Windows
Analysis Report
https://usps.com-dscd.top/mum
Overview
General Information
Detection
Score: | 52 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- chrome.exe (PID: 2800 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 3964 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2056 --fi eld-trial- handle=200 8,i,113814 4701162016 0889,93269 9425939544 1866,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- chrome.exe (PID: 5720 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://usps. com-dscd.t op/mum" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | SlashNext: |
Phishing |
---|
Source: | Joe Sandbox AI: | ||
Source: | Joe Sandbox AI: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: |
Source: | Window detected: |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Browser Extensions | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 Registry Run Keys / Startup Folder | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 4 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 5 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 3 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | SlashNext | Fraudulent Website type: Phishing & Social Engineering |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
a.nel.cloudflare.com | 35.190.80.1 | true | false | high | |
usps.com-dscd.top | 172.67.202.68 | true | true | unknown | |
www.google.com | 142.250.181.132 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true | unknown | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
35.190.80.1 | a.nel.cloudflare.com | United States | 15169 | GOOGLEUS | false | |
142.250.181.132 | www.google.com | United States | 15169 | GOOGLEUS | false | |
172.67.202.68 | usps.com-dscd.top | United States | 13335 | CLOUDFLARENETUS | true |
IP |
---|
192.168.2.5 |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1578456 |
Start date and time: | 2024-12-19 18:34:59 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 1m 59s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | https://usps.com-dscd.top/mum |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal52.win@18/6@6/5 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- URL not reachable
- Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 142.250.181.99, 172.217.19.206, 64.233.164.84, 142.250.181.142, 199.232.214.172, 192.229.221.95, 23.218.208.109, 52.149.20.212, 13.107.246.63
- Excluded domains from analysis (whitelisted): fs.microsoft.com, clients2.google.com, ocsp.digicert.com, accounts.google.com, redirector.gvt1.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, clientservices.googleapis.com, clients.l.google.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- VT rate limit hit for: https://usps.com-dscd.top/mum
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.97766919646564 |
Encrypted: | false |
SSDEEP: | 48:8ydUTYI9HzidAKZdA19ehwiZUklqehvty+3:8xPLGy |
MD5: | 79AF249C932651703E172B8E36244719 |
SHA1: | 80FE86A2F9FDECF3DCD65217B08E8D52D94EB275 |
SHA-256: | 0B944FF0AB916E63090C796934EBA8759A393BB4F118C2A774C2AF56E8E9A240 |
SHA-512: | 0257057A609A7B10D7D0FA3077A57AA933BDCEB71602369B9A4A30207B7F8718CEFD3A9EA2EA826ACCE91B76F3A4EC98D06667B9D0AF3A846074581E10862378 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.9942206884650053 |
Encrypted: | false |
SSDEEP: | 48:8dSdUTYI9HzidAKZdA1weh/iZUkAQkqehwty+2:8dRP59Qby |
MD5: | 7895BE80A8C6D85A3A07D82999C90F3C |
SHA1: | 84FF04A0E3154292E1371AF9CE892B4070D2796B |
SHA-256: | 037263643453A04BA0BBECBE0B45B8332FB689261DCDA7EBD9308D79DC207943 |
SHA-512: | 48D8D02870B59046401410C412B53E877FD10088B6E04CE8EB030EBC9E862816B78F9BB864388385D557DDC68BCA0948A2ABC9970742A9BA414B247C2B40A203 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2693 |
Entropy (8bit): | 4.004364299466394 |
Encrypted: | false |
SSDEEP: | 48:8xJdUTYIsHzidAKZdA14tseh7sFiZUkmgqeh7s6ty+BX:8xYPKnqy |
MD5: | 8A15E23237D723480302FFC4FE7C2E4A |
SHA1: | F913B3BE5FF5D87BC4C45EC19475A81C518FD63E |
SHA-256: | A13E65DBA146A9BA14D3979E9CD00C3A26F3F0CF25DEDE06CD0C3013EF046019 |
SHA-512: | 5C83BF51F96AD966FF5FAABEE7D7E53C729FD7711FE2FF80540D93E49EA66F202BCA949E826A58FF3B32EF23C98105723805D1D233FE00762C735EA97A0D8CAF |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.9932557704053036 |
Encrypted: | false |
SSDEEP: | 48:8hdUTYI9HzidAKZdA1vehDiZUkwqeh8ty+R:8wPa8y |
MD5: | D47114F168DD978720CF613794C92DA4 |
SHA1: | D883E395E9D6F7BCAFF50B71A963361D42B34FC2 |
SHA-256: | 6492599E73FE8AAA2F7B37E99DBBDA0DC357C59BF06BD934BF740240FEF2732F |
SHA-512: | 3BE678732352B51164F5D6D66162F4AE8A82A4108D79DC99687A68B8CF95D6E4A64E70C92B239FD5328BC28939054A6CACA580751018F67F1DC7415CA396B94F |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.981438285998994 |
Encrypted: | false |
SSDEEP: | 48:8VdUTYI9HzidAKZdA1hehBiZUk1W1qeh+ty+C:88Pa94y |
MD5: | 9E474A02E1A14445F26003024EA53CD2 |
SHA1: | FB26990523154714AD121995D2AACFAE42421FB3 |
SHA-256: | F7E036A472BE4BE76A656A9BF99B85A5109A75E05C62D2276961127D9CF37DDA |
SHA-512: | 88BBF54BA6DF77E4895BFEA69E675B61F0091BE6C0DC4BD9228D34C302B4DBF569C09BD3C8101F79BCC2DB5700C4780164F3207298FD2C905D9B7F4E6EFBE11A |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2683 |
Entropy (8bit): | 3.99012348679176 |
Encrypted: | false |
SSDEEP: | 48:8EdUTYI9HzidAKZdA1duT+ehOuTbbiZUk5OjqehOuTbUty+yT+:8PPkT/TbxWOvTbqy7T |
MD5: | B6DC2657ABD8044632A7C09CADC8A6E8 |
SHA1: | F1D0C28C0221CDC8318ED28FF12E3C1028A673BE |
SHA-256: | 6D2B45DB4C798930EE3E12FB68F6166EF3874EE545FB3055F16F09C7EE6A5881 |
SHA-512: | FECC8DD74E467FF0B4D1122BBD4BE97C08B5976EB79B3A78758ABFCDA60C05D536E53D5E612C63D96A0BAB979AD8830178B26B4E905237B207D13B7E406ED0C4 |
Malicious: | false |
Reputation: | low |
Preview: |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 19, 2024 18:35:48.342348099 CET | 49675 | 443 | 192.168.2.5 | 23.1.237.91 |
Dec 19, 2024 18:35:48.342447042 CET | 49674 | 443 | 192.168.2.5 | 23.1.237.91 |
Dec 19, 2024 18:35:48.451720953 CET | 49673 | 443 | 192.168.2.5 | 23.1.237.91 |
Dec 19, 2024 18:35:57.956170082 CET | 49675 | 443 | 192.168.2.5 | 23.1.237.91 |
Dec 19, 2024 18:35:57.956187010 CET | 49674 | 443 | 192.168.2.5 | 23.1.237.91 |
Dec 19, 2024 18:35:58.004658937 CET | 49712 | 443 | 192.168.2.5 | 142.250.181.132 |
Dec 19, 2024 18:35:58.004770041 CET | 443 | 49712 | 142.250.181.132 | 192.168.2.5 |
Dec 19, 2024 18:35:58.004872084 CET | 49712 | 443 | 192.168.2.5 | 142.250.181.132 |
Dec 19, 2024 18:35:58.005117893 CET | 49712 | 443 | 192.168.2.5 | 142.250.181.132 |
Dec 19, 2024 18:35:58.005150080 CET | 443 | 49712 | 142.250.181.132 | 192.168.2.5 |
Dec 19, 2024 18:35:58.065500975 CET | 49673 | 443 | 192.168.2.5 | 23.1.237.91 |
Dec 19, 2024 18:35:59.654321909 CET | 49714 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:35:59.654385090 CET | 443 | 49714 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:35:59.654465914 CET | 49714 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:35:59.654871941 CET | 49715 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:35:59.654972076 CET | 443 | 49715 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:35:59.655047894 CET | 49715 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:35:59.655265093 CET | 49714 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:35:59.655284882 CET | 443 | 49714 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:35:59.655575037 CET | 49715 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:35:59.655608892 CET | 443 | 49715 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:35:59.722234964 CET | 443 | 49712 | 142.250.181.132 | 192.168.2.5 |
Dec 19, 2024 18:35:59.722517014 CET | 49712 | 443 | 192.168.2.5 | 142.250.181.132 |
Dec 19, 2024 18:35:59.722583055 CET | 443 | 49712 | 142.250.181.132 | 192.168.2.5 |
Dec 19, 2024 18:35:59.723643064 CET | 443 | 49712 | 142.250.181.132 | 192.168.2.5 |
Dec 19, 2024 18:35:59.723710060 CET | 49712 | 443 | 192.168.2.5 | 142.250.181.132 |
Dec 19, 2024 18:35:59.724797010 CET | 49712 | 443 | 192.168.2.5 | 142.250.181.132 |
Dec 19, 2024 18:35:59.724906921 CET | 443 | 49712 | 142.250.181.132 | 192.168.2.5 |
Dec 19, 2024 18:35:59.768265009 CET | 49712 | 443 | 192.168.2.5 | 142.250.181.132 |
Dec 19, 2024 18:35:59.768285990 CET | 443 | 49712 | 142.250.181.132 | 192.168.2.5 |
Dec 19, 2024 18:35:59.816293955 CET | 49712 | 443 | 192.168.2.5 | 142.250.181.132 |
Dec 19, 2024 18:36:00.449430943 CET | 443 | 49703 | 23.1.237.91 | 192.168.2.5 |
Dec 19, 2024 18:36:00.449508905 CET | 49703 | 443 | 192.168.2.5 | 23.1.237.91 |
Dec 19, 2024 18:36:00.880657911 CET | 443 | 49715 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:00.883223057 CET | 443 | 49714 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:00.892326117 CET | 49714 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:00.892335892 CET | 49715 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:00.892358065 CET | 443 | 49714 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:00.892375946 CET | 443 | 49715 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:00.893605947 CET | 443 | 49714 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:00.893946886 CET | 443 | 49715 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:00.893990040 CET | 49714 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:00.894113064 CET | 49715 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:00.908485889 CET | 49714 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:00.908487082 CET | 49714 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:00.908621073 CET | 443 | 49714 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:00.908756971 CET | 49714 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:00.908756971 CET | 49714 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:00.908770084 CET | 443 | 49714 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:00.908816099 CET | 49714 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:00.910330057 CET | 49715 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:00.910476923 CET | 443 | 49715 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:00.910687923 CET | 49715 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:00.910687923 CET | 49715 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:00.910892010 CET | 443 | 49715 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:00.910917044 CET | 49715 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:00.911412001 CET | 49718 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:00.911448002 CET | 443 | 49718 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:00.911469936 CET | 49715 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:00.911639929 CET | 49717 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:00.911655903 CET | 49718 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:00.911678076 CET | 443 | 49717 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:00.911741972 CET | 49718 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:00.911750078 CET | 443 | 49718 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:00.911775112 CET | 49717 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:00.912902117 CET | 49717 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:00.912915945 CET | 443 | 49717 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:02.139193058 CET | 443 | 49718 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:02.139503956 CET | 49718 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:02.139518023 CET | 443 | 49718 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:02.140465021 CET | 443 | 49718 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:02.140532970 CET | 49718 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:02.141022921 CET | 443 | 49717 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:02.141884089 CET | 49717 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:02.141917944 CET | 443 | 49717 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:02.142076969 CET | 49718 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:02.142121077 CET | 443 | 49718 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:02.142421007 CET | 49718 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:02.142425060 CET | 443 | 49718 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:02.143302917 CET | 443 | 49717 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:02.143363953 CET | 49717 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:02.144063950 CET | 49717 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:02.144130945 CET | 443 | 49717 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:02.189862967 CET | 49717 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:02.189888000 CET | 49718 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:02.189889908 CET | 443 | 49717 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:02.240140915 CET | 49717 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:02.788034916 CET | 443 | 49718 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:02.788111925 CET | 443 | 49718 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:02.788192987 CET | 49718 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:02.788885117 CET | 49718 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:02.788896084 CET | 443 | 49718 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:02.936470032 CET | 49719 | 443 | 192.168.2.5 | 35.190.80.1 |
Dec 19, 2024 18:36:02.936579943 CET | 443 | 49719 | 35.190.80.1 | 192.168.2.5 |
Dec 19, 2024 18:36:02.936665058 CET | 49719 | 443 | 192.168.2.5 | 35.190.80.1 |
Dec 19, 2024 18:36:02.936934948 CET | 49719 | 443 | 192.168.2.5 | 35.190.80.1 |
Dec 19, 2024 18:36:02.936973095 CET | 443 | 49719 | 35.190.80.1 | 192.168.2.5 |
Dec 19, 2024 18:36:04.163738012 CET | 443 | 49719 | 35.190.80.1 | 192.168.2.5 |
Dec 19, 2024 18:36:04.164258957 CET | 49719 | 443 | 192.168.2.5 | 35.190.80.1 |
Dec 19, 2024 18:36:04.164324045 CET | 443 | 49719 | 35.190.80.1 | 192.168.2.5 |
Dec 19, 2024 18:36:04.166023970 CET | 443 | 49719 | 35.190.80.1 | 192.168.2.5 |
Dec 19, 2024 18:36:04.166111946 CET | 49719 | 443 | 192.168.2.5 | 35.190.80.1 |
Dec 19, 2024 18:36:04.167351961 CET | 49719 | 443 | 192.168.2.5 | 35.190.80.1 |
Dec 19, 2024 18:36:04.167478085 CET | 443 | 49719 | 35.190.80.1 | 192.168.2.5 |
Dec 19, 2024 18:36:04.167519093 CET | 49719 | 443 | 192.168.2.5 | 35.190.80.1 |
Dec 19, 2024 18:36:04.206655979 CET | 49719 | 443 | 192.168.2.5 | 35.190.80.1 |
Dec 19, 2024 18:36:04.206681967 CET | 443 | 49719 | 35.190.80.1 | 192.168.2.5 |
Dec 19, 2024 18:36:04.253537893 CET | 49719 | 443 | 192.168.2.5 | 35.190.80.1 |
Dec 19, 2024 18:36:04.617389917 CET | 443 | 49719 | 35.190.80.1 | 192.168.2.5 |
Dec 19, 2024 18:36:04.618043900 CET | 443 | 49719 | 35.190.80.1 | 192.168.2.5 |
Dec 19, 2024 18:36:04.618135929 CET | 49719 | 443 | 192.168.2.5 | 35.190.80.1 |
Dec 19, 2024 18:36:04.618246078 CET | 49719 | 443 | 192.168.2.5 | 35.190.80.1 |
Dec 19, 2024 18:36:04.618247032 CET | 49719 | 443 | 192.168.2.5 | 35.190.80.1 |
Dec 19, 2024 18:36:04.618299007 CET | 443 | 49719 | 35.190.80.1 | 192.168.2.5 |
Dec 19, 2024 18:36:04.618365049 CET | 49719 | 443 | 192.168.2.5 | 35.190.80.1 |
Dec 19, 2024 18:36:04.618766069 CET | 49720 | 443 | 192.168.2.5 | 35.190.80.1 |
Dec 19, 2024 18:36:04.618854046 CET | 443 | 49720 | 35.190.80.1 | 192.168.2.5 |
Dec 19, 2024 18:36:04.618927956 CET | 49720 | 443 | 192.168.2.5 | 35.190.80.1 |
Dec 19, 2024 18:36:04.619141102 CET | 49720 | 443 | 192.168.2.5 | 35.190.80.1 |
Dec 19, 2024 18:36:04.619174004 CET | 443 | 49720 | 35.190.80.1 | 192.168.2.5 |
Dec 19, 2024 18:36:05.833914042 CET | 443 | 49720 | 35.190.80.1 | 192.168.2.5 |
Dec 19, 2024 18:36:05.834363937 CET | 49720 | 443 | 192.168.2.5 | 35.190.80.1 |
Dec 19, 2024 18:36:05.834428072 CET | 443 | 49720 | 35.190.80.1 | 192.168.2.5 |
Dec 19, 2024 18:36:05.835678101 CET | 443 | 49720 | 35.190.80.1 | 192.168.2.5 |
Dec 19, 2024 18:36:05.836128950 CET | 49720 | 443 | 192.168.2.5 | 35.190.80.1 |
Dec 19, 2024 18:36:05.836288929 CET | 49720 | 443 | 192.168.2.5 | 35.190.80.1 |
Dec 19, 2024 18:36:05.836301088 CET | 443 | 49720 | 35.190.80.1 | 192.168.2.5 |
Dec 19, 2024 18:36:05.836323977 CET | 443 | 49720 | 35.190.80.1 | 192.168.2.5 |
Dec 19, 2024 18:36:05.878401041 CET | 49720 | 443 | 192.168.2.5 | 35.190.80.1 |
Dec 19, 2024 18:36:06.293183088 CET | 443 | 49720 | 35.190.80.1 | 192.168.2.5 |
Dec 19, 2024 18:36:06.293473005 CET | 443 | 49720 | 35.190.80.1 | 192.168.2.5 |
Dec 19, 2024 18:36:06.293551922 CET | 49720 | 443 | 192.168.2.5 | 35.190.80.1 |
Dec 19, 2024 18:36:06.293622017 CET | 49720 | 443 | 192.168.2.5 | 35.190.80.1 |
Dec 19, 2024 18:36:06.293663025 CET | 443 | 49720 | 35.190.80.1 | 192.168.2.5 |
Dec 19, 2024 18:36:06.293690920 CET | 49720 | 443 | 192.168.2.5 | 35.190.80.1 |
Dec 19, 2024 18:36:06.293735027 CET | 49720 | 443 | 192.168.2.5 | 35.190.80.1 |
Dec 19, 2024 18:36:09.400815010 CET | 443 | 49712 | 142.250.181.132 | 192.168.2.5 |
Dec 19, 2024 18:36:09.400968075 CET | 443 | 49712 | 142.250.181.132 | 192.168.2.5 |
Dec 19, 2024 18:36:09.401032925 CET | 49712 | 443 | 192.168.2.5 | 142.250.181.132 |
Dec 19, 2024 18:36:09.802177906 CET | 49712 | 443 | 192.168.2.5 | 142.250.181.132 |
Dec 19, 2024 18:36:09.802218914 CET | 443 | 49712 | 142.250.181.132 | 192.168.2.5 |
Dec 19, 2024 18:36:14.750396967 CET | 49737 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:14.750439882 CET | 443 | 49737 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:14.750510931 CET | 49737 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:14.750997066 CET | 49737 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:14.751008987 CET | 443 | 49737 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:14.751375914 CET | 49717 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:14.799339056 CET | 443 | 49717 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:15.266228914 CET | 443 | 49717 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:15.266418934 CET | 443 | 49717 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:15.266643047 CET | 49717 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:15.267105103 CET | 49717 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:15.267138004 CET | 443 | 49717 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:16.014911890 CET | 443 | 49737 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:16.015598059 CET | 49737 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:16.015616894 CET | 443 | 49737 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:16.017067909 CET | 443 | 49737 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:16.017205954 CET | 49737 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:16.017913103 CET | 49737 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:16.017944098 CET | 49737 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:16.018003941 CET | 443 | 49737 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:16.018003941 CET | 49737 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:16.018064022 CET | 49737 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:16.018429995 CET | 49738 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:16.018492937 CET | 443 | 49738 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:16.018568993 CET | 49738 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:16.018842936 CET | 49738 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:16.018857956 CET | 443 | 49738 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:17.232323885 CET | 443 | 49738 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:17.233026981 CET | 49738 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:17.233083010 CET | 443 | 49738 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:17.233557940 CET | 443 | 49738 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:17.234015942 CET | 49738 | 443 | 192.168.2.5 | 172.67.202.68 |
Dec 19, 2024 18:36:17.234110117 CET | 443 | 49738 | 172.67.202.68 | 192.168.2.5 |
Dec 19, 2024 18:36:17.284980059 CET | 49738 | 443 | 192.168.2.5 | 172.67.202.68 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 19, 2024 18:35:53.489141941 CET | 53 | 62041 | 1.1.1.1 | 192.168.2.5 |
Dec 19, 2024 18:35:53.653726101 CET | 53 | 56229 | 1.1.1.1 | 192.168.2.5 |
Dec 19, 2024 18:35:56.345108032 CET | 53 | 63015 | 1.1.1.1 | 192.168.2.5 |
Dec 19, 2024 18:35:57.863437891 CET | 51934 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 19, 2024 18:35:57.863483906 CET | 52809 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 19, 2024 18:35:58.000802994 CET | 53 | 51934 | 1.1.1.1 | 192.168.2.5 |
Dec 19, 2024 18:35:58.002789974 CET | 53 | 52809 | 1.1.1.1 | 192.168.2.5 |
Dec 19, 2024 18:35:59.329436064 CET | 54758 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 19, 2024 18:35:59.329857111 CET | 56595 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 19, 2024 18:35:59.653178930 CET | 53 | 54758 | 1.1.1.1 | 192.168.2.5 |
Dec 19, 2024 18:35:59.653737068 CET | 53 | 56595 | 1.1.1.1 | 192.168.2.5 |
Dec 19, 2024 18:36:02.796212912 CET | 56629 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 19, 2024 18:36:02.796565056 CET | 65149 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 19, 2024 18:36:02.935111046 CET | 53 | 65149 | 1.1.1.1 | 192.168.2.5 |
Dec 19, 2024 18:36:02.935635090 CET | 53 | 56629 | 1.1.1.1 | 192.168.2.5 |
Dec 19, 2024 18:36:13.301523924 CET | 53 | 56582 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 19, 2024 18:35:57.863437891 CET | 192.168.2.5 | 1.1.1.1 | 0xaa02 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 19, 2024 18:35:57.863483906 CET | 192.168.2.5 | 1.1.1.1 | 0xe845 | Standard query (0) | 65 | IN (0x0001) | false | |
Dec 19, 2024 18:35:59.329436064 CET | 192.168.2.5 | 1.1.1.1 | 0x4e55 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 19, 2024 18:35:59.329857111 CET | 192.168.2.5 | 1.1.1.1 | 0xfa25 | Standard query (0) | 65 | IN (0x0001) | false | |
Dec 19, 2024 18:36:02.796212912 CET | 192.168.2.5 | 1.1.1.1 | 0xfa55 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 19, 2024 18:36:02.796565056 CET | 192.168.2.5 | 1.1.1.1 | 0xe318 | Standard query (0) | 65 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 19, 2024 18:35:58.000802994 CET | 1.1.1.1 | 192.168.2.5 | 0xaa02 | No error (0) | 142.250.181.132 | A (IP address) | IN (0x0001) | false | ||
Dec 19, 2024 18:35:58.002789974 CET | 1.1.1.1 | 192.168.2.5 | 0xe845 | No error (0) | 65 | IN (0x0001) | false | |||
Dec 19, 2024 18:35:59.653178930 CET | 1.1.1.1 | 192.168.2.5 | 0x4e55 | No error (0) | 172.67.202.68 | A (IP address) | IN (0x0001) | false | ||
Dec 19, 2024 18:35:59.653178930 CET | 1.1.1.1 | 192.168.2.5 | 0x4e55 | No error (0) | 104.21.93.12 | A (IP address) | IN (0x0001) | false | ||
Dec 19, 2024 18:35:59.653737068 CET | 1.1.1.1 | 192.168.2.5 | 0xfa25 | No error (0) | 65 | IN (0x0001) | false | |||
Dec 19, 2024 18:36:02.935635090 CET | 1.1.1.1 | 192.168.2.5 | 0xfa55 | No error (0) | 35.190.80.1 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49718 | 172.67.202.68 | 443 | 3964 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-19 17:36:02 UTC | 663 | OUT | |
2024-12-19 17:36:02 UTC | 793 | IN | |
2024-12-19 17:36:02 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49719 | 35.190.80.1 | 443 | 3964 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-19 17:36:04 UTC | 544 | OUT | |
2024-12-19 17:36:04 UTC | 336 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49720 | 35.190.80.1 | 443 | 3964 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-19 17:36:05 UTC | 484 | OUT | |
2024-12-19 17:36:05 UTC | 391 | OUT | |
2024-12-19 17:36:06 UTC | 168 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.5 | 49717 | 172.67.202.68 | 443 | 3964 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-19 17:36:14 UTC | 695 | OUT | |
2024-12-19 17:36:15 UTC | 797 | IN | |
2024-12-19 17:36:15 UTC | 5 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 12:35:48 |
Start date: | 19/12/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 2 |
Start time: | 12:35:51 |
Start date: | 19/12/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 3 |
Start time: | 12:35:58 |
Start date: | 19/12/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |