Windows
Analysis Report
https://chamberoflearning.com/n/?c3Y9bzM2NV8xX25vbSZyYW5kPU1uZ3phbkk9JnVpZD1VU0VSMTcxMjIwMjRVNTkxMjE3Mjk=N0123NCA_A8_CHF@emfa.pt
Overview
General Information
Detection
Score: | 56 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- chrome.exe (PID: 5660 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 5852 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2632 --fi eld-trial- handle=249 2,i,112186 5699173773 4334,92890 5672563000 0553,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- chrome.exe (PID: 7128 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://chamb eroflearni ng.com/n/? c3Y9bzM2NV 8xX25vbSZy YW5kPU1uZ3 phbkk9JnVp ZD1VU0VSMT cxMjIwMjRV NTkxMjE3Mj k=N0123NCA _A8_CHF@em fa.pt" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-27T19:11:56.429200+0100 | 2057333 | 1 | Successful Credential Theft Detected | 192.168.2.5 | 49714 | 216.69.174.68 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | SlashNext: |
Source: | Sample URL: |
Source: | HTTP Parser: |
Networking |
---|
Source: | Suricata IDS: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: |
Source: | Window detected: |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 1 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
100% | SlashNext | Credential Stealing type: Phishing & Social Engineering |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
www.google.com | 142.250.181.68 | true | false | high | |
chamberoflearning.com | 216.69.174.68 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true | unknown | ||
true |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
216.69.174.68 | chamberoflearning.com | United States | 26496 | AS-26496-GO-DADDY-COM-LLCUS | true | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.250.181.68 | www.google.com | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.5 |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1581458 |
Start date and time: | 2024-12-27 19:10:52 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 2m 56s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | https://chamberoflearning.com/n/?c3Y9bzM2NV8xX25vbSZyYW5kPU1uZ3phbkk9JnVpZD1VU0VSMTcxMjIwMjRVNTkxMjE3Mjk=N0123NCA_A8_CHF@emfa.pt |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal56.win@16/10@4/4 |
EGA Information: | Failed |
HCA Information: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 172.217.21.35, 172.217.19.238, 64.233.161.84, 172.217.17.46, 199.232.210.172, 192.229.221.95, 172.217.17.35, 142.250.181.142, 23.218.208.109, 20.109.210.53, 13.107.246.63
- Excluded domains from analysis (whitelisted): fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, clientservices.googleapis.com, fe3cr.delivery.mp.microsoft.com, clients2.google.com, ocsp.digicert.com, edgedl.me.gvt1.com, redirector.gvt1.com, update.googleapis.com, clients.l.google.com
- Not all processes where analyzed, report is missing behavior information
- VT rate limit hit for: https://chamberoflearning.com/n/?c3Y9bzM2NV8xX25vbSZyYW5kPU1uZ3phbkk9JnVpZD1VU0VSMTcxMjIwMjRVNTkxMjE3Mjk=N0123NCA_A8_CHF@emfa.pt
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9855136627269894 |
Encrypted: | false |
SSDEEP: | 48:8hdoTMQjHKidAKZdA19ehwiZUklqehQy+3:80vsvy |
MD5: | 8DA10A651B21278E1B4ED46E25EDCD98 |
SHA1: | 3B92DF6C21ABDA636803B63658173B37817087C3 |
SHA-256: | D8E0033623310A0526536B0EF6E57EA14530B11C96A0180250E32674CD4A47FA |
SHA-512: | 759F2A7458E74729C2BB0A6E4493F961E5583DA38653C66139E1904F4644340CD4C8D672EB761538499D1F865E23C2F60A6B15F57DF9BB37740F792135C60080 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.998779069827132 |
Encrypted: | false |
SSDEEP: | 48:8adoTMQjHKidAKZdA1weh/iZUkAQkqehfy+2:8tve9QWy |
MD5: | 4E6A358F4CD0B397894AD0DB8D41658C |
SHA1: | 216997DAEC8E852A8E0A6DAC90C486D5850E13E1 |
SHA-256: | 6F5DAFFEE00164D10859699D633004270F1D8BB3AD7F10C3EBDA815FD79D499E |
SHA-512: | 99BCECAC4300CC70B9CA0D44B2934B684ACE41E085EFD51C5E2EAD46E96BB5C29A6F2F1EDD0D0BD82B788AE2F61E92E28D813D702D78D7D9B27E01400F1F8C16 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2693 |
Entropy (8bit): | 4.008725381673341 |
Encrypted: | false |
SSDEEP: | 48:8xBdoTMQsHKidAKZdA14tseh7sFiZUkmgqeh7sVy+BX:8xUv7njy |
MD5: | 24ADC09D8C4AB5AC330BFA0B34F6BD6D |
SHA1: | 6BE052370C4713440532503F38DA0027213A7EC0 |
SHA-256: | 5EC1982D1779FF6EAD4523F1607EDC337B9B414184C4B59D9DEB74522806CA10 |
SHA-512: | 27F57219D1DABC44A98A501135958B15BD69B5DA5DE1024064E1EB237D64A4294595CDF8E7A7473FB2808EA7F3AD0CD620B201A4DA11B0EBFF2ACBC4B3FE1E45 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.999982695099033 |
Encrypted: | false |
SSDEEP: | 48:8wdoTMQjHKidAKZdA1vehDiZUkwqehLy+R:8LvFdy |
MD5: | 1193968F5C904EF2E203788807AEFCB8 |
SHA1: | 151C9541E106E1DB0E659262A4C156827278EB12 |
SHA-256: | 8D5C78191EB2C16E603ECD76A417FB0EDA264AB57AC40736B44450E48EF3050B |
SHA-512: | F4AF6ECE32811EE159354EF15C7C8F16CCAFE752EE2839F8350585C5EE1C8EEC1A49CA14660AFF3CF304F082601780EC559AFF3A11C0B376D7AC56D97FD10FF0 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.988733645807306 |
Encrypted: | false |
SSDEEP: | 48:8bLddoTMQjHKidAKZdA1hehBiZUk1W1qehJy+C:8AvV9py |
MD5: | 8DA41E214A8D7A00A7BF0F9944C1F5B5 |
SHA1: | BD31C736C9FC5B02F794CCEBEACAFCF3B7B93E90 |
SHA-256: | 0DD6D6BB6178936832B4D146693FE059745B187EAADB0BCFD3852B694242303C |
SHA-512: | 79B37BC210D61244833558324E73331FD63846179398B8BA9B0A61C0B7FDB11FE62FEEBA2ED36A0CBDB4E2D4B860FDC5C30D661434C8CDED27D203EB74B44E0A |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2683 |
Entropy (8bit): | 3.9987990331831376 |
Encrypted: | false |
SSDEEP: | 48:8QdoTMQjHKidAKZdA1duT+ehOuTbbiZUk5OjqehOuTbjy+yT+:8rvpT/TbxWOvTbjy7T |
MD5: | 3BF1909E046752363EB5DDEE9CEEA3EC |
SHA1: | B7C67714BCE0A50E208882452A02A274390C40F8 |
SHA-256: | 5DEE90BB61FA96803180CEDA34547230D6BC7E8FF99F588210B28ABDB3E6E7E1 |
SHA-512: | 9981B9CC4A7A9C12EA3E1BAB70842C1914639A4D332B1E3FC39B8049E04B8C8443615F9520FBDFFB192B1081FF7AF1DB4597CBEBBEA660D4CECAECCBF58EF2FF |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 675 |
Entropy (8bit): | 4.7888896708778645 |
Encrypted: | false |
SSDEEP: | 12:J0+ox0UDWsRGDW8hsw4Aox1WR3oKcOgAZXtmIrgvRMKiSQe9uE7F50vIqUDWvjsq:yiUDWsYDWus/q3oKccXt+vEHK50vZUD4 |
MD5: | BB24BBE0E0A1321F801D4F94AA849716 |
SHA1: | BDB24243D677AB92284CE2F3188277C839566F68 |
SHA-256: | B9A5A44B16CEE2FA2B118C86FC08A1961BB64DCFCF90B6B81B3FC36A91915165 |
SHA-512: | 338F7168933C15BCC026E084B51D59EBBC108AAFD4C68BC639EE2BF9E9BFF39EB43A803AC09F4DF8858E208F33A331BBBB87FDF4AEBAEE6409F589B5D5EAC90D |
Malicious: | false |
Reputation: | low |
URL: | https://chamberoflearning.com/favicon.ico |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 675 |
Entropy (8bit): | 4.7888896708778645 |
Encrypted: | false |
SSDEEP: | 12:J0+ox0UDWsRGDW8hsw4Aox1WR3oKcOgAZXtmIrgvRMKiSQe9uE7F50vIqUDWvjsq:yiUDWsYDWus/q3oKccXt+vEHK50vZUD4 |
MD5: | BB24BBE0E0A1321F801D4F94AA849716 |
SHA1: | BDB24243D677AB92284CE2F3188277C839566F68 |
SHA-256: | B9A5A44B16CEE2FA2B118C86FC08A1961BB64DCFCF90B6B81B3FC36A91915165 |
SHA-512: | 338F7168933C15BCC026E084B51D59EBBC108AAFD4C68BC639EE2BF9E9BFF39EB43A803AC09F4DF8858E208F33A331BBBB87FDF4AEBAEE6409F589B5D5EAC90D |
Malicious: | false |
Reputation: | low |
URL: | https://chamberoflearning.com/n/?c3Y9bzM2NV8xX25vbSZyYW5kPU1uZ3phbkk9JnVpZD1VU0VSMTcxMjIwMjRVNTkxMjE3Mjk=N0123NCA_A8_CHF@emfa.pt |
Preview: |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-27T19:11:56.429200+0100 | 2057333 | ET PHISHING MAMBA Credential Phish Landing Page 2024-11-08 | 1 | 192.168.2.5 | 49714 | 216.69.174.68 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 27, 2024 19:11:41.408934116 CET | 49674 | 443 | 192.168.2.5 | 23.1.237.91 |
Dec 27, 2024 19:11:41.424468994 CET | 49675 | 443 | 192.168.2.5 | 23.1.237.91 |
Dec 27, 2024 19:11:41.533941984 CET | 49673 | 443 | 192.168.2.5 | 23.1.237.91 |
Dec 27, 2024 19:11:51.014995098 CET | 49674 | 443 | 192.168.2.5 | 23.1.237.91 |
Dec 27, 2024 19:11:51.033900976 CET | 49675 | 443 | 192.168.2.5 | 23.1.237.91 |
Dec 27, 2024 19:11:51.138883114 CET | 49673 | 443 | 192.168.2.5 | 23.1.237.91 |
Dec 27, 2024 19:11:51.968055964 CET | 49712 | 443 | 192.168.2.5 | 142.250.181.68 |
Dec 27, 2024 19:11:51.968097925 CET | 443 | 49712 | 142.250.181.68 | 192.168.2.5 |
Dec 27, 2024 19:11:51.968183994 CET | 49712 | 443 | 192.168.2.5 | 142.250.181.68 |
Dec 27, 2024 19:11:51.968408108 CET | 49712 | 443 | 192.168.2.5 | 142.250.181.68 |
Dec 27, 2024 19:11:51.968417883 CET | 443 | 49712 | 142.250.181.68 | 192.168.2.5 |
Dec 27, 2024 19:11:53.632220030 CET | 443 | 49703 | 23.1.237.91 | 192.168.2.5 |
Dec 27, 2024 19:11:53.632328987 CET | 49703 | 443 | 192.168.2.5 | 23.1.237.91 |
Dec 27, 2024 19:11:53.713016987 CET | 443 | 49712 | 142.250.181.68 | 192.168.2.5 |
Dec 27, 2024 19:11:53.713422060 CET | 49712 | 443 | 192.168.2.5 | 142.250.181.68 |
Dec 27, 2024 19:11:53.713434935 CET | 443 | 49712 | 142.250.181.68 | 192.168.2.5 |
Dec 27, 2024 19:11:53.714298010 CET | 443 | 49712 | 142.250.181.68 | 192.168.2.5 |
Dec 27, 2024 19:11:53.714359999 CET | 49712 | 443 | 192.168.2.5 | 142.250.181.68 |
Dec 27, 2024 19:11:53.716506958 CET | 49712 | 443 | 192.168.2.5 | 142.250.181.68 |
Dec 27, 2024 19:11:53.716571093 CET | 443 | 49712 | 142.250.181.68 | 192.168.2.5 |
Dec 27, 2024 19:11:53.766071081 CET | 49712 | 443 | 192.168.2.5 | 142.250.181.68 |
Dec 27, 2024 19:11:53.766079903 CET | 443 | 49712 | 142.250.181.68 | 192.168.2.5 |
Dec 27, 2024 19:11:53.816260099 CET | 49712 | 443 | 192.168.2.5 | 142.250.181.68 |
Dec 27, 2024 19:11:54.048472881 CET | 49714 | 443 | 192.168.2.5 | 216.69.174.68 |
Dec 27, 2024 19:11:54.048599958 CET | 443 | 49714 | 216.69.174.68 | 192.168.2.5 |
Dec 27, 2024 19:11:54.048693895 CET | 49714 | 443 | 192.168.2.5 | 216.69.174.68 |
Dec 27, 2024 19:11:54.049021006 CET | 49715 | 443 | 192.168.2.5 | 216.69.174.68 |
Dec 27, 2024 19:11:54.049052954 CET | 443 | 49715 | 216.69.174.68 | 192.168.2.5 |
Dec 27, 2024 19:11:54.049108982 CET | 49715 | 443 | 192.168.2.5 | 216.69.174.68 |
Dec 27, 2024 19:11:54.049385071 CET | 49714 | 443 | 192.168.2.5 | 216.69.174.68 |
Dec 27, 2024 19:11:54.049402952 CET | 443 | 49714 | 216.69.174.68 | 192.168.2.5 |
Dec 27, 2024 19:11:54.049684048 CET | 49715 | 443 | 192.168.2.5 | 216.69.174.68 |
Dec 27, 2024 19:11:54.049695969 CET | 443 | 49715 | 216.69.174.68 | 192.168.2.5 |
Dec 27, 2024 19:11:56.032805920 CET | 443 | 49714 | 216.69.174.68 | 192.168.2.5 |
Dec 27, 2024 19:11:56.033257008 CET | 49714 | 443 | 192.168.2.5 | 216.69.174.68 |
Dec 27, 2024 19:11:56.033349991 CET | 443 | 49714 | 216.69.174.68 | 192.168.2.5 |
Dec 27, 2024 19:11:56.034537077 CET | 443 | 49714 | 216.69.174.68 | 192.168.2.5 |
Dec 27, 2024 19:11:56.034600019 CET | 49714 | 443 | 192.168.2.5 | 216.69.174.68 |
Dec 27, 2024 19:11:56.039004087 CET | 49714 | 443 | 192.168.2.5 | 216.69.174.68 |
Dec 27, 2024 19:11:56.039091110 CET | 443 | 49714 | 216.69.174.68 | 192.168.2.5 |
Dec 27, 2024 19:11:56.039159060 CET | 49714 | 443 | 192.168.2.5 | 216.69.174.68 |
Dec 27, 2024 19:11:56.080101013 CET | 49714 | 443 | 192.168.2.5 | 216.69.174.68 |
Dec 27, 2024 19:11:56.080133915 CET | 443 | 49714 | 216.69.174.68 | 192.168.2.5 |
Dec 27, 2024 19:11:56.091002941 CET | 443 | 49715 | 216.69.174.68 | 192.168.2.5 |
Dec 27, 2024 19:11:56.091232061 CET | 49715 | 443 | 192.168.2.5 | 216.69.174.68 |
Dec 27, 2024 19:11:56.091245890 CET | 443 | 49715 | 216.69.174.68 | 192.168.2.5 |
Dec 27, 2024 19:11:56.092252016 CET | 443 | 49715 | 216.69.174.68 | 192.168.2.5 |
Dec 27, 2024 19:11:56.092310905 CET | 49715 | 443 | 192.168.2.5 | 216.69.174.68 |
Dec 27, 2024 19:11:56.092619896 CET | 49715 | 443 | 192.168.2.5 | 216.69.174.68 |
Dec 27, 2024 19:11:56.092673063 CET | 443 | 49715 | 216.69.174.68 | 192.168.2.5 |
Dec 27, 2024 19:11:56.126116037 CET | 49714 | 443 | 192.168.2.5 | 216.69.174.68 |
Dec 27, 2024 19:11:56.141340971 CET | 49715 | 443 | 192.168.2.5 | 216.69.174.68 |
Dec 27, 2024 19:11:56.141366959 CET | 443 | 49715 | 216.69.174.68 | 192.168.2.5 |
Dec 27, 2024 19:11:56.188124895 CET | 49715 | 443 | 192.168.2.5 | 216.69.174.68 |
Dec 27, 2024 19:11:56.429244995 CET | 443 | 49714 | 216.69.174.68 | 192.168.2.5 |
Dec 27, 2024 19:11:56.429328918 CET | 443 | 49714 | 216.69.174.68 | 192.168.2.5 |
Dec 27, 2024 19:11:56.429375887 CET | 49714 | 443 | 192.168.2.5 | 216.69.174.68 |
Dec 27, 2024 19:11:56.430066109 CET | 49714 | 443 | 192.168.2.5 | 216.69.174.68 |
Dec 27, 2024 19:11:56.430088043 CET | 443 | 49714 | 216.69.174.68 | 192.168.2.5 |
Dec 27, 2024 19:11:56.493479967 CET | 49715 | 443 | 192.168.2.5 | 216.69.174.68 |
Dec 27, 2024 19:11:56.539324045 CET | 443 | 49715 | 216.69.174.68 | 192.168.2.5 |
Dec 27, 2024 19:11:56.898525953 CET | 443 | 49715 | 216.69.174.68 | 192.168.2.5 |
Dec 27, 2024 19:11:56.898597956 CET | 443 | 49715 | 216.69.174.68 | 192.168.2.5 |
Dec 27, 2024 19:11:56.898663044 CET | 49715 | 443 | 192.168.2.5 | 216.69.174.68 |
Dec 27, 2024 19:11:56.899281025 CET | 49715 | 443 | 192.168.2.5 | 216.69.174.68 |
Dec 27, 2024 19:11:56.899291992 CET | 443 | 49715 | 216.69.174.68 | 192.168.2.5 |
Dec 27, 2024 19:12:03.394725084 CET | 443 | 49712 | 142.250.181.68 | 192.168.2.5 |
Dec 27, 2024 19:12:03.394788027 CET | 443 | 49712 | 142.250.181.68 | 192.168.2.5 |
Dec 27, 2024 19:12:03.394839048 CET | 49712 | 443 | 192.168.2.5 | 142.250.181.68 |
Dec 27, 2024 19:12:04.470123053 CET | 49712 | 443 | 192.168.2.5 | 142.250.181.68 |
Dec 27, 2024 19:12:04.470154047 CET | 443 | 49712 | 142.250.181.68 | 192.168.2.5 |
Dec 27, 2024 19:12:51.891130924 CET | 49821 | 443 | 192.168.2.5 | 142.250.181.68 |
Dec 27, 2024 19:12:51.891230106 CET | 443 | 49821 | 142.250.181.68 | 192.168.2.5 |
Dec 27, 2024 19:12:51.891350031 CET | 49821 | 443 | 192.168.2.5 | 142.250.181.68 |
Dec 27, 2024 19:12:51.891586065 CET | 49821 | 443 | 192.168.2.5 | 142.250.181.68 |
Dec 27, 2024 19:12:51.891621113 CET | 443 | 49821 | 142.250.181.68 | 192.168.2.5 |
Dec 27, 2024 19:12:53.580992937 CET | 443 | 49821 | 142.250.181.68 | 192.168.2.5 |
Dec 27, 2024 19:12:53.581427097 CET | 49821 | 443 | 192.168.2.5 | 142.250.181.68 |
Dec 27, 2024 19:12:53.581470013 CET | 443 | 49821 | 142.250.181.68 | 192.168.2.5 |
Dec 27, 2024 19:12:53.581784010 CET | 443 | 49821 | 142.250.181.68 | 192.168.2.5 |
Dec 27, 2024 19:12:53.582114935 CET | 49821 | 443 | 192.168.2.5 | 142.250.181.68 |
Dec 27, 2024 19:12:53.582178116 CET | 443 | 49821 | 142.250.181.68 | 192.168.2.5 |
Dec 27, 2024 19:12:53.623585939 CET | 49821 | 443 | 192.168.2.5 | 142.250.181.68 |
Dec 27, 2024 19:13:03.297386885 CET | 443 | 49821 | 142.250.181.68 | 192.168.2.5 |
Dec 27, 2024 19:13:03.297525883 CET | 443 | 49821 | 142.250.181.68 | 192.168.2.5 |
Dec 27, 2024 19:13:03.297643900 CET | 49821 | 443 | 192.168.2.5 | 142.250.181.68 |
Dec 27, 2024 19:13:04.487884998 CET | 49821 | 443 | 192.168.2.5 | 142.250.181.68 |
Dec 27, 2024 19:13:04.487961054 CET | 443 | 49821 | 142.250.181.68 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 27, 2024 19:11:48.352783918 CET | 53 | 52410 | 1.1.1.1 | 192.168.2.5 |
Dec 27, 2024 19:11:48.413156986 CET | 53 | 52413 | 1.1.1.1 | 192.168.2.5 |
Dec 27, 2024 19:11:51.318933010 CET | 53 | 63470 | 1.1.1.1 | 192.168.2.5 |
Dec 27, 2024 19:11:51.827860117 CET | 63262 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 27, 2024 19:11:51.827981949 CET | 50766 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 27, 2024 19:11:51.965256929 CET | 53 | 63262 | 1.1.1.1 | 192.168.2.5 |
Dec 27, 2024 19:11:51.966656923 CET | 53 | 50766 | 1.1.1.1 | 192.168.2.5 |
Dec 27, 2024 19:11:53.619095087 CET | 56290 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 27, 2024 19:11:53.619550943 CET | 64490 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 27, 2024 19:11:53.964826107 CET | 53 | 64490 | 1.1.1.1 | 192.168.2.5 |
Dec 27, 2024 19:11:54.045562983 CET | 53 | 56290 | 1.1.1.1 | 192.168.2.5 |
Dec 27, 2024 19:12:08.294770956 CET | 53 | 55765 | 1.1.1.1 | 192.168.2.5 |
Dec 27, 2024 19:12:27.169095039 CET | 53 | 60939 | 1.1.1.1 | 192.168.2.5 |
Dec 27, 2024 19:12:48.046015978 CET | 53 | 54647 | 1.1.1.1 | 192.168.2.5 |
Dec 27, 2024 19:12:49.685575008 CET | 53 | 63735 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 27, 2024 19:11:51.827860117 CET | 192.168.2.5 | 1.1.1.1 | 0x930a | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 27, 2024 19:11:51.827981949 CET | 192.168.2.5 | 1.1.1.1 | 0x3a48 | Standard query (0) | 65 | IN (0x0001) | false | |
Dec 27, 2024 19:11:53.619095087 CET | 192.168.2.5 | 1.1.1.1 | 0xeca8 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 27, 2024 19:11:53.619550943 CET | 192.168.2.5 | 1.1.1.1 | 0x371a | Standard query (0) | 65 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 27, 2024 19:11:51.965256929 CET | 1.1.1.1 | 192.168.2.5 | 0x930a | No error (0) | 142.250.181.68 | A (IP address) | IN (0x0001) | false | ||
Dec 27, 2024 19:11:51.966656923 CET | 1.1.1.1 | 192.168.2.5 | 0x3a48 | No error (0) | 65 | IN (0x0001) | false | |||
Dec 27, 2024 19:11:54.045562983 CET | 1.1.1.1 | 192.168.2.5 | 0xeca8 | No error (0) | 216.69.174.68 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49714 | 216.69.174.68 | 443 | 5852 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-27 18:11:56 UTC | 762 | OUT | |
2024-12-27 18:11:56 UTC | 176 | IN | |
2024-12-27 18:11:56 UTC | 675 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49715 | 216.69.174.68 | 443 | 5852 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-27 18:11:56 UTC | 696 | OUT | |
2024-12-27 18:11:56 UTC | 176 | IN | |
2024-12-27 18:11:56 UTC | 675 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 13:11:42 |
Start date: | 27/12/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 2 |
Start time: | 13:11:46 |
Start date: | 27/12/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 3 |
Start time: | 13:11:52 |
Start date: | 27/12/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |