Windows
Analysis Report
OmUg4Vt9Cg.html
Overview
General Information
Sample name: | OmUg4Vt9Cg.htmlrenamed because original name is a hash value |
Original sample name: | f40c3eb4afdd248e1c995f1e786fd47f5a14f88dfd30de060e453031fb535fb9.htm.html |
Analysis ID: | 1576038 |
MD5: | 875da184badc843c03d8c3ca32dcc77b |
SHA1: | f05f622b09b66fee03762f78bc60388c43a2db1c |
SHA256: | f40c3eb4afdd248e1c995f1e786fd47f5a14f88dfd30de060e453031fb535fb9 |
Tags: | htmlWsgiDAVuser-JAMESWT_MHT |
Infos: | |
Detection
Score: | 56 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- chrome.exe (PID: 7128 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "C:\Us ers\user\D esktop\OmU g4Vt9Cg.ht ml" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA) - chrome.exe (PID: 6064 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2204 --fi eld-trial- handle=216 0,i,181109 3401158934 5828,53766 9115034744 9859,26214 4 /prefetc h:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_WinSearchAbuse | Yara detected WinSearchAbuse | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_WinSearchAbuse | Yara detected WinSearchAbuse | Joe Security |
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
Software Vulnerabilities |
---|
Source: | File source: | ||
Source: | File source: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 1 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
32% | ReversingLabs | Document-HTML.Trojan.Maldownloader |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
winaero.com | 68.183.112.81 | true | false | high | |
www.google.com | 172.217.21.36 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
true |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
68.183.112.81 | winaero.com | United States | 14061 | DIGITALOCEAN-ASNUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
172.217.21.36 | www.google.com | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.17 |
192.168.2.16 |
192.168.2.5 |
192.168.2.10 |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1576038 |
Start date and time: | 2024-12-16 13:30:12 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 16s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowshtmlcookbook.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 15 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | OmUg4Vt9Cg.htmlrenamed because original name is a hash value |
Original Sample Name: | f40c3eb4afdd248e1c995f1e786fd47f5a14f88dfd30de060e453031fb535fb9.htm.html |
Detection: | MAL |
Classification: | mal56.expl.winHTML@30/9@6/7 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, Sgrmuserer.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 172.217.21.35, 172.217.19.238, 64.233.162.84, 172.217.17.46, 142.250.181.74, 172.217.19.10, 172.217.19.202, 142.250.181.106, 142.250.181.138, 172.217.17.74, 172.217.17.42, 142.250.181.42, 172.217.19.234, 199.232.210.172, 172.217.17.35, 13.107.246.63, 23.218.208.109, 4.245.163.56
- Excluded domains from analysis (whitelisted): clients1.google.com, fs.microsoft.com, accounts.google.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, clientservices.googleapis.com, fe3cr.delivery.mp.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, redirector.gvt1.com, update.googleapis.com, clients.l.google.com, optimizationguide-pa.googleapis.com
- Not all processes where analyzed, report is missing behavior information
- VT rate limit hit for: OmUg4Vt9Cg.html
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
68.183.112.81 | Get hash | malicious | WinSearchAbuse | Browse | ||
Get hash | malicious | WinSearchAbuse | Browse | |||
Get hash | malicious | WinSearchAbuse | Browse | |||
Get hash | malicious | WinSearchAbuse | Browse | |||
Get hash | malicious | WinSearchAbuse | Browse | |||
Get hash | malicious | WinSearchAbuse | Browse | |||
Get hash | malicious | WinSearchAbuse | Browse | |||
Get hash | malicious | WinSearchAbuse | Browse | |||
Get hash | malicious | WinSearchAbuse | Browse | |||
Get hash | malicious | WinSearchAbuse | Browse | |||
239.255.255.250 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | HTMLPhisher | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
winaero.com | Get hash | malicious | WinSearchAbuse | Browse |
| |
Get hash | malicious | WinSearchAbuse | Browse |
| ||
Get hash | malicious | WinSearchAbuse | Browse |
| ||
Get hash | malicious | WinSearchAbuse | Browse |
| ||
Get hash | malicious | WinSearchAbuse | Browse |
| ||
Get hash | malicious | WinSearchAbuse | Browse |
| ||
Get hash | malicious | WinSearchAbuse | Browse |
| ||
Get hash | malicious | WinSearchAbuse | Browse |
| ||
Get hash | malicious | WinSearchAbuse | Browse |
| ||
Get hash | malicious | WinSearchAbuse | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
DIGITALOCEAN-ASNUS | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai, Moobot | Browse |
| ||
Get hash | malicious | Mirai, Moobot | Browse |
| ||
Get hash | malicious | Mirai, Moobot | Browse |
| ||
Get hash | malicious | Mirai, Moobot | Browse |
| ||
Get hash | malicious | Mirai, Moobot | Browse |
| ||
Get hash | malicious | Mirai, Moobot | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Quasar | Browse |
|
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2673 |
Entropy (8bit): | 3.983437182449831 |
Encrypted: | false |
SSDEEP: | 48:8wtbdNTwnHCidAKZdA1uehwiZUklqehzxy+3:8wZUD2xy |
MD5: | 93B8687F10BE233B56142EE19E12C19F |
SHA1: | A44F407F023051D864A7A296FD17980EB0C4DE24 |
SHA-256: | E19B49840446ADB1915631A142502D93BCD02391F2DDF6D0EC9103E7A1B98F53 |
SHA-512: | 14416D1472873AA5B9396AD3904323A761B67B21C9530A3BFE257F4D46782F1C16F019906C030A8B639D8400AEA52EE4A5273CEBF61C18AF7CC44C326BBCB407 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2675 |
Entropy (8bit): | 3.9984544949369893 |
Encrypted: | false |
SSDEEP: | 48:8TtbdNTwnHCidAKZdA1Heh/iZUkAQkqehmxy+2:8TZU99Qhxy |
MD5: | CA131A70AE48CE57C348F13BFF3D5557 |
SHA1: | 707C2233879617AAABD26CE969179CA9F6669CB2 |
SHA-256: | 640A767F9948F6B3BE0CFBCC371B26EF4573F804CADB60AC47D8E6B969F14CC6 |
SHA-512: | 152BB0EBDD119A37F76456CEB0B5F87490400A9FBA9FAC176AD158294DAF65C605D0CB27AF469F540627B546E0F7C948B5ED097D6A761E72E42C00F06AB1F84A |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2689 |
Entropy (8bit): | 4.009386892392341 |
Encrypted: | false |
SSDEEP: | 48:8FtbdNTwbHCidAKZdA149eh7sFiZUkmgqeh7sExy+BX:8FZUdnKxy |
MD5: | 6E537FA0F2CB22B20CE4E29BB039B4D9 |
SHA1: | 260D015A12FFCE684A69E72A3D306E0D3A4170F9 |
SHA-256: | BEED8EBA7E8A5C1741FE058676998CA21D9477375D92503BA63FCA5FAE86EDE3 |
SHA-512: | FDF911035503641ED3A16C32E9C668D5437C92C60DDF8671ED2B0363F6BBBA60E9DDB4E0360AF1D278BDC1BCA758B819825E6008FE0CE68FD227830A01269F63 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.998827165148771 |
Encrypted: | false |
SSDEEP: | 48:8DtbdNTwnHCidAKZdA14ehDiZUkwqehixy+R:8DZUO8xy |
MD5: | 09D8D96F17D5F7D318DB18F9DDA0EF2B |
SHA1: | 0FB5DCDA951087A49FF2B9C71C786BFD35C47B8B |
SHA-256: | D3FEFB9AB8CF818607B7F48B0A8ADC806D00C4F5480A70A344B5B4A420BAE499 |
SHA-512: | F34335FB9158644AF6825A4DDB4EBE13FA26047058C56CE43E202C6D9D53FB08ABA73E0F9910C445B5D68D7275F0937E325914BD118F305D06BCF7D6EE915F34 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9874529041940643 |
Encrypted: | false |
SSDEEP: | 48:85tbdNTwnHCidAKZdA1mehBiZUk1W1qehYxy+C:85ZUu94xy |
MD5: | ECE8CB9D7551BF034FB1E57D9CD8A686 |
SHA1: | 172B5192721FEB03EA3708A47D3A323B32CB8415 |
SHA-256: | 7F3B6A9619F3D2503D5F43453DFC21D58303DDFD1173EB8693613098BFE13E92 |
SHA-512: | 628359D458922D481DD2A67BB58C3BE5A544BA7A0691CB63FE2F77278BA019F91D338E692F8F143FBB56C49BF7B4E55E3319D69667301985B2E8B423BA8AD1B8 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.9975435816962315 |
Encrypted: | false |
SSDEEP: | 48:8FtbdNTwnHCidAKZdA1duT1ehOuTbbiZUk5OjqehOuTbKxy+yT+:8FZU1TyTbxWOvTbKxy7T |
MD5: | 585D9067461595E0D1577B5C500E85BC |
SHA1: | 48850BF2FADC464181FAA843392111A5FFA1FB2C |
SHA-256: | 24632431E3C41F014973163C7C34DBF474F7A5D6E111830F93C9FAF55AD686A7 |
SHA-512: | 36D21F1DFE5379E9E6A2927F240824B2C87633C36F19F9E2252E95333796DB12DE3C255F4DD7A43E6EB3F28B097988CE08C2AB6A34B3D8FD16E99FA04816670D |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 7584 |
Entropy (8bit): | 7.771402547890117 |
Encrypted: | false |
SSDEEP: | 192:kwSfH4IraPynWHFxRJkWLY6LiCD7LG7b2yqQwPOFb:kwSP4IEynWxJk6H2gLWqPQF |
MD5: | 17956A7275630ED70C693A72B11E67F3 |
SHA1: | AA600A8D3F3026816674F7DCA1D1FAE6651AEDD6 |
SHA-256: | 96E34D83AD7BBB7ECF150EA8DAC6544F9AB2A6FC7BD40D8300CF6D4CD7679DD2 |
SHA-512: | CAA7428CA8C5ADAA405FE6E95F64992482A590B6452EE94040E0BF80E1F167000609D9795281EDA3CED0C9CD00D489F620A44E8FCC4E9C4963590D4E245384F2 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 7584 |
Entropy (8bit): | 7.771402547890117 |
Encrypted: | false |
SSDEEP: | 192:kwSfH4IraPynWHFxRJkWLY6LiCD7LG7b2yqQwPOFb:kwSP4IEynWxJk6H2gLWqPQF |
MD5: | 17956A7275630ED70C693A72B11E67F3 |
SHA1: | AA600A8D3F3026816674F7DCA1D1FAE6651AEDD6 |
SHA-256: | 96E34D83AD7BBB7ECF150EA8DAC6544F9AB2A6FC7BD40D8300CF6D4CD7679DD2 |
SHA-512: | CAA7428CA8C5ADAA405FE6E95F64992482A590B6452EE94040E0BF80E1F167000609D9795281EDA3CED0C9CD00D489F620A44E8FCC4E9C4963590D4E245384F2 |
Malicious: | false |
URL: | https://winaero.com/blog/wp-content/uploads/2016/05/build-10158.png |
Preview: |
File type: | |
Entropy (8bit): | 0.0438925293371343 |
TrID: | |
File name: | OmUg4Vt9Cg.html |
File size: | 220'160 bytes |
MD5: | 875da184badc843c03d8c3ca32dcc77b |
SHA1: | f05f622b09b66fee03762f78bc60388c43a2db1c |
SHA256: | f40c3eb4afdd248e1c995f1e786fd47f5a14f88dfd30de060e453031fb535fb9 |
SHA512: | c2609b8c38bf2156e4e7fe8b260592ad7c86c6c211353b1ac4dad45a47a7e4aac76371da3ed9feffa08e49a0d55a633c22eb374f2b76aaaf4f8806b7900c60a4 |
SSDEEP: | 12:FF21pDgqunpDvXcMxik/QBSCm86GzjQBSCm86Z/g:Fwbg79fcMxik/6m89j6m8G |
TLSH: | 6B24787308DB6815CB31423C85D230DEF1B2802B96847DE1B1DB026D8EB86969893A89 |
File Content Preview: | <link rel="icon" href="https://winaero.com/blog/wp-content/uploads/2016/05/build-10158.png">....<meta property="og:image" content="https://winaero.com/blog/wp-content/uploads/2016/05/build-10158.png"> .. <title>BSKU6093MKSAF</title>.... <meta h |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 16, 2024 13:31:04.032514095 CET | 49675 | 443 | 192.168.2.10 | 173.222.162.55 |
Dec 16, 2024 13:31:04.032649994 CET | 49674 | 443 | 192.168.2.10 | 173.222.162.55 |
Dec 16, 2024 13:31:05.486964941 CET | 49677 | 443 | 192.168.2.10 | 20.42.65.85 |
Dec 16, 2024 13:31:05.798353910 CET | 49677 | 443 | 192.168.2.10 | 20.42.65.85 |
Dec 16, 2024 13:31:06.407445908 CET | 49677 | 443 | 192.168.2.10 | 20.42.65.85 |
Dec 16, 2024 13:31:06.563802958 CET | 49671 | 443 | 192.168.2.10 | 204.79.197.203 |
Dec 16, 2024 13:31:07.610589981 CET | 49677 | 443 | 192.168.2.10 | 20.42.65.85 |
Dec 16, 2024 13:31:10.018748999 CET | 49677 | 443 | 192.168.2.10 | 20.42.65.85 |
Dec 16, 2024 13:31:10.505242109 CET | 49714 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:31:10.505295038 CET | 443 | 49714 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:10.505368948 CET | 49714 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:31:10.506896019 CET | 49714 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:31:10.506922007 CET | 443 | 49714 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:11.621860981 CET | 49718 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:31:11.621910095 CET | 443 | 49718 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:11.623971939 CET | 49718 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:31:11.624203920 CET | 49718 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:31:11.624217033 CET | 443 | 49718 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:12.040005922 CET | 443 | 49714 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:12.040256023 CET | 49714 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:31:12.040268898 CET | 443 | 49714 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:12.041310072 CET | 443 | 49714 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:12.042268991 CET | 49714 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:31:12.046552896 CET | 49714 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:31:12.046627998 CET | 443 | 49714 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:12.046699047 CET | 49714 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:31:12.091334105 CET | 443 | 49714 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:12.251333952 CET | 443 | 49714 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:12.258265972 CET | 49714 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:31:12.370256901 CET | 443 | 49714 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:12.370383978 CET | 443 | 49714 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:12.370405912 CET | 443 | 49714 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:12.370434046 CET | 443 | 49714 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:12.370547056 CET | 49714 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:31:12.370573044 CET | 443 | 49714 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:12.370585918 CET | 443 | 49714 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:12.370831966 CET | 49714 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:31:12.371120930 CET | 49714 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:31:12.371136904 CET | 443 | 49714 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:12.515218019 CET | 49720 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:31:12.515260935 CET | 443 | 49720 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:12.520425081 CET | 49720 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:31:12.520637989 CET | 49720 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:31:12.520653963 CET | 443 | 49720 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:13.148917913 CET | 443 | 49718 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:13.164140940 CET | 49718 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:31:13.164151907 CET | 443 | 49718 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:13.165287971 CET | 443 | 49718 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:13.165640116 CET | 49718 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:31:13.166014910 CET | 49718 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:31:13.166085005 CET | 443 | 49718 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:13.361166954 CET | 49718 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:31:13.361183882 CET | 443 | 49718 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:13.421654940 CET | 49718 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:31:13.634190083 CET | 49675 | 443 | 192.168.2.10 | 173.222.162.55 |
Dec 16, 2024 13:31:13.634231091 CET | 49674 | 443 | 192.168.2.10 | 173.222.162.55 |
Dec 16, 2024 13:31:13.733350992 CET | 443 | 49720 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:13.733603001 CET | 49720 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:31:13.733619928 CET | 443 | 49720 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:13.734678984 CET | 443 | 49720 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:13.734745026 CET | 49720 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:31:13.735224962 CET | 49720 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:31:13.735275030 CET | 49720 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:31:13.735291958 CET | 443 | 49720 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:13.819124937 CET | 49720 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:31:13.819154024 CET | 443 | 49720 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:13.919423103 CET | 49720 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:31:14.169269085 CET | 443 | 49720 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:14.169301987 CET | 443 | 49720 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:14.169310093 CET | 443 | 49720 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:14.169327974 CET | 443 | 49720 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:14.169390917 CET | 49720 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:31:14.169397116 CET | 443 | 49720 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:14.169672012 CET | 49720 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:31:14.170447111 CET | 49720 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:31:14.170463085 CET | 443 | 49720 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:31:14.206522942 CET | 49728 | 443 | 192.168.2.10 | 172.217.21.36 |
Dec 16, 2024 13:31:14.206562042 CET | 443 | 49728 | 172.217.21.36 | 192.168.2.10 |
Dec 16, 2024 13:31:14.206645012 CET | 49728 | 443 | 192.168.2.10 | 172.217.21.36 |
Dec 16, 2024 13:31:14.206845999 CET | 49728 | 443 | 192.168.2.10 | 172.217.21.36 |
Dec 16, 2024 13:31:14.206859112 CET | 443 | 49728 | 172.217.21.36 | 192.168.2.10 |
Dec 16, 2024 13:31:14.821757078 CET | 49677 | 443 | 192.168.2.10 | 20.42.65.85 |
Dec 16, 2024 13:31:15.914216042 CET | 443 | 49728 | 172.217.21.36 | 192.168.2.10 |
Dec 16, 2024 13:31:15.914473057 CET | 49728 | 443 | 192.168.2.10 | 172.217.21.36 |
Dec 16, 2024 13:31:15.914496899 CET | 443 | 49728 | 172.217.21.36 | 192.168.2.10 |
Dec 16, 2024 13:31:15.915760994 CET | 443 | 49728 | 172.217.21.36 | 192.168.2.10 |
Dec 16, 2024 13:31:15.915826082 CET | 49728 | 443 | 192.168.2.10 | 172.217.21.36 |
Dec 16, 2024 13:31:15.917124987 CET | 49728 | 443 | 192.168.2.10 | 172.217.21.36 |
Dec 16, 2024 13:31:15.917195082 CET | 443 | 49728 | 172.217.21.36 | 192.168.2.10 |
Dec 16, 2024 13:31:15.965426922 CET | 49728 | 443 | 192.168.2.10 | 172.217.21.36 |
Dec 16, 2024 13:31:15.965435982 CET | 443 | 49728 | 172.217.21.36 | 192.168.2.10 |
Dec 16, 2024 13:31:16.012296915 CET | 49728 | 443 | 192.168.2.10 | 172.217.21.36 |
Dec 16, 2024 13:31:16.166027069 CET | 49671 | 443 | 192.168.2.10 | 204.79.197.203 |
Dec 16, 2024 13:31:24.429755926 CET | 49677 | 443 | 192.168.2.10 | 20.42.65.85 |
Dec 16, 2024 13:31:25.631398916 CET | 443 | 49728 | 172.217.21.36 | 192.168.2.10 |
Dec 16, 2024 13:31:25.631472111 CET | 443 | 49728 | 172.217.21.36 | 192.168.2.10 |
Dec 16, 2024 13:31:25.631525040 CET | 49728 | 443 | 192.168.2.10 | 172.217.21.36 |
Dec 16, 2024 13:31:27.501558065 CET | 49728 | 443 | 192.168.2.10 | 172.217.21.36 |
Dec 16, 2024 13:31:27.501590967 CET | 443 | 49728 | 172.217.21.36 | 192.168.2.10 |
Dec 16, 2024 13:31:58.383146048 CET | 49718 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:31:58.383161068 CET | 443 | 49718 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:32:13.494796038 CET | 49718 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:32:13.494995117 CET | 443 | 49718 | 68.183.112.81 | 192.168.2.10 |
Dec 16, 2024 13:32:13.495085955 CET | 49718 | 443 | 192.168.2.10 | 68.183.112.81 |
Dec 16, 2024 13:32:14.134911060 CET | 49875 | 443 | 192.168.2.10 | 172.217.21.36 |
Dec 16, 2024 13:32:14.134963989 CET | 443 | 49875 | 172.217.21.36 | 192.168.2.10 |
Dec 16, 2024 13:32:14.135046005 CET | 49875 | 443 | 192.168.2.10 | 172.217.21.36 |
Dec 16, 2024 13:32:14.135302067 CET | 49875 | 443 | 192.168.2.10 | 172.217.21.36 |
Dec 16, 2024 13:32:14.135323048 CET | 443 | 49875 | 172.217.21.36 | 192.168.2.10 |
Dec 16, 2024 13:32:15.889770985 CET | 443 | 49875 | 172.217.21.36 | 192.168.2.10 |
Dec 16, 2024 13:32:15.890146017 CET | 49875 | 443 | 192.168.2.10 | 172.217.21.36 |
Dec 16, 2024 13:32:15.890163898 CET | 443 | 49875 | 172.217.21.36 | 192.168.2.10 |
Dec 16, 2024 13:32:15.891341925 CET | 443 | 49875 | 172.217.21.36 | 192.168.2.10 |
Dec 16, 2024 13:32:15.891752005 CET | 49875 | 443 | 192.168.2.10 | 172.217.21.36 |
Dec 16, 2024 13:32:15.891930103 CET | 443 | 49875 | 172.217.21.36 | 192.168.2.10 |
Dec 16, 2024 13:32:15.945588112 CET | 49875 | 443 | 192.168.2.10 | 172.217.21.36 |
Dec 16, 2024 13:32:25.588447094 CET | 443 | 49875 | 172.217.21.36 | 192.168.2.10 |
Dec 16, 2024 13:32:25.588598013 CET | 443 | 49875 | 172.217.21.36 | 192.168.2.10 |
Dec 16, 2024 13:32:25.588690996 CET | 49875 | 443 | 192.168.2.10 | 172.217.21.36 |
Dec 16, 2024 13:32:27.494993925 CET | 49875 | 443 | 192.168.2.10 | 172.217.21.36 |
Dec 16, 2024 13:32:27.495039940 CET | 443 | 49875 | 172.217.21.36 | 192.168.2.10 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 16, 2024 13:31:09.949182034 CET | 53 | 50701 | 1.1.1.1 | 192.168.2.10 |
Dec 16, 2024 13:31:09.958965063 CET | 53 | 58840 | 1.1.1.1 | 192.168.2.10 |
Dec 16, 2024 13:31:10.162086964 CET | 62533 | 53 | 192.168.2.10 | 1.1.1.1 |
Dec 16, 2024 13:31:10.162393093 CET | 64088 | 53 | 192.168.2.10 | 1.1.1.1 |
Dec 16, 2024 13:31:10.492881060 CET | 53 | 64088 | 1.1.1.1 | 192.168.2.10 |
Dec 16, 2024 13:31:10.493338108 CET | 53 | 62533 | 1.1.1.1 | 192.168.2.10 |
Dec 16, 2024 13:31:12.376168966 CET | 50486 | 53 | 192.168.2.10 | 1.1.1.1 |
Dec 16, 2024 13:31:12.376307964 CET | 59594 | 53 | 192.168.2.10 | 1.1.1.1 |
Dec 16, 2024 13:31:12.513530970 CET | 53 | 59594 | 1.1.1.1 | 192.168.2.10 |
Dec 16, 2024 13:31:12.514784098 CET | 53 | 50486 | 1.1.1.1 | 192.168.2.10 |
Dec 16, 2024 13:31:12.818264008 CET | 53 | 58869 | 1.1.1.1 | 192.168.2.10 |
Dec 16, 2024 13:31:14.067595959 CET | 63160 | 53 | 192.168.2.10 | 1.1.1.1 |
Dec 16, 2024 13:31:14.067753077 CET | 59329 | 53 | 192.168.2.10 | 1.1.1.1 |
Dec 16, 2024 13:31:14.190932035 CET | 53 | 51047 | 1.1.1.1 | 192.168.2.10 |
Dec 16, 2024 13:31:14.205373049 CET | 53 | 63160 | 1.1.1.1 | 192.168.2.10 |
Dec 16, 2024 13:31:14.205384970 CET | 53 | 59329 | 1.1.1.1 | 192.168.2.10 |
Dec 16, 2024 13:31:29.803539991 CET | 53 | 62008 | 1.1.1.1 | 192.168.2.10 |
Dec 16, 2024 13:31:48.820668936 CET | 53 | 63012 | 1.1.1.1 | 192.168.2.10 |
Dec 16, 2024 13:32:04.577231884 CET | 138 | 138 | 192.168.2.10 | 192.168.2.255 |
Dec 16, 2024 13:32:09.726365089 CET | 53 | 58788 | 1.1.1.1 | 192.168.2.10 |
Dec 16, 2024 13:32:11.179888010 CET | 53 | 63255 | 1.1.1.1 | 192.168.2.10 |
Dec 16, 2024 13:32:42.132702112 CET | 53 | 51641 | 1.1.1.1 | 192.168.2.10 |
Dec 16, 2024 13:33:28.335531950 CET | 53 | 61309 | 1.1.1.1 | 192.168.2.10 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 16, 2024 13:31:10.162086964 CET | 192.168.2.10 | 1.1.1.1 | 0x6ac1 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 16, 2024 13:31:10.162393093 CET | 192.168.2.10 | 1.1.1.1 | 0x5c31 | Standard query (0) | 65 | IN (0x0001) | false | |
Dec 16, 2024 13:31:12.376168966 CET | 192.168.2.10 | 1.1.1.1 | 0xadaf | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 16, 2024 13:31:12.376307964 CET | 192.168.2.10 | 1.1.1.1 | 0x90f4 | Standard query (0) | 65 | IN (0x0001) | false | |
Dec 16, 2024 13:31:14.067595959 CET | 192.168.2.10 | 1.1.1.1 | 0xf3a9 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 16, 2024 13:31:14.067753077 CET | 192.168.2.10 | 1.1.1.1 | 0x5b8c | Standard query (0) | 65 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 16, 2024 13:31:10.493338108 CET | 1.1.1.1 | 192.168.2.10 | 0x6ac1 | No error (0) | 68.183.112.81 | A (IP address) | IN (0x0001) | false | ||
Dec 16, 2024 13:31:12.514784098 CET | 1.1.1.1 | 192.168.2.10 | 0xadaf | No error (0) | 68.183.112.81 | A (IP address) | IN (0x0001) | false | ||
Dec 16, 2024 13:31:14.205373049 CET | 1.1.1.1 | 192.168.2.10 | 0xf3a9 | No error (0) | 172.217.21.36 | A (IP address) | IN (0x0001) | false | ||
Dec 16, 2024 13:31:14.205384970 CET | 1.1.1.1 | 192.168.2.10 | 0x5b8c | No error (0) | 65 | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.10 | 49714 | 68.183.112.81 | 443 | 6064 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-16 12:31:12 UTC | 582 | OUT | |
2024-12-16 12:31:12 UTC | 338 | IN | |
2024-12-16 12:31:12 UTC | 7584 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.10 | 49720 | 68.183.112.81 | 443 | 6064 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-16 12:31:13 UTC | 382 | OUT | |
2024-12-16 12:31:14 UTC | 338 | IN | |
2024-12-16 12:31:14 UTC | 7584 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 4 |
Start time: | 07:31:05 |
Start date: | 16/12/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6c5c30000 |
File size: | 3'242'272 bytes |
MD5 hash: | 83395EAB5B03DEA9720F8D7AC0D15CAA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 7 |
Start time: | 07:31:08 |
Start date: | 16/12/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6c5c30000 |
File size: | 3'242'272 bytes |
MD5 hash: | 83395EAB5B03DEA9720F8D7AC0D15CAA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |