Windows
Analysis Report
https://sdk.fra-01.braze.eu/api/v3/data/
Overview
Detection
Score: | 0 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
chrome.exe (PID: 5088 cmdline:
C:\Program Files\Goo gle\Chrome \Applicati on\chrome. exe" --sta rt-maximiz ed "about: blank MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) chrome.exe (PID: 3992 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2260 --fi eld-trial- handle=222 0,i,577872 2968356699 458,180035 6982295177 0728,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
chrome.exe (PID: 6484 cmdline:
C:\Program Files\Goo gle\Chrome \Applicati on\chrome. exe" "http s://sdk.fr a-01.braze .eu/api/v3 /data/ MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
- • Phishing
- • Compliance
- • Networking
- • System Summary
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Window detected: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Process Injection | 1 Process Injection | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 1 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
1% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
www.google.com | 142.251.40.100 | true | false | high | |
fp2e7a.wpc.phicdn.net | 192.229.211.108 | true | false |
| unknown |
sdk.fra-01.braze.eu | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.251.40.100 | www.google.com | United States | 15169 | GOOGLEUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false |
IP |
---|
192.168.2.4 |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1400844 |
Start date and time: | 2024-02-29 12:00:33 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 7s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | https://sdk.fra-01.braze.eu/api/v3/data/ |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 8 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean0.win@16/5@6/3 |
EGA Information: | Failed |
HCA Information: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, W MIADAP.exe, SIHClient.exe, con host.exe, svchost.exe - Excluded IPs from analysis (wh
itelisted): 142.250.80.99, 142 .250.65.238, 172.253.62.84, 34 .104.35.123, 151.101.65.208, 1 51.101.193.208, 151.101.129.20 8, 151.101.1.208, 13.85.23.86, 23.206.121.52, 23.206.121.20, 23.206.121.47, 23.206.121.28, 192.229.211.108, 20.242.39.17 1, 20.3.187.198, 142.251.40.99 - Excluded domains from analysis
(whitelisted): fs.microsoft.c om, accounts.google.com, slscr .update.microsoft.com, d2.shar ed.global.fastly.net, clientse rvices.googleapis.com, ctldl.w indowsupdate.com, a767.dspw65. akamai.net, wu-bg-shim.traffic manager.net, download.windowsu pdate.com.edgesuite.net, fe3cr .delivery.mp.microsoft.com, fe 3.delivery.mp.microsoft.com, c lients2.google.com, edgedl.me. gvt1.com, ocsp.digicert.com, o csp.edge.digicert.com, glb.cws .prod.dcat.dsp.trafficmanager. net, sls.update.microsoft.com, update.googleapis.com, client s.l.google.com, glb.sls.prod.d cat.dsp.trafficmanager.net - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtSetInformationFile c alls found.
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 27 |
Entropy (8bit): | 3.8841550945958043 |
Encrypted: | false |
SSDEEP: | 3:YAPFrKFkJaY:YAPFOFAaY |
MD5: | 0F4F0AAA6EA8F4B00B021973B681FD6A |
SHA1: | 34F8855DF3DD6BBF6F46D0DB73A383A240E144B3 |
SHA-256: | 6CF6953E625A6215204D25C9AFE9EBDBA3A98AC672804BEE3B9F707A0EE4B487 |
SHA-512: | A5E93D6CD26043B40D79C7D67D6F48AD37220F7F8B836DBAA8ED1E453E36E2F9D07F2AE8B5B5CC21D997C45D7F4B3240C8036E1B5AF6639B8EEEAFB89FD15768 |
Malicious: | false |
Reputation: | low |
URL: | https://sdk.fra-01.braze.eu/api/v3/data/ |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 15086 |
Entropy (8bit): | 4.728520317142111 |
Encrypted: | false |
SSDEEP: | 192:jMVWu5y8ZQTY80RGOPfMLcwS8gD2F1gcP5DuYEl3qF0Oulf:jMoUZQTYT0OPkLJVgD2Fuk5DuxKulf |
MD5: | B04370195EDC2F49A9E34B63909B948A |
SHA1: | 538110B436CBA3DB3A6C4943FB11DF8C7C470570 |
SHA-256: | DE47F4635AE36272F176D9391E7860951B64465F641648DEAA43876160D69C52 |
SHA-512: | FC854AFB1037AE47C75FA0F62E00DE5CC1CDB2E493EE946DA4F42BA2D688BE14F74358334FB407D0C4F3F897EF8F2B227F9C3C921930BE0B5BE4E55062FE65EE |
Malicious: | false |
Reputation: | low |
URL: | https://sdk.fra-01.braze.eu/favicon.ico |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 15086 |
Entropy (8bit): | 4.728520317142111 |
Encrypted: | false |
SSDEEP: | 192:jMVWu5y8ZQTY80RGOPfMLcwS8gD2F1gcP5DuYEl3qF0Oulf:jMoUZQTYT0OPkLJVgD2Fuk5DuxKulf |
MD5: | B04370195EDC2F49A9E34B63909B948A |
SHA1: | 538110B436CBA3DB3A6C4943FB11DF8C7C470570 |
SHA-256: | DE47F4635AE36272F176D9391E7860951B64465F641648DEAA43876160D69C52 |
SHA-512: | FC854AFB1037AE47C75FA0F62E00DE5CC1CDB2E493EE946DA4F42BA2D688BE14F74358334FB407D0C4F3F897EF8F2B227F9C3C921930BE0B5BE4E55062FE65EE |
Malicious: | false |
Reputation: | low |
Preview: |
Download Network PCAP: filtered – full
- Total Packets: 48
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Feb 29, 2024 12:01:23.596472979 CET | 49675 | 443 | 192.168.2.4 | 173.222.162.32 |
Feb 29, 2024 12:01:32.933803082 CET | 49739 | 443 | 192.168.2.4 | 142.251.40.100 |
Feb 29, 2024 12:01:32.933837891 CET | 443 | 49739 | 142.251.40.100 | 192.168.2.4 |
Feb 29, 2024 12:01:32.933902979 CET | 49739 | 443 | 192.168.2.4 | 142.251.40.100 |
Feb 29, 2024 12:01:32.934142113 CET | 49739 | 443 | 192.168.2.4 | 142.251.40.100 |
Feb 29, 2024 12:01:32.934158087 CET | 443 | 49739 | 142.251.40.100 | 192.168.2.4 |
Feb 29, 2024 12:01:33.203674078 CET | 443 | 49739 | 142.251.40.100 | 192.168.2.4 |
Feb 29, 2024 12:01:33.204195023 CET | 49739 | 443 | 192.168.2.4 | 142.251.40.100 |
Feb 29, 2024 12:01:33.204216957 CET | 443 | 49739 | 142.251.40.100 | 192.168.2.4 |
Feb 29, 2024 12:01:33.204544067 CET | 49675 | 443 | 192.168.2.4 | 173.222.162.32 |
Feb 29, 2024 12:01:33.205075026 CET | 443 | 49739 | 142.251.40.100 | 192.168.2.4 |
Feb 29, 2024 12:01:33.205127954 CET | 49739 | 443 | 192.168.2.4 | 142.251.40.100 |
Feb 29, 2024 12:01:33.208147049 CET | 49739 | 443 | 192.168.2.4 | 142.251.40.100 |
Feb 29, 2024 12:01:33.208211899 CET | 443 | 49739 | 142.251.40.100 | 192.168.2.4 |
Feb 29, 2024 12:01:33.251441002 CET | 49739 | 443 | 192.168.2.4 | 142.251.40.100 |
Feb 29, 2024 12:01:33.251456976 CET | 443 | 49739 | 142.251.40.100 | 192.168.2.4 |
Feb 29, 2024 12:01:33.298301935 CET | 49739 | 443 | 192.168.2.4 | 142.251.40.100 |
Feb 29, 2024 12:01:33.872570992 CET | 49740 | 443 | 192.168.2.4 | 23.51.58.94 |
Feb 29, 2024 12:01:33.872596025 CET | 443 | 49740 | 23.51.58.94 | 192.168.2.4 |
Feb 29, 2024 12:01:33.872665882 CET | 49740 | 443 | 192.168.2.4 | 23.51.58.94 |
Feb 29, 2024 12:01:33.875264883 CET | 49740 | 443 | 192.168.2.4 | 23.51.58.94 |
Feb 29, 2024 12:01:33.875278950 CET | 443 | 49740 | 23.51.58.94 | 192.168.2.4 |
Feb 29, 2024 12:01:34.072360992 CET | 443 | 49740 | 23.51.58.94 | 192.168.2.4 |
Feb 29, 2024 12:01:34.072439909 CET | 49740 | 443 | 192.168.2.4 | 23.51.58.94 |
Feb 29, 2024 12:01:34.078594923 CET | 49740 | 443 | 192.168.2.4 | 23.51.58.94 |
Feb 29, 2024 12:01:34.078620911 CET | 443 | 49740 | 23.51.58.94 | 192.168.2.4 |
Feb 29, 2024 12:01:34.079046011 CET | 443 | 49740 | 23.51.58.94 | 192.168.2.4 |
Feb 29, 2024 12:01:34.126435995 CET | 49740 | 443 | 192.168.2.4 | 23.51.58.94 |
Feb 29, 2024 12:01:34.272876978 CET | 49740 | 443 | 192.168.2.4 | 23.51.58.94 |
Feb 29, 2024 12:01:34.313910007 CET | 443 | 49740 | 23.51.58.94 | 192.168.2.4 |
Feb 29, 2024 12:01:34.362684965 CET | 443 | 49740 | 23.51.58.94 | 192.168.2.4 |
Feb 29, 2024 12:01:34.362801075 CET | 443 | 49740 | 23.51.58.94 | 192.168.2.4 |
Feb 29, 2024 12:01:34.362862110 CET | 49740 | 443 | 192.168.2.4 | 23.51.58.94 |
Feb 29, 2024 12:01:34.363147020 CET | 49740 | 443 | 192.168.2.4 | 23.51.58.94 |
Feb 29, 2024 12:01:34.363173008 CET | 443 | 49740 | 23.51.58.94 | 192.168.2.4 |
Feb 29, 2024 12:01:34.363188982 CET | 49740 | 443 | 192.168.2.4 | 23.51.58.94 |
Feb 29, 2024 12:01:34.363195896 CET | 443 | 49740 | 23.51.58.94 | 192.168.2.4 |
Feb 29, 2024 12:01:34.448322058 CET | 49741 | 443 | 192.168.2.4 | 23.51.58.94 |
Feb 29, 2024 12:01:34.448416948 CET | 443 | 49741 | 23.51.58.94 | 192.168.2.4 |
Feb 29, 2024 12:01:34.448613882 CET | 49741 | 443 | 192.168.2.4 | 23.51.58.94 |
Feb 29, 2024 12:01:34.449961901 CET | 49741 | 443 | 192.168.2.4 | 23.51.58.94 |
Feb 29, 2024 12:01:34.449994087 CET | 443 | 49741 | 23.51.58.94 | 192.168.2.4 |
Feb 29, 2024 12:01:34.641257048 CET | 443 | 49741 | 23.51.58.94 | 192.168.2.4 |
Feb 29, 2024 12:01:34.641336918 CET | 49741 | 443 | 192.168.2.4 | 23.51.58.94 |
Feb 29, 2024 12:01:34.642997026 CET | 49741 | 443 | 192.168.2.4 | 23.51.58.94 |
Feb 29, 2024 12:01:34.643007994 CET | 443 | 49741 | 23.51.58.94 | 192.168.2.4 |
Feb 29, 2024 12:01:34.643523932 CET | 443 | 49741 | 23.51.58.94 | 192.168.2.4 |
Feb 29, 2024 12:01:34.645121098 CET | 49741 | 443 | 192.168.2.4 | 23.51.58.94 |
Feb 29, 2024 12:01:34.685933113 CET | 443 | 49741 | 23.51.58.94 | 192.168.2.4 |
Feb 29, 2024 12:01:34.814093113 CET | 443 | 49741 | 23.51.58.94 | 192.168.2.4 |
Feb 29, 2024 12:01:34.814435959 CET | 443 | 49741 | 23.51.58.94 | 192.168.2.4 |
Feb 29, 2024 12:01:34.814491987 CET | 49741 | 443 | 192.168.2.4 | 23.51.58.94 |
Feb 29, 2024 12:01:34.816927910 CET | 49741 | 443 | 192.168.2.4 | 23.51.58.94 |
Feb 29, 2024 12:01:34.816946030 CET | 443 | 49741 | 23.51.58.94 | 192.168.2.4 |
Feb 29, 2024 12:01:43.198189974 CET | 443 | 49739 | 142.251.40.100 | 192.168.2.4 |
Feb 29, 2024 12:01:43.198360920 CET | 443 | 49739 | 142.251.40.100 | 192.168.2.4 |
Feb 29, 2024 12:01:43.198738098 CET | 49739 | 443 | 192.168.2.4 | 142.251.40.100 |
Feb 29, 2024 12:01:43.538142920 CET | 49739 | 443 | 192.168.2.4 | 142.251.40.100 |
Feb 29, 2024 12:01:43.538202047 CET | 443 | 49739 | 142.251.40.100 | 192.168.2.4 |
Feb 29, 2024 12:02:32.895543098 CET | 49749 | 443 | 192.168.2.4 | 142.251.40.100 |
Feb 29, 2024 12:02:32.895576954 CET | 443 | 49749 | 142.251.40.100 | 192.168.2.4 |
Feb 29, 2024 12:02:32.895637989 CET | 49749 | 443 | 192.168.2.4 | 142.251.40.100 |
Feb 29, 2024 12:02:32.896575928 CET | 49749 | 443 | 192.168.2.4 | 142.251.40.100 |
Feb 29, 2024 12:02:32.896589041 CET | 443 | 49749 | 142.251.40.100 | 192.168.2.4 |
Feb 29, 2024 12:02:33.171353102 CET | 443 | 49749 | 142.251.40.100 | 192.168.2.4 |
Feb 29, 2024 12:02:33.171717882 CET | 49749 | 443 | 192.168.2.4 | 142.251.40.100 |
Feb 29, 2024 12:02:33.171725035 CET | 443 | 49749 | 142.251.40.100 | 192.168.2.4 |
Feb 29, 2024 12:02:33.173191071 CET | 443 | 49749 | 142.251.40.100 | 192.168.2.4 |
Feb 29, 2024 12:02:33.173764944 CET | 49749 | 443 | 192.168.2.4 | 142.251.40.100 |
Feb 29, 2024 12:02:33.173850060 CET | 443 | 49749 | 142.251.40.100 | 192.168.2.4 |
Feb 29, 2024 12:02:33.220724106 CET | 49749 | 443 | 192.168.2.4 | 142.251.40.100 |
Feb 29, 2024 12:02:39.642801046 CET | 49723 | 80 | 192.168.2.4 | 72.21.81.240 |
Feb 29, 2024 12:02:39.643062115 CET | 49724 | 80 | 192.168.2.4 | 72.21.81.240 |
Feb 29, 2024 12:02:39.730648994 CET | 80 | 49724 | 72.21.81.240 | 192.168.2.4 |
Feb 29, 2024 12:02:39.730835915 CET | 49724 | 80 | 192.168.2.4 | 72.21.81.240 |
Feb 29, 2024 12:02:39.730963945 CET | 80 | 49723 | 72.21.81.240 | 192.168.2.4 |
Feb 29, 2024 12:02:39.731034040 CET | 49723 | 80 | 192.168.2.4 | 72.21.81.240 |
Feb 29, 2024 12:02:43.155745029 CET | 443 | 49749 | 142.251.40.100 | 192.168.2.4 |
Feb 29, 2024 12:02:43.155916929 CET | 443 | 49749 | 142.251.40.100 | 192.168.2.4 |
Feb 29, 2024 12:02:43.156022072 CET | 49749 | 443 | 192.168.2.4 | 142.251.40.100 |
Feb 29, 2024 12:02:43.729618073 CET | 49749 | 443 | 192.168.2.4 | 142.251.40.100 |
Feb 29, 2024 12:02:43.729643106 CET | 443 | 49749 | 142.251.40.100 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Feb 29, 2024 12:01:29.089593887 CET | 53 | 51220 | 1.1.1.1 | 192.168.2.4 |
Feb 29, 2024 12:01:29.187817097 CET | 53 | 62190 | 1.1.1.1 | 192.168.2.4 |
Feb 29, 2024 12:01:29.815280914 CET | 53 | 50002 | 1.1.1.1 | 192.168.2.4 |
Feb 29, 2024 12:01:30.624028921 CET | 65308 | 53 | 192.168.2.4 | 1.1.1.1 |
Feb 29, 2024 12:01:30.624361992 CET | 50431 | 53 | 192.168.2.4 | 1.1.1.1 |
Feb 29, 2024 12:01:30.713401079 CET | 53 | 50431 | 1.1.1.1 | 192.168.2.4 |
Feb 29, 2024 12:01:32.472856045 CET | 52984 | 53 | 192.168.2.4 | 1.1.1.1 |
Feb 29, 2024 12:01:32.473120928 CET | 62535 | 53 | 192.168.2.4 | 1.1.1.1 |
Feb 29, 2024 12:01:32.561741114 CET | 53 | 62535 | 1.1.1.1 | 192.168.2.4 |
Feb 29, 2024 12:01:32.844191074 CET | 54391 | 53 | 192.168.2.4 | 1.1.1.1 |
Feb 29, 2024 12:01:32.844794989 CET | 54560 | 53 | 192.168.2.4 | 1.1.1.1 |
Feb 29, 2024 12:01:32.932193995 CET | 53 | 54560 | 1.1.1.1 | 192.168.2.4 |
Feb 29, 2024 12:01:32.932773113 CET | 53 | 54391 | 1.1.1.1 | 192.168.2.4 |
Feb 29, 2024 12:01:46.894262075 CET | 53 | 63041 | 1.1.1.1 | 192.168.2.4 |
Feb 29, 2024 12:01:46.915803909 CET | 138 | 138 | 192.168.2.4 | 192.168.2.255 |
Feb 29, 2024 12:02:05.965315104 CET | 53 | 50918 | 1.1.1.1 | 192.168.2.4 |
Feb 29, 2024 12:02:28.804441929 CET | 53 | 60667 | 1.1.1.1 | 192.168.2.4 |
Feb 29, 2024 12:02:28.809217930 CET | 53 | 57813 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Feb 29, 2024 12:01:30.624028921 CET | 192.168.2.4 | 1.1.1.1 | 0x7c2a | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Feb 29, 2024 12:01:30.624361992 CET | 192.168.2.4 | 1.1.1.1 | 0x7ce1 | Standard query (0) | 65 | IN (0x0001) | false | |
Feb 29, 2024 12:01:32.472856045 CET | 192.168.2.4 | 1.1.1.1 | 0x3230 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Feb 29, 2024 12:01:32.473120928 CET | 192.168.2.4 | 1.1.1.1 | 0xdf6f | Standard query (0) | 65 | IN (0x0001) | false | |
Feb 29, 2024 12:01:32.844191074 CET | 192.168.2.4 | 1.1.1.1 | 0x79fd | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Feb 29, 2024 12:01:32.844794989 CET | 192.168.2.4 | 1.1.1.1 | 0xbb45 | Standard query (0) | 65 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Feb 29, 2024 12:01:30.713401079 CET | 1.1.1.1 | 192.168.2.4 | 0x7ce1 | No error (0) | d2.shared.global.fastly.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Feb 29, 2024 12:01:30.713635921 CET | 1.1.1.1 | 192.168.2.4 | 0x7c2a | No error (0) | d2.shared.global.fastly.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Feb 29, 2024 12:01:32.561741114 CET | 1.1.1.1 | 192.168.2.4 | 0xdf6f | No error (0) | d2.shared.global.fastly.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Feb 29, 2024 12:01:32.561785936 CET | 1.1.1.1 | 192.168.2.4 | 0x3230 | No error (0) | d2.shared.global.fastly.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Feb 29, 2024 12:01:32.932193995 CET | 1.1.1.1 | 192.168.2.4 | 0xbb45 | No error (0) | 65 | IN (0x0001) | false | |||
Feb 29, 2024 12:01:32.932773113 CET | 1.1.1.1 | 192.168.2.4 | 0x79fd | No error (0) | 142.251.40.100 | A (IP address) | IN (0x0001) | false | ||
Feb 29, 2024 12:01:47.449345112 CET | 1.1.1.1 | 192.168.2.4 | 0xbfc4 | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Feb 29, 2024 12:01:47.449345112 CET | 1.1.1.1 | 192.168.2.4 | 0xbfc4 | No error (0) | 192.229.211.108 | A (IP address) | IN (0x0001) | false | ||
Feb 29, 2024 12:02:02.065303087 CET | 1.1.1.1 | 192.168.2.4 | 0x940b | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Feb 29, 2024 12:02:02.065303087 CET | 1.1.1.1 | 192.168.2.4 | 0x940b | No error (0) | 192.229.211.108 | A (IP address) | IN (0x0001) | false | ||
Feb 29, 2024 12:02:21.044779062 CET | 1.1.1.1 | 192.168.2.4 | 0x3291 | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Feb 29, 2024 12:02:21.044779062 CET | 1.1.1.1 | 192.168.2.4 | 0x3291 | No error (0) | 192.229.211.108 | A (IP address) | IN (0x0001) | false | ||
Feb 29, 2024 12:02:41.689121962 CET | 1.1.1.1 | 192.168.2.4 | 0x8800 | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Feb 29, 2024 12:02:41.689121962 CET | 1.1.1.1 | 192.168.2.4 | 0x8800 | No error (0) | 192.229.211.108 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49740 | 23.51.58.94 | 443 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-02-29 11:01:34 UTC | 161 | OUT | |
2024-02-29 11:01:34 UTC | 467 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49741 | 23.51.58.94 | 443 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-02-29 11:01:34 UTC | 239 | OUT | |
2024-02-29 11:01:34 UTC | 456 | IN | |
2024-02-29 11:01:34 UTC | 55 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 12:01:25 |
Start date: | 29/02/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff76e190000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 2 |
Start time: | 12:01:26 |
Start date: | 29/02/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff76e190000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 3 |
Start time: | 12:01:29 |
Start date: | 29/02/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff76e190000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |