Windows
Analysis Report
https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-light.woff2
Overview
General Information
Detection
Score: | 1 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
- System is w10x64
chrome.exe (PID: 5072 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) chrome.exe (PID: 3908 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2156 --fi eld-trial- handle=189 2,i,131645 6903103221 5832,12959 8374543325 18080,2621 44 --disab le-feature s=Optimiza tionGuideM odelDownlo ading,Opti mizationHi nts,Optimi zationHint sFetching, Optimizati onTargetPr ediction / prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
chrome.exe (PID: 7108 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://stati c2.sharepo intonline. com/files/ fabric/ass ets/fonts/ segoeui-we steuropean /segoeui-l ight.woff2 " MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
OpenWith.exe (PID: 3628 cmdline:
C:\Windows \system32\ OpenWith.e xe -Embedd ing MD5: E4A834784FA08C17D47A1E72429C5109)
- cleanup
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: |
Source: | Window detected: |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 1 Process Injection | 1 Masquerading | OS Credential Dumping | 1 File and Directory Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 Registry Run Keys / Startup Folder | 1 DLL Side-Loading | 1 Process Injection | LSASS Memory | 11 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 Registry Run Keys / Startup Folder | 1 DLL Side-Loading | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 1 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse | ||
0% | Virustotal | Browse | ||
0% | Virustotal | Browse |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
www.google.com | 142.250.186.164 | true | false |
| unknown |
fp2e7a.wpc.phicdn.net | 192.229.221.95 | true | false |
| unknown |
static2.sharepointonline.com | unknown | unknown | false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.250.186.164 | www.google.com | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.8 |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1466759 |
Start date and time: | 2024-07-03 11:05:09 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 31s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-light.woff2 |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 10 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean1.win@18/10@4/3 |
EGA Information: | Failed |
HCA Information: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 142.250.74.195, 142.250.186.174, 64.233.166.84, 34.104.35.123, 23.199.223.63, 40.68.123.157, 2.19.126.163, 2.19.126.137, 192.229.221.95, 20.166.126.56, 52.165.164.15, 142.250.186.35
- Excluded domains from analysis (whitelisted): fs.microsoft.com, accounts.google.com, e13287.dscg.akamaiedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, clientservices.googleapis.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, download.windowsupdate.com.edgesuite.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, ocsp.digicert.com, static2.sharepointonline.com.edgekey.net, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, update.googleapis.com, clients.l.google.com, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtSetInformationFile calls found.
Time | Type | Description |
---|---|---|
05:07:34 | API Interceptor |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9845785625563557 |
Encrypted: | false |
SSDEEP: | 48:8TR0dzT7LfHSidAKZdA1oehwiZUklqehRy+3:8TR8bxqy |
MD5: | 05125C98705295E683401B13FA76CEEC |
SHA1: | C6AA1428E9D93E3C15A85E5BBFA567D7E285866E |
SHA-256: | CC56D80F70CDCF0725C3C80502A4799073CCCA8E010FF010494973115FB185BE |
SHA-512: | A40A9AB6BF1C511DD48803EC06D9B55B2E39204209320435D4664DF797EBE4A9FCC253C8734A96DD4071238F603CDBD257C71E93BFA760F5799C6E63420C979B |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.999146333310874 |
Encrypted: | false |
SSDEEP: | 48:8VR0dzT7LfHSidAKZdA1leh/iZUkAQkqehay+2:8VR8bj9Q/y |
MD5: | 021BB38DA9CF99D9E9EAB788EF5F9861 |
SHA1: | 56CAD9C449AEBED3D41895D7ACED683990249793 |
SHA-256: | 76620E710E3FF3C8FC868A8F5D13A089FB96227C588254FF843E65720DB5ADD2 |
SHA-512: | 63D25EC203D3D76F1DB2FD2656D936A465EAD06C96B1BF42CD148B3E0E8DB7D89E31BAC27662695738D94C50FD7C3D12BB15F97464FE13FCD1319BBB6F319DDF |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2693 |
Entropy (8bit): | 4.009458012632261 |
Encrypted: | false |
SSDEEP: | 48:8C0dzT7LbHSidAKZdA14t5eh7sFiZUkmgqeh7soy+BX:8C8bHnGy |
MD5: | F935D35ACA34BF9085E33612C6441C05 |
SHA1: | 101BB78094C179E17B0173AE16B1434ACB9D149E |
SHA-256: | 5F4110DFEF2B05C194597EE9F12719D680FF454586FC4993FE24271620505DA1 |
SHA-512: | 4D006FC1D8B6C8047CC411C3F0DE5FB2CB1B6CF215DBB1B6218E45492923D4BF1FB1377746B5F94DF8F32955FFF7B23602D0C0F7A1EFD6D05790853B79C6D2A7 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.998575757201026 |
Encrypted: | false |
SSDEEP: | 48:81R0dzT7LfHSidAKZdA16ehDiZUkwqehuy+R:81R8bQQy |
MD5: | C4DD4BFA9A4E850807821CFEDFF12494 |
SHA1: | 37BFAE3F5692A12CFDCD104F74EED682E8E2D6E6 |
SHA-256: | B67ABCBC032A2775D761EDD2F3B4E09D27DC0DA9B3DA5187563B44F218320CBA |
SHA-512: | 0E0F9B6D84542DF779757155174D9C697154E66074039A2B8FC173E80AFE19EAF6939DAC2DF617EE55AB2B023C7FAC49EB712BE0B12C7159B8FD2B5765983AF7 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.9864728457754723 |
Encrypted: | false |
SSDEEP: | 48:8OR0dzT7LfHSidAKZdA1UehBiZUk1W1qehUy+C:8OR8bQ90y |
MD5: | A491F80FE43E2B803A34D5AFE5DCC7F8 |
SHA1: | 2235AC24555088FD41E164F323FA5AA3A56461AC |
SHA-256: | CFBCAF4DD1FFCF79490800B698762D5BC13435C5BC41197E43573227436B6272 |
SHA-512: | C1E0FCBB7A72439C1CD939E3C117184EA56D97F10C0033E64C53CE444C588A590916611AFA293C10A19570304920440F6926D01A3B1568BB157FE27806D4A3ED |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2683 |
Entropy (8bit): | 3.99669029945673 |
Encrypted: | false |
SSDEEP: | 48:8vR0dzT7LfHSidAKZdA1duTrehOuTbbiZUk5OjqehOuTbGy+yT+:8vR8b9TYTbxWOvTbGy7T |
MD5: | D00F7C5F7D9EAD41DE417B439F4D0A8F |
SHA1: | 811A7861AA6ECD9C9E1899A2990271E5A389F898 |
SHA-256: | 470C6BAD0734531ECB0DE5C52C8C5B6E52F0B6F786C5EAAD83DE1C418C972A5E |
SHA-512: | 20745A88114DDF4CB9FC78038FCB35FDC06FF7F93F006FCFFEA1605151C9DB6D98C99710B5C7E98F9FA5A99C067AEB05A75032E32717ECD77C7B7E186BDA75FD |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 28740 |
Entropy (8bit): | 7.99094566451361 |
Encrypted: | true |
SSDEEP: | 384:+W6q2qYn+Uh/UBlruLKWN4yKTDAj8T2rrOciQHyMRLfVZSmVTQoUwSTaVDCiU7Mu:lxoy6LtN4yrwTs+mVQoUwZCiFQt2Dg |
MD5: | 330E17BEEEECEE428DEA32F39B679D3B |
SHA1: | 0287E124B90084127EBD975D9F3FC92EBAAF53E2 |
SHA-256: | D12E9086B74EF50E35760E4F40BD5411D1B2B657E33E4A09C5FC4861BEBF0752 |
SHA-512: | 2D8F0D315A75527D5D198F09BD9CF685CCD2971960CB54EE4AFB56BE3CCDFB0AFA757ADC93EAD412D6C975B4786BA8D0B10912EE4F23E4977528002BDA6B4668 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 28740 |
Entropy (8bit): | 7.99094566451361 |
Encrypted: | true |
SSDEEP: | 384:+W6q2qYn+Uh/UBlruLKWN4yKTDAj8T2rrOciQHyMRLfVZSmVTQoUwSTaVDCiU7Mu:lxoy6LtN4yrwTs+mVQoUwZCiFQt2Dg |
MD5: | 330E17BEEEECEE428DEA32F39B679D3B |
SHA1: | 0287E124B90084127EBD975D9F3FC92EBAAF53E2 |
SHA-256: | D12E9086B74EF50E35760E4F40BD5411D1B2B657E33E4A09C5FC4861BEBF0752 |
SHA-512: | 2D8F0D315A75527D5D198F09BD9CF685CCD2971960CB54EE4AFB56BE3CCDFB0AFA757ADC93EAD412D6C975B4786BA8D0B10912EE4F23E4977528002BDA6B4668 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 28740 |
Entropy (8bit): | 7.99094566451361 |
Encrypted: | true |
SSDEEP: | 384:+W6q2qYn+Uh/UBlruLKWN4yKTDAj8T2rrOciQHyMRLfVZSmVTQoUwSTaVDCiU7Mu:lxoy6LtN4yrwTs+mVQoUwZCiFQt2Dg |
MD5: | 330E17BEEEECEE428DEA32F39B679D3B |
SHA1: | 0287E124B90084127EBD975D9F3FC92EBAAF53E2 |
SHA-256: | D12E9086B74EF50E35760E4F40BD5411D1B2B657E33E4A09C5FC4861BEBF0752 |
SHA-512: | 2D8F0D315A75527D5D198F09BD9CF685CCD2971960CB54EE4AFB56BE3CCDFB0AFA757ADC93EAD412D6C975B4786BA8D0B10912EE4F23E4977528002BDA6B4668 |
Malicious: | false |
Reputation: | low |
URL: | https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-light.woff2 |
Preview: |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jul 3, 2024 11:06:11.677870035 CEST | 49673 | 443 | 192.168.2.8 | 23.206.229.226 |
Jul 3, 2024 11:06:12.052889109 CEST | 49672 | 443 | 192.168.2.8 | 23.206.229.226 |
Jul 3, 2024 11:06:13.552944899 CEST | 49676 | 443 | 192.168.2.8 | 52.182.143.211 |
Jul 3, 2024 11:06:16.177939892 CEST | 49677 | 80 | 192.168.2.8 | 192.229.211.108 |
Jul 3, 2024 11:06:21.053000927 CEST | 49716 | 443 | 192.168.2.8 | 142.250.186.164 |
Jul 3, 2024 11:06:21.053054094 CEST | 443 | 49716 | 142.250.186.164 | 192.168.2.8 |
Jul 3, 2024 11:06:21.053131104 CEST | 49716 | 443 | 192.168.2.8 | 142.250.186.164 |
Jul 3, 2024 11:06:21.053392887 CEST | 49716 | 443 | 192.168.2.8 | 142.250.186.164 |
Jul 3, 2024 11:06:21.053411007 CEST | 443 | 49716 | 142.250.186.164 | 192.168.2.8 |
Jul 3, 2024 11:06:21.294946909 CEST | 49673 | 443 | 192.168.2.8 | 23.206.229.226 |
Jul 3, 2024 11:06:21.654337883 CEST | 49672 | 443 | 192.168.2.8 | 23.206.229.226 |
Jul 3, 2024 11:06:21.733545065 CEST | 443 | 49716 | 142.250.186.164 | 192.168.2.8 |
Jul 3, 2024 11:06:21.779323101 CEST | 49716 | 443 | 192.168.2.8 | 142.250.186.164 |
Jul 3, 2024 11:06:21.782896996 CEST | 49717 | 443 | 192.168.2.8 | 184.28.90.27 |
Jul 3, 2024 11:06:21.782952070 CEST | 443 | 49717 | 184.28.90.27 | 192.168.2.8 |
Jul 3, 2024 11:06:21.783020973 CEST | 49717 | 443 | 192.168.2.8 | 184.28.90.27 |
Jul 3, 2024 11:06:21.796370029 CEST | 49717 | 443 | 192.168.2.8 | 184.28.90.27 |
Jul 3, 2024 11:06:21.796427011 CEST | 443 | 49717 | 184.28.90.27 | 192.168.2.8 |
Jul 3, 2024 11:06:21.833288908 CEST | 49716 | 443 | 192.168.2.8 | 142.250.186.164 |
Jul 3, 2024 11:06:21.833316088 CEST | 443 | 49716 | 142.250.186.164 | 192.168.2.8 |
Jul 3, 2024 11:06:21.834651947 CEST | 443 | 49716 | 142.250.186.164 | 192.168.2.8 |
Jul 3, 2024 11:06:21.834726095 CEST | 49716 | 443 | 192.168.2.8 | 142.250.186.164 |
Jul 3, 2024 11:06:21.922007084 CEST | 49716 | 443 | 192.168.2.8 | 142.250.186.164 |
Jul 3, 2024 11:06:21.922239065 CEST | 443 | 49716 | 142.250.186.164 | 192.168.2.8 |
Jul 3, 2024 11:06:21.966846943 CEST | 49716 | 443 | 192.168.2.8 | 142.250.186.164 |
Jul 3, 2024 11:06:21.966880083 CEST | 443 | 49716 | 142.250.186.164 | 192.168.2.8 |
Jul 3, 2024 11:06:22.013708115 CEST | 49716 | 443 | 192.168.2.8 | 142.250.186.164 |
Jul 3, 2024 11:06:22.462435961 CEST | 443 | 49717 | 184.28.90.27 | 192.168.2.8 |
Jul 3, 2024 11:06:22.462507963 CEST | 49717 | 443 | 192.168.2.8 | 184.28.90.27 |
Jul 3, 2024 11:06:22.475100994 CEST | 49717 | 443 | 192.168.2.8 | 184.28.90.27 |
Jul 3, 2024 11:06:22.475126028 CEST | 443 | 49717 | 184.28.90.27 | 192.168.2.8 |
Jul 3, 2024 11:06:22.475439072 CEST | 443 | 49717 | 184.28.90.27 | 192.168.2.8 |
Jul 3, 2024 11:06:22.529315948 CEST | 49717 | 443 | 192.168.2.8 | 184.28.90.27 |
Jul 3, 2024 11:06:22.678623915 CEST | 49717 | 443 | 192.168.2.8 | 184.28.90.27 |
Jul 3, 2024 11:06:22.720503092 CEST | 443 | 49717 | 184.28.90.27 | 192.168.2.8 |
Jul 3, 2024 11:06:22.870011091 CEST | 443 | 49717 | 184.28.90.27 | 192.168.2.8 |
Jul 3, 2024 11:06:22.870090961 CEST | 443 | 49717 | 184.28.90.27 | 192.168.2.8 |
Jul 3, 2024 11:06:22.870143890 CEST | 49717 | 443 | 192.168.2.8 | 184.28.90.27 |
Jul 3, 2024 11:06:22.870264053 CEST | 49717 | 443 | 192.168.2.8 | 184.28.90.27 |
Jul 3, 2024 11:06:22.870264053 CEST | 49717 | 443 | 192.168.2.8 | 184.28.90.27 |
Jul 3, 2024 11:06:22.870285988 CEST | 443 | 49717 | 184.28.90.27 | 192.168.2.8 |
Jul 3, 2024 11:06:22.870299101 CEST | 443 | 49717 | 184.28.90.27 | 192.168.2.8 |
Jul 3, 2024 11:06:22.909286022 CEST | 49718 | 443 | 192.168.2.8 | 184.28.90.27 |
Jul 3, 2024 11:06:22.909338951 CEST | 443 | 49718 | 184.28.90.27 | 192.168.2.8 |
Jul 3, 2024 11:06:22.909408092 CEST | 49718 | 443 | 192.168.2.8 | 184.28.90.27 |
Jul 3, 2024 11:06:22.909673929 CEST | 49718 | 443 | 192.168.2.8 | 184.28.90.27 |
Jul 3, 2024 11:06:22.909688950 CEST | 443 | 49718 | 184.28.90.27 | 192.168.2.8 |
Jul 3, 2024 11:06:23.302033901 CEST | 443 | 49706 | 23.206.229.226 | 192.168.2.8 |
Jul 3, 2024 11:06:23.302262068 CEST | 49706 | 443 | 192.168.2.8 | 23.206.229.226 |
Jul 3, 2024 11:06:23.547678947 CEST | 443 | 49718 | 184.28.90.27 | 192.168.2.8 |
Jul 3, 2024 11:06:23.547779083 CEST | 49718 | 443 | 192.168.2.8 | 184.28.90.27 |
Jul 3, 2024 11:06:23.550420046 CEST | 49718 | 443 | 192.168.2.8 | 184.28.90.27 |
Jul 3, 2024 11:06:23.550446987 CEST | 443 | 49718 | 184.28.90.27 | 192.168.2.8 |
Jul 3, 2024 11:06:23.550714970 CEST | 443 | 49718 | 184.28.90.27 | 192.168.2.8 |
Jul 3, 2024 11:06:23.552875996 CEST | 49718 | 443 | 192.168.2.8 | 184.28.90.27 |
Jul 3, 2024 11:06:23.600507975 CEST | 443 | 49718 | 184.28.90.27 | 192.168.2.8 |
Jul 3, 2024 11:06:23.823702097 CEST | 443 | 49718 | 184.28.90.27 | 192.168.2.8 |
Jul 3, 2024 11:06:23.823782921 CEST | 443 | 49718 | 184.28.90.27 | 192.168.2.8 |
Jul 3, 2024 11:06:23.823940039 CEST | 49718 | 443 | 192.168.2.8 | 184.28.90.27 |
Jul 3, 2024 11:06:23.825340986 CEST | 49718 | 443 | 192.168.2.8 | 184.28.90.27 |
Jul 3, 2024 11:06:23.825362921 CEST | 443 | 49718 | 184.28.90.27 | 192.168.2.8 |
Jul 3, 2024 11:06:31.631738901 CEST | 443 | 49716 | 142.250.186.164 | 192.168.2.8 |
Jul 3, 2024 11:06:31.631814003 CEST | 443 | 49716 | 142.250.186.164 | 192.168.2.8 |
Jul 3, 2024 11:06:31.631855011 CEST | 49716 | 443 | 192.168.2.8 | 142.250.186.164 |
Jul 3, 2024 11:06:32.884156942 CEST | 49716 | 443 | 192.168.2.8 | 142.250.186.164 |
Jul 3, 2024 11:06:32.884180069 CEST | 443 | 49716 | 142.250.186.164 | 192.168.2.8 |
Jul 3, 2024 11:07:21.039449930 CEST | 49728 | 443 | 192.168.2.8 | 142.250.186.164 |
Jul 3, 2024 11:07:21.039500952 CEST | 443 | 49728 | 142.250.186.164 | 192.168.2.8 |
Jul 3, 2024 11:07:21.039572954 CEST | 49728 | 443 | 192.168.2.8 | 142.250.186.164 |
Jul 3, 2024 11:07:21.040045977 CEST | 49728 | 443 | 192.168.2.8 | 142.250.186.164 |
Jul 3, 2024 11:07:21.040062904 CEST | 443 | 49728 | 142.250.186.164 | 192.168.2.8 |
Jul 3, 2024 11:07:21.671885014 CEST | 443 | 49728 | 142.250.186.164 | 192.168.2.8 |
Jul 3, 2024 11:07:21.672879934 CEST | 49728 | 443 | 192.168.2.8 | 142.250.186.164 |
Jul 3, 2024 11:07:21.672899008 CEST | 443 | 49728 | 142.250.186.164 | 192.168.2.8 |
Jul 3, 2024 11:07:21.673228025 CEST | 443 | 49728 | 142.250.186.164 | 192.168.2.8 |
Jul 3, 2024 11:07:21.673619032 CEST | 49728 | 443 | 192.168.2.8 | 142.250.186.164 |
Jul 3, 2024 11:07:21.673677921 CEST | 443 | 49728 | 142.250.186.164 | 192.168.2.8 |
Jul 3, 2024 11:07:21.721365929 CEST | 49728 | 443 | 192.168.2.8 | 142.250.186.164 |
Jul 3, 2024 11:07:31.577601910 CEST | 443 | 49728 | 142.250.186.164 | 192.168.2.8 |
Jul 3, 2024 11:07:31.577660084 CEST | 443 | 49728 | 142.250.186.164 | 192.168.2.8 |
Jul 3, 2024 11:07:31.577717066 CEST | 49728 | 443 | 192.168.2.8 | 142.250.186.164 |
Jul 3, 2024 11:07:32.797605991 CEST | 49728 | 443 | 192.168.2.8 | 142.250.186.164 |
Jul 3, 2024 11:07:32.797650099 CEST | 443 | 49728 | 142.250.186.164 | 192.168.2.8 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jul 3, 2024 11:06:16.627417088 CEST | 53 | 51500 | 1.1.1.1 | 192.168.2.8 |
Jul 3, 2024 11:06:16.642944098 CEST | 53 | 60792 | 1.1.1.1 | 192.168.2.8 |
Jul 3, 2024 11:06:17.622497082 CEST | 53 | 50736 | 1.1.1.1 | 192.168.2.8 |
Jul 3, 2024 11:06:18.153933048 CEST | 56794 | 53 | 192.168.2.8 | 1.1.1.1 |
Jul 3, 2024 11:06:18.154088020 CEST | 58830 | 53 | 192.168.2.8 | 1.1.1.1 |
Jul 3, 2024 11:06:20.986519098 CEST | 64730 | 53 | 192.168.2.8 | 1.1.1.1 |
Jul 3, 2024 11:06:20.986761093 CEST | 58382 | 53 | 192.168.2.8 | 1.1.1.1 |
Jul 3, 2024 11:06:20.993948936 CEST | 53 | 58382 | 1.1.1.1 | 192.168.2.8 |
Jul 3, 2024 11:06:20.994757891 CEST | 53 | 64730 | 1.1.1.1 | 192.168.2.8 |
Jul 3, 2024 11:06:34.789493084 CEST | 53 | 60624 | 1.1.1.1 | 192.168.2.8 |
Jul 3, 2024 11:06:53.633312941 CEST | 53 | 53227 | 1.1.1.1 | 192.168.2.8 |
Jul 3, 2024 11:06:54.377859116 CEST | 138 | 138 | 192.168.2.8 | 192.168.2.255 |
Jul 3, 2024 11:07:16.150981903 CEST | 53 | 56549 | 1.1.1.1 | 192.168.2.8 |
Jul 3, 2024 11:07:16.225400925 CEST | 53 | 55177 | 1.1.1.1 | 192.168.2.8 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jul 3, 2024 11:06:18.153933048 CEST | 192.168.2.8 | 1.1.1.1 | 0xa4de | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jul 3, 2024 11:06:18.154088020 CEST | 192.168.2.8 | 1.1.1.1 | 0xc7cd | Standard query (0) | 65 | IN (0x0001) | false | |
Jul 3, 2024 11:06:20.986519098 CEST | 192.168.2.8 | 1.1.1.1 | 0x2def | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jul 3, 2024 11:06:20.986761093 CEST | 192.168.2.8 | 1.1.1.1 | 0x23c8 | Standard query (0) | 65 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jul 3, 2024 11:06:18.161221981 CEST | 1.1.1.1 | 192.168.2.8 | 0xa4de | No error (0) | static2.sharepointonline.com.edgekey.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jul 3, 2024 11:06:18.164222956 CEST | 1.1.1.1 | 192.168.2.8 | 0xc7cd | No error (0) | static2.sharepointonline.com.edgekey.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jul 3, 2024 11:06:20.993948936 CEST | 1.1.1.1 | 192.168.2.8 | 0x23c8 | No error (0) | 65 | IN (0x0001) | false | |||
Jul 3, 2024 11:06:20.994757891 CEST | 1.1.1.1 | 192.168.2.8 | 0x2def | No error (0) | 142.250.186.164 | A (IP address) | IN (0x0001) | false | ||
Jul 3, 2024 11:06:33.099617958 CEST | 1.1.1.1 | 192.168.2.8 | 0xfde4 | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jul 3, 2024 11:06:33.099617958 CEST | 1.1.1.1 | 192.168.2.8 | 0xfde4 | No error (0) | 192.229.221.95 | A (IP address) | IN (0x0001) | false | ||
Jul 3, 2024 11:06:46.789964914 CEST | 1.1.1.1 | 192.168.2.8 | 0x4913 | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jul 3, 2024 11:06:46.789964914 CEST | 1.1.1.1 | 192.168.2.8 | 0x4913 | No error (0) | 192.229.221.95 | A (IP address) | IN (0x0001) | false | ||
Jul 3, 2024 11:07:08.742993116 CEST | 1.1.1.1 | 192.168.2.8 | 0xe1fe | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jul 3, 2024 11:07:08.742993116 CEST | 1.1.1.1 | 192.168.2.8 | 0xe1fe | No error (0) | 192.229.221.95 | A (IP address) | IN (0x0001) | false | ||
Jul 3, 2024 11:07:29.278117895 CEST | 1.1.1.1 | 192.168.2.8 | 0x6e11 | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jul 3, 2024 11:07:29.278117895 CEST | 1.1.1.1 | 192.168.2.8 | 0x6e11 | No error (0) | 192.229.221.95 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.8 | 49717 | 184.28.90.27 | 443 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-07-03 09:06:22 UTC | 161 | OUT | |
2024-07-03 09:06:22 UTC | 467 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.8 | 49718 | 184.28.90.27 | 443 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-07-03 09:06:23 UTC | 239 | OUT | |
2024-07-03 09:06:23 UTC | 515 | IN | |
2024-07-03 09:06:23 UTC | 55 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 05:06:12 |
Start date: | 03/07/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff678760000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 2 |
Start time: | 05:06:14 |
Start date: | 03/07/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff678760000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 3 |
Start time: | 05:06:16 |
Start date: | 03/07/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff678760000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 9 |
Start time: | 05:07:34 |
Start date: | 03/07/2024 |
Path: | C:\Windows\System32\OpenWith.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff76bfe0000 |
File size: | 123'984 bytes |
MD5 hash: | E4A834784FA08C17D47A1E72429C5109 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |