Windows
Analysis Report
http://pluralism.themancav.com
Overview
Detection
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- chrome.exe (PID: 4396 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 2124 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2332 --fi eld-trial- handle=228 4,i,160144 1863667844 6389,13033 6111277539 5062,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- chrome.exe (PID: 5416 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt p://plural ism.theman cav.com" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | HTTP Parser: |
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: |
Source: | Window detected: |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 3 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 4 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 3 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | phishing |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
www.google.com | 142.250.185.228 | true | false | high | |
pluralism.themancav.com | 62.60.154.114 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.250.185.228 | www.google.com | United States | 15169 | GOOGLEUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
62.60.154.114 | pluralism.themancav.com | Iran (ISLAMIC Republic Of) | 15611 | IROST-ASIR | false |
IP |
---|
192.168.2.4 |
192.168.2.5 |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1591154 |
Start date and time: | 2025-01-14 18:27:45 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 2m 56s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | http://pluralism.themancav.com |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal48.win@16/8@4/5 |
EGA Information: | Failed |
HCA Information: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 172.217.16.195, 142.250.185.238, 74.125.133.84, 142.250.185.206, 142.250.184.206, 217.20.57.20, 2.17.190.73, 142.250.186.78, 142.250.181.238, 216.58.206.46, 142.250.185.131, 142.250.186.174, 199.232.214.172, 184.28.90.27, 4.175.87.197, 23.1.237.91, 13.107.246.45
- Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, otelrules.azureedge.net, 7.4.8.4.4.3.1.4.0.0.0.0.0.0.0.0.0.0.0.a.0.0.1.f.1.1.1.0.1.0.a.2.ip6.arpa, ctldl.windowsupdate.com, clientservices.googleapis.com, fe3cr.delivery.mp.microsoft.com, clients2.google.com, ocsp.digicert.com, edgedl.me.gvt1.com, redirector.gvt1.com, update.googleapis.com, clients.l.google.com
- Not all processes where analyzed, report is missing behavior information
- VT rate limit hit for: http://pluralism.themancav.com
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9810272805364075 |
Encrypted: | false |
SSDEEP: | 48:8x2daTmui8HmidAKZdA19ehwiZUklqehAy+3:89fih/y |
MD5: | 3767F6895ED0A85B1C5B3F9CED3647A5 |
SHA1: | 359620630C2183AE4710918A7731F790CCFC5FA0 |
SHA-256: | 069CF962F7CDFD16690FF3435FDDA34FE394ADB8AB255CA3795239B2A5E269BB |
SHA-512: | 40E5A55A86383ECCB4A0C01860F4C55714E3BEA515644575241737765EADF529D716175F9377269BBD85B287F99440299E7F8DD3D5715AA439D7BFCA3470663A |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.993510781037463 |
Encrypted: | false |
SSDEEP: | 48:812daTmui8HmidAKZdA1weh/iZUkAQkqehvy+2:8hfiT9Qay |
MD5: | 0972A3EBA7E0CD8332A3D279E776911F |
SHA1: | 16594BA508D07DC4F38E690679B8598A9617E8DE |
SHA-256: | 754F508AC87C7EB200818681068CDA3351EF53DC82FDFA960F19FD4D4B45241D |
SHA-512: | 786C8D1BC22EBBD13B4303B102A041BECD450F92B3BDA94F7CAB0D498612830B035793632C5AA6857D0E3CE9F4F435398A80D29BD184BAE765B847BDB800D786 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2693 |
Entropy (8bit): | 4.0057480654824955 |
Encrypted: | false |
SSDEEP: | 48:8xW2daTmusHmidAKZdA14tseh7sFiZUkmgqeh7sZy+BX:8xMfjnby |
MD5: | 499F7403B1AB6AD0BCA0CE6CA669DC91 |
SHA1: | 727720D4559F5FD1ED313FBED402981928368FBF |
SHA-256: | 85344E22FB4B6EEEE31E25FE5DD264E10E47D6DF670B1AF61C771668B79F5EA1 |
SHA-512: | 628C864830783A05446ACB08BCEB7A6EE902DB3DE74B61F8EA0370F3B3508EE18BC3E80383D13950533E9DBDA29E16760C011C0D7131BE241412A49E53371B80 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.993228900662529 |
Encrypted: | false |
SSDEEP: | 48:8y2daTmui8HmidAKZdA1vehDiZUkwqehTy+R:8ofiQRy |
MD5: | 03F33656C68D16B5FA1764C6CF7690F3 |
SHA1: | 9135D629B34F4C292BBECBE786727176C5B9E4A3 |
SHA-256: | 8876D9D034F6DEB635B9E1DB16D04F28F0F7F07CC75E7F2239F511F310219409 |
SHA-512: | 04CDE13727C2B59CD4335F5DB5F28E8DC0FEB7372000C5117E1F1DF703D4B149EAB10FA6626EB5EBFE93A7389DDF8684656553F4AF12020C3937F62D521695D9 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.982805925486274 |
Encrypted: | false |
SSDEEP: | 48:8H22daTmui8HmidAKZdA1hehBiZUk1W1qehFy+C:8HsfiQ9ly |
MD5: | 6B061778C73933B876D8A24A8E2D9C35 |
SHA1: | AFE268CC8EC1825787B2D47C9CD2BE7C6AD93751 |
SHA-256: | 9F36745D24D00801D18DA4E6935729D4B46F8F75A01D293A6CCCBAB259DD4E87 |
SHA-512: | 9F7157BB6640FC1882F2414554A1A056C0A34748C9600096B3CC5A25161F6D1B576613EF6118A80FBBC88DC9AE6B6CE8FF7EC5AEE8C1826754D22BB224F1EED5 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2683 |
Entropy (8bit): | 3.993939355422964 |
Encrypted: | false |
SSDEEP: | 48:8Q2daTmui8HmidAKZdA1duT+ehOuTbbiZUk5OjqehOuTbby+yT+:8yfieT/TbxWOvTbby7T |
MD5: | 76DB80334FA54E537E8344B85CF58127 |
SHA1: | 6B875941148D8309EE0FBFA515B5C806EBC860ED |
SHA-256: | 0DABD4D2A28A208AF7F4A7F10BC2E95CDCE0A85D155383C78BE795A47B0A9701 |
SHA-512: | 531971108CB7AB1137D21B8688E4CABB8215B8847BDF014CCBFAA05E9C0FF03924972838747FAA0A43D6280356EE690947CB5F33304BCC6EAA0F778EB327F823 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 203 |
Entropy (8bit): | 5.139523437629011 |
Encrypted: | false |
SSDEEP: | 6:pn0+t9xqObRKr6TQzetSzRx3G0CezowoG:J0+t9xqeRKWTQzetSzRxGezn |
MD5: | A368EBDB8002FBB3142E16BC34B326D8 |
SHA1: | E727C702FB6BE3CBEFA0B0847717B2334CE9B8FD |
SHA-256: | 7BB4BE9184710E7D3067CE155A3F8E37C248BDF649906EA40AF66A324ACE61A4 |
SHA-512: | 2550B4B0040F566D106E24E8180DE41225FEDA5B82C68A31BC7DBCF422B6751CC1701CD3F1CC51A7FFDBD57FDCDCCABF1F3B6444AFDA681221F8E6F734C40DAD |
Malicious: | false |
Reputation: | low |
URL: | http://pluralism.themancav.com/ |
Preview: |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 14, 2025 18:28:44.431431055 CET | 49712 | 443 | 192.168.2.5 | 142.250.185.228 |
Jan 14, 2025 18:28:44.431484938 CET | 443 | 49712 | 142.250.185.228 | 192.168.2.5 |
Jan 14, 2025 18:28:44.431747913 CET | 49712 | 443 | 192.168.2.5 | 142.250.185.228 |
Jan 14, 2025 18:28:44.431924105 CET | 49712 | 443 | 192.168.2.5 | 142.250.185.228 |
Jan 14, 2025 18:28:44.431941986 CET | 443 | 49712 | 142.250.185.228 | 192.168.2.5 |
Jan 14, 2025 18:28:45.096503973 CET | 443 | 49712 | 142.250.185.228 | 192.168.2.5 |
Jan 14, 2025 18:28:45.097327948 CET | 49712 | 443 | 192.168.2.5 | 142.250.185.228 |
Jan 14, 2025 18:28:45.097352028 CET | 443 | 49712 | 142.250.185.228 | 192.168.2.5 |
Jan 14, 2025 18:28:45.098212004 CET | 443 | 49712 | 142.250.185.228 | 192.168.2.5 |
Jan 14, 2025 18:28:45.098388910 CET | 49712 | 443 | 192.168.2.5 | 142.250.185.228 |
Jan 14, 2025 18:28:45.099782944 CET | 49712 | 443 | 192.168.2.5 | 142.250.185.228 |
Jan 14, 2025 18:28:45.099841118 CET | 443 | 49712 | 142.250.185.228 | 192.168.2.5 |
Jan 14, 2025 18:28:45.143336058 CET | 49712 | 443 | 192.168.2.5 | 142.250.185.228 |
Jan 14, 2025 18:28:45.143362045 CET | 443 | 49712 | 142.250.185.228 | 192.168.2.5 |
Jan 14, 2025 18:28:45.186748028 CET | 49712 | 443 | 192.168.2.5 | 142.250.185.228 |
Jan 14, 2025 18:28:46.190969944 CET | 49714 | 80 | 192.168.2.5 | 62.60.154.114 |
Jan 14, 2025 18:28:46.191844940 CET | 49715 | 80 | 192.168.2.5 | 62.60.154.114 |
Jan 14, 2025 18:28:46.195836067 CET | 80 | 49714 | 62.60.154.114 | 192.168.2.5 |
Jan 14, 2025 18:28:46.195915937 CET | 49714 | 80 | 192.168.2.5 | 62.60.154.114 |
Jan 14, 2025 18:28:46.196091890 CET | 49714 | 80 | 192.168.2.5 | 62.60.154.114 |
Jan 14, 2025 18:28:46.196696043 CET | 80 | 49715 | 62.60.154.114 | 192.168.2.5 |
Jan 14, 2025 18:28:46.196877003 CET | 49715 | 80 | 192.168.2.5 | 62.60.154.114 |
Jan 14, 2025 18:28:46.200913906 CET | 80 | 49714 | 62.60.154.114 | 192.168.2.5 |
Jan 14, 2025 18:28:48.228509903 CET | 80 | 49714 | 62.60.154.114 | 192.168.2.5 |
Jan 14, 2025 18:28:48.277347088 CET | 49714 | 80 | 192.168.2.5 | 62.60.154.114 |
Jan 14, 2025 18:28:48.303119898 CET | 49714 | 80 | 192.168.2.5 | 62.60.154.114 |
Jan 14, 2025 18:28:48.308105946 CET | 80 | 49714 | 62.60.154.114 | 192.168.2.5 |
Jan 14, 2025 18:28:48.469331026 CET | 80 | 49714 | 62.60.154.114 | 192.168.2.5 |
Jan 14, 2025 18:28:48.518412113 CET | 49714 | 80 | 192.168.2.5 | 62.60.154.114 |
Jan 14, 2025 18:28:55.070950985 CET | 443 | 49712 | 142.250.185.228 | 192.168.2.5 |
Jan 14, 2025 18:28:55.071013927 CET | 443 | 49712 | 142.250.185.228 | 192.168.2.5 |
Jan 14, 2025 18:28:55.071171999 CET | 49712 | 443 | 192.168.2.5 | 142.250.185.228 |
Jan 14, 2025 18:28:56.970876932 CET | 49712 | 443 | 192.168.2.5 | 142.250.185.228 |
Jan 14, 2025 18:28:56.970905066 CET | 443 | 49712 | 142.250.185.228 | 192.168.2.5 |
Jan 14, 2025 18:29:20.225996971 CET | 50722 | 53 | 192.168.2.5 | 162.159.36.2 |
Jan 14, 2025 18:29:20.230864048 CET | 53 | 50722 | 162.159.36.2 | 192.168.2.5 |
Jan 14, 2025 18:29:20.231050014 CET | 50722 | 53 | 192.168.2.5 | 162.159.36.2 |
Jan 14, 2025 18:29:20.235883951 CET | 53 | 50722 | 162.159.36.2 | 192.168.2.5 |
Jan 14, 2025 18:29:20.676157951 CET | 50722 | 53 | 192.168.2.5 | 162.159.36.2 |
Jan 14, 2025 18:29:20.681200981 CET | 53 | 50722 | 162.159.36.2 | 192.168.2.5 |
Jan 14, 2025 18:29:20.681262970 CET | 50722 | 53 | 192.168.2.5 | 162.159.36.2 |
Jan 14, 2025 18:29:31.202466011 CET | 49715 | 80 | 192.168.2.5 | 62.60.154.114 |
Jan 14, 2025 18:29:31.207421064 CET | 80 | 49715 | 62.60.154.114 | 192.168.2.5 |
Jan 14, 2025 18:29:33.483562946 CET | 49714 | 80 | 192.168.2.5 | 62.60.154.114 |
Jan 14, 2025 18:29:33.488354921 CET | 80 | 49714 | 62.60.154.114 | 192.168.2.5 |
Jan 14, 2025 18:29:44.484983921 CET | 50860 | 443 | 192.168.2.5 | 142.250.185.228 |
Jan 14, 2025 18:29:44.485033035 CET | 443 | 50860 | 142.250.185.228 | 192.168.2.5 |
Jan 14, 2025 18:29:44.485117912 CET | 50860 | 443 | 192.168.2.5 | 142.250.185.228 |
Jan 14, 2025 18:29:44.485404968 CET | 50860 | 443 | 192.168.2.5 | 142.250.185.228 |
Jan 14, 2025 18:29:44.485421896 CET | 443 | 50860 | 142.250.185.228 | 192.168.2.5 |
Jan 14, 2025 18:29:45.129954100 CET | 443 | 50860 | 142.250.185.228 | 192.168.2.5 |
Jan 14, 2025 18:29:45.130363941 CET | 50860 | 443 | 192.168.2.5 | 142.250.185.228 |
Jan 14, 2025 18:29:45.130430937 CET | 443 | 50860 | 142.250.185.228 | 192.168.2.5 |
Jan 14, 2025 18:29:45.131390095 CET | 443 | 50860 | 142.250.185.228 | 192.168.2.5 |
Jan 14, 2025 18:29:45.131742954 CET | 50860 | 443 | 192.168.2.5 | 142.250.185.228 |
Jan 14, 2025 18:29:45.131839991 CET | 443 | 50860 | 142.250.185.228 | 192.168.2.5 |
Jan 14, 2025 18:29:45.186412096 CET | 50860 | 443 | 192.168.2.5 | 142.250.185.228 |
Jan 14, 2025 18:29:46.685118914 CET | 80 | 49715 | 62.60.154.114 | 192.168.2.5 |
Jan 14, 2025 18:29:46.685214996 CET | 49715 | 80 | 192.168.2.5 | 62.60.154.114 |
Jan 14, 2025 18:29:46.970427990 CET | 49715 | 80 | 192.168.2.5 | 62.60.154.114 |
Jan 14, 2025 18:29:46.975457907 CET | 80 | 49715 | 62.60.154.114 | 192.168.2.5 |
Jan 14, 2025 18:29:55.034632921 CET | 443 | 50860 | 142.250.185.228 | 192.168.2.5 |
Jan 14, 2025 18:29:55.034799099 CET | 443 | 50860 | 142.250.185.228 | 192.168.2.5 |
Jan 14, 2025 18:29:55.034881115 CET | 50860 | 443 | 192.168.2.5 | 142.250.185.228 |
Jan 14, 2025 18:29:57.001173973 CET | 50860 | 443 | 192.168.2.5 | 142.250.185.228 |
Jan 14, 2025 18:29:57.001230955 CET | 443 | 50860 | 142.250.185.228 | 192.168.2.5 |
Jan 14, 2025 18:29:58.461801052 CET | 80 | 49714 | 62.60.154.114 | 192.168.2.5 |
Jan 14, 2025 18:29:58.461965084 CET | 49714 | 80 | 192.168.2.5 | 62.60.154.114 |
Jan 14, 2025 18:29:58.970778942 CET | 49714 | 80 | 192.168.2.5 | 62.60.154.114 |
Jan 14, 2025 18:29:58.976449966 CET | 80 | 49714 | 62.60.154.114 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 14, 2025 18:28:40.411369085 CET | 53 | 57752 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 18:28:40.436726093 CET | 53 | 55370 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 18:28:41.545088053 CET | 53 | 57227 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 18:28:44.422391891 CET | 51898 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 18:28:44.422548056 CET | 58717 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 18:28:44.429233074 CET | 53 | 51898 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 18:28:44.429299116 CET | 53 | 58717 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 18:28:46.167208910 CET | 50025 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 18:28:46.167459965 CET | 53920 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 18:28:46.182005882 CET | 53 | 50025 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 18:28:46.183737993 CET | 53 | 53920 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 18:28:58.617785931 CET | 53 | 55758 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 18:29:17.726125002 CET | 53 | 57599 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 18:29:20.225342035 CET | 53 | 59234 | 162.159.36.2 | 192.168.2.5 |
Jan 14, 2025 18:29:20.690558910 CET | 53 | 55796 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 18:29:39.775064945 CET | 53 | 65014 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 18:29:40.087044954 CET | 53 | 59594 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 14, 2025 18:28:44.422391891 CET | 192.168.2.5 | 1.1.1.1 | 0x5969 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 18:28:44.422548056 CET | 192.168.2.5 | 1.1.1.1 | 0xb803 | Standard query (0) | 65 | IN (0x0001) | false | |
Jan 14, 2025 18:28:46.167208910 CET | 192.168.2.5 | 1.1.1.1 | 0xa202 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 18:28:46.167459965 CET | 192.168.2.5 | 1.1.1.1 | 0x9baa | Standard query (0) | 65 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 14, 2025 18:28:44.429233074 CET | 1.1.1.1 | 192.168.2.5 | 0x5969 | No error (0) | 142.250.185.228 | A (IP address) | IN (0x0001) | false | ||
Jan 14, 2025 18:28:44.429299116 CET | 1.1.1.1 | 192.168.2.5 | 0xb803 | No error (0) | 65 | IN (0x0001) | false | |||
Jan 14, 2025 18:28:46.182005882 CET | 1.1.1.1 | 192.168.2.5 | 0xa202 | No error (0) | 62.60.154.114 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49714 | 62.60.154.114 | 80 | 2124 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 14, 2025 18:28:46.196091890 CET | 438 | OUT | |
Jan 14, 2025 18:28:48.228509903 CET | 384 | IN | |
Jan 14, 2025 18:28:48.303119898 CET | 390 | OUT | |
Jan 14, 2025 18:28:48.469331026 CET | 103 | IN | |
Jan 14, 2025 18:29:33.483562946 CET | 6 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49715 | 62.60.154.114 | 80 | 2124 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 14, 2025 18:29:31.202466011 CET | 6 | OUT |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 12:28:33 |
Start date: | 14/01/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 2 |
Start time: | 12:28:38 |
Start date: | 14/01/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 3 |
Start time: | 12:28:44 |
Start date: | 14/01/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |