Windows
Analysis Report
https://biruuq.com/f.php?e=br2PMEkzX4etGTJQWDungH49fmtueHVYY3lUMlNtQmowN3Y4WGd6LzdFUVB6dUZXNllHUE1NQndDaEdlcTJURC9qQ1R0VHBHWWIxY2R4UHlwWXNCcmhRQVcyalQ3K0VFWFU4RUtsaHluWE9kYnc1U0MwYVdLOHVsZ2NvWDNnV21rM3BNVFJVekpEdTh3NjFBbXhQMVExKzA3dytjcHJEcVpRTCsrcEM3UUozNXdPSXl2dUZ3OEpXZXFpMUNSaXdsdFE2TjYxR2x1NVZpe
Overview
General Information
Detection
Score: | 0 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w7x64
- chrome.exe (PID: 2424 cmdline:
"C:\Progra m Files (x 86)\Google \Chrome\Ap plication\ chrome.exe " --start- maximized "about:bla nk" MD5: FFA2B8E17F645BCC20F0E0201FEF83ED) - chrome.exe (PID: 1224 cmdline:
"C:\Progra m Files (x 86)\Google \Chrome\Ap plication\ chrome.exe " --type=u tility --u tility-sub -type=netw ork.mojom. NetworkSer vice --lan g=en-US -- service-sa ndbox-type =none --mo jo-platfor m-channel- handle=146 0 --field- trial-hand le=1264,i, 6515938508 693869711, 1372122409 2671204226 ,131072 -- disable-fe atures=Opt imizationG uideModelD ownloading ,Optimizat ionHints,O ptimizatio nHintsFetc hing,Optim izationTar getPredict ion /prefe tch:8 MD5: FFA2B8E17F645BCC20F0E0201FEF83ED)
- chrome.exe (PID: 240 cmdline:
"C:\Progra m Files (x 86)\Google \Chrome\Ap plication\ chrome.exe " "https:/ /biruuq.co m/f.php?e= br2PMEkzX4 etGTJQWDun gH49fmtueH VYY3lUMlNt QmowN3Y4WG d6LzdFUVB6 dUZXNllHUE 1NQndDaEdl cTJURC9qQ1 R0VHBHWWIx Y2R4UHlwWX NCcmhRQVcy alQ3K0VFWF U4RUtsaHlu WE9kYnc1U0 MwYVdLOHVs Z2NvWDNnV2 1rM3BNVFJV ekpEdTh3Nj FBbXhQMVEx KzA3dytjcH JEcVpRTCsr cEM3UUozNX dPSXl2dUZ3 OEpXZXFpMU NSaXdsdFE2 TjYxR2x1NV ZpeWhNbmYx blg3amM1WT FlUEZIVmRT aHQ2YkdvZF hTYld3MWRS N3JxNkw2U1 FkRHNGTFpI Mzkyb2I0WD ROWm1taERu NHlhZWRlem ZQT0pIVFZY b2lVUGhTOU 9qNmJSNXhr TEVURXAxSV lEblRXQTFa YjdGUVlyOV Naa3ZGS3h1 eERKMzNiMk 1vRkdyUkFP TmNyc1hqV0 92MCtEak1o K01OblNZdm NCSHRkWFVt dWVjTXFUUH E4MjdZa0pI dVdGaDUyQk JnbmtJdVJD YVgxczdod0 FkWFlIUmxF TTdsUzJYSH dtWEFRU1JY M0tzangyOH lOb0c3bE1Y WFNuWkJYWm 1hS29tQjkx UjBFbXBzbk tsbXp6VGh0 VVU5M0ZjVn MvaVBoZFEy SGF5eitQd3 ZPdUMzMkVm alZDN0dtVW 96MEZTdXlo T0g0RDFJQ3 Z6bFpVWVl3 NUV1QmRxS0 p2WHJxcVY2 WkVqck54NG EzV3hRUFlr aXdCK09uZz lTaXVKWmdY Q2pZT0ZsWU ZJVjBwb2VL NjMrQ0JKbj QxMXh0RUcv VVB4M1VGSz lWMnhLYlUr aXdaYXgvTF RmSHgwUG5I d1BTZEEyUX JJS2lHdmZa RTRGUTZHVV huUUR3ZHJF eXJKUmdqc0 crck4rTUdU dWh1N3krYV R0QldXQU4r SGRBS0Z2L0 N3RitlTjh0 a09YNzBran UyQ1Z0QXB3 QU1mNzdjWE 1nQnNJWkw2 N3lKK1d3MX RLQmZuTnpC alVwZG1jai 81YXBEMlFw VmhSRDFoZm laMS8vRU9T aXREUGRHNi tQUXBlVDhM a3lZK0tsZk 1OL2NaRXdS SWU5eklCOH FjcnRsdk9r YVpkdVduY1 lmRHd3bm5P N1FZSkNtRE FZcjRnZjRB anFSN1hTWH lKcEQ0SWpK eVh5M2x0Y2 pWcTMyUGlY TjZwRWdoZX p0ejFOS2I0 OXNmSHErTn JSY1UyK21l d29vNlBzdV RhNi9sQnZs ZEJUQWQrZn N2bmliMlBN NGtRWGYzL3 AvVmdQa1g0 YWZtTXZSdk RLTHZEUC92 TDhNZlkrVT RWYlE9PQ%3 D%3D&fp=3f 9689c9c10f 3e5af454ab ad6931a2b8 " MD5: FFA2B8E17F645BCC20F0E0201FEF83ED)
- cleanup
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Window detected: |
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Process Injection | 2 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 1 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
www.google.com | 172.217.18.4 | true | false | unknown | |
biruuq.com | 103.224.182.206 | true | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
103.224.182.206 | biruuq.com | Australia | 133618 | TRELLIAN-AS-APTrellianPtyLimitedAU | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
172.217.18.4 | www.google.com | United States | 15169 | GOOGLEUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1542423 |
Start date and time: | 2024-10-25 22:28:38 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 2m 55s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | https://biruuq.com/f.php?e=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%3D%3D&fp=3f9689c9c10f3e5af454abad6931a2b8 |
Analysis system description: | Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2) |
Number of analysed new started processes analysed: | 3 |
Number of new started drivers analysed: | 2 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean0.win@18/4@4/3 |
- Exclude process from analysis (whitelisted): vga.dll
- Excluded IPs from analysis (whitelisted): 142.250.184.195, 142.250.185.78, 172.217.218.84, 34.104.35.123, 142.250.185.131
- Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, edgedl.me.gvt1.com, update.googleapis.com, clientservices.googleapis.com, clients.l.google.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtSetInformationFile calls found.
- VT rate limit hit for: https://biruuq.com/f.php?e=br2PMEkzX4etGTJQWDungH49fmtueHVYY3lUMlNtQmowN3Y4WGd6LzdFUVB6dUZXNllHUE1NQndDaEdlcTJURC9qQ1R0VHBHWWIxY2R4UHlwWXNCcmhRQVcyalQ3K0VFWFU4RUtsaHluWE9kYnc1U0MwYVdLOHVsZ2NvWDNnV21rM3BNVFJVekpEdTh3NjFBbXhQMVExKzA3dytjcHJEcVpRTCsrcEM3UUozNXdPSXl2dUZ3OEpXZXFpMUNSaXdsdFE2TjYxR2x1NVZpeWhNbmYxblg3amM1WTFlUEZIVmRTaHQ2YkdvZFhTYld3MWRSN3JxNkw2U1FkRHNGTFpIMzkyb2I0WDROWm1taERuNHlhZWRlemZQT0pIVFZYb2lVUGhTOU9qNmJSNXhrTEVURXAxSVlEblRXQTFaYjdGUVlyOVNaa3ZGS3h1eERKMzNiMk1vRkdyUkFPTmNyc1hqV092MCtEak1oK01OblNZdmNCSHRkWFVtdWVjTXFUUHE4MjdZa0pIdVdGaDUyQkJnbmtJdVJDYVgxczdod0FkWFlIUmxFTTdsUzJYSHdtWEFRU1JYM0tzangyOHlOb0c3bE1YWFNuWkJYWm1hS29tQjkxUjBFbXBzbktsbXp6VGh0VVU5M0ZjVnMvaVBoZFEySGF5eitQd3ZPdUMzMkVmalZDN0dtVW96MEZTdXloT0g0RDFJQ3Z6bFpVWVl3NUV1QmRxS0p2WHJxcVY2WkVqck54NGEzV3hRUFlraXdCK09uZzlTaXVKWmdYQ2pZT0ZsWUZJVjBwb2VLNjMrQ0JKbjQxMXh0RUcvVVB4M1VGSzlWMnhLYlUraXdaYXgvTFRmSHgwUG5Id1BTZEEyUXJJS2lHdmZaRTRGUTZHVVhuUUR3ZHJFeXJKUmdqc0crck4rTUdUdWh1N3krYVR0QldXQU4rSGRBS0Z2L0N3RitlTjh0a09YNzBranUyQ
Process: | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 94 |
Entropy (8bit): | 4.648751656165808 |
Encrypted: | false |
SSDEEP: | 3:qVZqcMsMgs0UL3AE+FoJRx+QVBK3z:qzsgs0HE+2XVBmz |
MD5: | E96DDCEB1C305B9AD21EAAE42522C26F |
SHA1: | AD08AE39A71ED5BA992B8B5DABC450D046354696 |
SHA-256: | 9221CFEDFC5E03790F46C7890BCA21FCC47C5788D89DAB0AA0799C492B6AE78A |
SHA-512: | 1CC850F76467645447E9935F4DE13EDE698727B4FB598C7BD36DE2779596D8B5A85CB94B0CF1FB2259AD1D988F1F199E3F4C310DFDC22FCDD378B8E773F0DBD5 |
Malicious: | false |
Reputation: | low |
URL: | https://biruuq.com/favicon.ico |
Preview: |
Process: | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 2 |
Entropy (8bit): | 1.0 |
Encrypted: | false |
SSDEEP: | 3:y:y |
MD5: | 81051BCC2CF1BEDF378224B0A93E2877 |
SHA1: | BA8AB5A0280B953AA97435FF8946CBCBB2755A27 |
SHA-256: | 7EB70257593DA06F682A3DDDA54A9D260D4FC514F645237F5CA74B08F8DA61A6 |
SHA-512: | 1B302A2F1E624A5FB5AD94DDC4E5F8BFD74D26FA37512D0E5FACE303D8C40EEE0D0FFA3649F5DA43F439914D128166CB6C4774A7CAA3B174D7535451EB697B5D |
Malicious: | false |
Reputation: | low |
URL: | https://biruuq.com/f.php?e=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%3D%3D&fp=3f9689c9c10f3e5af454abad6931a2b8 |
Preview: |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 25, 2024 22:29:37.302093029 CEST | 49166 | 443 | 192.168.2.22 | 103.224.182.206 |
Oct 25, 2024 22:29:37.302139044 CEST | 443 | 49166 | 103.224.182.206 | 192.168.2.22 |
Oct 25, 2024 22:29:37.302257061 CEST | 49166 | 443 | 192.168.2.22 | 103.224.182.206 |
Oct 25, 2024 22:29:37.302711010 CEST | 49167 | 443 | 192.168.2.22 | 103.224.182.206 |
Oct 25, 2024 22:29:37.302766085 CEST | 443 | 49167 | 103.224.182.206 | 192.168.2.22 |
Oct 25, 2024 22:29:37.302814007 CEST | 49167 | 443 | 192.168.2.22 | 103.224.182.206 |
Oct 25, 2024 22:29:37.302994967 CEST | 49166 | 443 | 192.168.2.22 | 103.224.182.206 |
Oct 25, 2024 22:29:37.303004980 CEST | 443 | 49166 | 103.224.182.206 | 192.168.2.22 |
Oct 25, 2024 22:29:37.303107977 CEST | 49167 | 443 | 192.168.2.22 | 103.224.182.206 |
Oct 25, 2024 22:29:37.303126097 CEST | 443 | 49167 | 103.224.182.206 | 192.168.2.22 |
Oct 25, 2024 22:29:37.998868942 CEST | 443 | 49166 | 103.224.182.206 | 192.168.2.22 |
Oct 25, 2024 22:29:37.999341965 CEST | 49166 | 443 | 192.168.2.22 | 103.224.182.206 |
Oct 25, 2024 22:29:37.999350071 CEST | 443 | 49166 | 103.224.182.206 | 192.168.2.22 |
Oct 25, 2024 22:29:37.999720097 CEST | 443 | 49166 | 103.224.182.206 | 192.168.2.22 |
Oct 25, 2024 22:29:37.999772072 CEST | 49166 | 443 | 192.168.2.22 | 103.224.182.206 |
Oct 25, 2024 22:29:38.000360966 CEST | 443 | 49166 | 103.224.182.206 | 192.168.2.22 |
Oct 25, 2024 22:29:38.001677990 CEST | 49166 | 443 | 192.168.2.22 | 103.224.182.206 |
Oct 25, 2024 22:29:38.001727104 CEST | 443 | 49166 | 103.224.182.206 | 192.168.2.22 |
Oct 25, 2024 22:29:38.002036095 CEST | 49166 | 443 | 192.168.2.22 | 103.224.182.206 |
Oct 25, 2024 22:29:38.002043962 CEST | 443 | 49166 | 103.224.182.206 | 192.168.2.22 |
Oct 25, 2024 22:29:38.011168003 CEST | 443 | 49167 | 103.224.182.206 | 192.168.2.22 |
Oct 25, 2024 22:29:38.011404991 CEST | 49167 | 443 | 192.168.2.22 | 103.224.182.206 |
Oct 25, 2024 22:29:38.011425018 CEST | 443 | 49167 | 103.224.182.206 | 192.168.2.22 |
Oct 25, 2024 22:29:38.012368917 CEST | 443 | 49167 | 103.224.182.206 | 192.168.2.22 |
Oct 25, 2024 22:29:38.012420893 CEST | 49167 | 443 | 192.168.2.22 | 103.224.182.206 |
Oct 25, 2024 22:29:38.013390064 CEST | 443 | 49167 | 103.224.182.206 | 192.168.2.22 |
Oct 25, 2024 22:29:38.014800072 CEST | 49167 | 443 | 192.168.2.22 | 103.224.182.206 |
Oct 25, 2024 22:29:38.014887094 CEST | 443 | 49167 | 103.224.182.206 | 192.168.2.22 |
Oct 25, 2024 22:29:38.166234970 CEST | 443 | 49166 | 103.224.182.206 | 192.168.2.22 |
Oct 25, 2024 22:29:38.166286945 CEST | 49166 | 443 | 192.168.2.22 | 103.224.182.206 |
Oct 25, 2024 22:29:38.172446966 CEST | 49166 | 443 | 192.168.2.22 | 103.224.182.206 |
Oct 25, 2024 22:29:38.172465086 CEST | 443 | 49166 | 103.224.182.206 | 192.168.2.22 |
Oct 25, 2024 22:29:38.210397959 CEST | 49167 | 443 | 192.168.2.22 | 103.224.182.206 |
Oct 25, 2024 22:29:38.210448027 CEST | 443 | 49167 | 103.224.182.206 | 192.168.2.22 |
Oct 25, 2024 22:29:38.217489958 CEST | 49169 | 443 | 192.168.2.22 | 172.217.18.4 |
Oct 25, 2024 22:29:38.217540026 CEST | 443 | 49169 | 172.217.18.4 | 192.168.2.22 |
Oct 25, 2024 22:29:38.217590094 CEST | 49169 | 443 | 192.168.2.22 | 172.217.18.4 |
Oct 25, 2024 22:29:38.218633890 CEST | 49169 | 443 | 192.168.2.22 | 172.217.18.4 |
Oct 25, 2024 22:29:38.218651056 CEST | 443 | 49169 | 172.217.18.4 | 192.168.2.22 |
Oct 25, 2024 22:29:38.365525961 CEST | 443 | 49167 | 103.224.182.206 | 192.168.2.22 |
Oct 25, 2024 22:29:38.365592003 CEST | 49167 | 443 | 192.168.2.22 | 103.224.182.206 |
Oct 25, 2024 22:29:38.367131948 CEST | 49167 | 443 | 192.168.2.22 | 103.224.182.206 |
Oct 25, 2024 22:29:38.367150068 CEST | 443 | 49167 | 103.224.182.206 | 192.168.2.22 |
Oct 25, 2024 22:29:39.104154110 CEST | 443 | 49169 | 172.217.18.4 | 192.168.2.22 |
Oct 25, 2024 22:29:39.105230093 CEST | 49169 | 443 | 192.168.2.22 | 172.217.18.4 |
Oct 25, 2024 22:29:39.105264902 CEST | 443 | 49169 | 172.217.18.4 | 192.168.2.22 |
Oct 25, 2024 22:29:39.106347084 CEST | 443 | 49169 | 172.217.18.4 | 192.168.2.22 |
Oct 25, 2024 22:29:39.106398106 CEST | 49169 | 443 | 192.168.2.22 | 172.217.18.4 |
Oct 25, 2024 22:29:39.108935118 CEST | 49169 | 443 | 192.168.2.22 | 172.217.18.4 |
Oct 25, 2024 22:29:39.108994961 CEST | 443 | 49169 | 172.217.18.4 | 192.168.2.22 |
Oct 25, 2024 22:29:39.315334082 CEST | 443 | 49169 | 172.217.18.4 | 192.168.2.22 |
Oct 25, 2024 22:29:39.315391064 CEST | 49169 | 443 | 192.168.2.22 | 172.217.18.4 |
Oct 25, 2024 22:29:49.126473904 CEST | 443 | 49169 | 172.217.18.4 | 192.168.2.22 |
Oct 25, 2024 22:29:49.126576900 CEST | 443 | 49169 | 172.217.18.4 | 192.168.2.22 |
Oct 25, 2024 22:29:49.126724958 CEST | 49169 | 443 | 192.168.2.22 | 172.217.18.4 |
Oct 25, 2024 22:29:49.588785887 CEST | 49169 | 443 | 192.168.2.22 | 172.217.18.4 |
Oct 25, 2024 22:29:49.588845015 CEST | 443 | 49169 | 172.217.18.4 | 192.168.2.22 |
Oct 25, 2024 22:30:38.244529963 CEST | 49171 | 443 | 192.168.2.22 | 172.217.18.4 |
Oct 25, 2024 22:30:38.244627953 CEST | 443 | 49171 | 172.217.18.4 | 192.168.2.22 |
Oct 25, 2024 22:30:38.244718075 CEST | 49171 | 443 | 192.168.2.22 | 172.217.18.4 |
Oct 25, 2024 22:30:38.245357990 CEST | 49171 | 443 | 192.168.2.22 | 172.217.18.4 |
Oct 25, 2024 22:30:38.245407104 CEST | 443 | 49171 | 172.217.18.4 | 192.168.2.22 |
Oct 25, 2024 22:30:39.099430084 CEST | 443 | 49171 | 172.217.18.4 | 192.168.2.22 |
Oct 25, 2024 22:30:39.099848986 CEST | 49171 | 443 | 192.168.2.22 | 172.217.18.4 |
Oct 25, 2024 22:30:39.099910021 CEST | 443 | 49171 | 172.217.18.4 | 192.168.2.22 |
Oct 25, 2024 22:30:39.100404024 CEST | 443 | 49171 | 172.217.18.4 | 192.168.2.22 |
Oct 25, 2024 22:30:39.101865053 CEST | 49171 | 443 | 192.168.2.22 | 172.217.18.4 |
Oct 25, 2024 22:30:39.101975918 CEST | 443 | 49171 | 172.217.18.4 | 192.168.2.22 |
Oct 25, 2024 22:30:39.307339907 CEST | 443 | 49171 | 172.217.18.4 | 192.168.2.22 |
Oct 25, 2024 22:30:39.307411909 CEST | 49171 | 443 | 192.168.2.22 | 172.217.18.4 |
Oct 25, 2024 22:30:39.307450056 CEST | 49171 | 443 | 192.168.2.22 | 172.217.18.4 |
Oct 25, 2024 22:30:49.109021902 CEST | 443 | 49171 | 172.217.18.4 | 192.168.2.22 |
Oct 25, 2024 22:30:49.109101057 CEST | 443 | 49171 | 172.217.18.4 | 192.168.2.22 |
Oct 25, 2024 22:30:49.109178066 CEST | 49171 | 443 | 192.168.2.22 | 172.217.18.4 |
Oct 25, 2024 22:30:49.591197968 CEST | 49171 | 443 | 192.168.2.22 | 172.217.18.4 |
Oct 25, 2024 22:30:49.591236115 CEST | 443 | 49171 | 172.217.18.4 | 192.168.2.22 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 25, 2024 22:29:33.627043962 CEST | 53 | 54821 | 8.8.8.8 | 192.168.2.22 |
Oct 25, 2024 22:29:33.655059099 CEST | 53 | 52781 | 8.8.8.8 | 192.168.2.22 |
Oct 25, 2024 22:29:36.038156033 CEST | 53 | 62672 | 8.8.8.8 | 192.168.2.22 |
Oct 25, 2024 22:29:37.139062881 CEST | 54842 | 53 | 192.168.2.22 | 8.8.8.8 |
Oct 25, 2024 22:29:37.141573906 CEST | 58105 | 53 | 192.168.2.22 | 8.8.8.8 |
Oct 25, 2024 22:29:37.300045013 CEST | 53 | 54842 | 8.8.8.8 | 192.168.2.22 |
Oct 25, 2024 22:29:37.301495075 CEST | 53 | 58105 | 8.8.8.8 | 192.168.2.22 |
Oct 25, 2024 22:29:38.207077026 CEST | 57390 | 53 | 192.168.2.22 | 8.8.8.8 |
Oct 25, 2024 22:29:38.208774090 CEST | 58095 | 53 | 192.168.2.22 | 8.8.8.8 |
Oct 25, 2024 22:29:38.214225054 CEST | 53 | 57390 | 8.8.8.8 | 192.168.2.22 |
Oct 25, 2024 22:29:38.215859890 CEST | 53 | 58095 | 8.8.8.8 | 192.168.2.22 |
Oct 25, 2024 22:29:53.025768995 CEST | 53 | 52074 | 8.8.8.8 | 192.168.2.22 |
Oct 25, 2024 22:29:59.722368002 CEST | 53 | 51828 | 8.8.8.8 | 192.168.2.22 |
Oct 25, 2024 22:30:10.002083063 CEST | 53 | 64687 | 8.8.8.8 | 192.168.2.22 |
Oct 25, 2024 22:30:28.833165884 CEST | 53 | 58257 | 8.8.8.8 | 192.168.2.22 |
Oct 25, 2024 22:30:33.528127909 CEST | 53 | 49226 | 8.8.8.8 | 192.168.2.22 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Oct 25, 2024 22:29:37.139062881 CEST | 192.168.2.22 | 8.8.8.8 | 0xd4a8 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Oct 25, 2024 22:29:37.141573906 CEST | 192.168.2.22 | 8.8.8.8 | 0xc64c | Standard query (0) | 65 | IN (0x0001) | false | |
Oct 25, 2024 22:29:38.207077026 CEST | 192.168.2.22 | 8.8.8.8 | 0x3a4f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Oct 25, 2024 22:29:38.208774090 CEST | 192.168.2.22 | 8.8.8.8 | 0x8467 | Standard query (0) | 65 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Oct 25, 2024 22:29:37.300045013 CEST | 8.8.8.8 | 192.168.2.22 | 0xd4a8 | No error (0) | 103.224.182.206 | A (IP address) | IN (0x0001) | false | ||
Oct 25, 2024 22:29:38.214225054 CEST | 8.8.8.8 | 192.168.2.22 | 0x3a4f | No error (0) | 172.217.18.4 | A (IP address) | IN (0x0001) | false | ||
Oct 25, 2024 22:29:38.215859890 CEST | 8.8.8.8 | 192.168.2.22 | 0x8467 | No error (0) | 65 | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.22 | 49166 | 103.224.182.206 | 443 | 1224 | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-25 20:29:37 UTC | 2042 | OUT | |
2024-10-25 20:29:38 UTC | 150 | IN | |
2024-10-25 20:29:38 UTC | 2 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.22 | 49167 | 103.224.182.206 | 443 | 1224 | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-25 20:29:38 UTC | 1965 | OUT | |
2024-10-25 20:29:38 UTC | 76 | IN | |
2024-10-25 20:29:38 UTC | 94 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 16:29:31 |
Start date: | 25/10/2024 |
Path: | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x13f500000 |
File size: | 3'151'128 bytes |
MD5 hash: | FFA2B8E17F645BCC20F0E0201FEF83ED |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 1 |
Start time: | 16:29:32 |
Start date: | 25/10/2024 |
Path: | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x13f500000 |
File size: | 3'151'128 bytes |
MD5 hash: | FFA2B8E17F645BCC20F0E0201FEF83ED |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 4 |
Start time: | 16:29:36 |
Start date: | 25/10/2024 |
Path: | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x13f500000 |
File size: | 3'151'128 bytes |
MD5 hash: | FFA2B8E17F645BCC20F0E0201FEF83ED |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |