Windows
Analysis Report
https://pub-2d00d32ff6d84ef6999828eaf509b772.r2.dev/
Overview
General Information
Detection
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- chrome.exe (PID: 3012 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 2428 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2088 --fi eld-trial- handle=201 2,i,405648 7226617403 426,435825 7475477362 112,262144 --disable -features= Optimizati onGuideMod elDownload ing,Optimi zationHint s,Optimiza tionHintsF etching,Op timization TargetPred iction /pr efetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- chrome.exe (PID: 4984 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://pub-2 d00d32ff6d 84ef699982 8eaf509b77 2.r2.dev/" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: |
Source: | Window detected: |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 3 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 4 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 3 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | phishing |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
pub-2d00d32ff6d84ef6999828eaf509b772.r2.dev | 172.66.0.235 | true | false | unknown | |
www.cloudflare.com | 104.16.123.96 | true | false | high | |
www.google.com | 142.250.186.100 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
true | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.250.186.100 | www.google.com | United States | 15169 | GOOGLEUS | false | |
172.66.0.235 | pub-2d00d32ff6d84ef6999828eaf509b772.r2.dev | United States | 13335 | CLOUDFLARENETUS | false | |
104.16.123.96 | www.cloudflare.com | United States | 13335 | CLOUDFLARENETUS | false |
IP |
---|
192.168.2.5 |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1591886 |
Start date and time: | 2025-01-15 15:21:48 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 1s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | https://pub-2d00d32ff6d84ef6999828eaf509b772.r2.dev/ |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal48.win@16/11@8/5 |
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 142.250.184.227, 172.217.16.206, 108.177.15.84, 172.217.18.14, 216.58.206.46, 172.217.23.110, 199.232.214.172, 2.23.77.188, 142.250.185.142, 216.58.206.78, 142.250.186.46, 142.250.185.238, 142.250.184.206, 142.250.186.78, 142.250.186.35, 184.28.90.27, 172.202.163.200, 13.107.246.45
- Excluded domains from analysis (whitelisted): fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, clientservices.googleapis.com, fe3cr.delivery.mp.microsoft.com, clients2.google.com, ocsp.digicert.com, edgedl.me.gvt1.com, redirector.gvt1.com, 6.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa, update.googleapis.com, clients.l.google.com
- Not all processes where analyzed, report is missing behavior information
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: https://pub-2d00d32ff6d84ef6999828eaf509b772.r2.dev/
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9754056638953874 |
Encrypted: | false |
SSDEEP: | 48:8DMdhTJpEHeOidAKZdA19ehwiZUklqeh9y+3:82PbEey |
MD5: | 52A69094AA62EED34878EAB697D80DE1 |
SHA1: | D42EC7F4C9CBC2DF39004C01CF7F260F91E88C86 |
SHA-256: | 11CC2B9FAE84562C6DA04C801A197DFCAFF55E2AA1272FFF87ADDE5FBF4ED214 |
SHA-512: | 2EF45103F17280301A2B6FA20472C1FF08506134F3469A49B7CA233BFA0A2DB3B3626FF53E960545971450783E525D80E0E65217F67E5ED8CF2231F970B9DA94 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.9907232936331005 |
Encrypted: | false |
SSDEEP: | 48:8xMdhTJpEHeOidAKZdA1weh/iZUkAQkqehOy+2:8wPb29Qry |
MD5: | E6031C19B5539054D27AE7F5605D70C9 |
SHA1: | 73EAA46CCBDBA190DA229DCEE96E21F3EB4C5772 |
SHA-256: | E4C7BB8AE74ED17CF742FB68DACA387E424C2ADF2E977CA449A9899CD90B2E1E |
SHA-512: | 25F1C952DCAB5DDA564762BE3DD57ED320483BC9E68A2ABA5B78AFBACE64BB68B4B9BF6F49C3EBC25A51958045A1F29C55E8572A8A7B53B1E2DE920F0685E642 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2693 |
Entropy (8bit): | 4.00325945080487 |
Encrypted: | false |
SSDEEP: | 48:8xtMdhTJpsHeOidAKZdA14tseh7sFiZUkmgqeh7ssy+BX:8xEPz+nKy |
MD5: | 7FD28E65004332AAB0DE57A2857F1240 |
SHA1: | 9E40F43329F55283CEADD7916BB47B49CC9AA7F8 |
SHA-256: | AA95D23E638800B6721D3BD2FB973DD116A2D62834BF2A09C198A77F487D6E63 |
SHA-512: | FC7F9E5462C00107FF0EE0976C847E66CF6E3D7118385088268038271CF21BF31F1B61A0026017C4FAF7371512A31D93DAACFEC2F0588861980FDE4A2C826E40 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.990546745419176 |
Encrypted: | false |
SSDEEP: | 48:8aMdhTJpEHeOidAKZdA1vehDiZUkwqehiy+R:8bPbdky |
MD5: | A71CE57B389B496944EFB97F61365CFC |
SHA1: | 411B45629FBEAC655710BA1D69A3180A97C608B4 |
SHA-256: | D8120ABEE8E434B998409957961745C0E1EF6ADC1C38F20E6307DF115AF99F85 |
SHA-512: | FF946F4E43EC7B41562FFE4FE1215977D56C329F4FA56054AA6D604D3F88F1E11CDE654EC82F710A039FA883765D073605DAEED5B38A0B2C9DBB3A75CB6A72E4 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.979398231457859 |
Encrypted: | false |
SSDEEP: | 48:8VMdhTJpEHeOidAKZdA1hehBiZUk1W1qehYy+C:8MPb994y |
MD5: | C96FD234FD630BB9E4495911AC115CB3 |
SHA1: | 69D8BEE618A54BA7A82A2C47AF63DA89ACDC6F54 |
SHA-256: | 0B076A0FBB5D16242EC7CDFE6360F7B362FDFB35A3EF766073CCD27E5C304A31 |
SHA-512: | 65872CFA37DE29C18518A5F720733A4DDD0A00CF5E2264DDEE8A7E03B34CE815E1EE9BE116439141CB3897ED3D3941DDECB0E45CBFD84EBD99F4FB4C39FE3ACF |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2683 |
Entropy (8bit): | 3.9912391873810154 |
Encrypted: | false |
SSDEEP: | 48:8WMdhTJpEHeOidAKZdA1duT+ehOuTbbiZUk5OjqehOuTbKy+yT+:8fPbBT/TbxWOvTbKy7T |
MD5: | F4477DB0A3397DFB1C74BB632DCC598E |
SHA1: | 5D3B35E28046D774E6EBDD9F4DB5123CDFDD88DD |
SHA-256: | 250ACBB78B1E0D6CAA40D1093C2ABBC955248587B182A825A732757309CC0274 |
SHA-512: | E23D2773C3CDFCB879CF1127ADCEFD82C74FB5D6B0D864B178154644A1099B5A907D2DA5BF9CEAF55B2AF9C3A1DA6A8BF817F6A58E580B6107629FFE3E40CC67 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2485 |
Entropy (8bit): | 7.876592005079966 |
Encrypted: | false |
SSDEEP: | 48:v/xwXiYbH0Y39tgMknRXn+wq4C/l8ppeOsiPZzY4Jz4hMgzSJun4NNNNNNN5:HcVIY39tgMkRX+wq4mifNvPpYSqnK |
MD5: | 112AD5F84433E5F46D607F73FB64BD60 |
SHA1: | A8BF11F3F6099CA49D1CBF73C050EB7E6FBC68B4 |
SHA-256: | 0F84307AD691800E391FCCB42B4BA290A87FEBF001ABEDFBE03B34767D45E441 |
SHA-512: | A0FDDEC2CECC71AA2FE16EB01AA541051A5FD1B9F0FEAB18413007186826E81C2E582EC7F48F7242FA4142E7BB0105B29D1F11F1062F96D255F743050C97B65C |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 2485 |
Entropy (8bit): | 7.876592005079966 |
Encrypted: | false |
SSDEEP: | 48:v/xwXiYbH0Y39tgMknRXn+wq4C/l8ppeOsiPZzY4Jz4hMgzSJun4NNNNNNN5:HcVIY39tgMkRX+wq4mifNvPpYSqnK |
MD5: | 112AD5F84433E5F46D607F73FB64BD60 |
SHA1: | A8BF11F3F6099CA49D1CBF73C050EB7E6FBC68B4 |
SHA-256: | 0F84307AD691800E391FCCB42B4BA290A87FEBF001ABEDFBE03B34767D45E441 |
SHA-512: | A0FDDEC2CECC71AA2FE16EB01AA541051A5FD1B9F0FEAB18413007186826E81C2E582EC7F48F7242FA4142E7BB0105B29D1F11F1062F96D255F743050C97B65C |
Malicious: | false |
Reputation: | low |
URL: | https://www.cloudflare.com/favicon.ico |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 27150 |
Entropy (8bit): | 4.357340680151037 |
Encrypted: | false |
SSDEEP: | 384:6bamwIluB0sJQqCeSQup5szCUXAG0VVi82OgoKACZQQofNJXY3gW3:603Mp5If8WOmgW3 |
MD5: | 46DD133EE00DC1BAE5E4EEBA7B88432F |
SHA1: | 8AF86A4AC91CE48C062216FB94A6E1D57618A19B |
SHA-256: | 9EB52EE46C7AB5EA4CA0982415DA99FDED1B7D7354F75E50847BDAE6CB44EB66 |
SHA-512: | CB49F9E3812E2C262AF374E79BD8905CB508A45BF2C2D6AF62EED85AF43770872486A55E9425882FEDA9FB3A57A317A3C18BE1E286ADAF0C76BE7F1B0DFA8474 |
Malicious: | false |
Reputation: | low |
URL: | https://pub-2d00d32ff6d84ef6999828eaf509b772.r2.dev/ |
Preview: |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 15, 2025 15:22:35.013514996 CET | 49674 | 443 | 192.168.2.5 | 23.1.237.91 |
Jan 15, 2025 15:22:35.013540983 CET | 49675 | 443 | 192.168.2.5 | 23.1.237.91 |
Jan 15, 2025 15:22:35.122837067 CET | 49673 | 443 | 192.168.2.5 | 23.1.237.91 |
Jan 15, 2025 15:22:44.622833014 CET | 49675 | 443 | 192.168.2.5 | 23.1.237.91 |
Jan 15, 2025 15:22:44.622917891 CET | 49674 | 443 | 192.168.2.5 | 23.1.237.91 |
Jan 15, 2025 15:22:44.732846975 CET | 49673 | 443 | 192.168.2.5 | 23.1.237.91 |
Jan 15, 2025 15:22:46.366689920 CET | 443 | 49703 | 23.1.237.91 | 192.168.2.5 |
Jan 15, 2025 15:22:46.366790056 CET | 49703 | 443 | 192.168.2.5 | 23.1.237.91 |
Jan 15, 2025 15:22:49.442636967 CET | 49712 | 443 | 192.168.2.5 | 142.250.186.100 |
Jan 15, 2025 15:22:49.442665100 CET | 443 | 49712 | 142.250.186.100 | 192.168.2.5 |
Jan 15, 2025 15:22:49.442874908 CET | 49712 | 443 | 192.168.2.5 | 142.250.186.100 |
Jan 15, 2025 15:22:49.443166971 CET | 49712 | 443 | 192.168.2.5 | 142.250.186.100 |
Jan 15, 2025 15:22:49.443176031 CET | 443 | 49712 | 142.250.186.100 | 192.168.2.5 |
Jan 15, 2025 15:22:50.107737064 CET | 443 | 49712 | 142.250.186.100 | 192.168.2.5 |
Jan 15, 2025 15:22:50.108160019 CET | 49712 | 443 | 192.168.2.5 | 142.250.186.100 |
Jan 15, 2025 15:22:50.108190060 CET | 443 | 49712 | 142.250.186.100 | 192.168.2.5 |
Jan 15, 2025 15:22:50.109247923 CET | 443 | 49712 | 142.250.186.100 | 192.168.2.5 |
Jan 15, 2025 15:22:50.109329939 CET | 49712 | 443 | 192.168.2.5 | 142.250.186.100 |
Jan 15, 2025 15:22:50.110605001 CET | 49712 | 443 | 192.168.2.5 | 142.250.186.100 |
Jan 15, 2025 15:22:50.110686064 CET | 443 | 49712 | 142.250.186.100 | 192.168.2.5 |
Jan 15, 2025 15:22:50.151612997 CET | 49712 | 443 | 192.168.2.5 | 142.250.186.100 |
Jan 15, 2025 15:22:50.151623964 CET | 443 | 49712 | 142.250.186.100 | 192.168.2.5 |
Jan 15, 2025 15:22:50.198489904 CET | 49712 | 443 | 192.168.2.5 | 142.250.186.100 |
Jan 15, 2025 15:22:50.928448915 CET | 49714 | 443 | 192.168.2.5 | 172.66.0.235 |
Jan 15, 2025 15:22:50.928519964 CET | 443 | 49714 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:50.928668976 CET | 49715 | 443 | 192.168.2.5 | 172.66.0.235 |
Jan 15, 2025 15:22:50.928698063 CET | 49714 | 443 | 192.168.2.5 | 172.66.0.235 |
Jan 15, 2025 15:22:50.928738117 CET | 443 | 49715 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:50.928813934 CET | 49715 | 443 | 192.168.2.5 | 172.66.0.235 |
Jan 15, 2025 15:22:50.929164886 CET | 49715 | 443 | 192.168.2.5 | 172.66.0.235 |
Jan 15, 2025 15:22:50.929182053 CET | 443 | 49715 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:50.929328918 CET | 49714 | 443 | 192.168.2.5 | 172.66.0.235 |
Jan 15, 2025 15:22:50.929351091 CET | 443 | 49714 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.410353899 CET | 443 | 49715 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.417154074 CET | 443 | 49714 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.467168093 CET | 49714 | 443 | 192.168.2.5 | 172.66.0.235 |
Jan 15, 2025 15:22:51.467180014 CET | 49715 | 443 | 192.168.2.5 | 172.66.0.235 |
Jan 15, 2025 15:22:51.517653942 CET | 49714 | 443 | 192.168.2.5 | 172.66.0.235 |
Jan 15, 2025 15:22:51.517688990 CET | 443 | 49714 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.517930031 CET | 49715 | 443 | 192.168.2.5 | 172.66.0.235 |
Jan 15, 2025 15:22:51.517971039 CET | 443 | 49715 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.518976927 CET | 443 | 49714 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.519087076 CET | 49714 | 443 | 192.168.2.5 | 172.66.0.235 |
Jan 15, 2025 15:22:51.519232035 CET | 443 | 49715 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.519251108 CET | 443 | 49715 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.519308090 CET | 49715 | 443 | 192.168.2.5 | 172.66.0.235 |
Jan 15, 2025 15:22:51.525486946 CET | 49714 | 443 | 192.168.2.5 | 172.66.0.235 |
Jan 15, 2025 15:22:51.525588036 CET | 443 | 49714 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.525773048 CET | 49715 | 443 | 192.168.2.5 | 172.66.0.235 |
Jan 15, 2025 15:22:51.525966883 CET | 443 | 49715 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.526760101 CET | 49714 | 443 | 192.168.2.5 | 172.66.0.235 |
Jan 15, 2025 15:22:51.526773930 CET | 443 | 49714 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.575479984 CET | 49715 | 443 | 192.168.2.5 | 172.66.0.235 |
Jan 15, 2025 15:22:51.575552940 CET | 443 | 49715 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.575624943 CET | 49714 | 443 | 192.168.2.5 | 172.66.0.235 |
Jan 15, 2025 15:22:51.624074936 CET | 49715 | 443 | 192.168.2.5 | 172.66.0.235 |
Jan 15, 2025 15:22:51.733755112 CET | 443 | 49714 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.733813047 CET | 443 | 49714 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.733845949 CET | 443 | 49714 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.733901978 CET | 49714 | 443 | 192.168.2.5 | 172.66.0.235 |
Jan 15, 2025 15:22:51.733930111 CET | 443 | 49714 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.733975887 CET | 443 | 49714 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.734013081 CET | 443 | 49714 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.734024048 CET | 49714 | 443 | 192.168.2.5 | 172.66.0.235 |
Jan 15, 2025 15:22:51.734030008 CET | 443 | 49714 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.734055042 CET | 49714 | 443 | 192.168.2.5 | 172.66.0.235 |
Jan 15, 2025 15:22:51.734098911 CET | 443 | 49714 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.734303951 CET | 49714 | 443 | 192.168.2.5 | 172.66.0.235 |
Jan 15, 2025 15:22:51.734309912 CET | 443 | 49714 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.734416962 CET | 443 | 49714 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.734467030 CET | 49714 | 443 | 192.168.2.5 | 172.66.0.235 |
Jan 15, 2025 15:22:51.734472036 CET | 443 | 49714 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.786881924 CET | 49714 | 443 | 192.168.2.5 | 172.66.0.235 |
Jan 15, 2025 15:22:51.786910057 CET | 443 | 49714 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.825992107 CET | 443 | 49714 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.826025963 CET | 443 | 49714 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.826061010 CET | 443 | 49714 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.826189041 CET | 49714 | 443 | 192.168.2.5 | 172.66.0.235 |
Jan 15, 2025 15:22:51.826189041 CET | 49714 | 443 | 192.168.2.5 | 172.66.0.235 |
Jan 15, 2025 15:22:51.826217890 CET | 443 | 49714 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.826337099 CET | 443 | 49714 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.826379061 CET | 443 | 49714 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.826384068 CET | 49714 | 443 | 192.168.2.5 | 172.66.0.235 |
Jan 15, 2025 15:22:51.826390028 CET | 443 | 49714 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.826430082 CET | 49714 | 443 | 192.168.2.5 | 172.66.0.235 |
Jan 15, 2025 15:22:51.826863050 CET | 443 | 49714 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.826968908 CET | 443 | 49714 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.827030897 CET | 49714 | 443 | 192.168.2.5 | 172.66.0.235 |
Jan 15, 2025 15:22:51.828679085 CET | 49714 | 443 | 192.168.2.5 | 172.66.0.235 |
Jan 15, 2025 15:22:51.828696012 CET | 443 | 49714 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:22:51.866940022 CET | 49717 | 443 | 192.168.2.5 | 104.16.123.96 |
Jan 15, 2025 15:22:51.866981030 CET | 443 | 49717 | 104.16.123.96 | 192.168.2.5 |
Jan 15, 2025 15:22:51.867398977 CET | 49717 | 443 | 192.168.2.5 | 104.16.123.96 |
Jan 15, 2025 15:22:51.868005037 CET | 49717 | 443 | 192.168.2.5 | 104.16.123.96 |
Jan 15, 2025 15:22:51.868026972 CET | 443 | 49717 | 104.16.123.96 | 192.168.2.5 |
Jan 15, 2025 15:22:52.336527109 CET | 443 | 49717 | 104.16.123.96 | 192.168.2.5 |
Jan 15, 2025 15:22:52.336893082 CET | 49717 | 443 | 192.168.2.5 | 104.16.123.96 |
Jan 15, 2025 15:22:52.336919069 CET | 443 | 49717 | 104.16.123.96 | 192.168.2.5 |
Jan 15, 2025 15:22:52.337955952 CET | 443 | 49717 | 104.16.123.96 | 192.168.2.5 |
Jan 15, 2025 15:22:52.338027000 CET | 49717 | 443 | 192.168.2.5 | 104.16.123.96 |
Jan 15, 2025 15:22:52.340800047 CET | 49717 | 443 | 192.168.2.5 | 104.16.123.96 |
Jan 15, 2025 15:22:52.340863943 CET | 443 | 49717 | 104.16.123.96 | 192.168.2.5 |
Jan 15, 2025 15:22:52.341267109 CET | 49717 | 443 | 192.168.2.5 | 104.16.123.96 |
Jan 15, 2025 15:22:52.341272116 CET | 443 | 49717 | 104.16.123.96 | 192.168.2.5 |
Jan 15, 2025 15:22:52.384676933 CET | 49717 | 443 | 192.168.2.5 | 104.16.123.96 |
Jan 15, 2025 15:22:52.494062901 CET | 443 | 49717 | 104.16.123.96 | 192.168.2.5 |
Jan 15, 2025 15:22:52.494116068 CET | 443 | 49717 | 104.16.123.96 | 192.168.2.5 |
Jan 15, 2025 15:22:52.494178057 CET | 49717 | 443 | 192.168.2.5 | 104.16.123.96 |
Jan 15, 2025 15:22:52.494205952 CET | 443 | 49717 | 104.16.123.96 | 192.168.2.5 |
Jan 15, 2025 15:22:52.494219065 CET | 443 | 49717 | 104.16.123.96 | 192.168.2.5 |
Jan 15, 2025 15:22:52.494340897 CET | 49717 | 443 | 192.168.2.5 | 104.16.123.96 |
Jan 15, 2025 15:22:52.503669977 CET | 49717 | 443 | 192.168.2.5 | 104.16.123.96 |
Jan 15, 2025 15:22:52.503685951 CET | 443 | 49717 | 104.16.123.96 | 192.168.2.5 |
Jan 15, 2025 15:22:52.537777901 CET | 49718 | 443 | 192.168.2.5 | 104.16.123.96 |
Jan 15, 2025 15:22:52.537838936 CET | 443 | 49718 | 104.16.123.96 | 192.168.2.5 |
Jan 15, 2025 15:22:52.537909985 CET | 49718 | 443 | 192.168.2.5 | 104.16.123.96 |
Jan 15, 2025 15:22:52.538959026 CET | 49718 | 443 | 192.168.2.5 | 104.16.123.96 |
Jan 15, 2025 15:22:52.538990974 CET | 443 | 49718 | 104.16.123.96 | 192.168.2.5 |
Jan 15, 2025 15:22:53.018698931 CET | 443 | 49718 | 104.16.123.96 | 192.168.2.5 |
Jan 15, 2025 15:22:53.019155025 CET | 49718 | 443 | 192.168.2.5 | 104.16.123.96 |
Jan 15, 2025 15:22:53.019238949 CET | 443 | 49718 | 104.16.123.96 | 192.168.2.5 |
Jan 15, 2025 15:22:53.020240068 CET | 443 | 49718 | 104.16.123.96 | 192.168.2.5 |
Jan 15, 2025 15:22:53.020313978 CET | 49718 | 443 | 192.168.2.5 | 104.16.123.96 |
Jan 15, 2025 15:22:53.020843983 CET | 49718 | 443 | 192.168.2.5 | 104.16.123.96 |
Jan 15, 2025 15:22:53.020922899 CET | 443 | 49718 | 104.16.123.96 | 192.168.2.5 |
Jan 15, 2025 15:22:53.021029949 CET | 49718 | 443 | 192.168.2.5 | 104.16.123.96 |
Jan 15, 2025 15:22:53.061604023 CET | 49718 | 443 | 192.168.2.5 | 104.16.123.96 |
Jan 15, 2025 15:22:53.061635971 CET | 443 | 49718 | 104.16.123.96 | 192.168.2.5 |
Jan 15, 2025 15:22:53.103518963 CET | 49718 | 443 | 192.168.2.5 | 104.16.123.96 |
Jan 15, 2025 15:22:53.183484077 CET | 443 | 49718 | 104.16.123.96 | 192.168.2.5 |
Jan 15, 2025 15:22:53.183532953 CET | 443 | 49718 | 104.16.123.96 | 192.168.2.5 |
Jan 15, 2025 15:22:53.183635950 CET | 443 | 49718 | 104.16.123.96 | 192.168.2.5 |
Jan 15, 2025 15:22:53.183696032 CET | 49718 | 443 | 192.168.2.5 | 104.16.123.96 |
Jan 15, 2025 15:22:53.185322046 CET | 49718 | 443 | 192.168.2.5 | 104.16.123.96 |
Jan 15, 2025 15:22:53.185352087 CET | 443 | 49718 | 104.16.123.96 | 192.168.2.5 |
Jan 15, 2025 15:22:59.999172926 CET | 443 | 49712 | 142.250.186.100 | 192.168.2.5 |
Jan 15, 2025 15:22:59.999227047 CET | 443 | 49712 | 142.250.186.100 | 192.168.2.5 |
Jan 15, 2025 15:22:59.999435902 CET | 49712 | 443 | 192.168.2.5 | 142.250.186.100 |
Jan 15, 2025 15:23:01.527080059 CET | 49712 | 443 | 192.168.2.5 | 142.250.186.100 |
Jan 15, 2025 15:23:01.527097940 CET | 443 | 49712 | 142.250.186.100 | 192.168.2.5 |
Jan 15, 2025 15:23:03.318510056 CET | 49758 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 15:23:03.324327946 CET | 53 | 49758 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 15:23:03.324385881 CET | 49758 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 15:23:03.325563908 CET | 49758 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 15:23:03.325644016 CET | 49758 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 15:23:03.330354929 CET | 53 | 49758 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 15:23:03.330382109 CET | 53 | 49758 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 15:23:03.770320892 CET | 53 | 49758 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 15:23:03.770575047 CET | 49758 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 15:23:03.775760889 CET | 53 | 49758 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 15:23:03.776029110 CET | 49758 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 15:23:06.315517902 CET | 443 | 49715 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:23:06.315681934 CET | 443 | 49715 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:23:06.315767050 CET | 49715 | 443 | 192.168.2.5 | 172.66.0.235 |
Jan 15, 2025 15:23:07.516515970 CET | 49715 | 443 | 192.168.2.5 | 172.66.0.235 |
Jan 15, 2025 15:23:07.516556978 CET | 443 | 49715 | 172.66.0.235 | 192.168.2.5 |
Jan 15, 2025 15:23:23.432043076 CET | 53539 | 53 | 192.168.2.5 | 162.159.36.2 |
Jan 15, 2025 15:23:23.436819077 CET | 53 | 53539 | 162.159.36.2 | 192.168.2.5 |
Jan 15, 2025 15:23:23.436901093 CET | 53539 | 53 | 192.168.2.5 | 162.159.36.2 |
Jan 15, 2025 15:23:23.442645073 CET | 53 | 53539 | 162.159.36.2 | 192.168.2.5 |
Jan 15, 2025 15:23:23.881922007 CET | 53539 | 53 | 192.168.2.5 | 162.159.36.2 |
Jan 15, 2025 15:23:23.887208939 CET | 53 | 53539 | 162.159.36.2 | 192.168.2.5 |
Jan 15, 2025 15:23:23.887289047 CET | 53539 | 53 | 192.168.2.5 | 162.159.36.2 |
Jan 15, 2025 15:23:49.498253107 CET | 53656 | 443 | 192.168.2.5 | 142.250.186.100 |
Jan 15, 2025 15:23:49.498301029 CET | 443 | 53656 | 142.250.186.100 | 192.168.2.5 |
Jan 15, 2025 15:23:49.498372078 CET | 53656 | 443 | 192.168.2.5 | 142.250.186.100 |
Jan 15, 2025 15:23:49.498914003 CET | 53656 | 443 | 192.168.2.5 | 142.250.186.100 |
Jan 15, 2025 15:23:49.498927116 CET | 443 | 53656 | 142.250.186.100 | 192.168.2.5 |
Jan 15, 2025 15:23:50.344974041 CET | 443 | 53656 | 142.250.186.100 | 192.168.2.5 |
Jan 15, 2025 15:23:50.346072912 CET | 53656 | 443 | 192.168.2.5 | 142.250.186.100 |
Jan 15, 2025 15:23:50.346095085 CET | 443 | 53656 | 142.250.186.100 | 192.168.2.5 |
Jan 15, 2025 15:23:50.347182989 CET | 443 | 53656 | 142.250.186.100 | 192.168.2.5 |
Jan 15, 2025 15:23:50.347870111 CET | 53656 | 443 | 192.168.2.5 | 142.250.186.100 |
Jan 15, 2025 15:23:50.348051071 CET | 443 | 53656 | 142.250.186.100 | 192.168.2.5 |
Jan 15, 2025 15:23:50.391952991 CET | 53656 | 443 | 192.168.2.5 | 142.250.186.100 |
Jan 15, 2025 15:24:00.274977922 CET | 443 | 53656 | 142.250.186.100 | 192.168.2.5 |
Jan 15, 2025 15:24:00.275057077 CET | 443 | 53656 | 142.250.186.100 | 192.168.2.5 |
Jan 15, 2025 15:24:00.275105000 CET | 53656 | 443 | 192.168.2.5 | 142.250.186.100 |
Jan 15, 2025 15:24:01.530050993 CET | 53656 | 443 | 192.168.2.5 | 142.250.186.100 |
Jan 15, 2025 15:24:01.530080080 CET | 443 | 53656 | 142.250.186.100 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 15, 2025 15:22:45.041045904 CET | 53 | 52696 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 15:22:45.140090942 CET | 53 | 55925 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 15:22:46.143798113 CET | 53 | 52412 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 15:22:49.434402943 CET | 63323 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 15:22:49.434612989 CET | 54740 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 15:22:49.441071987 CET | 53 | 63323 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 15:22:49.441394091 CET | 53 | 54740 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 15:22:50.908370972 CET | 51365 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 15:22:50.908737898 CET | 53988 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 15:22:50.918001890 CET | 53 | 51365 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 15:22:50.918282032 CET | 53 | 53988 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 15:22:51.857758045 CET | 58780 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 15:22:51.858346939 CET | 51388 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 15:22:51.864574909 CET | 53 | 58780 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 15:22:51.865591049 CET | 53 | 51388 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 15:22:52.523988008 CET | 52929 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 15:22:52.524555922 CET | 60382 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 15:22:52.530860901 CET | 53 | 52929 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 15:22:52.532269001 CET | 53 | 60382 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 15:23:03.317995071 CET | 53 | 53878 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 15:23:22.431531906 CET | 53 | 64065 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 15:23:23.430757999 CET | 53 | 57847 | 162.159.36.2 | 192.168.2.5 |
Jan 15, 2025 15:23:23.907640934 CET | 53 | 63879 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 15:23:44.822300911 CET | 53 | 63172 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 15:23:45.244884968 CET | 53 | 60824 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 15, 2025 15:22:49.434402943 CET | 192.168.2.5 | 1.1.1.1 | 0xccc7 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 15:22:49.434612989 CET | 192.168.2.5 | 1.1.1.1 | 0x7f8c | Standard query (0) | 65 | IN (0x0001) | false | |
Jan 15, 2025 15:22:50.908370972 CET | 192.168.2.5 | 1.1.1.1 | 0x3469 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 15:22:50.908737898 CET | 192.168.2.5 | 1.1.1.1 | 0x746d | Standard query (0) | 65 | IN (0x0001) | false | |
Jan 15, 2025 15:22:51.857758045 CET | 192.168.2.5 | 1.1.1.1 | 0x1319 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 15:22:51.858346939 CET | 192.168.2.5 | 1.1.1.1 | 0x9b0e | Standard query (0) | 65 | IN (0x0001) | false | |
Jan 15, 2025 15:22:52.523988008 CET | 192.168.2.5 | 1.1.1.1 | 0xef05 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 15:22:52.524555922 CET | 192.168.2.5 | 1.1.1.1 | 0x689c | Standard query (0) | 65 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 15, 2025 15:22:49.441071987 CET | 1.1.1.1 | 192.168.2.5 | 0xccc7 | No error (0) | 142.250.186.100 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 15:22:49.441394091 CET | 1.1.1.1 | 192.168.2.5 | 0x7f8c | No error (0) | 65 | IN (0x0001) | false | |||
Jan 15, 2025 15:22:50.918001890 CET | 1.1.1.1 | 192.168.2.5 | 0x3469 | No error (0) | 172.66.0.235 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 15:22:50.918001890 CET | 1.1.1.1 | 192.168.2.5 | 0x3469 | No error (0) | 162.159.140.237 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 15:22:51.864574909 CET | 1.1.1.1 | 192.168.2.5 | 0x1319 | No error (0) | 104.16.123.96 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 15:22:51.864574909 CET | 1.1.1.1 | 192.168.2.5 | 0x1319 | No error (0) | 104.16.124.96 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 15:22:51.865591049 CET | 1.1.1.1 | 192.168.2.5 | 0x9b0e | No error (0) | 65 | IN (0x0001) | false | |||
Jan 15, 2025 15:22:52.530860901 CET | 1.1.1.1 | 192.168.2.5 | 0xef05 | No error (0) | 104.16.123.96 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 15:22:52.530860901 CET | 1.1.1.1 | 192.168.2.5 | 0xef05 | No error (0) | 104.16.124.96 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 15:22:52.532269001 CET | 1.1.1.1 | 192.168.2.5 | 0x689c | No error (0) | 65 | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49714 | 172.66.0.235 | 443 | 2428 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 14:22:51 UTC | 686 | OUT | |
2025-01-15 14:22:51 UTC | 180 | IN | |
2025-01-15 14:22:51 UTC | 1189 | IN | |
2025-01-15 14:22:51 UTC | 1369 | IN | |
2025-01-15 14:22:51 UTC | 1369 | IN | |
2025-01-15 14:22:51 UTC | 1369 | IN | |
2025-01-15 14:22:51 UTC | 1369 | IN | |
2025-01-15 14:22:51 UTC | 1369 | IN | |
2025-01-15 14:22:51 UTC | 1369 | IN | |
2025-01-15 14:22:51 UTC | 1369 | IN | |
2025-01-15 14:22:51 UTC | 1369 | IN | |
2025-01-15 14:22:51 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49717 | 104.16.123.96 | 443 | 2428 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 14:22:52 UTC | 616 | OUT | |
2025-01-15 14:22:52 UTC | 1215 | IN | |
2025-01-15 14:22:52 UTC | 154 | IN | |
2025-01-15 14:22:52 UTC | 1369 | IN | |
2025-01-15 14:22:52 UTC | 969 | IN | |
2025-01-15 14:22:52 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49718 | 104.16.123.96 | 443 | 2428 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 14:22:53 UTC | 541 | OUT | |
2025-01-15 14:22:53 UTC | 905 | IN | |
2025-01-15 14:22:53 UTC | 464 | IN | |
2025-01-15 14:22:53 UTC | 1369 | IN | |
2025-01-15 14:22:53 UTC | 659 | IN | |
2025-01-15 14:22:53 UTC | 5 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 09:22:36 |
Start date: | 15/01/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 2 |
Start time: | 09:22:43 |
Start date: | 15/01/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 3 |
Start time: | 09:22:49 |
Start date: | 15/01/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |