Windows
Analysis Report
Debh Payment Detail.html
Overview
General Information
Detection
Score: | 60 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64_ra
- chrome.exe (PID: 2148 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t C:\Users \user\Desk top\Debh P ayment Det ail.html MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA) - chrome.exe (PID: 5020 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2216 --fi eld-trial- handle=193 2,i,145991 4404144659 7676,95777 0972884258 2059,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
- cleanup
Click to jump to signature section
Phishing |
---|
Source: | Joe Sandbox AI: |
Source: | HTTP Parser: |
Source: | Tab title: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | IP Address: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
System Summary |
---|
Source: | Initial sample: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Browser Extensions | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 Registry Run Keys / Startup Folder | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 3 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 4 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 3 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
www.google.com | 142.250.181.228 | true | false | high | |
jerperez.com | 167.114.158.15 | true | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown | |
true |
| unknown | |
false | unknown | ||
false |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.250.181.228 | www.google.com | United States | 15169 | GOOGLEUS | false | |
167.114.158.15 | jerperez.com | Canada | 16276 | OVHFR | false |
IP |
---|
192.168.2.20 |
192.168.2.17 |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1591249 |
Start date and time: | 2025-01-14 20:45:32 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 51s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 17 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Debh Payment Detail.html |
Detection: | MAL |
Classification: | mal60.phis.winHTML@15/10@4/5 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, WmiPrvSE.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 172.217.18.3, 142.250.186.174, 64.233.184.84, 142.250.181.238, 142.250.186.46, 142.250.186.78, 142.250.184.206, 216.58.212.174, 142.250.184.238, 142.250.185.110, 142.250.185.131, 172.217.23.110, 142.250.186.110, 4.175.87.197, 2.23.242.162, 40.126.32.140, 13.107.5.88, 2.23.227.215
- Excluded domains from analysis (whitelisted): www.bing.com, clients1.google.com, fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, clientservices.googleapis.com, fe3cr.delivery.mp.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, redirector.gvt1.com, login.live.com, evoke-windowsservices-tas.msedge.net, update.googleapis.com, clients.l.google.com
- Not all processes where analyzed, report is missing behavior information
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
239.255.255.250 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | HTMLPhisher | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | HTMLPhisher | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | HTMLPhisher | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
OVHFR | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | ScreenConnect Tool | Browse |
| ||
Get hash | malicious | ScreenConnect Tool | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.987886738584626 |
Encrypted: | false |
SSDEEP: | 48:8y5d5DQTSDo7AFipSHwidAKZdA1JehwiZUklqehhy+3:8yNDQ2D3FiPiy |
MD5: | A6BA01C4E7E146DBBC430F00AAF5B70A |
SHA1: | 3525EB796916598CDAF2C1C175F913D99944A753 |
SHA-256: | 62113DC2FB9C18154A9982DB1BD5060341631F7E09BAEA953F2954BC095421AE |
SHA-512: | 76D8F3BFD5C69EE165071871620670B4C63364DE0F93A87220984922C9EA2571791F022DD237F1CD3F059641B76AE8EF9607E142DFF6FB70E6029BF4EA13D091 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 4.006030908274515 |
Encrypted: | false |
SSDEEP: | 48:8h5d5DQTSDo7AFipSHwidAKZdA10eh/iZUkAQkqehSy+2:8hNDQ2D3Fil9Q/y |
MD5: | 1CFCB43A5AC250C125F7B05AF4FD4F12 |
SHA1: | 286EFCABC0850A9BA363CC4B03CF2962FF4113C1 |
SHA-256: | 017657C65FDB276D4705BDD8D4564A257049E863AB3B5F6A9320C7D833EF7DE0 |
SHA-512: | 98F3198696C05F2BCA6C854B6712193D3CEEE274DDE5E3C4C0D7150EEF9A6E5728AFAE442168C2AC91A80F8E988EF68948FBA1972C10CE0EFF0EF5B25CC5C65A |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2693 |
Entropy (8bit): | 4.015830303248168 |
Encrypted: | false |
SSDEEP: | 48:8e5d5DQTSDo7AFjHwidAKZdA14tIeh7sFiZUkmgqeh7sgy+BX:8eNDQ2D3Fknmy |
MD5: | 32F208AEB4F882673B7A666669A6FB43 |
SHA1: | 6B0D054295CC67DE4E029416EE71F995B395017E |
SHA-256: | 3186FB07DA2D6100675CB1C7E336F0371C796835D8FD1D3EDADE738A39640610 |
SHA-512: | 569F19B54880AACFD2DA56DFA7EEE7EE01387697B6FD27BD4C0BAC080FC102982A3A47CE39939A6BF4B769CDC58EFC6E676FAB3425784C0D1EBEE8EAFC2B2995 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 4.000460331921061 |
Encrypted: | false |
SSDEEP: | 48:8x5d5DQTSDo7AFipSHwidAKZdA1behDiZUkwqehuy+R:8xNDQ2D3FiWoy |
MD5: | FC473B46CB9BABD0230A82666CB7FC8B |
SHA1: | 210644194E4BC3FB45880504F72C8EE012292645 |
SHA-256: | 522CE32C7F2E877540A7F49F22572346D6C0E2E468BC06860D98A8A1E1F0F12E |
SHA-512: | 9599B820101FA40529265C4FF56AA9964AB49F9B19B5FA520014D043DCDC6D346265D36C8C2CDF4506B2CD61B0C103EF2BC3E4EEE8EA20CBE61BFBA6B2CC6402 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.9919332405303956 |
Encrypted: | false |
SSDEEP: | 48:8a5d5DQTSDo7AFipSHwidAKZdA1VehBiZUk1W1qehEy+C:8aNDQ2D3FiW9ky |
MD5: | 63A6AD898188A1B709AD75F4386247D0 |
SHA1: | D5D91AC3F90A343EB5BE3CE78A80873DDB1E2F67 |
SHA-256: | FB0DE5E6331E6135D0A4A3DC76EF2065E05D3832F358172FBF0275EA6180FA5D |
SHA-512: | FC2DCB26BD60CEE684B19458A09908B6DBD48BE630B581C35E126ACBAC279EF597ED05465C134A030FD82ACBFA91F06D5C61678BA03F47D03528EEF6481EED1D |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2683 |
Entropy (8bit): | 4.005478189672329 |
Encrypted: | false |
SSDEEP: | 48:8S5d5DQTSDo7AFipSHwidAKZdA1duT6ehOuTbbiZUk5OjqehOuTbmy+yT+:8SNDQ2D3FiETTTbxWOvTbmy7T |
MD5: | 6944E911E3217666EA86FDD7B678793F |
SHA1: | 2B2DD31F6849A9D7C0F86FF728C37EA826F60200 |
SHA-256: | 75009887A4EC5A03DB8D3FB27230D25777273AF1BCB945D8484BB36458ECB64F |
SHA-512: | A39E81078E7F9043C758BED26CD7F004DF7710FBEE2B8168E7382570D95B20160D7F02831AA19C4F998A0D6C7B773E7C56EA4B072A29F03BDB3B536F30172296 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 16 |
Entropy (8bit): | 3.625 |
Encrypted: | false |
SSDEEP: | 3:8gne9v:8we9v |
MD5: | 4845F01EAA8068384625E302E9A4EB05 |
SHA1: | FB6FF8293FA45E17BA97F84954E7D1D5B0D38F87 |
SHA-256: | 8A482F2271A42C5F54C96E816A84340A6F2357A5B81F927D07D00788F5140A41 |
SHA-512: | BB58F2438524B518B19F2B74C5D598460735958F77C310BA3710520D1D88CE7975449977C9965DBCA87CD6A824C8AB82E56BEA6D571D79594079F0A0EA404D77 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
URL: | https://jerperez.com//wp-admin/includes/404.php?7-797967704b53693230746650794377715363334e724d704a7a5533567979334f316973713166654d4b50665031416341-anRhcmNoaW5za2lAZGViaC5vcmc= |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 315 |
Entropy (8bit): | 5.0572271090563765 |
Encrypted: | false |
SSDEEP: | 6:pn0+Dy9xwGObRmEr6VnetdzRx3G0CezoFEHcLgabzjsKtgsg93wzRbKqD:J0+oxBeRmR9etdzRxGezZfCzjsKtgizR |
MD5: | A34AC19F4AFAE63ADC5D2F7BC970C07F |
SHA1: | A82190FC530C265AA40A045C21770D967F4767B8 |
SHA-256: | D5A89E26BEAE0BC03AD18A0B0D1D3D75F87C32047879D25DA11970CB5C4662A3 |
SHA-512: | 42E53D96E5961E95B7A984D9C9778A1D3BD8EE0C87B8B3B515FA31F67C2D073C8565AFC2F4B962C43668C4EFA1E478DA9BB0ECFFA79479C7E880731BC4C55765 |
Malicious: | false |
URL: | https://jerperez.com/favicon.ico |
Preview: |
File type: | |
Entropy (8bit): | 4.83263085922783 |
TrID: |
|
File name: | Debh Payment Detail.html |
File size: | 886 bytes |
MD5: | d26df8b7517c0cd3101e0c13a19edfca |
SHA1: | f856877a4ec7c62dbff9b0d27525d33dcee68b13 |
SHA256: | be431659f19f536de016ef4661269a9b1227b51a605877b90096f66bdb0a1842 |
SHA512: | f6aecbaf4e02a384cd2ca4ca8302313c8d8414f78b44019ffefb3974a8d584580638033950d1e3b87b611d94490e48b48a64ce405151f1ac7ff9c25180701182 |
SSDEEP: | 24:hPGzCq2XFeACesejVeGfbH3sNp1EcbMyX:tECq2VBsOVeKH3s3mcgQ |
TLSH: | 8C1110A6BE10027065F02360879DF05DE52B23BF24DDDD0838CD56031F7251A4E572D4 |
File Content Preview: | <!DOCTYPE html>..<html>.. <head>.. <title>Signin.,!</title>.. <meta charset="UTF-8" />.. <script>.. // Get the text after the hash (#) symbol in the current URL.. var hashText = window |
Icon Hash: | 173149cccc490307 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 14, 2025 20:46:06.772819042 CET | 49678 | 443 | 192.168.2.17 | 204.79.197.200 |
Jan 14, 2025 20:46:06.772819042 CET | 49676 | 443 | 192.168.2.17 | 204.79.197.200 |
Jan 14, 2025 20:46:06.772928953 CET | 49677 | 443 | 192.168.2.17 | 204.79.197.200 |
Jan 14, 2025 20:46:09.447227955 CET | 49716 | 443 | 192.168.2.17 | 167.114.158.15 |
Jan 14, 2025 20:46:09.447352886 CET | 443 | 49716 | 167.114.158.15 | 192.168.2.17 |
Jan 14, 2025 20:46:09.447467089 CET | 49716 | 443 | 192.168.2.17 | 167.114.158.15 |
Jan 14, 2025 20:46:09.447623014 CET | 49717 | 443 | 192.168.2.17 | 167.114.158.15 |
Jan 14, 2025 20:46:09.447680950 CET | 443 | 49717 | 167.114.158.15 | 192.168.2.17 |
Jan 14, 2025 20:46:09.447736979 CET | 49717 | 443 | 192.168.2.17 | 167.114.158.15 |
Jan 14, 2025 20:46:09.447813988 CET | 49716 | 443 | 192.168.2.17 | 167.114.158.15 |
Jan 14, 2025 20:46:09.447846889 CET | 443 | 49716 | 167.114.158.15 | 192.168.2.17 |
Jan 14, 2025 20:46:09.447930098 CET | 49717 | 443 | 192.168.2.17 | 167.114.158.15 |
Jan 14, 2025 20:46:09.447942019 CET | 443 | 49717 | 167.114.158.15 | 192.168.2.17 |
Jan 14, 2025 20:46:09.953732967 CET | 443 | 49716 | 167.114.158.15 | 192.168.2.17 |
Jan 14, 2025 20:46:09.954098940 CET | 49716 | 443 | 192.168.2.17 | 167.114.158.15 |
Jan 14, 2025 20:46:09.954169989 CET | 443 | 49716 | 167.114.158.15 | 192.168.2.17 |
Jan 14, 2025 20:46:09.954854012 CET | 443 | 49717 | 167.114.158.15 | 192.168.2.17 |
Jan 14, 2025 20:46:09.955013990 CET | 49717 | 443 | 192.168.2.17 | 167.114.158.15 |
Jan 14, 2025 20:46:09.955040932 CET | 443 | 49717 | 167.114.158.15 | 192.168.2.17 |
Jan 14, 2025 20:46:09.955149889 CET | 443 | 49716 | 167.114.158.15 | 192.168.2.17 |
Jan 14, 2025 20:46:09.955224991 CET | 49716 | 443 | 192.168.2.17 | 167.114.158.15 |
Jan 14, 2025 20:46:09.956087112 CET | 443 | 49717 | 167.114.158.15 | 192.168.2.17 |
Jan 14, 2025 20:46:09.956156015 CET | 49716 | 443 | 192.168.2.17 | 167.114.158.15 |
Jan 14, 2025 20:46:09.956228971 CET | 443 | 49716 | 167.114.158.15 | 192.168.2.17 |
Jan 14, 2025 20:46:09.956234932 CET | 49717 | 443 | 192.168.2.17 | 167.114.158.15 |
Jan 14, 2025 20:46:09.956543922 CET | 49716 | 443 | 192.168.2.17 | 167.114.158.15 |
Jan 14, 2025 20:46:09.956562042 CET | 443 | 49716 | 167.114.158.15 | 192.168.2.17 |
Jan 14, 2025 20:46:09.957245111 CET | 49717 | 443 | 192.168.2.17 | 167.114.158.15 |
Jan 14, 2025 20:46:09.957326889 CET | 443 | 49717 | 167.114.158.15 | 192.168.2.17 |
Jan 14, 2025 20:46:10.009650946 CET | 49716 | 443 | 192.168.2.17 | 167.114.158.15 |
Jan 14, 2025 20:46:10.009665012 CET | 49717 | 443 | 192.168.2.17 | 167.114.158.15 |
Jan 14, 2025 20:46:10.009685040 CET | 443 | 49717 | 167.114.158.15 | 192.168.2.17 |
Jan 14, 2025 20:46:10.056653023 CET | 49717 | 443 | 192.168.2.17 | 167.114.158.15 |
Jan 14, 2025 20:46:10.065449953 CET | 443 | 49716 | 167.114.158.15 | 192.168.2.17 |
Jan 14, 2025 20:46:10.065537930 CET | 443 | 49716 | 167.114.158.15 | 192.168.2.17 |
Jan 14, 2025 20:46:10.065660000 CET | 49716 | 443 | 192.168.2.17 | 167.114.158.15 |
Jan 14, 2025 20:46:10.066421032 CET | 49716 | 443 | 192.168.2.17 | 167.114.158.15 |
Jan 14, 2025 20:46:10.066464901 CET | 443 | 49716 | 167.114.158.15 | 192.168.2.17 |
Jan 14, 2025 20:46:10.116503954 CET | 49717 | 443 | 192.168.2.17 | 167.114.158.15 |
Jan 14, 2025 20:46:10.159338951 CET | 443 | 49717 | 167.114.158.15 | 192.168.2.17 |
Jan 14, 2025 20:46:10.220963001 CET | 443 | 49717 | 167.114.158.15 | 192.168.2.17 |
Jan 14, 2025 20:46:10.221071959 CET | 443 | 49717 | 167.114.158.15 | 192.168.2.17 |
Jan 14, 2025 20:46:10.221129894 CET | 49717 | 443 | 192.168.2.17 | 167.114.158.15 |
Jan 14, 2025 20:46:10.221638918 CET | 49717 | 443 | 192.168.2.17 | 167.114.158.15 |
Jan 14, 2025 20:46:10.221657038 CET | 443 | 49717 | 167.114.158.15 | 192.168.2.17 |
Jan 14, 2025 20:46:12.914504051 CET | 49718 | 443 | 192.168.2.17 | 142.250.181.228 |
Jan 14, 2025 20:46:12.914540052 CET | 443 | 49718 | 142.250.181.228 | 192.168.2.17 |
Jan 14, 2025 20:46:12.914674997 CET | 49718 | 443 | 192.168.2.17 | 142.250.181.228 |
Jan 14, 2025 20:46:12.914954901 CET | 49718 | 443 | 192.168.2.17 | 142.250.181.228 |
Jan 14, 2025 20:46:12.914963961 CET | 443 | 49718 | 142.250.181.228 | 192.168.2.17 |
Jan 14, 2025 20:46:13.548190117 CET | 443 | 49718 | 142.250.181.228 | 192.168.2.17 |
Jan 14, 2025 20:46:13.548505068 CET | 49718 | 443 | 192.168.2.17 | 142.250.181.228 |
Jan 14, 2025 20:46:13.548528910 CET | 443 | 49718 | 142.250.181.228 | 192.168.2.17 |
Jan 14, 2025 20:46:13.549523115 CET | 443 | 49718 | 142.250.181.228 | 192.168.2.17 |
Jan 14, 2025 20:46:13.549603939 CET | 49718 | 443 | 192.168.2.17 | 142.250.181.228 |
Jan 14, 2025 20:46:13.550913095 CET | 49718 | 443 | 192.168.2.17 | 142.250.181.228 |
Jan 14, 2025 20:46:13.550966024 CET | 443 | 49718 | 142.250.181.228 | 192.168.2.17 |
Jan 14, 2025 20:46:13.603688002 CET | 49718 | 443 | 192.168.2.17 | 142.250.181.228 |
Jan 14, 2025 20:46:13.603713989 CET | 443 | 49718 | 142.250.181.228 | 192.168.2.17 |
Jan 14, 2025 20:46:13.651684046 CET | 49718 | 443 | 192.168.2.17 | 142.250.181.228 |
Jan 14, 2025 20:46:21.087363958 CET | 49675 | 443 | 192.168.2.17 | 204.79.197.203 |
Jan 14, 2025 20:46:21.390755892 CET | 49675 | 443 | 192.168.2.17 | 204.79.197.203 |
Jan 14, 2025 20:46:21.998764992 CET | 49675 | 443 | 192.168.2.17 | 204.79.197.203 |
Jan 14, 2025 20:46:23.213927031 CET | 49675 | 443 | 192.168.2.17 | 204.79.197.203 |
Jan 14, 2025 20:46:23.451639891 CET | 443 | 49718 | 142.250.181.228 | 192.168.2.17 |
Jan 14, 2025 20:46:23.451715946 CET | 443 | 49718 | 142.250.181.228 | 192.168.2.17 |
Jan 14, 2025 20:46:23.451802015 CET | 49718 | 443 | 192.168.2.17 | 142.250.181.228 |
Jan 14, 2025 20:46:24.205713034 CET | 49718 | 443 | 192.168.2.17 | 142.250.181.228 |
Jan 14, 2025 20:46:24.205743074 CET | 443 | 49718 | 142.250.181.228 | 192.168.2.17 |
Jan 14, 2025 20:46:25.256237984 CET | 49680 | 443 | 192.168.2.17 | 20.189.173.13 |
Jan 14, 2025 20:46:25.558006048 CET | 49680 | 443 | 192.168.2.17 | 20.189.173.13 |
Jan 14, 2025 20:46:25.621085882 CET | 49675 | 443 | 192.168.2.17 | 204.79.197.203 |
Jan 14, 2025 20:46:26.163856030 CET | 49680 | 443 | 192.168.2.17 | 20.189.173.13 |
Jan 14, 2025 20:46:27.377791882 CET | 49680 | 443 | 192.168.2.17 | 20.189.173.13 |
Jan 14, 2025 20:46:29.790893078 CET | 49680 | 443 | 192.168.2.17 | 20.189.173.13 |
Jan 14, 2025 20:46:30.428917885 CET | 49675 | 443 | 192.168.2.17 | 204.79.197.203 |
Jan 14, 2025 20:46:33.704092979 CET | 49682 | 80 | 192.168.2.17 | 192.229.211.108 |
Jan 14, 2025 20:46:34.006877899 CET | 49682 | 80 | 192.168.2.17 | 192.229.211.108 |
Jan 14, 2025 20:46:34.597862959 CET | 49680 | 443 | 192.168.2.17 | 20.189.173.13 |
Jan 14, 2025 20:46:34.613868952 CET | 49682 | 80 | 192.168.2.17 | 192.229.211.108 |
Jan 14, 2025 20:46:35.827861071 CET | 49682 | 80 | 192.168.2.17 | 192.229.211.108 |
Jan 14, 2025 20:46:38.242870092 CET | 49682 | 80 | 192.168.2.17 | 192.229.211.108 |
Jan 14, 2025 20:46:40.033869028 CET | 49675 | 443 | 192.168.2.17 | 204.79.197.203 |
Jan 14, 2025 20:46:43.054930925 CET | 49682 | 80 | 192.168.2.17 | 192.229.211.108 |
Jan 14, 2025 20:46:44.205019951 CET | 49680 | 443 | 192.168.2.17 | 20.189.173.13 |
Jan 14, 2025 20:46:46.452150106 CET | 49697 | 80 | 192.168.2.17 | 199.232.210.172 |
Jan 14, 2025 20:46:46.452241898 CET | 49699 | 80 | 192.168.2.17 | 199.232.210.172 |
Jan 14, 2025 20:46:46.457351923 CET | 80 | 49697 | 199.232.210.172 | 192.168.2.17 |
Jan 14, 2025 20:46:46.457401037 CET | 80 | 49699 | 199.232.210.172 | 192.168.2.17 |
Jan 14, 2025 20:46:46.457422018 CET | 49697 | 80 | 192.168.2.17 | 199.232.210.172 |
Jan 14, 2025 20:46:46.457458973 CET | 49699 | 80 | 192.168.2.17 | 199.232.210.172 |
Jan 14, 2025 20:46:52.663966894 CET | 49682 | 80 | 192.168.2.17 | 192.229.211.108 |
Jan 14, 2025 20:47:12.848558903 CET | 49731 | 443 | 192.168.2.17 | 142.250.181.228 |
Jan 14, 2025 20:47:12.848668098 CET | 443 | 49731 | 142.250.181.228 | 192.168.2.17 |
Jan 14, 2025 20:47:12.848973036 CET | 49731 | 443 | 192.168.2.17 | 142.250.181.228 |
Jan 14, 2025 20:47:12.849090099 CET | 49731 | 443 | 192.168.2.17 | 142.250.181.228 |
Jan 14, 2025 20:47:12.849123955 CET | 443 | 49731 | 142.250.181.228 | 192.168.2.17 |
Jan 14, 2025 20:47:13.492508888 CET | 443 | 49731 | 142.250.181.228 | 192.168.2.17 |
Jan 14, 2025 20:47:13.493067026 CET | 49731 | 443 | 192.168.2.17 | 142.250.181.228 |
Jan 14, 2025 20:47:13.493143082 CET | 443 | 49731 | 142.250.181.228 | 192.168.2.17 |
Jan 14, 2025 20:47:13.493465900 CET | 443 | 49731 | 142.250.181.228 | 192.168.2.17 |
Jan 14, 2025 20:47:13.493781090 CET | 49731 | 443 | 192.168.2.17 | 142.250.181.228 |
Jan 14, 2025 20:47:13.493849039 CET | 443 | 49731 | 142.250.181.228 | 192.168.2.17 |
Jan 14, 2025 20:47:13.535574913 CET | 49731 | 443 | 192.168.2.17 | 142.250.181.228 |
Jan 14, 2025 20:47:23.397994995 CET | 443 | 49731 | 142.250.181.228 | 192.168.2.17 |
Jan 14, 2025 20:47:23.398072004 CET | 443 | 49731 | 142.250.181.228 | 192.168.2.17 |
Jan 14, 2025 20:47:23.398269892 CET | 49731 | 443 | 192.168.2.17 | 142.250.181.228 |
Jan 14, 2025 20:47:24.210165024 CET | 49731 | 443 | 192.168.2.17 | 142.250.181.228 |
Jan 14, 2025 20:47:24.210258007 CET | 443 | 49731 | 142.250.181.228 | 192.168.2.17 |
Jan 14, 2025 20:47:31.833538055 CET | 49698 | 443 | 192.168.2.17 | 20.190.160.14 |
Jan 14, 2025 20:47:31.833583117 CET | 49700 | 80 | 192.168.2.17 | 2.17.190.73 |
Jan 14, 2025 20:47:31.987440109 CET | 443 | 49698 | 20.190.160.14 | 192.168.2.17 |
Jan 14, 2025 20:47:31.987478018 CET | 80 | 49700 | 2.17.190.73 | 192.168.2.17 |
Jan 14, 2025 20:47:31.987529039 CET | 49698 | 443 | 192.168.2.17 | 20.190.160.14 |
Jan 14, 2025 20:47:31.987561941 CET | 49700 | 80 | 192.168.2.17 | 2.17.190.73 |
Jan 14, 2025 20:47:54.580883026 CET | 443 | 49701 | 204.79.197.200 | 192.168.2.17 |
Jan 14, 2025 20:47:54.581115961 CET | 49701 | 443 | 192.168.2.17 | 204.79.197.200 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 14, 2025 20:46:07.948878050 CET | 53 | 65298 | 1.1.1.1 | 192.168.2.17 |
Jan 14, 2025 20:46:08.036413908 CET | 53 | 63886 | 1.1.1.1 | 192.168.2.17 |
Jan 14, 2025 20:46:09.022738934 CET | 53 | 52016 | 1.1.1.1 | 192.168.2.17 |
Jan 14, 2025 20:46:09.252717972 CET | 62854 | 53 | 192.168.2.17 | 1.1.1.1 |
Jan 14, 2025 20:46:09.252883911 CET | 61438 | 53 | 192.168.2.17 | 1.1.1.1 |
Jan 14, 2025 20:46:09.436284065 CET | 53 | 62854 | 1.1.1.1 | 192.168.2.17 |
Jan 14, 2025 20:46:09.446691036 CET | 53 | 61438 | 1.1.1.1 | 192.168.2.17 |
Jan 14, 2025 20:46:12.791527033 CET | 54256 | 53 | 192.168.2.17 | 1.1.1.1 |
Jan 14, 2025 20:46:12.791909933 CET | 53543 | 53 | 192.168.2.17 | 1.1.1.1 |
Jan 14, 2025 20:46:12.913053036 CET | 53 | 54256 | 1.1.1.1 | 192.168.2.17 |
Jan 14, 2025 20:46:12.913510084 CET | 53 | 53543 | 1.1.1.1 | 192.168.2.17 |
Jan 14, 2025 20:46:26.109667063 CET | 53 | 59660 | 1.1.1.1 | 192.168.2.17 |
Jan 14, 2025 20:46:45.087470055 CET | 53 | 49784 | 1.1.1.1 | 192.168.2.17 |
Jan 14, 2025 20:47:07.510036945 CET | 53 | 55282 | 1.1.1.1 | 192.168.2.17 |
Jan 14, 2025 20:47:07.925565004 CET | 53 | 63726 | 1.1.1.1 | 192.168.2.17 |
Jan 14, 2025 20:47:22.475131989 CET | 138 | 138 | 192.168.2.17 | 192.168.2.255 |
Jan 14, 2025 20:47:37.863840103 CET | 53 | 54922 | 1.1.1.1 | 192.168.2.17 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 14, 2025 20:46:09.252717972 CET | 192.168.2.17 | 1.1.1.1 | 0xeb49 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 20:46:09.252883911 CET | 192.168.2.17 | 1.1.1.1 | 0x101d | Standard query (0) | 65 | IN (0x0001) | false | |
Jan 14, 2025 20:46:12.791527033 CET | 192.168.2.17 | 1.1.1.1 | 0xd49d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 20:46:12.791909933 CET | 192.168.2.17 | 1.1.1.1 | 0xba03 | Standard query (0) | 65 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 14, 2025 20:46:09.436284065 CET | 1.1.1.1 | 192.168.2.17 | 0xeb49 | No error (0) | 167.114.158.15 | A (IP address) | IN (0x0001) | false | ||
Jan 14, 2025 20:46:12.913053036 CET | 1.1.1.1 | 192.168.2.17 | 0xd49d | No error (0) | 142.250.181.228 | A (IP address) | IN (0x0001) | false | ||
Jan 14, 2025 20:46:12.913510084 CET | 1.1.1.1 | 192.168.2.17 | 0xba03 | No error (0) | 65 | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.17 | 49716 | 167.114.158.15 | 443 | 5020 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 19:46:09 UTC | 795 | OUT | |
2025-01-14 19:46:10 UTC | 166 | IN | |
2025-01-14 19:46:10 UTC | 27 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.17 | 49717 | 167.114.158.15 | 443 | 5020 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 19:46:10 UTC | 734 | OUT | |
2025-01-14 19:46:10 UTC | 164 | IN | |
2025-01-14 19:46:10 UTC | 315 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 14:46:06 |
Start date: | 14/01/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7d6f10000 |
File size: | 3'242'272 bytes |
MD5 hash: | 83395EAB5B03DEA9720F8D7AC0D15CAA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 2 |
Start time: | 14:46:06 |
Start date: | 14/01/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7d6f10000 |
File size: | 3'242'272 bytes |
MD5 hash: | 83395EAB5B03DEA9720F8D7AC0D15CAA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |