Windows
Analysis Report
https://stoss3.libooc.com
Overview
Detection
Score: | 56 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- chrome.exe (PID: 4084 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 3536 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2168 --fi eld-trial- handle=201 2,i,627464 7700515573 441,992189 7690946213 267,262144 --disable -features= Optimizati onGuideMod elDownload ing,Optimi zationHint s,Optimiza tionHintsF etching,Op timization TargetPred iction /pr efetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- chrome.exe (PID: 6472 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://stoss 3.libooc.c om" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | Avira URL Cloud: |
Source: | HTTP Parser: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: |
Source: | Window detected: |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 3 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 4 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 3 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
stoss3.libooc.com.w.kunlunpi.com | 61.160.192.101 | true | false | unknown | |
www.google.com | 142.250.185.164 | true | false | high | |
stoss3.libooc.com | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
true | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.250.185.164 | www.google.com | United States | 15169 | GOOGLEUS | false | |
61.160.192.101 | stoss3.libooc.com.w.kunlunpi.com | China | 23650 | CHINANET-JS-AS-APASNumberforCHINANETjiangsuprovinceba | false |
IP |
---|
192.168.2.5 |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1587328 |
Start date and time: | 2025-01-10 07:42:29 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 2m 48s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | https://stoss3.libooc.com |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal56.win@16/6@5/4 |
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 142.250.186.67, 64.233.167.84, 142.250.185.238, 142.250.184.206, 172.217.16.142, 142.250.186.46, 199.232.210.172, 192.229.221.95, 142.250.185.174, 142.250.185.142, 172.217.16.206, 142.250.185.206, 142.250.185.195, 142.250.186.78, 184.28.90.27, 4.175.87.197, 13.107.246.45
- Excluded domains from analysis (whitelisted): fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, clientservices.googleapis.com, fe3cr.delivery.mp.microsoft.com, clients2.google.com, ocsp.digicert.com, edgedl.me.gvt1.com, redirector.gvt1.com, update.googleapis.com, clients.l.google.com
- Not all processes where analyzed, report is missing behavior information
- VT rate limit hit for: https://stoss3.libooc.com
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.974101093750699 |
Encrypted: | false |
SSDEEP: | 48:8rJd0T4EstHyidAKZdA19ehwiZUklqehzxy+3:8s/h2xy |
MD5: | 743FC8309B7DE541CC8CC28C9ABFA3A8 |
SHA1: | 1B285AC9655F442A620D346321C0786F470A64A5 |
SHA-256: | DEE63C1E66076B53B98C3DE58D94BEFBB157FEBA5727BD2423E7F9151F8A1CBA |
SHA-512: | BDEEBCA6DD20339DFEA9C4E886C8D8B5B362610BA01DC52F6C99C8077D2E21B2D77BC00176C019B139762DAA65C47490DEAF8CDB3811BEFDEBBD409D0F2F8F27 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.9881066609453293 |
Encrypted: | false |
SSDEEP: | 48:8Wd0T4EstHyidAKZdA1weh/iZUkAQkqehmxy+2:8B/T9Qhxy |
MD5: | BF21275788AEDE36F2292309446567CF |
SHA1: | 64B5E11A3FA001D48B8288D946193E9185D2C704 |
SHA-256: | BC4BB6C1B071FABDED2EE3279BC4B9B1C271FB2BE79977EAD2CECB019BBEAAD1 |
SHA-512: | AF6B2A6DFE996D39B56F58337FC44577260093B437ABE5128C4AF41EC1D6D5CD0AA8040BE90A64D459FAE1E9EC60E493E770D0DB64DE642623C5A55C17822847 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2693 |
Entropy (8bit): | 4.006328500308873 |
Encrypted: | false |
SSDEEP: | 48:8xld0T4EsHyidAKZdA14tseh7sFiZUkmgqeh7sExy+BX:8xs/3nKxy |
MD5: | 27A5D1F83751DBFE63DEAE9569869D5D |
SHA1: | 182C2CB497B5E417EBC73727EA3A552D6A1EDBFD |
SHA-256: | 1844174389FA23D2973A646497508704FB63705C6014E9C326F80D84D846EBFE |
SHA-512: | 78608E588D0D06E4A29477A68017EB2BA351F52B3FD15C3C375C476EDDC370092683EB1B60DB5E5811ABC700D5A2336D229FF98FCEEC6C52A1D0633F36327E3D |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.9877938131198927 |
Encrypted: | false |
SSDEEP: | 48:86ad0T4EstHyidAKZdA1vehDiZUkwqehixy+R:8U/Q8xy |
MD5: | 12FD0433B206E827FB87164DD47F0865 |
SHA1: | 0B43896277B46AC02F6971B71D3DE28DAF64504B |
SHA-256: | B31C8D3CBB2AEC9346490F057B5089C5858CB3E979B9FBD6F0A034CFC228BDA8 |
SHA-512: | FD39ACD4E4DA80118C781B7EC3CAB9128A0D05A9371E79D21147B11D555FDF22820089D4788E73206A0AF2FAB81717B36F1A1E2AD2FA5BEC9B88015361BD8271 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.976569874532432 |
Encrypted: | false |
SSDEEP: | 48:83d0T4EstHyidAKZdA1hehBiZUk1W1qehYxy+C:8i/Q94xy |
MD5: | DDCB029D9EBD5C9F6D52FF17F47A75FE |
SHA1: | 043F075E3B8D8A6C682DE16BD63BB81F611FF46A |
SHA-256: | 2CF8531D1F1BDB8DD052300A474BA7B29FE7BA6877F389F703269C53E97669F5 |
SHA-512: | 3982E7DE652FE38E50AD9696845380CA8C41E38417ECD18D4F287BD5D464E66A0559BED238C0D7DF1964F6EFECD642810589230DECDE5E37DFD791BBEB883532 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2683 |
Entropy (8bit): | 3.9907434053981694 |
Encrypted: | false |
SSDEEP: | 48:8fd0T4EstHyidAKZdA1duT+ehOuTbbiZUk5OjqehOuTbKxy+yT+:8K/eT/TbxWOvTbKxy7T |
MD5: | D22AAA7D295FF44352846E115166EA70 |
SHA1: | 5D6998F5597F4AC897050A7DBB803C902A0659F4 |
SHA-256: | DD1AB63374CD704F00CE659F8B70457CF5CB59E95E324D806F3BEBB8B5721F00 |
SHA-512: | 0710ED02CD20B463CD07B78EF95711415DDA321C32EDA2FF98F7F07B6BF44A8D1768C9B44440DBA3EABDE2374A1436C9E2AA682D73942C2BBA86BA720DD93006 |
Malicious: | false |
Reputation: | low |
Preview: |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 10, 2025 07:43:15.325438023 CET | 49674 | 443 | 192.168.2.5 | 23.1.237.91 |
Jan 10, 2025 07:43:15.325542927 CET | 49675 | 443 | 192.168.2.5 | 23.1.237.91 |
Jan 10, 2025 07:43:15.419178963 CET | 49673 | 443 | 192.168.2.5 | 23.1.237.91 |
Jan 10, 2025 07:43:24.931586027 CET | 49675 | 443 | 192.168.2.5 | 23.1.237.91 |
Jan 10, 2025 07:43:24.933583975 CET | 49674 | 443 | 192.168.2.5 | 23.1.237.91 |
Jan 10, 2025 07:43:25.025327921 CET | 49673 | 443 | 192.168.2.5 | 23.1.237.91 |
Jan 10, 2025 07:43:25.785692930 CET | 49712 | 443 | 192.168.2.5 | 142.250.185.164 |
Jan 10, 2025 07:43:25.785785913 CET | 443 | 49712 | 142.250.185.164 | 192.168.2.5 |
Jan 10, 2025 07:43:25.786072016 CET | 49712 | 443 | 192.168.2.5 | 142.250.185.164 |
Jan 10, 2025 07:43:25.786217928 CET | 49712 | 443 | 192.168.2.5 | 142.250.185.164 |
Jan 10, 2025 07:43:25.786261082 CET | 443 | 49712 | 142.250.185.164 | 192.168.2.5 |
Jan 10, 2025 07:43:26.441905022 CET | 443 | 49712 | 142.250.185.164 | 192.168.2.5 |
Jan 10, 2025 07:43:26.442462921 CET | 49712 | 443 | 192.168.2.5 | 142.250.185.164 |
Jan 10, 2025 07:43:26.442533970 CET | 443 | 49712 | 142.250.185.164 | 192.168.2.5 |
Jan 10, 2025 07:43:26.444195032 CET | 443 | 49712 | 142.250.185.164 | 192.168.2.5 |
Jan 10, 2025 07:43:26.444300890 CET | 49712 | 443 | 192.168.2.5 | 142.250.185.164 |
Jan 10, 2025 07:43:26.445787907 CET | 49712 | 443 | 192.168.2.5 | 142.250.185.164 |
Jan 10, 2025 07:43:26.445883989 CET | 443 | 49712 | 142.250.185.164 | 192.168.2.5 |
Jan 10, 2025 07:43:26.493942022 CET | 49712 | 443 | 192.168.2.5 | 142.250.185.164 |
Jan 10, 2025 07:43:26.493963957 CET | 443 | 49712 | 142.250.185.164 | 192.168.2.5 |
Jan 10, 2025 07:43:26.540816069 CET | 49712 | 443 | 192.168.2.5 | 142.250.185.164 |
Jan 10, 2025 07:43:26.656275034 CET | 443 | 49703 | 23.1.237.91 | 192.168.2.5 |
Jan 10, 2025 07:43:26.656410933 CET | 49703 | 443 | 192.168.2.5 | 23.1.237.91 |
Jan 10, 2025 07:43:27.907710075 CET | 49715 | 443 | 192.168.2.5 | 61.160.192.101 |
Jan 10, 2025 07:43:27.907733917 CET | 443 | 49715 | 61.160.192.101 | 192.168.2.5 |
Jan 10, 2025 07:43:27.907797098 CET | 49715 | 443 | 192.168.2.5 | 61.160.192.101 |
Jan 10, 2025 07:43:27.908068895 CET | 49715 | 443 | 192.168.2.5 | 61.160.192.101 |
Jan 10, 2025 07:43:27.908080101 CET | 443 | 49715 | 61.160.192.101 | 192.168.2.5 |
Jan 10, 2025 07:43:27.908580065 CET | 49716 | 443 | 192.168.2.5 | 61.160.192.101 |
Jan 10, 2025 07:43:27.908606052 CET | 443 | 49716 | 61.160.192.101 | 192.168.2.5 |
Jan 10, 2025 07:43:27.908684015 CET | 49716 | 443 | 192.168.2.5 | 61.160.192.101 |
Jan 10, 2025 07:43:27.908982038 CET | 49716 | 443 | 192.168.2.5 | 61.160.192.101 |
Jan 10, 2025 07:43:27.908993959 CET | 443 | 49716 | 61.160.192.101 | 192.168.2.5 |
Jan 10, 2025 07:43:28.862740040 CET | 443 | 49715 | 61.160.192.101 | 192.168.2.5 |
Jan 10, 2025 07:43:28.863034010 CET | 49715 | 443 | 192.168.2.5 | 61.160.192.101 |
Jan 10, 2025 07:43:28.863040924 CET | 443 | 49715 | 61.160.192.101 | 192.168.2.5 |
Jan 10, 2025 07:43:28.863917112 CET | 443 | 49715 | 61.160.192.101 | 192.168.2.5 |
Jan 10, 2025 07:43:28.863975048 CET | 49715 | 443 | 192.168.2.5 | 61.160.192.101 |
Jan 10, 2025 07:43:28.868025064 CET | 49715 | 443 | 192.168.2.5 | 61.160.192.101 |
Jan 10, 2025 07:43:28.868073940 CET | 443 | 49715 | 61.160.192.101 | 192.168.2.5 |
Jan 10, 2025 07:43:28.868212938 CET | 49715 | 443 | 192.168.2.5 | 61.160.192.101 |
Jan 10, 2025 07:43:28.868218899 CET | 443 | 49715 | 61.160.192.101 | 192.168.2.5 |
Jan 10, 2025 07:43:28.917051077 CET | 49715 | 443 | 192.168.2.5 | 61.160.192.101 |
Jan 10, 2025 07:43:28.919585943 CET | 443 | 49716 | 61.160.192.101 | 192.168.2.5 |
Jan 10, 2025 07:43:28.919806004 CET | 49716 | 443 | 192.168.2.5 | 61.160.192.101 |
Jan 10, 2025 07:43:28.919826031 CET | 443 | 49716 | 61.160.192.101 | 192.168.2.5 |
Jan 10, 2025 07:43:28.923512936 CET | 443 | 49716 | 61.160.192.101 | 192.168.2.5 |
Jan 10, 2025 07:43:28.923643112 CET | 49716 | 443 | 192.168.2.5 | 61.160.192.101 |
Jan 10, 2025 07:43:28.923923969 CET | 49716 | 443 | 192.168.2.5 | 61.160.192.101 |
Jan 10, 2025 07:43:28.924104929 CET | 443 | 49716 | 61.160.192.101 | 192.168.2.5 |
Jan 10, 2025 07:43:28.964385986 CET | 49716 | 443 | 192.168.2.5 | 61.160.192.101 |
Jan 10, 2025 07:43:28.964395046 CET | 443 | 49716 | 61.160.192.101 | 192.168.2.5 |
Jan 10, 2025 07:43:29.011452913 CET | 49716 | 443 | 192.168.2.5 | 61.160.192.101 |
Jan 10, 2025 07:43:29.374150038 CET | 443 | 49715 | 61.160.192.101 | 192.168.2.5 |
Jan 10, 2025 07:43:29.374196053 CET | 443 | 49715 | 61.160.192.101 | 192.168.2.5 |
Jan 10, 2025 07:43:29.374244928 CET | 49715 | 443 | 192.168.2.5 | 61.160.192.101 |
Jan 10, 2025 07:43:29.379759073 CET | 49715 | 443 | 192.168.2.5 | 61.160.192.101 |
Jan 10, 2025 07:43:29.379770994 CET | 443 | 49715 | 61.160.192.101 | 192.168.2.5 |
Jan 10, 2025 07:43:29.457716942 CET | 49716 | 443 | 192.168.2.5 | 61.160.192.101 |
Jan 10, 2025 07:43:29.499373913 CET | 443 | 49716 | 61.160.192.101 | 192.168.2.5 |
Jan 10, 2025 07:43:29.776276112 CET | 443 | 49716 | 61.160.192.101 | 192.168.2.5 |
Jan 10, 2025 07:43:29.781202078 CET | 443 | 49716 | 61.160.192.101 | 192.168.2.5 |
Jan 10, 2025 07:43:29.781300068 CET | 49716 | 443 | 192.168.2.5 | 61.160.192.101 |
Jan 10, 2025 07:43:29.846204996 CET | 49716 | 443 | 192.168.2.5 | 61.160.192.101 |
Jan 10, 2025 07:43:29.846220970 CET | 443 | 49716 | 61.160.192.101 | 192.168.2.5 |
Jan 10, 2025 07:43:36.363029957 CET | 443 | 49712 | 142.250.185.164 | 192.168.2.5 |
Jan 10, 2025 07:43:36.363183022 CET | 443 | 49712 | 142.250.185.164 | 192.168.2.5 |
Jan 10, 2025 07:43:36.363276958 CET | 49712 | 443 | 192.168.2.5 | 142.250.185.164 |
Jan 10, 2025 07:43:37.574501038 CET | 49712 | 443 | 192.168.2.5 | 142.250.185.164 |
Jan 10, 2025 07:43:37.574539900 CET | 443 | 49712 | 142.250.185.164 | 192.168.2.5 |
Jan 10, 2025 07:44:25.839174032 CET | 49990 | 443 | 192.168.2.5 | 142.250.185.164 |
Jan 10, 2025 07:44:25.839241028 CET | 443 | 49990 | 142.250.185.164 | 192.168.2.5 |
Jan 10, 2025 07:44:25.839301109 CET | 49990 | 443 | 192.168.2.5 | 142.250.185.164 |
Jan 10, 2025 07:44:25.839518070 CET | 49990 | 443 | 192.168.2.5 | 142.250.185.164 |
Jan 10, 2025 07:44:25.839529037 CET | 443 | 49990 | 142.250.185.164 | 192.168.2.5 |
Jan 10, 2025 07:44:26.474703074 CET | 443 | 49990 | 142.250.185.164 | 192.168.2.5 |
Jan 10, 2025 07:44:26.475192070 CET | 49990 | 443 | 192.168.2.5 | 142.250.185.164 |
Jan 10, 2025 07:44:26.475255966 CET | 443 | 49990 | 142.250.185.164 | 192.168.2.5 |
Jan 10, 2025 07:44:26.475749016 CET | 443 | 49990 | 142.250.185.164 | 192.168.2.5 |
Jan 10, 2025 07:44:26.476170063 CET | 49990 | 443 | 192.168.2.5 | 142.250.185.164 |
Jan 10, 2025 07:44:26.476264954 CET | 443 | 49990 | 142.250.185.164 | 192.168.2.5 |
Jan 10, 2025 07:44:26.525244951 CET | 49990 | 443 | 192.168.2.5 | 142.250.185.164 |
Jan 10, 2025 07:44:36.404582024 CET | 443 | 49990 | 142.250.185.164 | 192.168.2.5 |
Jan 10, 2025 07:44:36.404644966 CET | 443 | 49990 | 142.250.185.164 | 192.168.2.5 |
Jan 10, 2025 07:44:36.404918909 CET | 49990 | 443 | 192.168.2.5 | 142.250.185.164 |
Jan 10, 2025 07:44:37.575583935 CET | 49990 | 443 | 192.168.2.5 | 142.250.185.164 |
Jan 10, 2025 07:44:37.575668097 CET | 443 | 49990 | 142.250.185.164 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 10, 2025 07:43:21.437810898 CET | 53 | 50101 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 07:43:21.462615013 CET | 53 | 57420 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 07:43:22.489638090 CET | 53 | 63870 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 07:43:25.776619911 CET | 52637 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 07:43:25.776724100 CET | 62661 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 07:43:25.783967018 CET | 53 | 52637 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 07:43:25.784029007 CET | 53 | 62661 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 07:43:26.732218027 CET | 56073 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 07:43:26.735613108 CET | 51182 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 07:43:27.216065884 CET | 53 | 51182 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 07:43:27.747641087 CET | 50921 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 07:43:27.906816006 CET | 53 | 56073 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 07:43:28.672300100 CET | 53 | 50921 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 07:43:39.426927090 CET | 53 | 56817 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 07:43:58.362404108 CET | 53 | 59970 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 07:44:20.956131935 CET | 53 | 62233 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 07:44:21.082647085 CET | 53 | 59258 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Checksum | Code | Type |
---|---|---|---|---|---|
Jan 10, 2025 07:43:28.672399998 CET | 192.168.2.5 | 1.1.1.1 | c223 | (Port unreachable) | Destination Unreachable |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 10, 2025 07:43:25.776619911 CET | 192.168.2.5 | 1.1.1.1 | 0x3cf3 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 07:43:25.776724100 CET | 192.168.2.5 | 1.1.1.1 | 0x62de | Standard query (0) | 65 | IN (0x0001) | false | |
Jan 10, 2025 07:43:26.732218027 CET | 192.168.2.5 | 1.1.1.1 | 0x1ad1 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 07:43:26.735613108 CET | 192.168.2.5 | 1.1.1.1 | 0xac62 | Standard query (0) | 65 | IN (0x0001) | false | |
Jan 10, 2025 07:43:27.747641087 CET | 192.168.2.5 | 1.1.1.1 | 0x1c0a | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 10, 2025 07:43:25.783967018 CET | 1.1.1.1 | 192.168.2.5 | 0x3cf3 | No error (0) | 142.250.185.164 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 07:43:25.784029007 CET | 1.1.1.1 | 192.168.2.5 | 0x62de | No error (0) | 65 | IN (0x0001) | false | |||
Jan 10, 2025 07:43:27.216065884 CET | 1.1.1.1 | 192.168.2.5 | 0xac62 | No error (0) | stoss3.libooc.com.w.kunlunpi.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 10, 2025 07:43:27.906816006 CET | 1.1.1.1 | 192.168.2.5 | 0x1ad1 | No error (0) | stoss3.libooc.com.w.kunlunpi.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 10, 2025 07:43:27.906816006 CET | 1.1.1.1 | 192.168.2.5 | 0x1ad1 | No error (0) | 61.160.192.101 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 07:43:28.672300100 CET | 1.1.1.1 | 192.168.2.5 | 0x1c0a | No error (0) | stoss3.libooc.com.w.kunlunpi.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 10, 2025 07:43:28.672300100 CET | 1.1.1.1 | 192.168.2.5 | 0x1c0a | No error (0) | 61.160.192.101 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49715 | 61.160.192.101 | 443 | 3536 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 06:43:28 UTC | 660 | OUT | |
2025-01-10 06:43:29 UTC | 572 | IN | |
2025-01-10 06:43:29 UTC | 317 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49716 | 61.160.192.101 | 443 | 3536 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 06:43:29 UTC | 736 | OUT | |
2025-01-10 06:43:29 UTC | 352 | IN | |
2025-01-10 06:43:29 UTC | 317 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 01:43:17 |
Start date: | 10/01/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 2 |
Start time: | 01:43:19 |
Start date: | 10/01/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 3 |
Start time: | 01:43:25 |
Start date: | 10/01/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |