Windows
Analysis Report
https://docucdn-a.akamaihd.net/olive/images/2.62.0/global-assets/email-templates/email-logo.png
Overview
General Information
Detection
Score: | 1 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
chrome.exe (PID: 2364 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) chrome.exe (PID: 5836 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =1944 --fi eld-trial- handle=191 2,i,485019 3781345600 493,164949 4683877203 3416,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
chrome.exe (PID: 2000 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://docuc dn-a.akama ihd.net/ol ive/images /2.62.0/gl obal-asset s/email-te mplates/em ail-logo.p ng" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
- • Phishing
- • Compliance
- • Networking
- • System Summary
- • Boot Survival
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: |
Source: | Window detected: |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 1 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
bg.microsoft.map.fastly.net | 199.232.210.172 | true | false | unknown | |
www.google.com | 142.250.186.132 | true | false | unknown | |
fp2e7a.wpc.phicdn.net | 192.229.221.95 | true | false | unknown | |
docucdn-a.akamaihd.net | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.250.186.132 | www.google.com | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.4 |
192.168.2.5 |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1517239 |
Start date and time: | 2024-09-24 22:21:31 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 18s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | https://docucdn-a.akamaihd.net/olive/images/2.62.0/global-assets/email-templates/email-logo.png |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean1.win@16/10@4/4 |
EGA Information: | Failed |
HCA Information: |
|
- Exclude process from analysis
(whitelisted): dllhost.exe, WM IADAP.exe, SIHClient.exe, svch ost.exe - Excluded IPs from analysis (wh
itelisted): 142.250.184.195, 1 72.217.16.206, 173.194.76.84, 34.104.35.123, 2.16.238.157, 2 .16.238.136, 20.12.23.50, 199. 232.210.172, 192.229.221.95, 9 3.184.221.240, 20.3.187.198, 1 3.95.31.18, 172.217.18.99 - Excluded domains from analysis
(whitelisted): fs.microsoft.c om, accounts.google.com, slscr .update.microsoft.com, ctldl.w indowsupdate.com.delivery.micr osoft.com, clientservices.goog leapis.com, ctldl.windowsupdat e.com, docucdn-a.akamaihd.net. edgesuite.net, fe3cr.delivery. mp.microsoft.com, a1737.b.akam ai.net, fe3.delivery.mp.micros oft.com, clients2.google.com, edgedl.me.gvt1.com, ocsp.digic ert.com, ocsp.edge.digicert.co m, glb.cws.prod.dcat.dsp.traff icmanager.net, sls.update.micr osoft.com, update.googleapis.c om, clients.l.google.com, wu-b -net.trafficmanager.net, glb.s ls.prod.dcat.dsp.trafficmanage r.net - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtSetInformationFile c alls found. - VT rate limit hit for: https:
//docucdn-a.akamaihd.net/olive /images/2.62.0/global-assets/e mail-templates/email-logo.png
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9816231898278076 |
Encrypted: | false |
SSDEEP: | 48:8QSdITsgkHiidAKZdA19ehwiZUklqehay+3:8QhvdZy |
MD5: | 41C635A543F6030C1C3CD477A6150226 |
SHA1: | ABF61DDDDD8182C0CA40A86ADE8DCDD5D8CD00AD |
SHA-256: | 62954A19EECB28B2AFA4BA89335059961017277890AA99D5729DBC4C7689C561 |
SHA-512: | 1359B4D3DF19C483E932A01AC1E19FB8062C9A54B703A670D9CE519931D22B8E3B6CE2F3BF3E2389A34F0672F9D79267AFAC10AAC4C3AF2BD506506C53D3F6B3 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.9948538169223964 |
Encrypted: | false |
SSDEEP: | 48:8rdITsgkHiidAKZdA1weh/iZUkAQkqehJy+2:86vX9QYy |
MD5: | 961BDAB85013D860E533197A325F6B61 |
SHA1: | 0BA985F538FB509ABF9972B0B086D4889478A67B |
SHA-256: | 4166508FA77293906EFFC0FC897150F1528D33354DCEB93D6CA6F44BDEC73B3E |
SHA-512: | 8D233B86921327DBB869F803B32EDCECD191725D20EC74E3CE9E8D5E36A966D996CB2B84454CFB3858E6B62B317E7A0491B4838798E385C48F9C4884F864B817 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2693 |
Entropy (8bit): | 4.00680364257646 |
Encrypted: | false |
SSDEEP: | 48:8xpdITsgsHiidAKZdA14tseh7sFiZUkmgqeh7sfy+BX:8xEv/nFy |
MD5: | 4FF7DF110AED805BCEF7937A69AE980B |
SHA1: | 0766818B46E3E1755B8BF8BAD308D6EF1B0DE63C |
SHA-256: | D3A6A412622361C4B066ACD5F4B5ED0C0A674D6F3A42C452A761F7DAADEB72B9 |
SHA-512: | 711CD926E281BAFACB07DE59FFDBD6F396FCF08D348A82CC26C2664E2D0A06D1E819DF245D8259D64D23E1A09369806984108B054D2E9786FB6FAD549A4C1325 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.9973709906170463 |
Encrypted: | false |
SSDEEP: | 48:8wdITsgkHiidAKZdA1vehDiZUkwqehty+R:87vUHy |
MD5: | 16BBBB3E6354B73D7FBDF57275BA0BFB |
SHA1: | EFF940C18F20AB78AB4F6583340BB33B56143E12 |
SHA-256: | 1BFAE448EDC22424C7ABC40CEC16C82F7A50C08FED4B172A7BE566BBD208DF66 |
SHA-512: | 467729DDC0C540F65029710C85253406BFF9841FB8CB848D5CB8B0E601E62247D4B2D91380BB1D51AFB20421BC17C3E0B32C5AE5923251622BE008C47B0DD02A |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.984375978840068 |
Encrypted: | false |
SSDEEP: | 48:8RdITsgkHiidAKZdA1hehBiZUk1W1qeh7y+C:88v09by |
MD5: | 4A1A818BF1E2937EF28A9949EEDEB8E6 |
SHA1: | CBB2F5F944CECD60636683562CE03B6DF148B6D7 |
SHA-256: | 69BEB57EFDC04CF1E47536D392B96DFA0E40B8059179A4E3D65799DFE95432F7 |
SHA-512: | F6E2BFF85F2725BF5B542F32E37C4DA90CF07A78454523E06A8730CF0EA9819CCF75D6148BBE3530E33393724E75A1B7FEC22499D0FBDF378B03ED55DFA18F49 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2683 |
Entropy (8bit): | 3.994554338159074 |
Encrypted: | false |
SSDEEP: | 48:8ddITsgkHiidAKZdA1duT+ehOuTbbiZUk5OjqehOuTbFy+yT+:84vaT/TbxWOvTbFy7T |
MD5: | FD0B47B87780E63119DF61378BE604E0 |
SHA1: | 8A1103B60DE4A18E1E5E24E2F009D8B23EF30D20 |
SHA-256: | 9D0D3B8A0DF419E66CC5F7E8FB07ED713D86396FA3BCCF831F156A7140FAFDD6 |
SHA-512: | C1D0D4036332404A980BE4115ED2C2623F7AE7FF084360F30ACEE2FD82325F01AA3D92C5B2615F92FA10F17AE17B622C96CDBBAEA7538B274A7381CE59EB1EB2 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 10 |
Entropy (8bit): | 3.1219280948873624 |
Encrypted: | false |
SSDEEP: | 3:OFZn:OFZn |
MD5: | 7605968E79D0CA095AB1231486D2B814 |
SHA1: | A007B420D19CEEFA840F0373E050E3B51A4AB480 |
SHA-256: | 493FDA53120050F85836032324409BE6C6484F90A0755AE0C6A673BA7626818B |
SHA-512: | 769249DA7ED6C6BF5671BBC2371A6453B433226CEB8C4C2AA3604000D66647BCEC83DEE1AB64C0262FA40F923D77E23BAD2C47274D339EFFC51D904CE77072A6 |
Malicious: | false |
Reputation: | low |
URL: | https://docucdn-a.akamaihd.net/favicon.ico |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 2684 |
Entropy (8bit): | 7.901894652512653 |
Encrypted: | false |
SSDEEP: | 48:B/6szm5aZYbB04l/HREz9CyaY6/8Rf78BLWlvhOmjtJBvQvxnwO:BSszm8Z4RHRG6uROLWb9RQj |
MD5: | B4F8F0DCDA279711CB9224C2239323D4 |
SHA1: | 3C1B1B68CD9D2D25FF5D7FB2C7A61271DFFBF41B |
SHA-256: | 53D92718DD6001A4EBF49D631AB9DF5B8194E6AF220790B1D8CF57164E38C6B0 |
SHA-512: | E97F783AF2EECCAFD684BDDE181C1509414997D2970405CC2AD7B9182439EF471EE6BF58253E6661A7B4491DD80523CC23C4544B0F9CF5AA0E9BFF4F20E7CA92 |
Malicious: | false |
Reputation: | low |
URL: | https://docucdn-a.akamaihd.net/olive/images/2.62.0/global-assets/email-templates/email-logo.png |
Preview: |
Download Network PCAP: filtered – full
- Total Packets: 55
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Sep 24, 2024 22:22:28.485084057 CEST | 49675 | 443 | 192.168.2.5 | 23.1.237.91 |
Sep 24, 2024 22:22:28.485095978 CEST | 49674 | 443 | 192.168.2.5 | 23.1.237.91 |
Sep 24, 2024 22:22:28.578690052 CEST | 49673 | 443 | 192.168.2.5 | 23.1.237.91 |
Sep 24, 2024 22:22:38.085097075 CEST | 49675 | 443 | 192.168.2.5 | 23.1.237.91 |
Sep 24, 2024 22:22:38.085125923 CEST | 49674 | 443 | 192.168.2.5 | 23.1.237.91 |
Sep 24, 2024 22:22:38.188877106 CEST | 49673 | 443 | 192.168.2.5 | 23.1.237.91 |
Sep 24, 2024 22:22:39.022833109 CEST | 49713 | 443 | 192.168.2.5 | 184.28.90.27 |
Sep 24, 2024 22:22:39.022881985 CEST | 443 | 49713 | 184.28.90.27 | 192.168.2.5 |
Sep 24, 2024 22:22:39.023030043 CEST | 49713 | 443 | 192.168.2.5 | 184.28.90.27 |
Sep 24, 2024 22:22:39.025142908 CEST | 49713 | 443 | 192.168.2.5 | 184.28.90.27 |
Sep 24, 2024 22:22:39.025156975 CEST | 443 | 49713 | 184.28.90.27 | 192.168.2.5 |
Sep 24, 2024 22:22:39.146445036 CEST | 49715 | 443 | 192.168.2.5 | 142.250.186.132 |
Sep 24, 2024 22:22:39.146496058 CEST | 443 | 49715 | 142.250.186.132 | 192.168.2.5 |
Sep 24, 2024 22:22:39.146562099 CEST | 49715 | 443 | 192.168.2.5 | 142.250.186.132 |
Sep 24, 2024 22:22:39.147317886 CEST | 49715 | 443 | 192.168.2.5 | 142.250.186.132 |
Sep 24, 2024 22:22:39.147336960 CEST | 443 | 49715 | 142.250.186.132 | 192.168.2.5 |
Sep 24, 2024 22:22:39.668167114 CEST | 443 | 49713 | 184.28.90.27 | 192.168.2.5 |
Sep 24, 2024 22:22:39.668266058 CEST | 49713 | 443 | 192.168.2.5 | 184.28.90.27 |
Sep 24, 2024 22:22:39.674529076 CEST | 49713 | 443 | 192.168.2.5 | 184.28.90.27 |
Sep 24, 2024 22:22:39.674536943 CEST | 443 | 49713 | 184.28.90.27 | 192.168.2.5 |
Sep 24, 2024 22:22:39.675064087 CEST | 443 | 49713 | 184.28.90.27 | 192.168.2.5 |
Sep 24, 2024 22:22:39.742151976 CEST | 49713 | 443 | 192.168.2.5 | 184.28.90.27 |
Sep 24, 2024 22:22:39.797497034 CEST | 443 | 49715 | 142.250.186.132 | 192.168.2.5 |
Sep 24, 2024 22:22:39.828583956 CEST | 49715 | 443 | 192.168.2.5 | 142.250.186.132 |
Sep 24, 2024 22:22:39.828619957 CEST | 443 | 49715 | 142.250.186.132 | 192.168.2.5 |
Sep 24, 2024 22:22:39.830184937 CEST | 443 | 49715 | 142.250.186.132 | 192.168.2.5 |
Sep 24, 2024 22:22:39.830279112 CEST | 49715 | 443 | 192.168.2.5 | 142.250.186.132 |
Sep 24, 2024 22:22:39.854806900 CEST | 443 | 49703 | 23.1.237.91 | 192.168.2.5 |
Sep 24, 2024 22:22:39.854911089 CEST | 49703 | 443 | 192.168.2.5 | 23.1.237.91 |
Sep 24, 2024 22:22:39.858773947 CEST | 49715 | 443 | 192.168.2.5 | 142.250.186.132 |
Sep 24, 2024 22:22:39.858886003 CEST | 443 | 49715 | 142.250.186.132 | 192.168.2.5 |
Sep 24, 2024 22:22:39.896389961 CEST | 49713 | 443 | 192.168.2.5 | 184.28.90.27 |
Sep 24, 2024 22:22:39.943412066 CEST | 443 | 49713 | 184.28.90.27 | 192.168.2.5 |
Sep 24, 2024 22:22:40.054614067 CEST | 49715 | 443 | 192.168.2.5 | 142.250.186.132 |
Sep 24, 2024 22:22:40.054635048 CEST | 443 | 49715 | 142.250.186.132 | 192.168.2.5 |
Sep 24, 2024 22:22:40.093595028 CEST | 443 | 49713 | 184.28.90.27 | 192.168.2.5 |
Sep 24, 2024 22:22:40.093714952 CEST | 443 | 49713 | 184.28.90.27 | 192.168.2.5 |
Sep 24, 2024 22:22:40.093842983 CEST | 49713 | 443 | 192.168.2.5 | 184.28.90.27 |
Sep 24, 2024 22:22:40.095082045 CEST | 49713 | 443 | 192.168.2.5 | 184.28.90.27 |
Sep 24, 2024 22:22:40.095098972 CEST | 443 | 49713 | 184.28.90.27 | 192.168.2.5 |
Sep 24, 2024 22:22:40.095109940 CEST | 49713 | 443 | 192.168.2.5 | 184.28.90.27 |
Sep 24, 2024 22:22:40.095115900 CEST | 443 | 49713 | 184.28.90.27 | 192.168.2.5 |
Sep 24, 2024 22:22:40.154000998 CEST | 49716 | 443 | 192.168.2.5 | 184.28.90.27 |
Sep 24, 2024 22:22:40.154069901 CEST | 443 | 49716 | 184.28.90.27 | 192.168.2.5 |
Sep 24, 2024 22:22:40.154269934 CEST | 49716 | 443 | 192.168.2.5 | 184.28.90.27 |
Sep 24, 2024 22:22:40.154623032 CEST | 49716 | 443 | 192.168.2.5 | 184.28.90.27 |
Sep 24, 2024 22:22:40.154638052 CEST | 443 | 49716 | 184.28.90.27 | 192.168.2.5 |
Sep 24, 2024 22:22:40.242156029 CEST | 49715 | 443 | 192.168.2.5 | 142.250.186.132 |
Sep 24, 2024 22:22:40.807506084 CEST | 443 | 49716 | 184.28.90.27 | 192.168.2.5 |
Sep 24, 2024 22:22:40.807631016 CEST | 49716 | 443 | 192.168.2.5 | 184.28.90.27 |
Sep 24, 2024 22:22:40.882508039 CEST | 49716 | 443 | 192.168.2.5 | 184.28.90.27 |
Sep 24, 2024 22:22:40.882586956 CEST | 443 | 49716 | 184.28.90.27 | 192.168.2.5 |
Sep 24, 2024 22:22:40.882996082 CEST | 443 | 49716 | 184.28.90.27 | 192.168.2.5 |
Sep 24, 2024 22:22:40.885411978 CEST | 49716 | 443 | 192.168.2.5 | 184.28.90.27 |
Sep 24, 2024 22:22:40.927447081 CEST | 443 | 49716 | 184.28.90.27 | 192.168.2.5 |
Sep 24, 2024 22:22:41.082539082 CEST | 443 | 49716 | 184.28.90.27 | 192.168.2.5 |
Sep 24, 2024 22:22:41.082637072 CEST | 443 | 49716 | 184.28.90.27 | 192.168.2.5 |
Sep 24, 2024 22:22:41.082704067 CEST | 49716 | 443 | 192.168.2.5 | 184.28.90.27 |
Sep 24, 2024 22:22:41.084712982 CEST | 49716 | 443 | 192.168.2.5 | 184.28.90.27 |
Sep 24, 2024 22:22:41.084749937 CEST | 443 | 49716 | 184.28.90.27 | 192.168.2.5 |
Sep 24, 2024 22:22:41.084775925 CEST | 49716 | 443 | 192.168.2.5 | 184.28.90.27 |
Sep 24, 2024 22:22:41.084790945 CEST | 443 | 49716 | 184.28.90.27 | 192.168.2.5 |
Sep 24, 2024 22:22:49.702698946 CEST | 443 | 49715 | 142.250.186.132 | 192.168.2.5 |
Sep 24, 2024 22:22:49.702755928 CEST | 443 | 49715 | 142.250.186.132 | 192.168.2.5 |
Sep 24, 2024 22:22:49.702801943 CEST | 49715 | 443 | 192.168.2.5 | 142.250.186.132 |
Sep 24, 2024 22:22:50.582221985 CEST | 49703 | 443 | 192.168.2.5 | 23.1.237.91 |
Sep 24, 2024 22:22:50.582312107 CEST | 49703 | 443 | 192.168.2.5 | 23.1.237.91 |
Sep 24, 2024 22:22:50.583132982 CEST | 49724 | 443 | 192.168.2.5 | 23.1.237.91 |
Sep 24, 2024 22:22:50.583156109 CEST | 443 | 49724 | 23.1.237.91 | 192.168.2.5 |
Sep 24, 2024 22:22:50.583390951 CEST | 49724 | 443 | 192.168.2.5 | 23.1.237.91 |
Sep 24, 2024 22:22:50.583827972 CEST | 49724 | 443 | 192.168.2.5 | 23.1.237.91 |
Sep 24, 2024 22:22:50.583839893 CEST | 443 | 49724 | 23.1.237.91 | 192.168.2.5 |
Sep 24, 2024 22:22:50.589852095 CEST | 443 | 49703 | 23.1.237.91 | 192.168.2.5 |
Sep 24, 2024 22:22:50.589884996 CEST | 443 | 49703 | 23.1.237.91 | 192.168.2.5 |
Sep 24, 2024 22:22:50.702367067 CEST | 49715 | 443 | 192.168.2.5 | 142.250.186.132 |
Sep 24, 2024 22:22:50.702399015 CEST | 443 | 49715 | 142.250.186.132 | 192.168.2.5 |
Sep 24, 2024 22:22:51.365124941 CEST | 443 | 49724 | 23.1.237.91 | 192.168.2.5 |
Sep 24, 2024 22:22:51.365294933 CEST | 49724 | 443 | 192.168.2.5 | 23.1.237.91 |
Sep 24, 2024 22:23:10.507725000 CEST | 443 | 49724 | 23.1.237.91 | 192.168.2.5 |
Sep 24, 2024 22:23:10.507776022 CEST | 49724 | 443 | 192.168.2.5 | 23.1.237.91 |
Sep 24, 2024 22:23:39.188030958 CEST | 49727 | 443 | 192.168.2.5 | 142.250.186.132 |
Sep 24, 2024 22:23:39.188138962 CEST | 443 | 49727 | 142.250.186.132 | 192.168.2.5 |
Sep 24, 2024 22:23:39.188318968 CEST | 49727 | 443 | 192.168.2.5 | 142.250.186.132 |
Sep 24, 2024 22:23:39.189049959 CEST | 49727 | 443 | 192.168.2.5 | 142.250.186.132 |
Sep 24, 2024 22:23:39.189069986 CEST | 443 | 49727 | 142.250.186.132 | 192.168.2.5 |
Sep 24, 2024 22:23:39.848582983 CEST | 443 | 49727 | 142.250.186.132 | 192.168.2.5 |
Sep 24, 2024 22:23:39.849200010 CEST | 49727 | 443 | 192.168.2.5 | 142.250.186.132 |
Sep 24, 2024 22:23:39.849215984 CEST | 443 | 49727 | 142.250.186.132 | 192.168.2.5 |
Sep 24, 2024 22:23:39.849836111 CEST | 443 | 49727 | 142.250.186.132 | 192.168.2.5 |
Sep 24, 2024 22:23:39.850400925 CEST | 49727 | 443 | 192.168.2.5 | 142.250.186.132 |
Sep 24, 2024 22:23:39.850486994 CEST | 443 | 49727 | 142.250.186.132 | 192.168.2.5 |
Sep 24, 2024 22:23:39.898515940 CEST | 49727 | 443 | 192.168.2.5 | 142.250.186.132 |
Sep 24, 2024 22:23:49.765924931 CEST | 443 | 49727 | 142.250.186.132 | 192.168.2.5 |
Sep 24, 2024 22:23:49.766012907 CEST | 443 | 49727 | 142.250.186.132 | 192.168.2.5 |
Sep 24, 2024 22:23:49.766077995 CEST | 49727 | 443 | 192.168.2.5 | 142.250.186.132 |
Sep 24, 2024 22:23:50.595714092 CEST | 49727 | 443 | 192.168.2.5 | 142.250.186.132 |
Sep 24, 2024 22:23:50.595741034 CEST | 443 | 49727 | 142.250.186.132 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Sep 24, 2024 22:22:34.235816002 CEST | 53 | 62321 | 1.1.1.1 | 192.168.2.5 |
Sep 24, 2024 22:22:34.357641935 CEST | 53 | 64451 | 1.1.1.1 | 192.168.2.5 |
Sep 24, 2024 22:22:35.467516899 CEST | 53 | 58146 | 1.1.1.1 | 192.168.2.5 |
Sep 24, 2024 22:22:35.660954952 CEST | 50432 | 53 | 192.168.2.5 | 1.1.1.1 |
Sep 24, 2024 22:22:35.661305904 CEST | 59487 | 53 | 192.168.2.5 | 1.1.1.1 |
Sep 24, 2024 22:22:39.135605097 CEST | 58598 | 53 | 192.168.2.5 | 1.1.1.1 |
Sep 24, 2024 22:22:39.135674000 CEST | 58140 | 53 | 192.168.2.5 | 1.1.1.1 |
Sep 24, 2024 22:22:39.142659903 CEST | 53 | 58598 | 1.1.1.1 | 192.168.2.5 |
Sep 24, 2024 22:22:39.142693996 CEST | 53 | 58140 | 1.1.1.1 | 192.168.2.5 |
Sep 24, 2024 22:22:52.687037945 CEST | 53 | 57460 | 1.1.1.1 | 192.168.2.5 |
Sep 24, 2024 22:23:11.546761036 CEST | 53 | 59568 | 1.1.1.1 | 192.168.2.5 |
Sep 24, 2024 22:23:33.894540071 CEST | 53 | 62034 | 1.1.1.1 | 192.168.2.5 |
Sep 24, 2024 22:23:34.270529032 CEST | 53 | 61835 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Sep 24, 2024 22:22:35.660954952 CEST | 192.168.2.5 | 1.1.1.1 | 0xd807 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Sep 24, 2024 22:22:35.661305904 CEST | 192.168.2.5 | 1.1.1.1 | 0x6b4b | Standard query (0) | 65 | IN (0x0001) | false | |
Sep 24, 2024 22:22:39.135605097 CEST | 192.168.2.5 | 1.1.1.1 | 0x86dd | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Sep 24, 2024 22:22:39.135674000 CEST | 192.168.2.5 | 1.1.1.1 | 0x1707 | Standard query (0) | 65 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Sep 24, 2024 22:22:35.668920040 CEST | 1.1.1.1 | 192.168.2.5 | 0x6b4b | No error (0) | docucdn-a.akamaihd.net.edgesuite.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Sep 24, 2024 22:22:35.670576096 CEST | 1.1.1.1 | 192.168.2.5 | 0xd807 | No error (0) | docucdn-a.akamaihd.net.edgesuite.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Sep 24, 2024 22:22:39.142659903 CEST | 1.1.1.1 | 192.168.2.5 | 0x86dd | No error (0) | 142.250.186.132 | A (IP address) | IN (0x0001) | false | ||
Sep 24, 2024 22:22:39.142693996 CEST | 1.1.1.1 | 192.168.2.5 | 0x1707 | No error (0) | 65 | IN (0x0001) | false | |||
Sep 24, 2024 22:22:47.893201113 CEST | 1.1.1.1 | 192.168.2.5 | 0x7292 | No error (0) | 199.232.210.172 | A (IP address) | IN (0x0001) | false | ||
Sep 24, 2024 22:22:47.893201113 CEST | 1.1.1.1 | 192.168.2.5 | 0x7292 | No error (0) | 199.232.214.172 | A (IP address) | IN (0x0001) | false | ||
Sep 24, 2024 22:22:48.500471115 CEST | 1.1.1.1 | 192.168.2.5 | 0x299f | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Sep 24, 2024 22:22:48.500471115 CEST | 1.1.1.1 | 192.168.2.5 | 0x299f | No error (0) | 192.229.221.95 | A (IP address) | IN (0x0001) | false | ||
Sep 24, 2024 22:23:01.769099951 CEST | 1.1.1.1 | 192.168.2.5 | 0xed84 | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Sep 24, 2024 22:23:01.769099951 CEST | 1.1.1.1 | 192.168.2.5 | 0xed84 | No error (0) | 192.229.221.95 | A (IP address) | IN (0x0001) | false | ||
Sep 24, 2024 22:23:26.671890974 CEST | 1.1.1.1 | 192.168.2.5 | 0xc0da | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Sep 24, 2024 22:23:26.671890974 CEST | 1.1.1.1 | 192.168.2.5 | 0xc0da | No error (0) | 192.229.221.95 | A (IP address) | IN (0x0001) | false | ||
Sep 24, 2024 22:23:46.969808102 CEST | 1.1.1.1 | 192.168.2.5 | 0xb35c | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Sep 24, 2024 22:23:46.969808102 CEST | 1.1.1.1 | 192.168.2.5 | 0xb35c | No error (0) | 192.229.221.95 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49713 | 184.28.90.27 | 443 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-09-24 20:22:39 UTC | 161 | OUT | |
2024-09-24 20:22:40 UTC | 467 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49716 | 184.28.90.27 | 443 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-09-24 20:22:40 UTC | 239 | OUT | |
2024-09-24 20:22:41 UTC | 515 | IN | |
2024-09-24 20:22:41 UTC | 55 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 16:22:28 |
Start date: | 24/09/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 2 |
Start time: | 16:22:32 |
Start date: | 24/09/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 3 |
Start time: | 16:22:34 |
Start date: | 24/09/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |