Windows
Analysis Report
http://tekascend.com
Overview
Detection
Score: | 56 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64_ra
- chrome.exe (PID: 872 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA) - chrome.exe (PID: 1248 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2084 --fi eld-trial- handle=200 0,i,162076 4059418013 9547,12086 6982819278 01729,2621 44 --disab le-feature s=Optimiza tionGuideM odelDownlo ading,Opti mizationHi nts,Optimi zationHint sFetching, Optimizati onTargetPr ediction / prefetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
- chrome.exe (PID: 6692 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt p://tekasc end.com" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | Avira URL Cloud: |
Source: | HTTP Parser: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: |
Source: | Window detected: |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 3 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 4 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 3 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
tekascend.com | 166.1.209.92 | true | false | high | |
www.google.com | 142.250.185.68 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true | unknown | ||
true |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.250.185.68 | www.google.com | United States | 15169 | GOOGLEUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
166.1.209.92 | tekascend.com | United States | 11798 | ACEDATACENTERS-AS-1US | false |
IP |
---|
192.168.2.24 |
192.168.2.18 |
192.168.2.4 |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1585485 |
Start date and time: | 2025-01-07 17:57:16 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 32s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | http://tekascend.com |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 15 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal56.win@17/10@4/6 |
EGA Information: | Failed |
HCA Information: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 23.56.254.164, 142.250.185.99, 142.250.186.78, 108.177.15.84, 142.250.185.78, 142.250.186.142, 172.217.18.14, 142.250.185.110, 142.250.184.238, 172.217.16.206, 142.250.185.238, 216.58.206.78, 216.58.206.46, 142.250.186.174, 52.149.20.212, 2.23.227.208
- Excluded domains from analysis (whitelisted): www.bing.com, clients1.google.com, fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, clientservices.googleapis.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, fe3cr.delivery.mp.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, redirector.gvt1.com, e16604.g.akamaiedge.net, update.googleapis.com, clients.l.google.com, prod.fs.microsoft.com.akadns.net
- Not all processes where analyzed, report is missing behavior information
- VT rate limit hit for: http://tekascend.com
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2675 |
Entropy (8bit): | 3.979143264017749 |
Encrypted: | false |
SSDEEP: | 48:8SxdiT5ONkHNidAKZdA1rehwiZUklqeh1y+3:8SWVONQey |
MD5: | BDEFE0E32DC675155AA81EDB5035BA3E |
SHA1: | FE605DEC720A182D9E75461519F71771D8E06918 |
SHA-256: | 3F46B6D90CDC2251249B2A0E521AFE9DEFA572CF9B9A2E5BAB6BB978C69486C8 |
SHA-512: | E0F32D775AB0D1457C5DEE55B2512D4C411CC9A06D033C2DD1AA4BDFCD162EAF498C5F1F0991635B682BF7B56D2CE15723D31BFEC1D6231454F42DC1908773DB |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.990224214765602 |
Encrypted: | false |
SSDEEP: | 48:8qxdiT5ONkHNidAKZdA1ceh/iZUkAQkqehOy+2:8qWVONM9QLy |
MD5: | 6F0F5973628AEDCCE59D3DF1526EA451 |
SHA1: | 3B66502685F75E47D09B54D4BB5675E400BB28F3 |
SHA-256: | 1630ADA99B1F58D3973AAC5C51EC857B8AE80C1B8F49A9BC9F1E5CE323579134 |
SHA-512: | AFE42218913C8EBCDA96882BBBFE273B47AD57F501EA857C09D24FD783DF92472B0338299B2C597C0A51E49F2B5649BED888011C8E4C9FE505319EB6AC65254C |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2691 |
Entropy (8bit): | 4.004185528200109 |
Encrypted: | false |
SSDEEP: | 48:8XRxdiT5ONSHNidAKZdA14Aeh7sFiZUkmgqeh7sky+BX:8hWVONsnCy |
MD5: | 36053195C86AA2D951F55E6ACFD2110E |
SHA1: | 1CB1C09893B134C4EAF93FFFE5B7DA18A0F48D69 |
SHA-256: | 1ECC789D343D5BD073D4A9B58E4654422A4FD4236452B145BB27C457003C52DF |
SHA-512: | 68D9E0BA02E5FA9E64FDC10E76A55EC31A651E04E920AF63473A4EA12416CAF801F0CA164C66F12C6FDD5DC1AF48D837E77ADF1ACF592C3C5665AB76C2238BE7 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.990177157949701 |
Encrypted: | false |
SSDEEP: | 48:8dxdiT5ONkHNidAKZdA1JehDiZUkwqehKy+R:8dWVONBsy |
MD5: | 918091904ACE08B247D58A199979530A |
SHA1: | B69DBF0900D81D7D2FA167A036121C7E4BC5103D |
SHA-256: | C1830DDF7CC61F4646E82C65F300DAFFA58E84F925443CE11A50AB65A7AFCD6E |
SHA-512: | 4340F076E9432B9C2FF522263DBFD8D429EB8EC4259D8AAA3CFE2BA5B320B842134669286CF2536FD4F66CF727BBACEBE679ED6AE8B85E821F2EDD7BC65A45A9 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.976302708567231 |
Encrypted: | false |
SSDEEP: | 48:8PxdiT5ONkHNidAKZdA1XehBiZUk1W1qehIy+C:8PWVONh9oy |
MD5: | 27878D35C9270025F1748F945A65B9A2 |
SHA1: | 8DF74A1DDEF06999C28B0483CCE339BEAC3475BF |
SHA-256: | E72D85B91CA58286B6B9AC6B5A90794EE60F1B923F3080ED4E9B8525A8EF266A |
SHA-512: | BF25B98C2ED952CDDB4428A46CCA249915886EAE018FDD1E68520B23A9F52D920B621B25F254702CCC2731BC75ABEDB6E6F82342A41DDDAAC88561DD5F95EF49 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.9875059966623634 |
Encrypted: | false |
SSDEEP: | 48:8VxdiT5ONkHNidAKZdA1duT+ehOuTbbiZUk5OjqehOuTbCy+yT+:8VWVONjT/TbxWOvTbCy7T |
MD5: | C42A38F7FBA077F18047752B34746123 |
SHA1: | BBF784FC58783DE624B03922D4014BADFB35690D |
SHA-256: | 2B8A9F95611EECE5E59DE00E2C0BD82811FAD17FDF1089D6D85AC5F0C13275BD |
SHA-512: | 8F83C27BA47E85A9021BE08903F8D45BFD729D8529CCE138490ED2227E22461A853B5C7B54CC7ACC2BC6EAAD42C0C59B1A49DA4C4BC03D6E295B11475E7EBF5F |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 231 |
Entropy (8bit): | 7.117771227469572 |
Encrypted: | false |
SSDEEP: | 6:XtxqiqSjcxk3FzukptlSHkhD7T7ddKlDrG9SDlyiD/n:Xb5cxIzXpzhD7ThdKl/Geyi7n |
MD5: | 9ED150DA208D08502CF9E642BDFE77D5 |
SHA1: | A2137BE6CB6A6D2B5EC53B971F6BE15066D2B01B |
SHA-256: | 626A7D4BCFA6A10ECD80210C85B3D884C0A9AB279D67DB38F1B2A52A60FF6DDD |
SHA-512: | B4BC9614FB0337E39DDC4E7A100DCF99E846560D893D35E0C02ECA8ABE14AA69FED1287A458202E1EE983469975391BEAF322E3B8A95A8CA92D408C39478F055 |
Malicious: | false |
Reputation: | low |
URL: | http://tekascend.com/favicon.ico |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 235 |
Entropy (8bit): | 7.069857851021855 |
Encrypted: | false |
SSDEEP: | 6:XtxG+Nb/7Crio6E11puHDQxNa2FHGO7xA:XbnDJw7asx5GOFA |
MD5: | F4C97969361255236A53CE862C6FBE3A |
SHA1: | 0EF07C4DEF61B263190177E7D3667C7A135F500A |
SHA-256: | AF8B7BB03AC717190F4E6D6263DB1E97F5CA8E4AA708DF5C70B408703E608BAC |
SHA-512: | 453589E916F6A81BC3286C9C6F9432E9F7FEBF4E18A69EE8F00460FFB1E0FABBEE47BDD20B16EE1B65E59115FF38514E7CF35A39F499B03B2D27290C8197AC11 |
Malicious: | false |
Reputation: | low |
URL: | http://tekascend.com/ |
Preview: |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 7, 2025 17:57:56.034365892 CET | 49704 | 80 | 192.168.2.18 | 166.1.209.92 |
Jan 7, 2025 17:57:56.034920931 CET | 49705 | 80 | 192.168.2.18 | 166.1.209.92 |
Jan 7, 2025 17:57:56.039211035 CET | 80 | 49704 | 166.1.209.92 | 192.168.2.18 |
Jan 7, 2025 17:57:56.039288998 CET | 49704 | 80 | 192.168.2.18 | 166.1.209.92 |
Jan 7, 2025 17:57:56.039458990 CET | 49704 | 80 | 192.168.2.18 | 166.1.209.92 |
Jan 7, 2025 17:57:56.039724112 CET | 80 | 49705 | 166.1.209.92 | 192.168.2.18 |
Jan 7, 2025 17:57:56.039788008 CET | 49705 | 80 | 192.168.2.18 | 166.1.209.92 |
Jan 7, 2025 17:57:56.044214010 CET | 80 | 49704 | 166.1.209.92 | 192.168.2.18 |
Jan 7, 2025 17:57:56.641215086 CET | 80 | 49704 | 166.1.209.92 | 192.168.2.18 |
Jan 7, 2025 17:57:56.685137987 CET | 49704 | 80 | 192.168.2.18 | 166.1.209.92 |
Jan 7, 2025 17:57:56.796618938 CET | 49704 | 80 | 192.168.2.18 | 166.1.209.92 |
Jan 7, 2025 17:57:56.801497936 CET | 80 | 49704 | 166.1.209.92 | 192.168.2.18 |
Jan 7, 2025 17:57:56.927161932 CET | 80 | 49704 | 166.1.209.92 | 192.168.2.18 |
Jan 7, 2025 17:57:56.971116066 CET | 49704 | 80 | 192.168.2.18 | 166.1.209.92 |
Jan 7, 2025 17:57:58.486433983 CET | 49673 | 443 | 192.168.2.18 | 204.79.197.203 |
Jan 7, 2025 17:57:58.789132118 CET | 49673 | 443 | 192.168.2.18 | 204.79.197.203 |
Jan 7, 2025 17:57:59.395143032 CET | 49673 | 443 | 192.168.2.18 | 204.79.197.203 |
Jan 7, 2025 17:57:59.756386995 CET | 49707 | 443 | 192.168.2.18 | 142.250.185.68 |
Jan 7, 2025 17:57:59.756432056 CET | 443 | 49707 | 142.250.185.68 | 192.168.2.18 |
Jan 7, 2025 17:57:59.756527901 CET | 49707 | 443 | 192.168.2.18 | 142.250.185.68 |
Jan 7, 2025 17:57:59.756792068 CET | 49707 | 443 | 192.168.2.18 | 142.250.185.68 |
Jan 7, 2025 17:57:59.756799936 CET | 443 | 49707 | 142.250.185.68 | 192.168.2.18 |
Jan 7, 2025 17:58:00.418469906 CET | 443 | 49707 | 142.250.185.68 | 192.168.2.18 |
Jan 7, 2025 17:58:00.418797970 CET | 49707 | 443 | 192.168.2.18 | 142.250.185.68 |
Jan 7, 2025 17:58:00.418813944 CET | 443 | 49707 | 142.250.185.68 | 192.168.2.18 |
Jan 7, 2025 17:58:00.419800043 CET | 443 | 49707 | 142.250.185.68 | 192.168.2.18 |
Jan 7, 2025 17:58:00.419864893 CET | 49707 | 443 | 192.168.2.18 | 142.250.185.68 |
Jan 7, 2025 17:58:00.421139956 CET | 49707 | 443 | 192.168.2.18 | 142.250.185.68 |
Jan 7, 2025 17:58:00.421219110 CET | 443 | 49707 | 142.250.185.68 | 192.168.2.18 |
Jan 7, 2025 17:58:00.467092991 CET | 49707 | 443 | 192.168.2.18 | 142.250.185.68 |
Jan 7, 2025 17:58:00.467114925 CET | 443 | 49707 | 142.250.185.68 | 192.168.2.18 |
Jan 7, 2025 17:58:00.515142918 CET | 49707 | 443 | 192.168.2.18 | 142.250.185.68 |
Jan 7, 2025 17:58:00.610117912 CET | 49673 | 443 | 192.168.2.18 | 204.79.197.203 |
Jan 7, 2025 17:58:03.022118092 CET | 49673 | 443 | 192.168.2.18 | 204.79.197.203 |
Jan 7, 2025 17:58:05.611067057 CET | 49679 | 443 | 192.168.2.18 | 52.182.141.63 |
Jan 7, 2025 17:58:05.913115025 CET | 49679 | 443 | 192.168.2.18 | 52.182.141.63 |
Jan 7, 2025 17:58:06.519161940 CET | 49679 | 443 | 192.168.2.18 | 52.182.141.63 |
Jan 7, 2025 17:58:07.733203888 CET | 49679 | 443 | 192.168.2.18 | 52.182.141.63 |
Jan 7, 2025 17:58:07.828130960 CET | 49673 | 443 | 192.168.2.18 | 204.79.197.203 |
Jan 7, 2025 17:58:10.138196945 CET | 49679 | 443 | 192.168.2.18 | 52.182.141.63 |
Jan 7, 2025 17:58:10.312563896 CET | 443 | 49707 | 142.250.185.68 | 192.168.2.18 |
Jan 7, 2025 17:58:10.312659025 CET | 443 | 49707 | 142.250.185.68 | 192.168.2.18 |
Jan 7, 2025 17:58:10.312777042 CET | 49707 | 443 | 192.168.2.18 | 142.250.185.68 |
Jan 7, 2025 17:58:11.223788977 CET | 49707 | 443 | 192.168.2.18 | 142.250.185.68 |
Jan 7, 2025 17:58:11.223820925 CET | 443 | 49707 | 142.250.185.68 | 192.168.2.18 |
Jan 7, 2025 17:58:14.938175917 CET | 49679 | 443 | 192.168.2.18 | 52.182.141.63 |
Jan 7, 2025 17:58:17.437153101 CET | 49673 | 443 | 192.168.2.18 | 204.79.197.203 |
Jan 7, 2025 17:58:24.542165995 CET | 49679 | 443 | 192.168.2.18 | 52.182.141.63 |
Jan 7, 2025 17:58:31.141379118 CET | 49693 | 443 | 192.168.2.18 | 20.190.159.75 |
Jan 7, 2025 17:58:31.141427040 CET | 49693 | 443 | 192.168.2.18 | 20.190.159.75 |
Jan 7, 2025 17:58:31.146222115 CET | 443 | 49693 | 20.190.159.75 | 192.168.2.18 |
Jan 7, 2025 17:58:31.146282911 CET | 443 | 49693 | 20.190.159.75 | 192.168.2.18 |
Jan 7, 2025 17:58:31.146295071 CET | 443 | 49693 | 20.190.159.75 | 192.168.2.18 |
Jan 7, 2025 17:58:31.146306038 CET | 443 | 49693 | 20.190.159.75 | 192.168.2.18 |
Jan 7, 2025 17:58:31.146414995 CET | 443 | 49693 | 20.190.159.75 | 192.168.2.18 |
Jan 7, 2025 17:58:31.471489906 CET | 443 | 49693 | 20.190.159.75 | 192.168.2.18 |
Jan 7, 2025 17:58:31.471508026 CET | 443 | 49693 | 20.190.159.75 | 192.168.2.18 |
Jan 7, 2025 17:58:31.471523046 CET | 443 | 49693 | 20.190.159.75 | 192.168.2.18 |
Jan 7, 2025 17:58:31.471534967 CET | 443 | 49693 | 20.190.159.75 | 192.168.2.18 |
Jan 7, 2025 17:58:31.471548080 CET | 443 | 49693 | 20.190.159.75 | 192.168.2.18 |
Jan 7, 2025 17:58:31.471586943 CET | 49693 | 443 | 192.168.2.18 | 20.190.159.75 |
Jan 7, 2025 17:58:31.471586943 CET | 49693 | 443 | 192.168.2.18 | 20.190.159.75 |
Jan 7, 2025 17:58:31.471898079 CET | 443 | 49693 | 20.190.159.75 | 192.168.2.18 |
Jan 7, 2025 17:58:31.471910000 CET | 443 | 49693 | 20.190.159.75 | 192.168.2.18 |
Jan 7, 2025 17:58:31.471935987 CET | 443 | 49693 | 20.190.159.75 | 192.168.2.18 |
Jan 7, 2025 17:58:31.471947908 CET | 443 | 49693 | 20.190.159.75 | 192.168.2.18 |
Jan 7, 2025 17:58:31.471959114 CET | 443 | 49693 | 20.190.159.75 | 192.168.2.18 |
Jan 7, 2025 17:58:31.471961021 CET | 49693 | 443 | 192.168.2.18 | 20.190.159.75 |
Jan 7, 2025 17:58:31.471990108 CET | 49693 | 443 | 192.168.2.18 | 20.190.159.75 |
Jan 7, 2025 17:58:31.473392010 CET | 49693 | 443 | 192.168.2.18 | 20.190.159.75 |
Jan 7, 2025 17:58:34.378490925 CET | 49690 | 80 | 192.168.2.18 | 199.232.210.172 |
Jan 7, 2025 17:58:34.383667946 CET | 80 | 49690 | 199.232.210.172 | 192.168.2.18 |
Jan 7, 2025 17:58:34.383745909 CET | 49690 | 80 | 192.168.2.18 | 199.232.210.172 |
Jan 7, 2025 17:58:41.050174952 CET | 49705 | 80 | 192.168.2.18 | 166.1.209.92 |
Jan 7, 2025 17:58:41.055234909 CET | 80 | 49705 | 166.1.209.92 | 192.168.2.18 |
Jan 7, 2025 17:58:41.943190098 CET | 49704 | 80 | 192.168.2.18 | 166.1.209.92 |
Jan 7, 2025 17:58:41.948057890 CET | 80 | 49704 | 166.1.209.92 | 192.168.2.18 |
Jan 7, 2025 17:58:56.550442934 CET | 80 | 49705 | 166.1.209.92 | 192.168.2.18 |
Jan 7, 2025 17:58:56.550548077 CET | 49705 | 80 | 192.168.2.18 | 166.1.209.92 |
Jan 7, 2025 17:58:57.210926056 CET | 49705 | 80 | 192.168.2.18 | 166.1.209.92 |
Jan 7, 2025 17:58:57.215881109 CET | 80 | 49705 | 166.1.209.92 | 192.168.2.18 |
Jan 7, 2025 17:58:59.799427032 CET | 49711 | 443 | 192.168.2.18 | 142.250.185.68 |
Jan 7, 2025 17:58:59.799472094 CET | 443 | 49711 | 142.250.185.68 | 192.168.2.18 |
Jan 7, 2025 17:58:59.799592018 CET | 49711 | 443 | 192.168.2.18 | 142.250.185.68 |
Jan 7, 2025 17:58:59.799890995 CET | 49711 | 443 | 192.168.2.18 | 142.250.185.68 |
Jan 7, 2025 17:58:59.799906015 CET | 443 | 49711 | 142.250.185.68 | 192.168.2.18 |
Jan 7, 2025 17:59:00.477195978 CET | 443 | 49711 | 142.250.185.68 | 192.168.2.18 |
Jan 7, 2025 17:59:00.477615118 CET | 49711 | 443 | 192.168.2.18 | 142.250.185.68 |
Jan 7, 2025 17:59:00.477703094 CET | 443 | 49711 | 142.250.185.68 | 192.168.2.18 |
Jan 7, 2025 17:59:00.478127003 CET | 443 | 49711 | 142.250.185.68 | 192.168.2.18 |
Jan 7, 2025 17:59:00.478466988 CET | 49711 | 443 | 192.168.2.18 | 142.250.185.68 |
Jan 7, 2025 17:59:00.478543043 CET | 443 | 49711 | 142.250.185.68 | 192.168.2.18 |
Jan 7, 2025 17:59:00.533288002 CET | 49711 | 443 | 192.168.2.18 | 142.250.185.68 |
Jan 7, 2025 17:59:01.928819895 CET | 80 | 49704 | 166.1.209.92 | 192.168.2.18 |
Jan 7, 2025 17:59:01.928955078 CET | 49704 | 80 | 192.168.2.18 | 166.1.209.92 |
Jan 7, 2025 17:59:03.220901012 CET | 49704 | 80 | 192.168.2.18 | 166.1.209.92 |
Jan 7, 2025 17:59:03.226238966 CET | 80 | 49704 | 166.1.209.92 | 192.168.2.18 |
Jan 7, 2025 17:59:10.376662016 CET | 443 | 49711 | 142.250.185.68 | 192.168.2.18 |
Jan 7, 2025 17:59:10.376737118 CET | 443 | 49711 | 142.250.185.68 | 192.168.2.18 |
Jan 7, 2025 17:59:10.376804113 CET | 49711 | 443 | 192.168.2.18 | 142.250.185.68 |
Jan 7, 2025 17:59:11.220856905 CET | 49711 | 443 | 192.168.2.18 | 142.250.185.68 |
Jan 7, 2025 17:59:11.220895052 CET | 443 | 49711 | 142.250.185.68 | 192.168.2.18 |
Jan 7, 2025 17:59:25.580535889 CET | 49691 | 443 | 192.168.2.18 | 20.190.159.75 |
Jan 7, 2025 17:59:25.580543041 CET | 49692 | 80 | 192.168.2.18 | 192.229.221.95 |
Jan 7, 2025 17:59:25.694715977 CET | 443 | 49691 | 20.190.159.75 | 192.168.2.18 |
Jan 7, 2025 17:59:25.694775105 CET | 49691 | 443 | 192.168.2.18 | 20.190.159.75 |
Jan 7, 2025 17:59:25.697300911 CET | 80 | 49692 | 192.229.221.95 | 192.168.2.18 |
Jan 7, 2025 17:59:25.697354078 CET | 49692 | 80 | 192.168.2.18 | 192.229.221.95 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 7, 2025 17:57:55.070638895 CET | 53 | 60983 | 1.1.1.1 | 192.168.2.18 |
Jan 7, 2025 17:57:55.123310089 CET | 53 | 56344 | 1.1.1.1 | 192.168.2.18 |
Jan 7, 2025 17:57:55.824671984 CET | 61607 | 53 | 192.168.2.18 | 1.1.1.1 |
Jan 7, 2025 17:57:55.825005054 CET | 53513 | 53 | 192.168.2.18 | 1.1.1.1 |
Jan 7, 2025 17:57:55.839765072 CET | 53 | 53513 | 1.1.1.1 | 192.168.2.18 |
Jan 7, 2025 17:57:56.033674002 CET | 53 | 61607 | 1.1.1.1 | 192.168.2.18 |
Jan 7, 2025 17:57:56.178715944 CET | 53 | 56323 | 1.1.1.1 | 192.168.2.18 |
Jan 7, 2025 17:57:59.748358011 CET | 55777 | 53 | 192.168.2.18 | 1.1.1.1 |
Jan 7, 2025 17:57:59.748445034 CET | 49866 | 53 | 192.168.2.18 | 1.1.1.1 |
Jan 7, 2025 17:57:59.755219936 CET | 53 | 55777 | 1.1.1.1 | 192.168.2.18 |
Jan 7, 2025 17:57:59.755238056 CET | 53 | 49866 | 1.1.1.1 | 192.168.2.18 |
Jan 7, 2025 17:58:13.256661892 CET | 53 | 62419 | 1.1.1.1 | 192.168.2.18 |
Jan 7, 2025 17:58:32.106659889 CET | 53 | 55941 | 1.1.1.1 | 192.168.2.18 |
Jan 7, 2025 17:58:54.665256023 CET | 53 | 57504 | 1.1.1.1 | 192.168.2.18 |
Jan 7, 2025 17:58:54.918979883 CET | 53 | 57095 | 1.1.1.1 | 192.168.2.18 |
Jan 7, 2025 17:59:05.818353891 CET | 138 | 138 | 192.168.2.18 | 192.168.2.255 |
Jan 7, 2025 17:59:24.951380968 CET | 53 | 61125 | 1.1.1.1 | 192.168.2.18 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 7, 2025 17:57:55.824671984 CET | 192.168.2.18 | 1.1.1.1 | 0x3dce | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 17:57:55.825005054 CET | 192.168.2.18 | 1.1.1.1 | 0xf9ce | Standard query (0) | 65 | IN (0x0001) | false | |
Jan 7, 2025 17:57:59.748358011 CET | 192.168.2.18 | 1.1.1.1 | 0x72f8 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 17:57:59.748445034 CET | 192.168.2.18 | 1.1.1.1 | 0x177 | Standard query (0) | 65 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 7, 2025 17:57:56.033674002 CET | 1.1.1.1 | 192.168.2.18 | 0x3dce | No error (0) | 166.1.209.92 | A (IP address) | IN (0x0001) | false | ||
Jan 7, 2025 17:57:59.755219936 CET | 1.1.1.1 | 192.168.2.18 | 0x72f8 | No error (0) | 142.250.185.68 | A (IP address) | IN (0x0001) | false | ||
Jan 7, 2025 17:57:59.755238056 CET | 1.1.1.1 | 192.168.2.18 | 0x177 | No error (0) | 65 | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.18 | 49704 | 166.1.209.92 | 80 | 1248 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 7, 2025 17:57:56.039458990 CET | 428 | OUT | |
Jan 7, 2025 17:57:56.641215086 CET | 452 | IN | |
Jan 7, 2025 17:57:56.796618938 CET | 370 | OUT | |
Jan 7, 2025 17:57:56.927161932 CET | 448 | IN | |
Jan 7, 2025 17:58:41.943190098 CET | 6 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.18 | 49705 | 166.1.209.92 | 80 | 1248 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 7, 2025 17:58:41.050174952 CET | 6 | OUT |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 11:57:53 |
Start date: | 07/01/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff728d30000 |
File size: | 3'242'272 bytes |
MD5 hash: | 83395EAB5B03DEA9720F8D7AC0D15CAA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 1 |
Start time: | 11:57:53 |
Start date: | 07/01/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff728d30000 |
File size: | 3'242'272 bytes |
MD5 hash: | 83395EAB5B03DEA9720F8D7AC0D15CAA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 2 |
Start time: | 11:57:54 |
Start date: | 07/01/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff728d30000 |
File size: | 3'242'272 bytes |
MD5 hash: | 83395EAB5B03DEA9720F8D7AC0D15CAA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |