Windows
Analysis Report
https://res-1.cdn.office.net/officeonline/o/s/hA3DA932CBFE26BE2_App_scriΡts/OneNoteDS.js
Overview
General Information
Detection
Score: | 0 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w7x64
chrome.exe (PID: 2944 cmdline:
C:\Program Files (x8 6)\Google\ Chrome\App lication\c hrome.exe" --start-m aximized " about:blan k MD5: FFA2B8E17F645BCC20F0E0201FEF83ED) chrome.exe (PID: 2036 cmdline:
"C:\Progra m Files (x 86)\Google \Chrome\Ap plication\ chrome.exe " --type=u tility --u tility-sub -type=netw ork.mojom. NetworkSer vice --lan g=en-US -- service-sa ndbox-type =none --mo jo-platfor m-channel- handle=148 8 --field- trial-hand le=1208,i, 4268960282 646367945, 8426501699 898787135, 131072 --d isable-fea tures=Opti mizationGu ideModelDo wnloading, Optimizati onHints,Op timization HintsFetch ing,Optimi zationTarg etPredicti on /prefet ch:8 MD5: FFA2B8E17F645BCC20F0E0201FEF83ED)
chrome.exe (PID: 1392 cmdline:
C:\Program Files (x8 6)\Google\ Chrome\App lication\c hrome.exe" "https:// res-1.cdn. office.net /officeonl ine/o/s/hA 3DA932CBFE 26BE2_App_ Scripts/On eNoteDS.js MD5: FFA2B8E17F645BCC20F0E0201FEF83ED)
- cleanup
- • Phishing
- • Compliance
- • Software Vulnerabilities
- • Networking
- • System Summary
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTP Parser: |
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior |
Source: | Memory has grown: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Binary or memory string: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Window detected: |
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Process Injection | 2 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Extra Window Memory Injection | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 3 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Extra Window Memory Injection | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 4 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 1 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
accounts.google.com | 142.250.12.84 | true | false | high | |
www.google.com | 142.250.12.104 | true | false | high | |
clients.l.google.com | 172.253.126.102 | true | false | high | |
clients2.google.com | unknown | unknown | false | high | |
m365cdn.nel.measure.office.net | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.250.12.104 | www.google.com | United States | 15169 | GOOGLEUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
172.253.126.102 | clients.l.google.com | United States | 15169 | GOOGLEUS | false | |
142.250.12.84 | accounts.google.com | United States | 15169 | GOOGLEUS | false |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1392204 |
Start date and time: | 2024-02-14 15:04:13 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 15s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | https://res-1.cdn.office.net/officeonline/o/s/hA3DA932CBFE26BE2_App_scriΡts/OneNoteDS.js |
Analysis system description: | Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2) |
Number of analysed new started processes analysed: | 3 |
Number of new started drivers analysed: | 2 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean0.win@18/4@8/4 |
EGA Information: | Failed |
HCA Information: |
|
- Exclude process from analysis
(whitelisted): vga.dll - Excluded IPs from analysis (wh
itelisted): 142.250.12.94, 34. 104.35.123, 23.1.33.16, 23.1.3 3.12, 23.1.33.15, 23.1.33.7, 2 3.1.33.18, 173.223.239.10, 173 .223.239.9, 172.253.126.94 - Excluded domains from analysis
(whitelisted): edgedl.me.gvt1 .com, nel.measure.office.net.e dgesuite.net, e40491.dscd.akam aiedge.net, update.googleapis. com, clientservices.googleapis .com, res-1.cdn.office.net, re s-1.cdn.office.net-c.edgekey.n et, a1894.dscb.akamai.net, res -1.cdn.office.net-c.edgekey.ne t.globalredir.akadns.net - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtCreateFile calls fou nd. - Report size getting too big, t
oo many NtSetInformationFile c alls found.
Process: | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 226 |
Entropy (8bit): | 5.240157682771309 |
Encrypted: | false |
SSDEEP: | 6:JiMVBdgqZj8DHgWdzRiAU2uvxV1+KcBL+GQexRqRIHr/mXg6n:MMHdVBMHgWdzR05+hL5Vr6w6 |
MD5: | 1DB25BC0F11483604833E0C70082BBD0 |
SHA1: | 39E68CFD1478C82BB1E5A46D4152729BD43E704D |
SHA-256: | B574E81A1680772F80B87C81A0D1829FE0AF1CB03E784EC5741DB80579BDA94D |
SHA-512: | 6192BC88048541AE88D253F019C64A3A98EE5A9967FB84406D18F3558459F613DA8486A95798ECF59510FE3A6D189658CCC4523734B6AF434AD7126808E69077 |
Malicious: | false |
Reputation: | low |
URL: | https://res-1.cdn.office.net/favicon.ico |
Preview: |
Process: | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 4967148 |
Entropy (8bit): | 5.689484470445794 |
Encrypted: | false |
SSDEEP: | 49152:syh0pOLKbaoQWJVTEPkXgw1iuKPr52l1G3EFI8k2erl3csFnjQuY3y0tTskUf5zs:ZnshkBbAA/AWObB |
MD5: | 647B16C17F10C2D53F5001A30DBE1B4A |
SHA1: | 9D24D1CF506C164640F7D2E726A43233421AFEA9 |
SHA-256: | A3DA932CBFE26BE25B1AC114AA3349E176C05B53333268C297A258F6A9A905BD |
SHA-512: | 679775A9525128126638E99479C75E4CD0168A41CF361D628D559E8E38C2E4F90C4503C1741943C2D39CCC3E28FEA96C925D0AB9CAD7732BAF6D5B210DC791E8 |
Malicious: | false |
Reputation: | low |
URL: | https://res-1.cdn.office.net/officeonline/o/s/hA3DA932CBFE26BE2_App_Scripts/OneNoteDS.js |
Preview: |
Download Network PCAP: filtered – full
- Total Packets: 60
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Feb 14, 2024 15:05:02.342386961 CET | 49161 | 443 | 192.168.2.22 | 142.250.12.84 |
Feb 14, 2024 15:05:02.342413902 CET | 443 | 49161 | 142.250.12.84 | 192.168.2.22 |
Feb 14, 2024 15:05:02.342572927 CET | 49161 | 443 | 192.168.2.22 | 142.250.12.84 |
Feb 14, 2024 15:05:02.347393036 CET | 49162 | 443 | 192.168.2.22 | 172.253.126.102 |
Feb 14, 2024 15:05:02.347429991 CET | 443 | 49162 | 172.253.126.102 | 192.168.2.22 |
Feb 14, 2024 15:05:02.347709894 CET | 49162 | 443 | 192.168.2.22 | 172.253.126.102 |
Feb 14, 2024 15:05:02.355067968 CET | 49163 | 443 | 192.168.2.22 | 172.253.126.102 |
Feb 14, 2024 15:05:02.355094910 CET | 443 | 49163 | 172.253.126.102 | 192.168.2.22 |
Feb 14, 2024 15:05:02.355149984 CET | 49163 | 443 | 192.168.2.22 | 172.253.126.102 |
Feb 14, 2024 15:05:02.355468035 CET | 49161 | 443 | 192.168.2.22 | 142.250.12.84 |
Feb 14, 2024 15:05:02.355488062 CET | 443 | 49161 | 142.250.12.84 | 192.168.2.22 |
Feb 14, 2024 15:05:02.355811119 CET | 49162 | 443 | 192.168.2.22 | 172.253.126.102 |
Feb 14, 2024 15:05:02.355829000 CET | 443 | 49162 | 172.253.126.102 | 192.168.2.22 |
Feb 14, 2024 15:05:02.356488943 CET | 49163 | 443 | 192.168.2.22 | 172.253.126.102 |
Feb 14, 2024 15:05:02.356503963 CET | 443 | 49163 | 172.253.126.102 | 192.168.2.22 |
Feb 14, 2024 15:05:02.578435898 CET | 443 | 49161 | 142.250.12.84 | 192.168.2.22 |
Feb 14, 2024 15:05:02.578849077 CET | 49161 | 443 | 192.168.2.22 | 142.250.12.84 |
Feb 14, 2024 15:05:02.578864098 CET | 443 | 49161 | 142.250.12.84 | 192.168.2.22 |
Feb 14, 2024 15:05:02.581825018 CET | 443 | 49161 | 142.250.12.84 | 192.168.2.22 |
Feb 14, 2024 15:05:02.581907988 CET | 49161 | 443 | 192.168.2.22 | 142.250.12.84 |
Feb 14, 2024 15:05:02.583754063 CET | 49161 | 443 | 192.168.2.22 | 142.250.12.84 |
Feb 14, 2024 15:05:02.583998919 CET | 49161 | 443 | 192.168.2.22 | 142.250.12.84 |
Feb 14, 2024 15:05:02.584005117 CET | 443 | 49161 | 142.250.12.84 | 192.168.2.22 |
Feb 14, 2024 15:05:02.584398031 CET | 443 | 49161 | 142.250.12.84 | 192.168.2.22 |
Feb 14, 2024 15:05:02.590044022 CET | 443 | 49163 | 172.253.126.102 | 192.168.2.22 |
Feb 14, 2024 15:05:02.590647936 CET | 49163 | 443 | 192.168.2.22 | 172.253.126.102 |
Feb 14, 2024 15:05:02.590676069 CET | 443 | 49163 | 172.253.126.102 | 192.168.2.22 |
Feb 14, 2024 15:05:02.591326952 CET | 443 | 49163 | 172.253.126.102 | 192.168.2.22 |
Feb 14, 2024 15:05:02.591401100 CET | 49163 | 443 | 192.168.2.22 | 172.253.126.102 |
Feb 14, 2024 15:05:02.592080116 CET | 443 | 49163 | 172.253.126.102 | 192.168.2.22 |
Feb 14, 2024 15:05:02.592147112 CET | 49163 | 443 | 192.168.2.22 | 172.253.126.102 |
Feb 14, 2024 15:05:02.593015909 CET | 443 | 49162 | 172.253.126.102 | 192.168.2.22 |
Feb 14, 2024 15:05:02.593291998 CET | 49162 | 443 | 192.168.2.22 | 172.253.126.102 |
Feb 14, 2024 15:05:02.593302965 CET | 443 | 49162 | 172.253.126.102 | 192.168.2.22 |
Feb 14, 2024 15:05:02.593478918 CET | 49163 | 443 | 192.168.2.22 | 172.253.126.102 |
Feb 14, 2024 15:05:02.593558073 CET | 443 | 49163 | 172.253.126.102 | 192.168.2.22 |
Feb 14, 2024 15:05:02.593667984 CET | 49163 | 443 | 192.168.2.22 | 172.253.126.102 |
Feb 14, 2024 15:05:02.593683958 CET | 443 | 49163 | 172.253.126.102 | 192.168.2.22 |
Feb 14, 2024 15:05:02.594105959 CET | 443 | 49162 | 172.253.126.102 | 192.168.2.22 |
Feb 14, 2024 15:05:02.594152927 CET | 49162 | 443 | 192.168.2.22 | 172.253.126.102 |
Feb 14, 2024 15:05:02.595141888 CET | 443 | 49162 | 172.253.126.102 | 192.168.2.22 |
Feb 14, 2024 15:05:02.595185041 CET | 49162 | 443 | 192.168.2.22 | 172.253.126.102 |
Feb 14, 2024 15:05:02.608541012 CET | 49162 | 443 | 192.168.2.22 | 172.253.126.102 |
Feb 14, 2024 15:05:02.608647108 CET | 443 | 49162 | 172.253.126.102 | 192.168.2.22 |
Feb 14, 2024 15:05:02.781294107 CET | 49161 | 443 | 192.168.2.22 | 142.250.12.84 |
Feb 14, 2024 15:05:02.781306028 CET | 443 | 49161 | 142.250.12.84 | 192.168.2.22 |
Feb 14, 2024 15:05:02.796917915 CET | 49163 | 443 | 192.168.2.22 | 172.253.126.102 |
Feb 14, 2024 15:05:02.812489986 CET | 49162 | 443 | 192.168.2.22 | 172.253.126.102 |
Feb 14, 2024 15:05:02.812498093 CET | 443 | 49162 | 172.253.126.102 | 192.168.2.22 |
Feb 14, 2024 15:05:02.813132048 CET | 443 | 49163 | 172.253.126.102 | 192.168.2.22 |
Feb 14, 2024 15:05:02.813308001 CET | 443 | 49163 | 172.253.126.102 | 192.168.2.22 |
Feb 14, 2024 15:05:02.813357115 CET | 49163 | 443 | 192.168.2.22 | 172.253.126.102 |
Feb 14, 2024 15:05:02.813708067 CET | 443 | 49161 | 142.250.12.84 | 192.168.2.22 |
Feb 14, 2024 15:05:02.813751936 CET | 49161 | 443 | 192.168.2.22 | 142.250.12.84 |
Feb 14, 2024 15:05:02.813761950 CET | 443 | 49161 | 142.250.12.84 | 192.168.2.22 |
Feb 14, 2024 15:05:02.813899994 CET | 443 | 49161 | 142.250.12.84 | 192.168.2.22 |
Feb 14, 2024 15:05:02.813947916 CET | 49161 | 443 | 192.168.2.22 | 142.250.12.84 |
Feb 14, 2024 15:05:02.814594984 CET | 49163 | 443 | 192.168.2.22 | 172.253.126.102 |
Feb 14, 2024 15:05:02.814631939 CET | 443 | 49163 | 172.253.126.102 | 192.168.2.22 |
Feb 14, 2024 15:05:02.814825058 CET | 49161 | 443 | 192.168.2.22 | 142.250.12.84 |
Feb 14, 2024 15:05:02.814837933 CET | 443 | 49161 | 142.250.12.84 | 192.168.2.22 |
Feb 14, 2024 15:05:03.011307001 CET | 49162 | 443 | 192.168.2.22 | 172.253.126.102 |
Feb 14, 2024 15:05:07.622461081 CET | 49167 | 443 | 192.168.2.22 | 142.250.12.104 |
Feb 14, 2024 15:05:07.622507095 CET | 443 | 49167 | 142.250.12.104 | 192.168.2.22 |
Feb 14, 2024 15:05:07.622778893 CET | 49167 | 443 | 192.168.2.22 | 142.250.12.104 |
Feb 14, 2024 15:05:07.624021053 CET | 49167 | 443 | 192.168.2.22 | 142.250.12.104 |
Feb 14, 2024 15:05:07.624032021 CET | 443 | 49167 | 142.250.12.104 | 192.168.2.22 |
Feb 14, 2024 15:05:07.845031023 CET | 443 | 49167 | 142.250.12.104 | 192.168.2.22 |
Feb 14, 2024 15:05:08.053900957 CET | 443 | 49167 | 142.250.12.104 | 192.168.2.22 |
Feb 14, 2024 15:05:08.054033995 CET | 49167 | 443 | 192.168.2.22 | 142.250.12.104 |
Feb 14, 2024 15:05:08.202714920 CET | 49167 | 443 | 192.168.2.22 | 142.250.12.104 |
Feb 14, 2024 15:05:08.202745914 CET | 443 | 49167 | 142.250.12.104 | 192.168.2.22 |
Feb 14, 2024 15:05:08.204039097 CET | 443 | 49167 | 142.250.12.104 | 192.168.2.22 |
Feb 14, 2024 15:05:08.204421043 CET | 49167 | 443 | 192.168.2.22 | 142.250.12.104 |
Feb 14, 2024 15:05:08.242461920 CET | 49167 | 443 | 192.168.2.22 | 142.250.12.104 |
Feb 14, 2024 15:05:08.242651939 CET | 443 | 49167 | 142.250.12.104 | 192.168.2.22 |
Feb 14, 2024 15:05:08.449939013 CET | 443 | 49167 | 142.250.12.104 | 192.168.2.22 |
Feb 14, 2024 15:05:08.450027943 CET | 49167 | 443 | 192.168.2.22 | 142.250.12.104 |
Feb 14, 2024 15:05:17.889816046 CET | 443 | 49167 | 142.250.12.104 | 192.168.2.22 |
Feb 14, 2024 15:05:17.889879942 CET | 443 | 49167 | 142.250.12.104 | 192.168.2.22 |
Feb 14, 2024 15:05:17.890021086 CET | 49167 | 443 | 192.168.2.22 | 142.250.12.104 |
Feb 14, 2024 15:05:23.386208057 CET | 49167 | 443 | 192.168.2.22 | 142.250.12.104 |
Feb 14, 2024 15:05:23.386234999 CET | 443 | 49167 | 142.250.12.104 | 192.168.2.22 |
Feb 14, 2024 15:05:47.864295959 CET | 49162 | 443 | 192.168.2.22 | 172.253.126.102 |
Feb 14, 2024 15:05:47.864308119 CET | 443 | 49162 | 172.253.126.102 | 192.168.2.22 |
Feb 14, 2024 15:06:04.444571018 CET | 49162 | 443 | 192.168.2.22 | 172.253.126.102 |
Feb 14, 2024 15:06:04.444704056 CET | 443 | 49162 | 172.253.126.102 | 192.168.2.22 |
Feb 14, 2024 15:06:04.444757938 CET | 49162 | 443 | 192.168.2.22 | 172.253.126.102 |
Feb 14, 2024 15:06:11.422415972 CET | 49172 | 443 | 192.168.2.22 | 142.250.12.104 |
Feb 14, 2024 15:06:11.422456980 CET | 443 | 49172 | 142.250.12.104 | 192.168.2.22 |
Feb 14, 2024 15:06:11.422517061 CET | 49172 | 443 | 192.168.2.22 | 142.250.12.104 |
Feb 14, 2024 15:06:11.423470974 CET | 49172 | 443 | 192.168.2.22 | 142.250.12.104 |
Feb 14, 2024 15:06:11.423486948 CET | 443 | 49172 | 142.250.12.104 | 192.168.2.22 |
Feb 14, 2024 15:06:11.640881062 CET | 443 | 49172 | 142.250.12.104 | 192.168.2.22 |
Feb 14, 2024 15:06:11.641416073 CET | 49172 | 443 | 192.168.2.22 | 142.250.12.104 |
Feb 14, 2024 15:06:11.641442060 CET | 443 | 49172 | 142.250.12.104 | 192.168.2.22 |
Feb 14, 2024 15:06:11.641817093 CET | 443 | 49172 | 142.250.12.104 | 192.168.2.22 |
Feb 14, 2024 15:06:11.643589020 CET | 49172 | 443 | 192.168.2.22 | 142.250.12.104 |
Feb 14, 2024 15:06:11.643677950 CET | 443 | 49172 | 142.250.12.104 | 192.168.2.22 |
Feb 14, 2024 15:06:11.849925041 CET | 443 | 49172 | 142.250.12.104 | 192.168.2.22 |
Feb 14, 2024 15:06:11.850055933 CET | 49172 | 443 | 192.168.2.22 | 142.250.12.104 |
Feb 14, 2024 15:06:21.720112085 CET | 443 | 49172 | 142.250.12.104 | 192.168.2.22 |
Feb 14, 2024 15:06:21.720199108 CET | 443 | 49172 | 142.250.12.104 | 192.168.2.22 |
Feb 14, 2024 15:06:21.720449924 CET | 49172 | 443 | 192.168.2.22 | 142.250.12.104 |
Feb 14, 2024 15:06:22.448398113 CET | 49172 | 443 | 192.168.2.22 | 142.250.12.104 |
Feb 14, 2024 15:06:22.448458910 CET | 443 | 49172 | 142.250.12.104 | 192.168.2.22 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Feb 14, 2024 15:05:02.004164934 CET | 54719 | 53 | 192.168.2.22 | 8.8.8.8 |
Feb 14, 2024 15:05:02.007040024 CET | 49881 | 53 | 192.168.2.22 | 8.8.8.8 |
Feb 14, 2024 15:05:02.009903908 CET | 54998 | 53 | 192.168.2.22 | 8.8.8.8 |
Feb 14, 2024 15:05:02.017090082 CET | 53 | 54821 | 8.8.8.8 | 192.168.2.22 |
Feb 14, 2024 15:05:02.017456055 CET | 52781 | 53 | 192.168.2.22 | 8.8.8.8 |
Feb 14, 2024 15:05:02.107657909 CET | 53 | 54719 | 8.8.8.8 | 192.168.2.22 |
Feb 14, 2024 15:05:02.110805988 CET | 53 | 49881 | 8.8.8.8 | 192.168.2.22 |
Feb 14, 2024 15:05:02.113924026 CET | 53 | 54998 | 8.8.8.8 | 192.168.2.22 |
Feb 14, 2024 15:05:02.121704102 CET | 53 | 52781 | 8.8.8.8 | 192.168.2.22 |
Feb 14, 2024 15:05:03.195060015 CET | 53 | 62672 | 8.8.8.8 | 192.168.2.22 |
Feb 14, 2024 15:05:07.222973108 CET | 58095 | 53 | 192.168.2.22 | 8.8.8.8 |
Feb 14, 2024 15:05:07.256589890 CET | 54261 | 53 | 192.168.2.22 | 8.8.8.8 |
Feb 14, 2024 15:05:07.329787970 CET | 53 | 58095 | 8.8.8.8 | 192.168.2.22 |
Feb 14, 2024 15:05:07.358967066 CET | 53 | 54261 | 8.8.8.8 | 192.168.2.22 |
Feb 14, 2024 15:05:08.594166994 CET | 50446 | 53 | 192.168.2.22 | 8.8.8.8 |
Feb 14, 2024 15:05:08.594521046 CET | 55939 | 53 | 192.168.2.22 | 8.8.8.8 |
Feb 14, 2024 15:05:23.420074940 CET | 53 | 52074 | 8.8.8.8 | 192.168.2.22 |
Feb 14, 2024 15:05:41.580450058 CET | 53 | 53406 | 8.8.8.8 | 192.168.2.22 |
Feb 14, 2024 15:05:52.001754045 CET | 53 | 49750 | 8.8.8.8 | 192.168.2.22 |
Feb 14, 2024 15:06:01.814981937 CET | 53 | 49690 | 8.8.8.8 | 192.168.2.22 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Feb 14, 2024 15:05:02.004164934 CET | 192.168.2.22 | 8.8.8.8 | 0xd986 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Feb 14, 2024 15:05:02.007040024 CET | 192.168.2.22 | 8.8.8.8 | 0xc684 | Standard query (0) | 65 | IN (0x0001) | false | |
Feb 14, 2024 15:05:02.009903908 CET | 192.168.2.22 | 8.8.8.8 | 0x3554 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Feb 14, 2024 15:05:02.017456055 CET | 192.168.2.22 | 8.8.8.8 | 0xe3f3 | Standard query (0) | 65 | IN (0x0001) | false | |
Feb 14, 2024 15:05:07.222973108 CET | 192.168.2.22 | 8.8.8.8 | 0xddd4 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Feb 14, 2024 15:05:07.256589890 CET | 192.168.2.22 | 8.8.8.8 | 0x58ef | Standard query (0) | 65 | IN (0x0001) | false | |
Feb 14, 2024 15:05:08.594166994 CET | 192.168.2.22 | 8.8.8.8 | 0x22be | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Feb 14, 2024 15:05:08.594521046 CET | 192.168.2.22 | 8.8.8.8 | 0x6a18 | Standard query (0) | 65 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Feb 14, 2024 15:05:02.107657909 CET | 8.8.8.8 | 192.168.2.22 | 0xd986 | No error (0) | 142.250.12.84 | A (IP address) | IN (0x0001) | false | ||
Feb 14, 2024 15:05:02.113924026 CET | 8.8.8.8 | 192.168.2.22 | 0x3554 | No error (0) | clients.l.google.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Feb 14, 2024 15:05:02.113924026 CET | 8.8.8.8 | 192.168.2.22 | 0x3554 | No error (0) | 172.253.126.102 | A (IP address) | IN (0x0001) | false | ||
Feb 14, 2024 15:05:02.113924026 CET | 8.8.8.8 | 192.168.2.22 | 0x3554 | No error (0) | 172.253.126.113 | A (IP address) | IN (0x0001) | false | ||
Feb 14, 2024 15:05:02.113924026 CET | 8.8.8.8 | 192.168.2.22 | 0x3554 | No error (0) | 172.253.126.138 | A (IP address) | IN (0x0001) | false | ||
Feb 14, 2024 15:05:02.113924026 CET | 8.8.8.8 | 192.168.2.22 | 0x3554 | No error (0) | 172.253.126.100 | A (IP address) | IN (0x0001) | false | ||
Feb 14, 2024 15:05:02.113924026 CET | 8.8.8.8 | 192.168.2.22 | 0x3554 | No error (0) | 172.253.126.101 | A (IP address) | IN (0x0001) | false | ||
Feb 14, 2024 15:05:02.113924026 CET | 8.8.8.8 | 192.168.2.22 | 0x3554 | No error (0) | 172.253.126.139 | A (IP address) | IN (0x0001) | false | ||
Feb 14, 2024 15:05:02.121704102 CET | 8.8.8.8 | 192.168.2.22 | 0xe3f3 | No error (0) | clients.l.google.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Feb 14, 2024 15:05:07.329787970 CET | 8.8.8.8 | 192.168.2.22 | 0xddd4 | No error (0) | 142.250.12.104 | A (IP address) | IN (0x0001) | false | ||
Feb 14, 2024 15:05:07.329787970 CET | 8.8.8.8 | 192.168.2.22 | 0xddd4 | No error (0) | 142.250.12.106 | A (IP address) | IN (0x0001) | false | ||
Feb 14, 2024 15:05:07.329787970 CET | 8.8.8.8 | 192.168.2.22 | 0xddd4 | No error (0) | 142.250.12.147 | A (IP address) | IN (0x0001) | false | ||
Feb 14, 2024 15:05:07.329787970 CET | 8.8.8.8 | 192.168.2.22 | 0xddd4 | No error (0) | 142.250.12.99 | A (IP address) | IN (0x0001) | false | ||
Feb 14, 2024 15:05:07.329787970 CET | 8.8.8.8 | 192.168.2.22 | 0xddd4 | No error (0) | 142.250.12.103 | A (IP address) | IN (0x0001) | false | ||
Feb 14, 2024 15:05:07.329787970 CET | 8.8.8.8 | 192.168.2.22 | 0xddd4 | No error (0) | 142.250.12.105 | A (IP address) | IN (0x0001) | false | ||
Feb 14, 2024 15:05:07.358967066 CET | 8.8.8.8 | 192.168.2.22 | 0x58ef | No error (0) | 65 | IN (0x0001) | false | |||
Feb 14, 2024 15:05:08.698159933 CET | 8.8.8.8 | 192.168.2.22 | 0x6a18 | No error (0) | nel.measure.office.net.edgesuite.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Feb 14, 2024 15:05:08.698295116 CET | 8.8.8.8 | 192.168.2.22 | 0x22be | No error (0) | nel.measure.office.net.edgesuite.net | CNAME (Canonical name) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.22 | 49161 | 142.250.12.84 | 443 | 2036 | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-02-14 14:05:02 UTC | 785 | OUT | |
2024-02-14 14:05:02 UTC | 1 | OUT | |
2024-02-14 14:05:02 UTC | 1799 | IN | |
2024-02-14 14:05:02 UTC | 23 | IN | |
2024-02-14 14:05:02 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.22 | 49163 | 172.253.126.102 | 443 | 2036 | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-02-14 14:05:02 UTC | 732 | OUT | |
2024-02-14 14:05:02 UTC | 732 | IN | |
2024-02-14 14:05:02 UTC | 520 | IN | |
2024-02-14 14:05:02 UTC | 200 | IN | |
2024-02-14 14:05:02 UTC | 5 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 15:04:58 |
Start date: | 14/02/2024 |
Path: | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x13f030000 |
File size: | 3'151'128 bytes |
MD5 hash: | FFA2B8E17F645BCC20F0E0201FEF83ED |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 1 |
Start time: | 15:04:59 |
Start date: | 14/02/2024 |
Path: | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x13f030000 |
File size: | 3'151'128 bytes |
MD5 hash: | FFA2B8E17F645BCC20F0E0201FEF83ED |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 4 |
Start time: | 15:05:01 |
Start date: | 14/02/2024 |
Path: | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x13f030000 |
File size: | 3'151'128 bytes |
MD5 hash: | FFA2B8E17F645BCC20F0E0201FEF83ED |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |