12.544490099 CET | 192.168.2.5 | 1.1.1.1 | 0x5d6d | Standard query (0) | 65 | IN (0x0001) | false | |
Nov 10, 2023 00:51:12.545030117 CET | 192.168.2.5 | 1.1.1.1 | 0x43e1 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 10, 2023 00:51:12.545314074 CET | 192.168.2.5 | 1.1.1.1 | 0xa28b | Standard query (0) | 65 | IN (0x0001) | false | |
Nov 10, 2023 00:51:14.072614908 CET | 192.168.2.5 | 1.1.1.1 | 0x4802 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 10, 2023 00:51:14.072827101 CET | 192.168.2.5 | 1.1.1.1 | 0x690 | Standard query (0) | 65 | IN (0x0001) | false | |
Nov 10, 2023 00:51:14.924968958 CET | 192.168.2.5 | 1.1.1.1 | 0xe06b | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 10, 2023 00:51:14.925282955 CET | 192.168.2.5 | 1.1.1.1 | 0x5d8d | Standard query (0) | 65 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 10, 2023 00:51:12.697160959 CET | 1.1.1.1 | 192.168.2.5 | 0xe73e | No error (0) | clients.l.google.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Nov 10, 2023 00:51:12.697160959 CET | 1.1.1.1 | 192.168.2.5 | 0xe73e | No error (0) | 142.251.211.238 | A (IP address) | IN (0x0001) | false | ||
Nov 10, 2023 00:51:12.697386026 CET | 1.1.1.1 | 192.168.2.5 | 0x5d6d | No error (0) | clients.l.google.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Nov 10, 2023 00:51:12.698405981 CET | 1.1.1.1 | 192.168.2.5 | 0x43e1 | No error (0) | 142.250.217.77 | A (IP address) | IN (0x0001) | false | ||
Nov 10, 2023 00:51:14.865958929 CET | 1.1.1.1 | 192.168.2.5 | 0x4802 | No error (0) | 134.122.188.254 | A (IP address) | IN (0x0001) | false | ||
Nov 10, 2023 00:51:15.077838898 CET | 1.1.1.1 | 192.168.2.5 | 0xe06b | No error (0) | 142.251.215.228 | A (IP address) | IN (0x0001) | false | ||
Nov 10, 2023 00:51:15.077861071 CET | 1.1.1.1 | 192.168.2.5 | 0x5d8d | No error (0) | 65 | IN (0x0001) | false |
|
Target ID: | 0 |
Start time: | 00:51:06 |
Start date: | 10/11/2023 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 2 |
Start time: | 00:51:10 |
Start date: | 10/11/2023 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 3 |
Start time: | 00:51:13 |
Start date: | 10/11/2023 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |