Windows
Analysis Report
phishingemail.eml
Overview
General Information
Detection
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64_ra
- OUTLOOK.EXE (PID: 6264 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \Root\Offi ce16\OUTLO OK.EXE" /e ml "C:\Use rs\user\De sktop\phis hingemail. eml" MD5: 91A5292942864110ED734005B7E005C0) - ai.exe (PID: 6500 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \root\vfs\ ProgramFil esCommonX6 4\Microsof t Shared\O ffice16\ai .exe" "1DA D4889-39FD -4D81-8A25 -F437DFB5E C8D" "A866 18B2-E54F- 49BC-88B1- 9360EFEB59 59" "6264" "C:\Progr am Files ( x86)\Micro soft Offic e\Root\Off ice16\OUTL OOK.EXE" " WordCombin edFloatieL reOnline.o nnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD) - chrome.exe (PID: 7020 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// royalmagaz ine.com.br /ss/c/user =914880779 2&tracking id=saezk6Y LBSmf0PIS3 wXweGrm6Gn 8membXPBiM FFl0 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA) - chrome.exe (PID: 4192 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2064 --fi eld-trial- handle=197 2,i,852012 3778435995 892,794258 2137012361 327,262144 --disable -features= Optimizati onGuideMod elDownload ing,Optimi zationHint s,Optimiza tionHintsF etching,Op timization TargetPred iction /pr efetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA) - chrome.exe (PID: 7456 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// royalmagaz ine.com.br /ss/c/user =914880779 2&tracking id=saezk6Y LBSmf0PIS3 wXweGrm6Gn 8membXPBiM FFl0 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA) - chrome.exe (PID: 7640 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2196 --fi eld-trial- handle=182 0,i,237194 7540312049 649,904499 2565933829 060,262144 --disable -features= Optimizati onGuideMod elDownload ing,Optimi zationHint s,Optimiza tionHintsF etching,Op timization TargetPred iction /pr efetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
- OpenWith.exe (PID: 5152 cmdline:
C:\Windows \system32\ OpenWith.e xe -Embedd ing MD5: E4A834784FA08C17D47A1E72429C5109)
- cleanup
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Click to jump to signature section
Phishing |
---|
Source: | Joe Sandbox AI: |
Source: | Joe Sandbox AI: |
Source: | Classification: |
Source: | Memory has grown: |
Source: | IP Address: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Window created: | Jump to behavior |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: |
Source: | Window found: | Jump to behavior |
Source: | Window detected: |
Source: | Key opened: | Jump to behavior |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 21 Browser Extensions | 1 Process Injection | 1 Masquerading | OS Credential Dumping | 1 Security Software Discovery | Remote Services | 1 Clipboard Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 Registry Run Keys / Startup Folder | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | Data from Removable Media | 3 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 DLL Side-Loading | Security Account Manager | 1 File and Directory Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | 1 Extra Window Memory Injection | 1 Extra Window Memory Injection | NTDS | 13 System Information Discovery | Distributed Component Object Model | Input Capture | 4 Application Layer Protocol | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
royalmagazine.com.br | 158.106.129.107 | true | false | high | |
www.google.com | 142.250.186.132 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.250.186.132 | www.google.com | United States | 15169 | GOOGLEUS | false | |
172.217.16.196 | unknown | United States | 15169 | GOOGLEUS | false | |
158.106.129.107 | royalmagazine.com.br | United States | 63410 | PRIVATESYSTEMSUS | false |
IP |
---|
192.168.2.17 |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1584028 |
Start date and time: | 2025-01-04 03:58:35 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 35s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 21 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | phishingemail.eml |
Detection: | MAL |
Classification: | mal48.winEML@30/10@8/5 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe, SgrmBroker.exe, backgroundTaskHost.exe, TextInputHost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 52.109.76.240, 52.113.194.132, 192.229.221.95, 104.208.16.92, 142.250.185.163, 142.250.186.46, 74.125.206.84, 172.217.18.110, 142.250.186.174, 172.217.18.14, 142.250.186.67, 142.250.185.78, 64.233.166.84, 142.250.185.238, 142.250.184.206, 52.109.76.144, 4.245.163.56, 184.28.90.27, 20.190.159.0, 13.107.5.88, 2.23.227.208
- Excluded domains from analysis (whitelisted): neu-azsc-000.odc.officeapps.live.com, odc.officeapps.live.com, slscr.update.microsoft.com, europe.odcsm1.live.com.akadns.net, clientservices.googleapis.com, mobile.events.data.microsoft.com, ecs-office.s-0005.s-msedge.net, onedscolprdcus23.centralus.cloudapp.azure.com, clients2.google.com, ocsp.digicert.com, redirector.gvt1.com, login.live.com, officeclient.microsoft.com, osiprod-neu-bronze-azsc-000.northeurope.cloudapp.azure.com, www.bing.com, ecs.office.com, fs.microsoft.com, accounts.google.com, prod.configsvc1.live.com.akadns.net, s-0005-office.config.skype.com, fe3cr.delivery.mp.microsoft.com, neu-azsc-config.officeapps.live.com, s-0005.s-msedge.net, config.officeapps.live.com, evoke-windowsservices-tas.msedge.net, ecs.office.trafficmanager.net, clients.l.google.com, europe.configsvc1.live.com.akadns.net, mobile.events.data.trafficmanager.net, prod.odcsm1.live.com.akadns.net
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryAttributesFile calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
- Report size getting too big, too many NtSetValueKey calls found.
Time | Type | Description |
---|---|---|
22:00:02 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
239.255.255.250 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | LiteHTTP Bot | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | KnowBe4 | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | CAPTCHA Scam ClickFix | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
PRIVATESYSTEMSUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Mirai, Moobot | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
|
C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20250103T2159130781-6264.etl
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 110592 |
Entropy (8bit): | 4.508127619581029 |
Encrypted: | false |
SSDEEP: | 768:Exl0hutTY1OE92jmQEq4kwNecI9gdctKg9PuW/ChcYvbXSbLYW4WOWWWpf4mYkCK:EmO4lecI9gdqocYzXQfP |
MD5: | DAC5F814BF227CE2266F827CB2F99A48 |
SHA1: | D1E7B6B6BE05B0CDA281E81A93715FCD0398CF63 |
SHA-256: | 238810FED860CEF61C02A0946977D8DAF4DC5A3D7D057D87DAF77FE4C93AB408 |
SHA-512: | 311FEE8EDDCF2675779B167BFA5E084E69E59EBA34A5435E938CFE33F7867F1B2B2AB5312909B19419E786F1E4296BC789DC6D7E119BFA5E4728FAD9D3298BC2 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 663 |
Entropy (8bit): | 5.949125862393289 |
Encrypted: | false |
SSDEEP: | 12:PlrojAxh4bxdtT/CS3wkxWHMGBJg8E8gKVYQezuYEecp:trPsTTaWKbBCgVqSF |
MD5: | ED3C1C40B68BA4F40DB15529D5443DEC |
SHA1: | 831AF99BB64A04617E0A42EA898756F9E0E0BCCA |
SHA-256: | 039FE79B74E6D3D561E32D4AF570E6CA70DB6BB3718395BE2BF278B9E601279A |
SHA-512: | C7B765B9AFBB9810B6674DBC5C5064ED96A2682E78D5DFFAB384D81EDBC77D01E0004F230D4207F2B7D89CEE9008D79D5FBADC5CB486DA4BC43293B7AA878041 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9932345027203877 |
Encrypted: | false |
SSDEEP: | 48:8jddwTR7+7HSidAKZdA1JehwiZUklqeh1y+3:8jA8omy |
MD5: | A20A7B60EFC264A77BD7853A91AEE2FD |
SHA1: | 06170F0F5CA79D17D6F3D8EE2213E9D2736911D7 |
SHA-256: | 5EEEF3B55AF2081A080DB8D15B980A41DC13682D51B9B8933466A65814882FFC |
SHA-512: | DB2299F308A328065C87824C149721B1B61502009C3298D73CDB293A58BD73A171EF7EF87FAF0508AC00771D20CFC469EE4D9DA16141FF0A289BAC2C15261F3E |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 4.009015019664643 |
Encrypted: | false |
SSDEEP: | 48:81ddwTR7+7HSidAKZdA10eh/iZUkAQkqehWy+2:81A8S9QLy |
MD5: | 1E7F895791D00A292A455798D3878741 |
SHA1: | F0BCA5E446D73D1CFB859A672C59E0291694651E |
SHA-256: | 85FDBCCA02AC2CA60F007758D15A970F88F630B08A93C4935C7839E127CDDF21 |
SHA-512: | F1D82F532E682E3EACA5065E7E3E3DB5F7C3F409EDE2A90720B3659DE84D6B0183733AA0788CB9ABBA8323F1338A6BDD68BA4273D3C67E3906C95D2DD1BA785D |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2693 |
Entropy (8bit): | 4.019575402920881 |
Encrypted: | false |
SSDEEP: | 48:8eddwTR7+jHSidAKZdA14tIeh7sFiZUkmgqeh7sEy+BX:8eA8ynqy |
MD5: | DAAE7C598E3FC9926E79A4BEC70DA65F |
SHA1: | A0DE895004311DF1BE3BD8E678A4A93AB12BADE6 |
SHA-256: | DD34A49167D3E03CE13DD5999D42B04E6914B111BC76D3D629A83E2B0C34BD7D |
SHA-512: | C62881488371B1F918108FDE4A5A3E90622B6E7CF7F5720B8798F509EAE5D0B9D057BBC31695DEF2A7061513DD50B5DFE5F0BDBC6E5EC5FFD3BCA80C2D176ADF |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 4.008154320029829 |
Encrypted: | false |
SSDEEP: | 48:82ddwTR7+7HSidAKZdA1behDiZUkwqehCy+R:82A8p8y |
MD5: | 8E82DFE768076F0BC95CD9BDE9C1E0E5 |
SHA1: | 983F1761CE1C52F93A3D607C40232E3061C8C546 |
SHA-256: | EC731FC0F91F62E1CF0FAA512FF74D2F73D133B40A2616D69CB8CCFCC98AB4DC |
SHA-512: | 3DCA489996F5D104BCC56082710A7484A8BB94207A8976D56892A23E689FB5B9F1F7CE7423F84A4AA9EC695F0B69D5B11C39671F2D5F654C153768F44B35322A |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.999090800408232 |
Encrypted: | false |
SSDEEP: | 48:8YddwTR7+7HSidAKZdA1VehBiZUk1W1qehIy+C:8YA8Z9oy |
MD5: | 79BC864189C098E57B6FCB2F37D9C675 |
SHA1: | 46F9B318D287D2C09A43AE0B556B1A777040BFBE |
SHA-256: | 18D9D05213E508010599259000E6A4776558C09375D76E35837A0F8972732F33 |
SHA-512: | 28E460234E1B44CD0E943F026C1274371DCE09B1EFC23A15B9C84DBB4A656E280AD61BC8E01127DD178DA9966581689460F6D7A83D6AA85C7D798B16190C8D02 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2683 |
Entropy (8bit): | 4.009669145994405 |
Encrypted: | false |
SSDEEP: | 48:8DddwTR7+7HSidAKZdA1duT6ehOuTbbiZUk5OjqehOuTbqy+yT+:8DA85TTTbxWOvTbqy7T |
MD5: | D4EA6156D9407883A94F8E024E74961D |
SHA1: | 9F4090DDA41D0E860D71F9BE4EA6517F162EFEC3 |
SHA-256: | E4CDAB2C6C3D8AFAE9FCBDA1B590A9688DA1281D9D37523D50A849C86FC73536 |
SHA-512: | A1D8471740E9F3CA38FEC49CA2C7C53A438FE8899F8196E2C270E471E0E255AB8BD7106D90BF8B739153D3C10B0304B417CB1140DA8ABB6A2B11575B27CD4CCF |
Malicious: | false |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 271360 |
Entropy (8bit): | 3.6564625968623234 |
Encrypted: | false |
SSDEEP: | 3072:VtwFS3gAaM2ZjyRj5yWC8pcX9ap9dHgp9:D3l2W5RGadg |
MD5: | 16676ABC072E7F0075B54688CD3DC170 |
SHA1: | 22B6324FB73E7F50347189FE63AC551A1C66E89A |
SHA-256: | FF1C6A2857577D6D357E915B172AE5168002837FBA3522CFF68A4A7A6E15B5D5 |
SHA-512: | 61D1F32CCC22AD258B3C84B890D0C8AAC03BF5181AB1EC4E971692A155497A830D33C69ED9C3C942C648BD347ED4B63C330748762299F0E9F08509D0174E9E80 |
Malicious: | true |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 131072 |
Entropy (8bit): | 5.140288893895107 |
Encrypted: | false |
SSDEEP: | 1536:3DOf6zhfWCnNtt56kvLn4CdUPS0tLW53jEpEHP4qQ10PAwrlnaTMfMDD:ywhfWCNL5WCcdp9DV |
MD5: | 7BB29986E0E42526531B29E2DEA8C5FC |
SHA1: | 6700B58667A5BADDF47D63B8B1126A7992BF0838 |
SHA-256: | 5E56822898856B4F03A54E404D1FADBD8C3DF3B2A798D960D5247F5801FFE559 |
SHA-512: | 79E6FFFDBC7F54989DBC47A575EB2070CE73E273BFE2D8E5559320B33CD982D3E2994BB83477C127E134515B9539A674564F0F0F0EB3747DECA30CDC2D8116E9 |
Malicious: | true |
Preview: |
File type: | |
Entropy (8bit): | 5.864890471286569 |
TrID: |
|
File name: | phishingemail.eml |
File size: | 64'259 bytes |
MD5: | 10b604ddf26a20de07060f18b9f43ebe |
SHA1: | 3f1bd89b4e3bcefce85f7fadf4c25dd6f268f317 |
SHA256: | a01174fd681341de09b7ec848bc62db8260229f2998f300cdbcf3b80bcd589da |
SHA512: | 97cc1fcb95a32a82e07780aa6ac104b0d745327748c7f19e737524ecc54af5658eb8d3148131cac693b31f64ec7727ebec9233d7d89742fc6593ba365fa72567 |
SSDEEP: | 1536:dQxHIu5RU8Ripd3yW5w5bZmD2PC4F79qL73WF4xJRC8gBFMLk/t0tdUDWKW:78RiTz5Atmya4F7onGF4xJRC8cFMLk/k |
TLSH: | 8A535C12AD433D838B6019C3A4EE19D9141D374F65F240A46DAEEA4C4F3C8ED6EF16E9 |
File Content Preview: | Received: from BY3PR13MB4868.namprd13.prod.outlook.com (2603:10b6:a03:361::13).. by DM6PR13MB2251.namprd13.prod.outlook.com with HTTPS; Sat, 14 Dec 2024.. 14:02:34 +0000..Received: from BL1PR13CA0291.namprd13.prod.outlook.com (2603:10b6:208:2bc::26).. by |
Subject: | Important notice: Your Robinhood Account is Currently Restricted. |
From: | "Account Support Robinh..." <jk@royalmagazine.com.br> |
To: | customer@wm3.robinhood.com |
Cc: | |
BCC: | |
Date: | Sat, 14 Dec 2024 14:02:30 +0000 |
Communications: |
|
Attachments: |
|
Key | Value |
---|---|
Received | from ip-172-31-37-64 (ec2-35-178-160-42.eu-west-2.compute.amazonaws.com. [35.178.160.42]) by smtp-relay.gmail.com with ESMTPS id a640c23a62f3a-aab9630f60csm1470166b.123.2024.12.14.06.02.30 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 14 Dec 2024 06:02:31 -0800 (PST) |
Authentication-Results | spf=pass (sender IP is 209.85.218.104) smtp.mailfrom=royalmagazine.com.br; dkim=pass (signature was verified) header.d=royalmagazine.com.br;dmarc=pass action=none header.from=royalmagazine.com.br;compauth=pass reason=100 |
Received-SPF | Pass (protection.outlook.com: domain of royalmagazine.com.br designates 209.85.218.104 as permitted sender) receiver=protection.outlook.com; client-ip=209.85.218.104; helo=mail-ej1-f104.google.com; pr=C |
X-IncomingTopHeaderMarker | OriginalChecksum:2557DD4DBB2EB540562E9346EA3EAE4CC85C5CF96EB6329E8327C03EEE7C8E11;UpperCasedChecksum:E72FB359C625ADFE521DA781B41E5BE9096BB5CCF5B3F1FF34A546D8BF6BF49F;SizeAsReceived:5729;Count:58 |
DKIM-Signature | v=1; a=rsa-sha256; c=relaxed/relaxed; d=royalmagazine.com.br; s=google; t=1734184951; x=1734789751; darn=hotmail.com; h=mime-version:feedback-id:disposition-notification-to:date :message-id:to:subject:sender:from:from:to:cc:subject:date :message-id:reply-to; bh=cgejvKJKoJmX8cE4kNepzhEAwtEw/840KwgY2lzyKR8=; b=iAPxN99akdPEvrNv/YAcB+1RukVukgzvQfHkhDtLEe9kvbHvdCpoLM4RbIijT3Nkj8 e3nCBarM2tE4zMBEPcV0eVWXYOJr+EFQwrplJUzNXCeXfcMoeCAC/rmt3BMIKm1uYUYl nQdn1Fv/jVekbrsWuVHc00cBsRZM2dVO5p34s= |
X-Google-DKIM-Signature | v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1734184951; x=1734789751; h=mime-version:feedback-id:disposition-notification-to:date :message-id:to:subject:sender:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=cgejvKJKoJmX8cE4kNepzhEAwtEw/840KwgY2lzyKR8=; b=rmyBl7QYBAPjs3cE4Ex0FDR3EknLPQe/Ll6YVTpRxXT6wpIzIVm8aaQHtInebn1ET4 GeXUjulrRqsr9ScgjzsSWytZlqVVJmT2Ym/6b/AD/UXYrtTN34N/m/xUsBksBzoJXBNJ 3/PV4mtVjTmh1MfW+RVQl3AZe60kyhdt1qMO/k85sNDi7WEtrZrhyUGdWkD3pLvhDujF tKUqhkyurT88vsS0nv71iuCe/5tHxgDPeF6qF0SyHgZU+NJ2XGNiwBOt9yJh414r6AfG SPr1iOywCHtz+Iz/H2Va0g67qOhI48429rIXJm73Mnnj/CKW6XtJhfj1UfW0sNIhS9lC 3fFA== |
X-Forwarded-Encrypted | i=1; AJvYcCWi55Y/K1t9Npk5zOmDZoYM6fk68/Ry/MSqxQm4rKTdQq9e4FqPQjHFoyTyuclSpKoVOF1Rbh0oQtR+@hotmail.com |
X-Gm-Message-State | AOJu0YyPD9Ste3qPXs8+HXh9nyL/QDTt0fp5issNbOKHxE54cEO1Oyce 7IQjXrYaxYRB4ewBQKpDrLbN0KxwCysox279n9DM7/TpTROBsGUbtX3BmPbEQo9z+GmkARxuCqN edTZfKEL4krcC9WuLTjKqdMMFM6B12a4W |
X-Gm-Gg | ASbGncvN3zo8Ihf+Nk3oKG5Jmaf9ROy5uAP8kO38lJZeEn9V1A/iugHxCJx4ytIGZuL eoGD/WdfwbxppBfpTAmXznyMU7+UR59J0IVXPDV8OrqBXmFZ2mhhqHKdpQwl+AMQ5ylHy3Bee1C xAFqrwU9EcteQcwUDx5f3q2K+f0BKjLtO6iRHNcJiWOeT5UFVXLxl/QHdXX1Qk8K/0xA4EeJcqN 3+Vpqa7cgTc2uG0eWTC8JqbeBTCrpmUc60ykzOEIqDUl6HcNUQ6D569OksNpRQh9zx5TjVWAHXo aG+s0vwg4YqhpdIQTPz5KK5T2HRcm6stL9UhosaDhS0xMA== |
X-Google-Smtp-Source | AGHT+IG7v+A57qbG8jQLK9EranwUm2+8vgg6E6pZR1Ymyobk07G1StIUJlkl95wlIbHz+JHjy8SHvMw6JXmM |
X-Received | by 2002:a17:907:2d2a:b0:aa6:abe2:5cb8 with SMTP id a640c23a62f3a-aab77ee9945mr585995666b.60.1734184951395; Sat, 14 Dec 2024 06:02:31 -0800 (PST) |
Return-Path | jk@royalmagazine.com.br |
X-Relaying-Domain | royalmagazine.com.br |
X-DISTRIBUIDORA-SENDING-MAIL | <dRvptoKAiYBTjwOfvPwjcwCG09K2bwPjbY5jq75y9k::web::royalmagazine.com.br::email::anti::spam::reports::true> |
X-DISTRIBUIDORA-SENDING-MESSAGES-ID | <sgU5dnBJoOlAj157bi0zNHiOmtHIg9JbzIRr1odJG4::web::royalmagazine.com.br::email::messages::id1Tj80kYMaI::anti::spam::reports::true> |
X-DISTRIBUIDORA-ADMIN-MAIL | <QKhrmR933RYEu25TInOu3M3CI6CalJOXyvcdJNC1j0::web::system::secure::email::anti::spam::reports::true> |
X-DISTRIBUIDORA-SUCESS-MESSAGES-ID | <BHH0KhnqCpQ2H355AqtMhKW8aBYdRYhafN8TqTgCdg::web::auth::email::messages::idhtH65gw8Iw::anti::spam::reports::true> |
X-Exabytes-ID-Jp | 7520644375 |
X-ExabytesID-Us | 701581148201 |
X-ExabytesID-Uk | 384133787730 |
X-ExabytesID-Id | 988292263 |
X-ExabytesID-Tw | 951502731 |
X-ExabytesID-Cn | 6286592 |
X-ExabytesID-De | 05710973 |
X-ExabytesID-Nl | 5276537 |
X-ExabytesID-Au | 7908660042 |
X-ExabytesID-Sg | 96970388 |
X-ExabytesID-Rcpt-Hash | <9B0F513A7816E4F646A28447416C59A1@MSN.COM> |
X-PVIQ | <000132-000343-20384-827463-000000> |
X-CM-MessageId | <20384-827463> |
X-ID-Tracking | <path::browser::false> |
X-RCPT-SOURCE | <https://www.royalmagazine.com.br/subscription?fbclid=IwAR2BaY3OsFso7z0PFAMQGLrMmfJFdPnhMfClsMrrUiLgHZmcMLqzZnD0L8c> |
From | "Account Support Robinh..." <jk@royalmagazine.com.br> |
Sender | jk@royalmagazine.com.br |
Subject | Important notice: Your Robinhood Account is Currently Restricted. |
To | customer@wm3.robinhood.com |
Message-ID | <0297696215542.525166765731456.8347490989.264821515043@royalmagazine.com.br> |
Date | Sat, 14 Dec 2024 14:02:30 +0000 |
X-Mailer | Amazon WorkMail |
Disposition-Notification-To | <ql@royalmagazine.com.br> |
Feedback-ID | ::1.us-east-1.9TFnKlCnRvkWPdt9cNuDvk8ja+z5xFxabmLHVnERtk=:DISTRIBUIDORA |
X-Return-Path | 9632341113 |
X-CONTENT-MOBILE-AUTH-Uk | 059172635147 |
X-CONTENT-MOBILE-AUTH-Id | 306040481 |
X-CONTENT-MOBILE-AUTH-Tw | 59362711 |
X-CONTENT-MOBILE-AUTH-Cn | 9197824 |
X-CONTENT-MOBILE-AUTH-De | 325949316 |
X-CONTENT-MOBILE-AUTH-Nl | 120313179 |
X-CONTENT-MOBILE-AUTH-Au | 66327020472 |
X-CONTENT-MOBILE-AUTH-Sg | 8690116 |
X-Report-Abuse | You can also report abuse here: http://royalmagazine.com.br/contact/abuse?id=31088735.8E66E56B8BD9B848A2F48AE18442E34B |
X-Csa-Complaints | whitelist-complaints@eco.de |
X-CONTENT-MOBILE-WIDTH | <OxkwI8jt0PVbEL9GI3CI6oG0flFHhIezRgXFd5p0Ckc::mobile::device::optimal> |
X-CONTENT-MOBILE-AUTH | <authsettings::lXazuGoxwloipcttXQQ27YFaS5qx9SGRcDZSH2AjAQ::system::3fR> |
X-CONTENT-MOBILE-TYPE | <authportalCONTENT-MOBILE-AUTH::juno::system::MqjJ14Kgxy> |
X-RCPT-AUTH | <kccuMZTbT5lmI2wteLan38Fdk65DIB5pyZorTMDHX0::simple:authenticate:system::on> |
Content-Type | multipart/mixed; boundary="inmixQDLmXMxWgPJQT4GfD2MKgFzq1rIJJeTPwzKqbT6fZgI" |
X-IncomingHeaderCount | 58 |
X-MS-Exchange-Organization-ExpirationStartTime | 14 Dec 2024 14:02:32.0902 (UTC) |
X-MS-Exchange-Organization-ExpirationStartTimeReason | OriginalSubmit |
X-MS-Exchange-Organization-ExpirationInterval | 1:00:00:00.0000000 |
X-MS-Exchange-Organization-ExpirationIntervalReason | OriginalSubmit |
X-MS-Exchange-Organization-Network-Message-Id | 6aa99f33-a5ed-477e-92f2-08dd1c47f426 |
X-EOPAttributedMessage | 0 |
X-EOPTenantAttributedMessage | 84df9e7f-e9f6-40af-b435-aaaaaaaaaaaa:0 |
X-MS-Exchange-Organization-MessageDirectionality | Incoming |
X-MS-PublicTrafficType | |
X-MS-TrafficTypeDiagnostic | BN1PEPF00004688:EE_|BY3PR13MB4868:EE_|DM6PR13MB2251:EE_ |
X-MS-Exchange-Organization-AuthSource | BN1PEPF00004688.namprd05.prod.outlook.com |
X-MS-Exchange-Organization-AuthAs | Anonymous |
X-MS-UserLastLogonTime | 12/14/2024 2:01:07 PM |
X-MS-Office365-Filtering-Correlation-Id | 6aa99f33-a5ed-477e-92f2-08dd1c47f426 |
X-MS-Exchange-EOPDirect | true |
X-Sender-IP | 209.85.218.104 |
X-SID-PRA | JK@ROYALMAGAZINE.COM.BR |
X-SID-Result | PASS |
X-MS-Exchange-Organization-SCL | 1 |
X-Microsoft-Antispam | BCL:0;ARA:1444111002|7402599021|9800799012|9020799016|69000799015|461199028|6092099012|51300799018|2700799026|87000799015|20103052901057|20103052903057|39102599003|13020799006|9000799050|12002599018|58200799018|970799057|5082599009|1680799054|9400799030|10300799035|20103052904057|20103052914048|440099028|3412199025|4302099013|940799032|1360799030|1380799030|1370799030|56899033|17101999012|1602099012; |
X-MS-Exchange-CrossTenant-OriginalArrivalTime | 14 Dec 2024 14:02:32.0590 (UTC) |
X-MS-Exchange-CrossTenant-Network-Message-Id | 6aa99f33-a5ed-477e-92f2-08dd1c47f426 |
X-MS-Exchange-CrossTenant-Id | 84df9e7f-e9f6-40af-b435-aaaaaaaaaaaa |
X-MS-Exchange-CrossTenant-AuthSource | BN1PEPF00004688.namprd05.prod.outlook.com |
X-MS-Exchange-CrossTenant-AuthAs | Anonymous |
X-MS-Exchange-CrossTenant-FromEntityHeader | Internet |
X-MS-Exchange-CrossTenant-RMS-PersistedConsumerOrg | 00000000-0000-0000-0000-000000000000 |
X-MS-Exchange-Transport-CrossTenantHeadersStamped | BY3PR13MB4868 |
X-MS-Exchange-Transport-EndToEndLatency | 00:00:02.1922812 |
X-MS-Exchange-Processed-By-BccFoldering | 15.20.8207.007 |
X-Microsoft-Antispam-Mailbox-Delivery | ucf:0;jmr:0;ex:0;auth:1;dest:I;ENG:(5062000308)(920221119095)(90000117)(920221120095)(90005022)(91005020)(91035115)(9050020)(9100341)(944500132)(2008001181)(2008121020)(4810010)(4910033)(9575002)(10195002)(9320005)(120001); |
X-Message-Delivery | Vj0xLjE7dXM9MDtsPTA7YT0wO0Q9MTtHRD0xO1NDTD0z |
X-Microsoft-Antispam-Message-Info | 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 |
MIME-Version | 1.0 |
Icon Hash: | 46070c0a8e0c67d6 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 4, 2025 03:59:12.536205053 CET | 49677 | 443 | 192.168.2.17 | 204.79.197.200 |
Jan 4, 2025 03:59:12.536221981 CET | 49678 | 443 | 192.168.2.17 | 204.79.197.200 |
Jan 4, 2025 03:59:12.536222935 CET | 49676 | 443 | 192.168.2.17 | 204.79.197.200 |
Jan 4, 2025 03:59:27.752944946 CET | 49715 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:27.752995968 CET | 443 | 49715 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:27.753089905 CET | 49715 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:27.753350019 CET | 49715 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:27.753364086 CET | 443 | 49715 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:27.753767014 CET | 49716 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:27.753799915 CET | 443 | 49716 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:27.753866911 CET | 49716 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:27.754084110 CET | 49716 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:27.754095078 CET | 443 | 49716 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:27.876791000 CET | 49675 | 443 | 192.168.2.17 | 204.79.197.203 |
Jan 4, 2025 03:59:28.180233002 CET | 49675 | 443 | 192.168.2.17 | 204.79.197.203 |
Jan 4, 2025 03:59:28.264566898 CET | 443 | 49716 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:28.269040108 CET | 443 | 49715 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:28.276868105 CET | 49715 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:28.276890039 CET | 443 | 49715 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:28.277378082 CET | 49716 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:28.277400017 CET | 443 | 49716 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:28.277962923 CET | 443 | 49715 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:28.278026104 CET | 49715 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:28.278476000 CET | 443 | 49716 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:28.278548956 CET | 49716 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:28.279299021 CET | 49715 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:28.279377937 CET | 443 | 49715 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:28.279381990 CET | 49716 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:28.279453039 CET | 443 | 49716 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:28.279670000 CET | 49715 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:28.279680967 CET | 443 | 49715 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:28.331554890 CET | 49715 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:28.331641912 CET | 49716 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:28.331665039 CET | 443 | 49716 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:28.377238035 CET | 49716 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:28.448806047 CET | 443 | 49715 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:28.449426889 CET | 443 | 49715 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:28.449472904 CET | 49715 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:28.449498892 CET | 443 | 49715 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:28.449511051 CET | 49715 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:28.449585915 CET | 49715 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:28.485414982 CET | 49716 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:28.531338930 CET | 443 | 49716 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:28.601025105 CET | 443 | 49716 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:28.601212025 CET | 443 | 49716 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:28.601332903 CET | 49716 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:28.601737976 CET | 49716 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:28.601754904 CET | 443 | 49716 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:28.791235924 CET | 49675 | 443 | 192.168.2.17 | 204.79.197.203 |
Jan 4, 2025 03:59:29.998231888 CET | 49675 | 443 | 192.168.2.17 | 204.79.197.203 |
Jan 4, 2025 03:59:32.028532028 CET | 49720 | 443 | 192.168.2.17 | 142.250.186.132 |
Jan 4, 2025 03:59:32.028573036 CET | 443 | 49720 | 142.250.186.132 | 192.168.2.17 |
Jan 4, 2025 03:59:32.028800011 CET | 49720 | 443 | 192.168.2.17 | 142.250.186.132 |
Jan 4, 2025 03:59:32.028867006 CET | 49720 | 443 | 192.168.2.17 | 142.250.186.132 |
Jan 4, 2025 03:59:32.028873920 CET | 443 | 49720 | 142.250.186.132 | 192.168.2.17 |
Jan 4, 2025 03:59:32.036545992 CET | 49680 | 443 | 192.168.2.17 | 20.189.173.13 |
Jan 4, 2025 03:59:32.339250088 CET | 49680 | 443 | 192.168.2.17 | 20.189.173.13 |
Jan 4, 2025 03:59:32.403250933 CET | 49675 | 443 | 192.168.2.17 | 204.79.197.203 |
Jan 4, 2025 03:59:32.683835983 CET | 443 | 49720 | 142.250.186.132 | 192.168.2.17 |
Jan 4, 2025 03:59:32.684380054 CET | 49720 | 443 | 192.168.2.17 | 142.250.186.132 |
Jan 4, 2025 03:59:32.684391975 CET | 443 | 49720 | 142.250.186.132 | 192.168.2.17 |
Jan 4, 2025 03:59:32.685416937 CET | 443 | 49720 | 142.250.186.132 | 192.168.2.17 |
Jan 4, 2025 03:59:32.685487986 CET | 49720 | 443 | 192.168.2.17 | 142.250.186.132 |
Jan 4, 2025 03:59:32.686638117 CET | 49720 | 443 | 192.168.2.17 | 142.250.186.132 |
Jan 4, 2025 03:59:32.686707020 CET | 443 | 49720 | 142.250.186.132 | 192.168.2.17 |
Jan 4, 2025 03:59:32.738259077 CET | 49720 | 443 | 192.168.2.17 | 142.250.186.132 |
Jan 4, 2025 03:59:32.738266945 CET | 443 | 49720 | 142.250.186.132 | 192.168.2.17 |
Jan 4, 2025 03:59:32.786238909 CET | 49720 | 443 | 192.168.2.17 | 142.250.186.132 |
Jan 4, 2025 03:59:32.945266008 CET | 49680 | 443 | 192.168.2.17 | 20.189.173.13 |
Jan 4, 2025 03:59:34.159255028 CET | 49680 | 443 | 192.168.2.17 | 20.189.173.13 |
Jan 4, 2025 03:59:35.755362034 CET | 49721 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:35.755410910 CET | 443 | 49721 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:35.755505085 CET | 49721 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:35.755753040 CET | 49721 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:35.755767107 CET | 443 | 49721 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:35.756583929 CET | 49722 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:35.756634951 CET | 443 | 49722 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:35.756851912 CET | 49722 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:35.757060051 CET | 49722 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:35.757077932 CET | 443 | 49722 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:36.243607998 CET | 443 | 49722 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:36.243968964 CET | 49722 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:36.243999958 CET | 443 | 49722 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:36.244307995 CET | 443 | 49722 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:36.244611025 CET | 49722 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:36.244673967 CET | 443 | 49722 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:36.244770050 CET | 49722 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:36.262789965 CET | 443 | 49721 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:36.271073103 CET | 49721 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:36.271101952 CET | 443 | 49721 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:36.271459103 CET | 443 | 49721 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:36.272368908 CET | 49721 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:36.272434950 CET | 443 | 49721 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:36.291338921 CET | 443 | 49722 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:36.318456888 CET | 49721 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:36.416961908 CET | 443 | 49722 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:36.417133093 CET | 443 | 49722 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:36.417891026 CET | 49722 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:36.417943954 CET | 443 | 49722 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:36.418051958 CET | 49722 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:36.418068886 CET | 49722 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:36.570307970 CET | 49680 | 443 | 192.168.2.17 | 20.189.173.13 |
Jan 4, 2025 03:59:37.206464052 CET | 49675 | 443 | 192.168.2.17 | 204.79.197.203 |
Jan 4, 2025 03:59:39.918080091 CET | 49721 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:39.918124914 CET | 49720 | 443 | 192.168.2.17 | 142.250.186.132 |
Jan 4, 2025 03:59:39.918215036 CET | 443 | 49721 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:39.918216944 CET | 443 | 49720 | 142.250.186.132 | 192.168.2.17 |
Jan 4, 2025 03:59:39.918283939 CET | 49720 | 443 | 192.168.2.17 | 142.250.186.132 |
Jan 4, 2025 03:59:39.918311119 CET | 49721 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:40.498307943 CET | 49682 | 80 | 192.168.2.17 | 192.229.211.108 |
Jan 4, 2025 03:59:40.799624920 CET | 49682 | 80 | 192.168.2.17 | 192.229.211.108 |
Jan 4, 2025 03:59:41.376748085 CET | 49680 | 443 | 192.168.2.17 | 20.189.173.13 |
Jan 4, 2025 03:59:41.408365011 CET | 49682 | 80 | 192.168.2.17 | 192.229.211.108 |
Jan 4, 2025 03:59:42.614303112 CET | 49682 | 80 | 192.168.2.17 | 192.229.211.108 |
Jan 4, 2025 03:59:45.027354956 CET | 49682 | 80 | 192.168.2.17 | 192.229.211.108 |
Jan 4, 2025 03:59:45.604342937 CET | 49728 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:45.604393959 CET | 443 | 49728 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:45.604475975 CET | 49728 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:45.604708910 CET | 49728 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:45.604733944 CET | 443 | 49728 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:45.605249882 CET | 49729 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:45.605298042 CET | 443 | 49729 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:45.605371952 CET | 49729 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:45.605551004 CET | 49729 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:45.605565071 CET | 443 | 49729 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:46.104660988 CET | 443 | 49729 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:46.104896069 CET | 49729 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:46.104924917 CET | 443 | 49729 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:46.105820894 CET | 443 | 49729 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:46.105900049 CET | 49729 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:46.115979910 CET | 49729 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:46.116090059 CET | 443 | 49729 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:46.116321087 CET | 49729 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:46.116333008 CET | 443 | 49729 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:46.170335054 CET | 49729 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:46.191507101 CET | 443 | 49728 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:46.191735983 CET | 49728 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:46.191766024 CET | 443 | 49728 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:46.192812920 CET | 443 | 49728 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:46.192882061 CET | 49728 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:46.193229914 CET | 49728 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:46.193299055 CET | 443 | 49728 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:46.234329939 CET | 49728 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:46.234361887 CET | 443 | 49728 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:46.278096914 CET | 443 | 49729 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:46.278431892 CET | 443 | 49729 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:46.278496027 CET | 49729 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:46.279074907 CET | 49729 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:46.279095888 CET | 443 | 49729 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:46.279109001 CET | 49729 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:46.279143095 CET | 49729 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:46.282322884 CET | 49728 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:46.312592983 CET | 49728 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:46.359340906 CET | 443 | 49728 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:46.425086021 CET | 443 | 49728 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:46.425231934 CET | 443 | 49728 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:46.425331116 CET | 49728 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:46.425796032 CET | 49728 | 443 | 192.168.2.17 | 158.106.129.107 |
Jan 4, 2025 03:59:46.425818920 CET | 443 | 49728 | 158.106.129.107 | 192.168.2.17 |
Jan 4, 2025 03:59:46.810389996 CET | 49675 | 443 | 192.168.2.17 | 204.79.197.203 |
Jan 4, 2025 03:59:49.840354919 CET | 49682 | 80 | 192.168.2.17 | 192.229.211.108 |
Jan 4, 2025 03:59:50.025080919 CET | 49730 | 443 | 192.168.2.17 | 172.217.16.196 |
Jan 4, 2025 03:59:50.025129080 CET | 443 | 49730 | 172.217.16.196 | 192.168.2.17 |
Jan 4, 2025 03:59:50.025211096 CET | 49730 | 443 | 192.168.2.17 | 172.217.16.196 |
Jan 4, 2025 03:59:50.025449038 CET | 49730 | 443 | 192.168.2.17 | 172.217.16.196 |
Jan 4, 2025 03:59:50.025460005 CET | 443 | 49730 | 172.217.16.196 | 192.168.2.17 |
Jan 4, 2025 03:59:50.473628998 CET | 49730 | 443 | 192.168.2.17 | 172.217.16.196 |
Jan 4, 2025 03:59:50.515338898 CET | 443 | 49730 | 172.217.16.196 | 192.168.2.17 |
Jan 4, 2025 03:59:50.672111988 CET | 443 | 49730 | 172.217.16.196 | 192.168.2.17 |
Jan 4, 2025 03:59:50.672190905 CET | 49730 | 443 | 192.168.2.17 | 172.217.16.196 |
Jan 4, 2025 03:59:50.989383936 CET | 49680 | 443 | 192.168.2.17 | 20.189.173.13 |
Jan 4, 2025 03:59:53.474332094 CET | 49691 | 443 | 192.168.2.17 | 204.79.197.200 |
Jan 4, 2025 03:59:53.479197979 CET | 443 | 49691 | 204.79.197.200 | 192.168.2.17 |
Jan 4, 2025 03:59:53.572577000 CET | 443 | 49691 | 204.79.197.200 | 192.168.2.17 |
Jan 4, 2025 03:59:53.572674036 CET | 49691 | 443 | 192.168.2.17 | 204.79.197.200 |
Jan 4, 2025 03:59:53.574023008 CET | 49691 | 443 | 192.168.2.17 | 204.79.197.200 |
Jan 4, 2025 03:59:53.574218035 CET | 49691 | 443 | 192.168.2.17 | 204.79.197.200 |
Jan 4, 2025 03:59:53.574512959 CET | 49691 | 443 | 192.168.2.17 | 204.79.197.200 |
Jan 4, 2025 03:59:53.574635029 CET | 49691 | 443 | 192.168.2.17 | 204.79.197.200 |
Jan 4, 2025 03:59:53.578802109 CET | 443 | 49691 | 204.79.197.200 | 192.168.2.17 |
Jan 4, 2025 03:59:53.578959942 CET | 443 | 49691 | 204.79.197.200 | 192.168.2.17 |
Jan 4, 2025 03:59:53.579129934 CET | 443 | 49691 | 204.79.197.200 | 192.168.2.17 |
Jan 4, 2025 03:59:53.579289913 CET | 443 | 49691 | 204.79.197.200 | 192.168.2.17 |
Jan 4, 2025 03:59:53.579423904 CET | 443 | 49691 | 204.79.197.200 | 192.168.2.17 |
Jan 4, 2025 03:59:53.669434071 CET | 443 | 49691 | 204.79.197.200 | 192.168.2.17 |
Jan 4, 2025 03:59:53.669532061 CET | 49691 | 443 | 192.168.2.17 | 204.79.197.200 |
Jan 4, 2025 03:59:53.669622898 CET | 49691 | 443 | 192.168.2.17 | 204.79.197.200 |
Jan 4, 2025 03:59:53.674367905 CET | 443 | 49691 | 204.79.197.200 | 192.168.2.17 |
Jan 4, 2025 03:59:53.764998913 CET | 443 | 49691 | 204.79.197.200 | 192.168.2.17 |
Jan 4, 2025 03:59:53.765080929 CET | 49691 | 443 | 192.168.2.17 | 204.79.197.200 |
Jan 4, 2025 03:59:59.448395014 CET | 49682 | 80 | 192.168.2.17 | 192.229.211.108 |
Jan 4, 2025 03:59:59.671638012 CET | 49699 | 80 | 192.168.2.17 | 199.232.214.172 |
Jan 4, 2025 03:59:59.676738024 CET | 80 | 49699 | 199.232.214.172 | 192.168.2.17 |
Jan 4, 2025 03:59:59.676822901 CET | 49699 | 80 | 192.168.2.17 | 199.232.214.172 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 4, 2025 03:59:27.200354099 CET | 53 | 59286 | 1.1.1.1 | 192.168.2.17 |
Jan 4, 2025 03:59:27.278561115 CET | 49602 | 53 | 192.168.2.17 | 1.1.1.1 |
Jan 4, 2025 03:59:27.278698921 CET | 59757 | 53 | 192.168.2.17 | 1.1.1.1 |
Jan 4, 2025 03:59:27.289252043 CET | 53 | 50610 | 1.1.1.1 | 192.168.2.17 |
Jan 4, 2025 03:59:27.716609001 CET | 53 | 49602 | 1.1.1.1 | 192.168.2.17 |
Jan 4, 2025 03:59:27.752314091 CET | 53 | 59757 | 1.1.1.1 | 192.168.2.17 |
Jan 4, 2025 03:59:28.368526936 CET | 53 | 53201 | 1.1.1.1 | 192.168.2.17 |
Jan 4, 2025 03:59:32.021049023 CET | 62957 | 53 | 192.168.2.17 | 1.1.1.1 |
Jan 4, 2025 03:59:32.021226883 CET | 49474 | 53 | 192.168.2.17 | 1.1.1.1 |
Jan 4, 2025 03:59:32.027642965 CET | 53 | 62957 | 1.1.1.1 | 192.168.2.17 |
Jan 4, 2025 03:59:32.027709961 CET | 53 | 49474 | 1.1.1.1 | 192.168.2.17 |
Jan 4, 2025 03:59:45.163949966 CET | 64483 | 53 | 192.168.2.17 | 1.1.1.1 |
Jan 4, 2025 03:59:45.164160013 CET | 58842 | 53 | 192.168.2.17 | 1.1.1.1 |
Jan 4, 2025 03:59:45.186599016 CET | 53 | 52823 | 1.1.1.1 | 192.168.2.17 |
Jan 4, 2025 03:59:45.191502094 CET | 53 | 56948 | 1.1.1.1 | 192.168.2.17 |
Jan 4, 2025 03:59:45.603600025 CET | 53 | 58842 | 1.1.1.1 | 192.168.2.17 |
Jan 4, 2025 03:59:45.603791952 CET | 53 | 64483 | 1.1.1.1 | 192.168.2.17 |
Jan 4, 2025 03:59:46.239495039 CET | 53 | 52541 | 1.1.1.1 | 192.168.2.17 |
Jan 4, 2025 03:59:50.017270088 CET | 58474 | 53 | 192.168.2.17 | 1.1.1.1 |
Jan 4, 2025 03:59:50.017412901 CET | 58676 | 53 | 192.168.2.17 | 1.1.1.1 |
Jan 4, 2025 03:59:50.024024963 CET | 53 | 58676 | 1.1.1.1 | 192.168.2.17 |
Jan 4, 2025 03:59:50.024081945 CET | 53 | 58474 | 1.1.1.1 | 192.168.2.17 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 4, 2025 03:59:27.278561115 CET | 192.168.2.17 | 1.1.1.1 | 0xcb0e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 4, 2025 03:59:27.278698921 CET | 192.168.2.17 | 1.1.1.1 | 0xd584 | Standard query (0) | 65 | IN (0x0001) | false | |
Jan 4, 2025 03:59:32.021049023 CET | 192.168.2.17 | 1.1.1.1 | 0x648e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 4, 2025 03:59:32.021226883 CET | 192.168.2.17 | 1.1.1.1 | 0xb4f0 | Standard query (0) | 65 | IN (0x0001) | false | |
Jan 4, 2025 03:59:45.163949966 CET | 192.168.2.17 | 1.1.1.1 | 0x3e9a | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 4, 2025 03:59:45.164160013 CET | 192.168.2.17 | 1.1.1.1 | 0x36c7 | Standard query (0) | 65 | IN (0x0001) | false | |
Jan 4, 2025 03:59:50.017270088 CET | 192.168.2.17 | 1.1.1.1 | 0xa796 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 4, 2025 03:59:50.017412901 CET | 192.168.2.17 | 1.1.1.1 | 0x4beb | Standard query (0) | 65 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 4, 2025 03:59:27.716609001 CET | 1.1.1.1 | 192.168.2.17 | 0xcb0e | No error (0) | 158.106.129.107 | A (IP address) | IN (0x0001) | false | ||
Jan 4, 2025 03:59:32.027642965 CET | 1.1.1.1 | 192.168.2.17 | 0x648e | No error (0) | 142.250.186.132 | A (IP address) | IN (0x0001) | false | ||
Jan 4, 2025 03:59:32.027709961 CET | 1.1.1.1 | 192.168.2.17 | 0xb4f0 | No error (0) | 65 | IN (0x0001) | false | |||
Jan 4, 2025 03:59:45.603791952 CET | 1.1.1.1 | 192.168.2.17 | 0x3e9a | No error (0) | 158.106.129.107 | A (IP address) | IN (0x0001) | false | ||
Jan 4, 2025 03:59:50.024024963 CET | 1.1.1.1 | 192.168.2.17 | 0x4beb | No error (0) | 65 | IN (0x0001) | false | |||
Jan 4, 2025 03:59:50.024081945 CET | 1.1.1.1 | 192.168.2.17 | 0xa796 | No error (0) | 172.217.16.196 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.17 | 49715 | 158.106.129.107 | 443 | 4192 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-04 02:59:28 UTC | 736 | OUT | |
2025-01-04 02:59:28 UTC | 331 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.17 | 49716 | 158.106.129.107 | 443 | 4192 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-04 02:59:28 UTC | 669 | OUT | |
2025-01-04 02:59:28 UTC | 416 | IN | |
2025-01-04 02:59:28 UTC | 952 | IN | |
2025-01-04 02:59:28 UTC | 299 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.17 | 49722 | 158.106.129.107 | 443 | 4192 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-04 02:59:36 UTC | 762 | OUT | |
2025-01-04 02:59:36 UTC | 331 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.17 | 49729 | 158.106.129.107 | 443 | 7640 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-04 02:59:46 UTC | 736 | OUT | |
2025-01-04 02:59:46 UTC | 331 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.17 | 49728 | 158.106.129.107 | 443 | 7640 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-04 02:59:46 UTC | 669 | OUT | |
2025-01-04 02:59:46 UTC | 416 | IN | |
2025-01-04 02:59:46 UTC | 952 | IN | |
2025-01-04 02:59:46 UTC | 299 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 21:59:13 |
Start date: | 03/01/2025 |
Path: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x950000 |
File size: | 34'446'744 bytes |
MD5 hash: | 91A5292942864110ED734005B7E005C0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 21:59:15 |
Start date: | 03/01/2025 |
Path: | C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff72b3a0000 |
File size: | 710'048 bytes |
MD5 hash: | EC652BEDD90E089D9406AFED89A8A8BD |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 21:59:26 |
Start date: | 03/01/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7d6f10000 |
File size: | 3'242'272 bytes |
MD5 hash: | 83395EAB5B03DEA9720F8D7AC0D15CAA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 21:59:26 |
Start date: | 03/01/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7d6f10000 |
File size: | 3'242'272 bytes |
MD5 hash: | 83395EAB5B03DEA9720F8D7AC0D15CAA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 13 |
Start time: | 21:59:44 |
Start date: | 03/01/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7d6f10000 |
File size: | 3'242'272 bytes |
MD5 hash: | 83395EAB5B03DEA9720F8D7AC0D15CAA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 14 |
Start time: | 21:59:44 |
Start date: | 03/01/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7d6f10000 |
File size: | 3'242'272 bytes |
MD5 hash: | 83395EAB5B03DEA9720F8D7AC0D15CAA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 16 |
Start time: | 22:00:02 |
Start date: | 03/01/2025 |
Path: | C:\Windows\System32\OpenWith.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff70b940000 |
File size: | 123'984 bytes |
MD5 hash: | E4A834784FA08C17D47A1E72429C5109 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |