Windows
Analysis Report
http://c.go-mpulse.net
Overview
Detection
Score: | 1 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
chrome.exe (PID: 6184 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) chrome.exe (PID: 1812 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2404 --fi eld-trial- handle=232 0,i,862707 0888507480 679,821498 9759592597 3,262144 - -disable-f eatures=Op timization GuideModel Downloadin g,Optimiza tionHints, Optimizati onHintsFet ching,Opti mizationTa rgetPredic tion /pref etch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
chrome.exe (PID: 4456 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt p://c.go-m pulse.net" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
- • Compliance
- • Networking
- • System Summary
- • Boot Survival
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTPS traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 3 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 4 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 1 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse | ||
0% | Virustotal | Browse |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
www.google.com | 142.251.40.100 | true | false | high | |
fp2e7a.wpc.phicdn.net | 192.229.211.108 | true | false |
| unknown |
c.go-mpulse.net | unknown | unknown | false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.251.40.100 | www.google.com | United States | 15169 | GOOGLEUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false |
IP |
---|
192.168.2.5 |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1412293 |
Start date and time: | 2024-03-20 11:24:25 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 2s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | http://c.go-mpulse.net |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean1.win@16/6@4/3 |
EGA Information: | Failed |
HCA Information: |
|
- Exclude process from analysis
(whitelisted): dllhost.exe, WM IADAP.exe, SIHClient.exe, svch ost.exe - Excluded IPs from analysis (wh
itelisted): 142.250.176.195, 1 42.251.32.110, 142.251.111.84, 34.104.35.123, 96.17.64.187, 40.68.123.157, 104.102.251.73, 72.21.81.240, 192.229.211.108 , 20.166.126.56, 20.3.187.198, 52.165.164.15, 142.250.80.67 - Excluded domains from analysis
(whitelisted): fs.microsoft.c om, accounts.google.com, slscr .update.microsoft.com, wu.ec.a zureedge.net, clientservices.g oogleapis.com, ctldl.windowsup date.com, wu-bg-shim.trafficma nager.net, wu.azureedge.net, f e3cr.delivery.mp.microsoft.com , e4518.dscapi7.akamaiedge.net , fe3.delivery.mp.microsoft.co m, clients2.google.com, edgedl .me.gvt1.com, ocsp.digicert.co m, wildcard46.go-mpulse.net.ed gekey.net, bg.apr-52dd2-0503.e dgecastdns.net, cs11.wpc.v0cdn .net, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficm anager.net, sls.update.microso ft.com, hlb.apr-52dd2-0.edgeca stdns.net, update.googleapis.c om, clients.l.google.com, glb. sls.prod.dcat.dsp.trafficmanag er.net - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtSetInformationFile c alls found.
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9732655214990444 |
Encrypted: | false |
SSDEEP: | 48:8id+oTesfyHjidAKZdA19ehwiZUklqehLy+3:8Kjy8y |
MD5: | 205817684239B18DD9E26A3B4F53F531 |
SHA1: | 519B056EB9ACE28586005247154F50CA41A1F01E |
SHA-256: | 9FF8B05F1AD6637D825B07865C9BE9128C264B1B6C11EF88AFCF3CDD81AFD525 |
SHA-512: | 5C153C301697C46E60B3A53E02DDFE63B133C73F22BFD0A45CF75B49BEEF577DA78E64358E4155E3C7BD65BA51F1224380C078B8C6B7785A0022941323113339 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.991249119494067 |
Encrypted: | false |
SSDEEP: | 48:82Pd+oTesfyHjidAKZdA1weh/iZUkAQkqehsy+2:8sjo9Qly |
MD5: | AA40BE5A2430F018F4995469EEE14657 |
SHA1: | BDAA3C17F6A9E13B5934242CA8E7099B1CB3FADE |
SHA-256: | 60559FBEC3ECA9B6565915BE5D63B07EFC5F65649BBD53B2C0F37F3C1874AF29 |
SHA-512: | 4375746A848CE89CA04BB8DF66A6C0D0F5BBE12D32FAC120C33F17FB6E4B10858558856C50785453851A2D2B90117E2E0CF41A437CC2E81D22DC266C3859DB8C |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2693 |
Entropy (8bit): | 4.000329347622894 |
Encrypted: | false |
SSDEEP: | 48:8xAd+oTesfsHjidAKZdA14tseh7sFiZUkmgqeh7s+y+BX:8x8jenwy |
MD5: | E6420ADD573267EFDDE4412B074224BA |
SHA1: | 43E9D5697B7042E328D8D837AEC7401774097FB5 |
SHA-256: | 433C449E9A57BBC0F4D93A4CAFF61374AE7D144F5FECC201CEA2ACFF409F265E |
SHA-512: | B0DC430CFD1B8C06E7AE9951E293630EF7FCFD7AAB762909ABBEE66652FDBAF6BBBC26CD7ECF81BDA44F8B40EA606E312C31CD367AF9A581C50A9C940A9D55B8 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.989183923379386 |
Encrypted: | false |
SSDEEP: | 48:8HHd+oTesfyHjidAKZdA1vehDiZUkwqeh4y+R:8djzGy |
MD5: | 97769F34C757054E84DC342384351A7A |
SHA1: | 02C6B1FF8CA537793A270501300AA2C3516B4715 |
SHA-256: | 6ED8F007785E5E856C15471DE050951BC1773F02BF71D0FB1508BA0E7ADB1860 |
SHA-512: | 0D913C12502E060449EDE5B6CD1138E9F0E83033474AC7792102819CDE28D34BE7FB94121370FB265DD84542E5D1BFB85C2FFFC1C81A7AB78A5F3E8CF7F26274 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.975482397357466 |
Encrypted: | false |
SSDEEP: | 48:8bd+oTesfyHjidAKZdA1hehBiZUk1W1qehyy+C:8Bjj9Sy |
MD5: | 1358232CCF2000F59DA7363527E4B3E4 |
SHA1: | 5861A3A3BD3A69E511E6D261B7523E9C65A1BA7F |
SHA-256: | 376EACBC206765B78C16E048DAEFE7A684BAADD3D37F280866ED39D8E9F3CD81 |
SHA-512: | 95CD656C2BD27D514FD3BCFF22F4DCDBAEEA6C466B52C228057FB1493848D8A5059546CE251CD06CC32B4701CD44ECE1C870E937A7E915B5CCA5B168B86FDB85 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2683 |
Entropy (8bit): | 3.986908484260524 |
Encrypted: | false |
SSDEEP: | 48:8Jd+oTesfyHjidAKZdA1duT+ehOuTbbiZUk5OjqehOuTbwy+yT+:8DjTT/TbxWOvTbwy7T |
MD5: | 74B85F4C8E012E59533835D85BE9A2C2 |
SHA1: | BD2851191A2EB415CF71B25C0483F7C1E50F9D22 |
SHA-256: | 7DB5922D01E549CCD9985392373076488B2AD6FFCA9C12F3AABCBD57D2CED59B |
SHA-512: | 819940E2249E5DBC43D1DFA0661A43406E63AD22AC37A3890B4CABF4AFBCFBA591CC0358A316395A06A95B87890E4CCF81F59BD321C7BAFE139AB28F2402EACE |
Malicious: | false |
Reputation: | low |
Preview: |
Download Network PCAP: filtered – full
- Total Packets: 44
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 20, 2024 11:25:06.955502987 CET | 49674 | 443 | 192.168.2.5 | 23.1.237.91 |
Mar 20, 2024 11:25:06.955504894 CET | 49675 | 443 | 192.168.2.5 | 23.1.237.91 |
Mar 20, 2024 11:25:07.064883947 CET | 49673 | 443 | 192.168.2.5 | 23.1.237.91 |
Mar 20, 2024 11:25:15.701702118 CET | 49714 | 443 | 192.168.2.5 | 142.251.40.100 |
Mar 20, 2024 11:25:15.701750994 CET | 443 | 49714 | 142.251.40.100 | 192.168.2.5 |
Mar 20, 2024 11:25:15.701828003 CET | 49714 | 443 | 192.168.2.5 | 142.251.40.100 |
Mar 20, 2024 11:25:15.702311993 CET | 49714 | 443 | 192.168.2.5 | 142.251.40.100 |
Mar 20, 2024 11:25:15.702327013 CET | 443 | 49714 | 142.251.40.100 | 192.168.2.5 |
Mar 20, 2024 11:25:15.970027924 CET | 443 | 49714 | 142.251.40.100 | 192.168.2.5 |
Mar 20, 2024 11:25:15.970597029 CET | 49714 | 443 | 192.168.2.5 | 142.251.40.100 |
Mar 20, 2024 11:25:15.970623016 CET | 443 | 49714 | 142.251.40.100 | 192.168.2.5 |
Mar 20, 2024 11:25:15.971616983 CET | 443 | 49714 | 142.251.40.100 | 192.168.2.5 |
Mar 20, 2024 11:25:15.971673965 CET | 49714 | 443 | 192.168.2.5 | 142.251.40.100 |
Mar 20, 2024 11:25:15.973581076 CET | 49714 | 443 | 192.168.2.5 | 142.251.40.100 |
Mar 20, 2024 11:25:15.973644972 CET | 443 | 49714 | 142.251.40.100 | 192.168.2.5 |
Mar 20, 2024 11:25:16.016717911 CET | 49714 | 443 | 192.168.2.5 | 142.251.40.100 |
Mar 20, 2024 11:25:16.016743898 CET | 443 | 49714 | 142.251.40.100 | 192.168.2.5 |
Mar 20, 2024 11:25:16.063605070 CET | 49714 | 443 | 192.168.2.5 | 142.251.40.100 |
Mar 20, 2024 11:25:16.563595057 CET | 49674 | 443 | 192.168.2.5 | 23.1.237.91 |
Mar 20, 2024 11:25:16.563599110 CET | 49675 | 443 | 192.168.2.5 | 23.1.237.91 |
Mar 20, 2024 11:25:16.672969103 CET | 49673 | 443 | 192.168.2.5 | 23.1.237.91 |
Mar 20, 2024 11:25:17.835123062 CET | 49715 | 443 | 192.168.2.5 | 69.192.108.161 |
Mar 20, 2024 11:25:17.835170031 CET | 443 | 49715 | 69.192.108.161 | 192.168.2.5 |
Mar 20, 2024 11:25:17.837616920 CET | 49715 | 443 | 192.168.2.5 | 69.192.108.161 |
Mar 20, 2024 11:25:17.841556072 CET | 49715 | 443 | 192.168.2.5 | 69.192.108.161 |
Mar 20, 2024 11:25:17.841567993 CET | 443 | 49715 | 69.192.108.161 | 192.168.2.5 |
Mar 20, 2024 11:25:18.035773039 CET | 443 | 49703 | 23.1.237.91 | 192.168.2.5 |
Mar 20, 2024 11:25:18.035870075 CET | 49703 | 443 | 192.168.2.5 | 23.1.237.91 |
Mar 20, 2024 11:25:18.186316967 CET | 443 | 49715 | 69.192.108.161 | 192.168.2.5 |
Mar 20, 2024 11:25:18.186398029 CET | 49715 | 443 | 192.168.2.5 | 69.192.108.161 |
Mar 20, 2024 11:25:18.188671112 CET | 49715 | 443 | 192.168.2.5 | 69.192.108.161 |
Mar 20, 2024 11:25:18.188679934 CET | 443 | 49715 | 69.192.108.161 | 192.168.2.5 |
Mar 20, 2024 11:25:18.188888073 CET | 443 | 49715 | 69.192.108.161 | 192.168.2.5 |
Mar 20, 2024 11:25:18.235081911 CET | 49715 | 443 | 192.168.2.5 | 69.192.108.161 |
Mar 20, 2024 11:25:18.280232906 CET | 443 | 49715 | 69.192.108.161 | 192.168.2.5 |
Mar 20, 2024 11:25:18.515990019 CET | 443 | 49715 | 69.192.108.161 | 192.168.2.5 |
Mar 20, 2024 11:25:18.516062975 CET | 443 | 49715 | 69.192.108.161 | 192.168.2.5 |
Mar 20, 2024 11:25:18.516119957 CET | 49715 | 443 | 192.168.2.5 | 69.192.108.161 |
Mar 20, 2024 11:25:18.516246080 CET | 49715 | 443 | 192.168.2.5 | 69.192.108.161 |
Mar 20, 2024 11:25:18.516272068 CET | 443 | 49715 | 69.192.108.161 | 192.168.2.5 |
Mar 20, 2024 11:25:18.516282082 CET | 49715 | 443 | 192.168.2.5 | 69.192.108.161 |
Mar 20, 2024 11:25:18.516287088 CET | 443 | 49715 | 69.192.108.161 | 192.168.2.5 |
Mar 20, 2024 11:25:18.578067064 CET | 49716 | 443 | 192.168.2.5 | 69.192.108.161 |
Mar 20, 2024 11:25:18.578164101 CET | 443 | 49716 | 69.192.108.161 | 192.168.2.5 |
Mar 20, 2024 11:25:18.578269005 CET | 49716 | 443 | 192.168.2.5 | 69.192.108.161 |
Mar 20, 2024 11:25:18.579262018 CET | 49716 | 443 | 192.168.2.5 | 69.192.108.161 |
Mar 20, 2024 11:25:18.579310894 CET | 443 | 49716 | 69.192.108.161 | 192.168.2.5 |
Mar 20, 2024 11:25:18.904622078 CET | 443 | 49716 | 69.192.108.161 | 192.168.2.5 |
Mar 20, 2024 11:25:18.904705048 CET | 49716 | 443 | 192.168.2.5 | 69.192.108.161 |
Mar 20, 2024 11:25:18.908478975 CET | 49716 | 443 | 192.168.2.5 | 69.192.108.161 |
Mar 20, 2024 11:25:18.908508062 CET | 443 | 49716 | 69.192.108.161 | 192.168.2.5 |
Mar 20, 2024 11:25:18.908754110 CET | 443 | 49716 | 69.192.108.161 | 192.168.2.5 |
Mar 20, 2024 11:25:18.911689997 CET | 49716 | 443 | 192.168.2.5 | 69.192.108.161 |
Mar 20, 2024 11:25:18.952264071 CET | 443 | 49716 | 69.192.108.161 | 192.168.2.5 |
Mar 20, 2024 11:25:19.224008083 CET | 443 | 49716 | 69.192.108.161 | 192.168.2.5 |
Mar 20, 2024 11:25:19.224087954 CET | 443 | 49716 | 69.192.108.161 | 192.168.2.5 |
Mar 20, 2024 11:25:19.224478960 CET | 49716 | 443 | 192.168.2.5 | 69.192.108.161 |
Mar 20, 2024 11:25:19.226001024 CET | 49716 | 443 | 192.168.2.5 | 69.192.108.161 |
Mar 20, 2024 11:25:19.226043940 CET | 443 | 49716 | 69.192.108.161 | 192.168.2.5 |
Mar 20, 2024 11:25:19.226099968 CET | 49716 | 443 | 192.168.2.5 | 69.192.108.161 |
Mar 20, 2024 11:25:19.226116896 CET | 443 | 49716 | 69.192.108.161 | 192.168.2.5 |
Mar 20, 2024 11:25:25.975569010 CET | 443 | 49714 | 142.251.40.100 | 192.168.2.5 |
Mar 20, 2024 11:25:25.975640059 CET | 443 | 49714 | 142.251.40.100 | 192.168.2.5 |
Mar 20, 2024 11:25:25.975866079 CET | 49714 | 443 | 192.168.2.5 | 142.251.40.100 |
Mar 20, 2024 11:25:27.510073900 CET | 49714 | 443 | 192.168.2.5 | 142.251.40.100 |
Mar 20, 2024 11:25:27.510140896 CET | 443 | 49714 | 142.251.40.100 | 192.168.2.5 |
Mar 20, 2024 11:25:28.524518967 CET | 49703 | 443 | 192.168.2.5 | 23.1.237.91 |
Mar 20, 2024 11:25:28.524913073 CET | 49703 | 443 | 192.168.2.5 | 23.1.237.91 |
Mar 20, 2024 11:25:28.525429964 CET | 49721 | 443 | 192.168.2.5 | 23.1.237.91 |
Mar 20, 2024 11:25:28.525496006 CET | 443 | 49721 | 23.1.237.91 | 192.168.2.5 |
Mar 20, 2024 11:25:28.525568008 CET | 49721 | 443 | 192.168.2.5 | 23.1.237.91 |
Mar 20, 2024 11:25:28.525968075 CET | 49721 | 443 | 192.168.2.5 | 23.1.237.91 |
Mar 20, 2024 11:25:28.525983095 CET | 443 | 49721 | 23.1.237.91 | 192.168.2.5 |
Mar 20, 2024 11:25:28.678431988 CET | 443 | 49703 | 23.1.237.91 | 192.168.2.5 |
Mar 20, 2024 11:25:28.678556919 CET | 443 | 49703 | 23.1.237.91 | 192.168.2.5 |
Mar 20, 2024 11:25:28.844391108 CET | 443 | 49721 | 23.1.237.91 | 192.168.2.5 |
Mar 20, 2024 11:25:28.844465971 CET | 49721 | 443 | 192.168.2.5 | 23.1.237.91 |
Mar 20, 2024 11:25:28.911637068 CET | 49721 | 443 | 192.168.2.5 | 23.1.237.91 |
Mar 20, 2024 11:25:28.911669016 CET | 443 | 49721 | 23.1.237.91 | 192.168.2.5 |
Mar 20, 2024 11:25:28.912038088 CET | 443 | 49721 | 23.1.237.91 | 192.168.2.5 |
Mar 20, 2024 11:25:28.912096024 CET | 49721 | 443 | 192.168.2.5 | 23.1.237.91 |
Mar 20, 2024 11:25:28.914710045 CET | 49721 | 443 | 192.168.2.5 | 23.1.237.91 |
Mar 20, 2024 11:25:28.914752960 CET | 443 | 49721 | 23.1.237.91 | 192.168.2.5 |
Mar 20, 2024 11:25:28.914931059 CET | 49721 | 443 | 192.168.2.5 | 23.1.237.91 |
Mar 20, 2024 11:25:28.914937019 CET | 443 | 49721 | 23.1.237.91 | 192.168.2.5 |
Mar 20, 2024 11:25:29.229470968 CET | 443 | 49721 | 23.1.237.91 | 192.168.2.5 |
Mar 20, 2024 11:25:29.229537010 CET | 49721 | 443 | 192.168.2.5 | 23.1.237.91 |
Mar 20, 2024 11:25:29.229552031 CET | 443 | 49721 | 23.1.237.91 | 192.168.2.5 |
Mar 20, 2024 11:25:29.229602098 CET | 49721 | 443 | 192.168.2.5 | 23.1.237.91 |
Mar 20, 2024 11:25:29.253921032 CET | 49721 | 443 | 192.168.2.5 | 23.1.237.91 |
Mar 20, 2024 11:25:29.253937960 CET | 443 | 49721 | 23.1.237.91 | 192.168.2.5 |
Mar 20, 2024 11:25:29.253947973 CET | 49721 | 443 | 192.168.2.5 | 23.1.237.91 |
Mar 20, 2024 11:25:29.253990889 CET | 49721 | 443 | 192.168.2.5 | 23.1.237.91 |
Mar 20, 2024 11:26:16.070452929 CET | 49726 | 443 | 192.168.2.5 | 142.251.40.100 |
Mar 20, 2024 11:26:16.070499897 CET | 443 | 49726 | 142.251.40.100 | 192.168.2.5 |
Mar 20, 2024 11:26:16.070694923 CET | 49726 | 443 | 192.168.2.5 | 142.251.40.100 |
Mar 20, 2024 11:26:16.071615934 CET | 49726 | 443 | 192.168.2.5 | 142.251.40.100 |
Mar 20, 2024 11:26:16.071643114 CET | 443 | 49726 | 142.251.40.100 | 192.168.2.5 |
Mar 20, 2024 11:26:16.334316015 CET | 443 | 49726 | 142.251.40.100 | 192.168.2.5 |
Mar 20, 2024 11:26:16.347058058 CET | 49726 | 443 | 192.168.2.5 | 142.251.40.100 |
Mar 20, 2024 11:26:16.347088099 CET | 443 | 49726 | 142.251.40.100 | 192.168.2.5 |
Mar 20, 2024 11:26:16.347419977 CET | 443 | 49726 | 142.251.40.100 | 192.168.2.5 |
Mar 20, 2024 11:26:16.348475933 CET | 49726 | 443 | 192.168.2.5 | 142.251.40.100 |
Mar 20, 2024 11:26:16.348542929 CET | 443 | 49726 | 142.251.40.100 | 192.168.2.5 |
Mar 20, 2024 11:26:16.391372919 CET | 49726 | 443 | 192.168.2.5 | 142.251.40.100 |
Mar 20, 2024 11:26:26.329781055 CET | 443 | 49726 | 142.251.40.100 | 192.168.2.5 |
Mar 20, 2024 11:26:26.329852104 CET | 443 | 49726 | 142.251.40.100 | 192.168.2.5 |
Mar 20, 2024 11:26:26.329921961 CET | 49726 | 443 | 192.168.2.5 | 142.251.40.100 |
Mar 20, 2024 11:26:27.237417936 CET | 49726 | 443 | 192.168.2.5 | 142.251.40.100 |
Mar 20, 2024 11:26:27.237451077 CET | 443 | 49726 | 142.251.40.100 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 20, 2024 11:25:13.162286997 CET | 53 | 58658 | 1.1.1.1 | 192.168.2.5 |
Mar 20, 2024 11:25:13.174017906 CET | 53 | 61859 | 1.1.1.1 | 192.168.2.5 |
Mar 20, 2024 11:25:13.720942020 CET | 53 | 55090 | 1.1.1.1 | 192.168.2.5 |
Mar 20, 2024 11:25:14.538547993 CET | 59198 | 53 | 192.168.2.5 | 1.1.1.1 |
Mar 20, 2024 11:25:14.538769960 CET | 64438 | 53 | 192.168.2.5 | 1.1.1.1 |
Mar 20, 2024 11:25:15.612689018 CET | 55734 | 53 | 192.168.2.5 | 1.1.1.1 |
Mar 20, 2024 11:25:15.612835884 CET | 55681 | 53 | 192.168.2.5 | 1.1.1.1 |
Mar 20, 2024 11:25:15.700468063 CET | 53 | 55734 | 1.1.1.1 | 192.168.2.5 |
Mar 20, 2024 11:25:15.700509071 CET | 53 | 55681 | 1.1.1.1 | 192.168.2.5 |
Mar 20, 2024 11:25:30.966161013 CET | 53 | 55086 | 1.1.1.1 | 192.168.2.5 |
Mar 20, 2024 11:25:49.758022070 CET | 53 | 64773 | 1.1.1.1 | 192.168.2.5 |
Mar 20, 2024 11:26:12.121961117 CET | 53 | 50690 | 1.1.1.1 | 192.168.2.5 |
Mar 20, 2024 11:26:12.673047066 CET | 53 | 51094 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Mar 20, 2024 11:25:14.538547993 CET | 192.168.2.5 | 1.1.1.1 | 0xc434 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 20, 2024 11:25:14.538769960 CET | 192.168.2.5 | 1.1.1.1 | 0x3d6b | Standard query (0) | 65 | IN (0x0001) | false | |
Mar 20, 2024 11:25:15.612689018 CET | 192.168.2.5 | 1.1.1.1 | 0xe88e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 20, 2024 11:25:15.612835884 CET | 192.168.2.5 | 1.1.1.1 | 0x8f67 | Standard query (0) | 65 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Mar 20, 2024 11:25:14.626657009 CET | 1.1.1.1 | 192.168.2.5 | 0xc434 | No error (0) | wildcard46.go-mpulse.net.edgekey.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 20, 2024 11:25:14.626914024 CET | 1.1.1.1 | 192.168.2.5 | 0x3d6b | No error (0) | wildcard46.go-mpulse.net.edgekey.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 20, 2024 11:25:15.700468063 CET | 1.1.1.1 | 192.168.2.5 | 0xe88e | No error (0) | 142.251.40.100 | A (IP address) | IN (0x0001) | false | ||
Mar 20, 2024 11:25:15.700509071 CET | 1.1.1.1 | 192.168.2.5 | 0x8f67 | No error (0) | 65 | IN (0x0001) | false | |||
Mar 20, 2024 11:25:28.051021099 CET | 1.1.1.1 | 192.168.2.5 | 0x6cce | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 20, 2024 11:25:28.051021099 CET | 1.1.1.1 | 192.168.2.5 | 0x6cce | No error (0) | 192.229.211.108 | A (IP address) | IN (0x0001) | false | ||
Mar 20, 2024 11:25:41.542943001 CET | 1.1.1.1 | 192.168.2.5 | 0xb713 | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 20, 2024 11:25:41.542943001 CET | 1.1.1.1 | 192.168.2.5 | 0xb713 | No error (0) | 192.229.211.108 | A (IP address) | IN (0x0001) | false | ||
Mar 20, 2024 11:26:04.871525049 CET | 1.1.1.1 | 192.168.2.5 | 0x1194 | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 20, 2024 11:26:04.871525049 CET | 1.1.1.1 | 192.168.2.5 | 0x1194 | No error (0) | 192.229.211.108 | A (IP address) | IN (0x0001) | false | ||
Mar 20, 2024 11:26:25.308193922 CET | 1.1.1.1 | 192.168.2.5 | 0xfcfc | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 20, 2024 11:26:25.308193922 CET | 1.1.1.1 | 192.168.2.5 | 0xfcfc | No error (0) | 192.229.211.108 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49715 | 69.192.108.161 | 443 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-03-20 10:25:18 UTC | 161 | OUT | |
2024-03-20 10:25:18 UTC | 467 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49716 | 69.192.108.161 | 443 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-03-20 10:25:18 UTC | 239 | OUT | |
2024-03-20 10:25:19 UTC | 530 | IN | |
2024-03-20 10:25:19 UTC | 55 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port |
---|---|---|---|---|
2 | 192.168.2.5 | 49721 | 23.1.237.91 | 443 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-03-20 10:25:28 UTC | 2148 | OUT | |
2024-03-20 10:25:28 UTC | 1 | OUT | |
2024-03-20 10:25:28 UTC | 2483 | OUT | |
2024-03-20 10:25:29 UTC | 476 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 11:25:07 |
Start date: | 20/03/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 2 |
Start time: | 11:25:10 |
Start date: | 20/03/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 3 |
Start time: | 11:25:13 |
Start date: | 20/03/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |