Windows
Analysis Report
https://kajec.icu
Overview
Detection
Score: | 0 |
Range: | 0 - 100 |
Confidence: | 80% |
Signatures
Classification
- System is w10x64
chrome.exe (PID: 6304 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --s tart-maxim ized "abou t:blank" MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 6816 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --no-pre-r ead-main-d ll --field -trial-han dle=2032,i ,876960488 278925228, 1103831399 019611287, 262144 --d isable-fea tures=Opti mizationGu ideModelDo wnloading, Optimizati onHints,Op timization HintsFetch ing,Optimi zationTarg etPredicti on --varia tions-seed -version=2 0250306-18 3004.42900 0 --mojo-p latform-ch annel-hand le=2064 /p refetch:3 MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 3140 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= printing.m ojom.Unsan dboxedPrin tBackendHo st --lang= en-US --se rvice-sand box-type=n one --no-p re-read-ma in-dll --f ield-trial -handle=20 32,i,87696 0488278925 228,110383 1399019611 287,262144 --disable -features= Optimizati onGuideMod elDownload ing,Optimi zationHint s,Optimiza tionHintsF etching,Op timization TargetPred iction --v ariations- seed-versi on=2025030 6-183004.4 29000 --mo jo-platfor m-channel- handle=500 0 /prefetc h:8 MD5: E81F54E6C1129887AEA47E7D092680BF)
chrome.exe (PID: 5276 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://kajec .icu" MD5: E81F54E6C1129887AEA47E7D092680BF)
- cleanup
- • Phishing
- • Compliance
- • Networking
- • System Summary
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | WMI Queries: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Window detected: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Windows Management Instrumentation | Path Interception | 1 Process Injection | 1 Process Injection | OS Credential Dumping | 1 System Information Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 3 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 4 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 3 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
www.google.com | 192.178.49.164 | true | false | high | |
kajec.icu | 172.67.153.22 | true | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
172.67.153.22 | kajec.icu | United States | 13335 | CLOUDFLARENETUS | false | |
192.178.49.164 | www.google.com | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.6 |
192.168.2.5 |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1670493 |
Start date and time: | 2025-04-21 19:41:10 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 2m 47s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | https://kajec.icu |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 15 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean0.win@23/8@4/4 |
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, S IHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe - Excluded IPs from analysis (wh
itelisted): 192.178.49.206, 19 2.178.49.163, 192.178.49.174, 142.250.141.84, 199.232.214.17 2, 142.250.69.10, 142.250.69.3 , 184.29.183.29, 172.202.163.2 00 - Excluded domains from analysis
(whitelisted): fonts.googleap is.com, fs.microsoft.com, acco unts.google.com, slscr.update. microsoft.com, fonts.gstatic.c om, ctldl.windowsupdate.com, c lientservices.googleapis.com, fe3cr.delivery.mp.microsoft.co m, c2a9c95e369881c67228a6591ca c2686.clo.footprintdns.com, ax -ring.msedge.net, clients2.goo gle.com, edgedl.me.gvt1.com, r edirector.gvt1.com, update.goo gleapis.com, clients.l.google. com, c.pki.goog - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtOpenFile calls found . - VT rate limit hit for: https:
//kajec.icu
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 271 |
Entropy (8bit): | 5.234124565998564 |
Encrypted: | false |
SSDEEP: | 6:pn0+Dy9xwGObRmEr6VnetdzRx3G0CezoIR4wq8cXaoD:J0+oxBeRmR9etdzRxGezHDq8ma+ |
MD5: | 8A300C41C0F21B9F81FCD635D24C54A5 |
SHA1: | 886938622D2F612B8174EA5CCF9C7A59B37797A5 |
SHA-256: | EB26094EDEC47737B5522DD812AD9DD0AD30B371A5BCD978D359DCFE0A889588 |
SHA-512: | 851AC640FDEBCA0E1C750DD05486E3CA234249C78B2E484D61F6B1B3B6F10F94711FC9877E6764AD470EA3F0F4D97003FA56135BD6F6B11854E3B677CF42BDC4 |
Malicious: | false |
Reputation: | low |
URL: | https://kajec.icu/favicon.ico |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 20876 |
Entropy (8bit): | 7.990241189634868 |
Encrypted: | true |
SSDEEP: | 384:lShzzaflLqW7fQKRsfhpgd29x6DUseewElvH/m6GrjEJNR1DRqEI6:4lzafpqW7fQxzHx0U4H+//ErR5oEI6 |
MD5: | DE58282A1CE2C94C8D03A2FEF04BADE2 |
SHA1: | 9C8BAC0B423F92B154D3D8F1CD40222654EE160E |
SHA-256: | 3A699A96B93301126FA93A9E52306A65149C4BB3B686EDA38DA3895941EDAA4F |
SHA-512: | 8C598BA8D6165C63835E01EC96E455055D4C3FBB0656CC1D2C8B1EEEF3D2DFF6208D87E7AB957871AF80297E4CAB2F658AF983C9A0D94B179C66380E41A178DF |
Malicious: | false |
Reputation: | low |
URL: | https://fonts.gstatic.com/s/capriola/v14/wXKoE3YSppcvo1PDlk_7JeE.woff2 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 2249 |
Entropy (8bit): | 5.260918880676623 |
Encrypted: | false |
SSDEEP: | 48:t/pzRgdYJP2Om7yfw1KrXVEYPbqqnadwVq:jedYJujSw1QLvaz |
MD5: | 1BA7A30A07230726B3CECBEDE78B5476 |
SHA1: | 7229FB742242DB43D708AE9E9205581D9289C3B9 |
SHA-256: | 228A524C66A99BFF27A022E4ADA9C45CA41AFCDFCF31B87BE4EEC8FD8685F42F |
SHA-512: | 32560E13A47BF409A5ECE538AF1B52585EB6A5682B860381D72B855952E6F867C0F2476DC0EC631ED0CE05FDE332D942CF7A08A73F840A9A66F5532203349E7E |
Malicious: | false |
Reputation: | low |
URL: | https://kajec.icu/ |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 801 |
Entropy (8bit): | 5.296566285075733 |
Encrypted: | false |
SSDEEP: | 12:UNmFaO6ZRoT6perKa+zb77kYYtJcb65wCgDrqAFaO6ZRoT6pYhKayVVey90HcGuM:3aOYspxtJc+u/raOYswwy96cGSSf7 |
MD5: | 254FA233C2FCA8D5F8A867061A7B806C |
SHA1: | 1BF4F2D344E415C1F2A0E4C130889EB8DE236840 |
SHA-256: | 0FB42055E11A4F1279019E52FB475863D4D4591B156C00AE893815B7E088CB5A |
SHA-512: | DDFA2129A67F33C039265216BFEBAE87F3D541A114F9962FD2FDF46660AD4029CFB450B64C8E4690A67792483FF932BD36E1D30D2B23A49F7E8EA6CAD9B35559 |
Malicious: | false |
Reputation: | low |
URL: | https://fonts.googleapis.com/css?family=Capriola |
Preview: |
Download Network PCAP: filtered – full
- Total Packets: 44
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 21, 2025 19:41:52.918874025 CEST | 49672 | 443 | 192.168.2.5 | 204.79.197.203 |
Apr 21, 2025 19:41:54.121999025 CEST | 49672 | 443 | 192.168.2.5 | 204.79.197.203 |
Apr 21, 2025 19:41:56.528239965 CEST | 49672 | 443 | 192.168.2.5 | 204.79.197.203 |
Apr 21, 2025 19:42:00.555964947 CEST | 49676 | 443 | 192.168.2.5 | 20.189.173.14 |
Apr 21, 2025 19:42:00.856374979 CEST | 49676 | 443 | 192.168.2.5 | 20.189.173.14 |
Apr 21, 2025 19:42:01.373806000 CEST | 49672 | 443 | 192.168.2.5 | 204.79.197.203 |
Apr 21, 2025 19:42:01.465744019 CEST | 49676 | 443 | 192.168.2.5 | 20.189.173.14 |
Apr 21, 2025 19:42:02.731359959 CEST | 49676 | 443 | 192.168.2.5 | 20.189.173.14 |
Apr 21, 2025 19:42:05.137409925 CEST | 49676 | 443 | 192.168.2.5 | 20.189.173.14 |
Apr 21, 2025 19:42:05.178462982 CEST | 49697 | 80 | 192.168.2.5 | 142.250.68.227 |
Apr 21, 2025 19:42:05.326141119 CEST | 80 | 49697 | 142.250.68.227 | 192.168.2.5 |
Apr 21, 2025 19:42:05.326236963 CEST | 49697 | 80 | 192.168.2.5 | 142.250.68.227 |
Apr 21, 2025 19:42:05.326396942 CEST | 49697 | 80 | 192.168.2.5 | 142.250.68.227 |
Apr 21, 2025 19:42:05.474019051 CEST | 80 | 49697 | 142.250.68.227 | 192.168.2.5 |
Apr 21, 2025 19:42:05.474706888 CEST | 80 | 49697 | 142.250.68.227 | 192.168.2.5 |
Apr 21, 2025 19:42:05.518282890 CEST | 49697 | 80 | 192.168.2.5 | 142.250.68.227 |
Apr 21, 2025 19:42:08.265832901 CEST | 49699 | 443 | 192.168.2.5 | 192.178.49.164 |
Apr 21, 2025 19:42:08.265866995 CEST | 443 | 49699 | 192.178.49.164 | 192.168.2.5 |
Apr 21, 2025 19:42:08.266037941 CEST | 49699 | 443 | 192.168.2.5 | 192.178.49.164 |
Apr 21, 2025 19:42:08.266166925 CEST | 49699 | 443 | 192.168.2.5 | 192.178.49.164 |
Apr 21, 2025 19:42:08.266180038 CEST | 443 | 49699 | 192.178.49.164 | 192.168.2.5 |
Apr 21, 2025 19:42:08.588176012 CEST | 443 | 49699 | 192.178.49.164 | 192.168.2.5 |
Apr 21, 2025 19:42:08.588289976 CEST | 49699 | 443 | 192.168.2.5 | 192.178.49.164 |
Apr 21, 2025 19:42:08.589590073 CEST | 49699 | 443 | 192.168.2.5 | 192.178.49.164 |
Apr 21, 2025 19:42:08.589610100 CEST | 443 | 49699 | 192.178.49.164 | 192.168.2.5 |
Apr 21, 2025 19:42:08.589894056 CEST | 443 | 49699 | 192.178.49.164 | 192.168.2.5 |
Apr 21, 2025 19:42:08.638175964 CEST | 49699 | 443 | 192.168.2.5 | 192.178.49.164 |
Apr 21, 2025 19:42:09.459835052 CEST | 49701 | 443 | 192.168.2.5 | 172.67.153.22 |
Apr 21, 2025 19:42:09.459893942 CEST | 443 | 49701 | 172.67.153.22 | 192.168.2.5 |
Apr 21, 2025 19:42:09.460022926 CEST | 49701 | 443 | 192.168.2.5 | 172.67.153.22 |
Apr 21, 2025 19:42:09.460396051 CEST | 49702 | 443 | 192.168.2.5 | 172.67.153.22 |
Apr 21, 2025 19:42:09.460427046 CEST | 443 | 49702 | 172.67.153.22 | 192.168.2.5 |
Apr 21, 2025 19:42:09.460587025 CEST | 49701 | 443 | 192.168.2.5 | 172.67.153.22 |
Apr 21, 2025 19:42:09.460599899 CEST | 443 | 49701 | 172.67.153.22 | 192.168.2.5 |
Apr 21, 2025 19:42:09.460617065 CEST | 49702 | 443 | 192.168.2.5 | 172.67.153.22 |
Apr 21, 2025 19:42:09.460786104 CEST | 49702 | 443 | 192.168.2.5 | 172.67.153.22 |
Apr 21, 2025 19:42:09.460799932 CEST | 443 | 49702 | 172.67.153.22 | 192.168.2.5 |
Apr 21, 2025 19:42:09.823405981 CEST | 443 | 49701 | 172.67.153.22 | 192.168.2.5 |
Apr 21, 2025 19:42:09.823509932 CEST | 49701 | 443 | 192.168.2.5 | 172.67.153.22 |
Apr 21, 2025 19:42:09.824839115 CEST | 49701 | 443 | 192.168.2.5 | 172.67.153.22 |
Apr 21, 2025 19:42:09.824862957 CEST | 443 | 49701 | 172.67.153.22 | 192.168.2.5 |
Apr 21, 2025 19:42:09.825109959 CEST | 443 | 49701 | 172.67.153.22 | 192.168.2.5 |
Apr 21, 2025 19:42:09.825726986 CEST | 49701 | 443 | 192.168.2.5 | 172.67.153.22 |
Apr 21, 2025 19:42:09.868274927 CEST | 443 | 49701 | 172.67.153.22 | 192.168.2.5 |
Apr 21, 2025 19:42:09.884877920 CEST | 443 | 49702 | 172.67.153.22 | 192.168.2.5 |
Apr 21, 2025 19:42:09.884946108 CEST | 49702 | 443 | 192.168.2.5 | 172.67.153.22 |
Apr 21, 2025 19:42:09.885340929 CEST | 49702 | 443 | 192.168.2.5 | 172.67.153.22 |
Apr 21, 2025 19:42:09.885348082 CEST | 443 | 49702 | 172.67.153.22 | 192.168.2.5 |
Apr 21, 2025 19:42:09.885548115 CEST | 443 | 49702 | 172.67.153.22 | 192.168.2.5 |
Apr 21, 2025 19:42:09.929795027 CEST | 49702 | 443 | 192.168.2.5 | 172.67.153.22 |
Apr 21, 2025 19:42:09.949771881 CEST | 49676 | 443 | 192.168.2.5 | 20.189.173.14 |
Apr 21, 2025 19:42:10.623255968 CEST | 443 | 49701 | 172.67.153.22 | 192.168.2.5 |
Apr 21, 2025 19:42:10.623313904 CEST | 443 | 49701 | 172.67.153.22 | 192.168.2.5 |
Apr 21, 2025 19:42:10.623399019 CEST | 443 | 49701 | 172.67.153.22 | 192.168.2.5 |
Apr 21, 2025 19:42:10.623521090 CEST | 49701 | 443 | 192.168.2.5 | 172.67.153.22 |
Apr 21, 2025 19:42:10.624535084 CEST | 49701 | 443 | 192.168.2.5 | 172.67.153.22 |
Apr 21, 2025 19:42:10.624553919 CEST | 443 | 49701 | 172.67.153.22 | 192.168.2.5 |
Apr 21, 2025 19:42:10.983104944 CEST | 49672 | 443 | 192.168.2.5 | 204.79.197.203 |
Apr 21, 2025 19:42:11.575666904 CEST | 49702 | 443 | 192.168.2.5 | 172.67.153.22 |
Apr 21, 2025 19:42:11.620275974 CEST | 443 | 49702 | 172.67.153.22 | 192.168.2.5 |
Apr 21, 2025 19:42:12.153162003 CEST | 443 | 49702 | 172.67.153.22 | 192.168.2.5 |
Apr 21, 2025 19:42:12.153301954 CEST | 443 | 49702 | 172.67.153.22 | 192.168.2.5 |
Apr 21, 2025 19:42:12.153348923 CEST | 49702 | 443 | 192.168.2.5 | 172.67.153.22 |
Apr 21, 2025 19:42:12.155780077 CEST | 49702 | 443 | 192.168.2.5 | 172.67.153.22 |
Apr 21, 2025 19:42:12.155797005 CEST | 443 | 49702 | 172.67.153.22 | 192.168.2.5 |
Apr 21, 2025 19:42:17.177856922 CEST | 49675 | 443 | 192.168.2.5 | 2.23.227.208 |
Apr 21, 2025 19:42:17.177886963 CEST | 443 | 49675 | 2.23.227.208 | 192.168.2.5 |
Apr 21, 2025 19:42:17.549974918 CEST | 49710 | 443 | 192.168.2.5 | 150.171.27.254 |
Apr 21, 2025 19:42:17.550009966 CEST | 443 | 49710 | 150.171.27.254 | 192.168.2.5 |
Apr 21, 2025 19:42:17.550107002 CEST | 49710 | 443 | 192.168.2.5 | 150.171.27.254 |
Apr 21, 2025 19:42:17.550951958 CEST | 49710 | 443 | 192.168.2.5 | 150.171.27.254 |
Apr 21, 2025 19:42:17.550965071 CEST | 443 | 49710 | 150.171.27.254 | 192.168.2.5 |
Apr 21, 2025 19:42:17.984761953 CEST | 443 | 49710 | 150.171.27.254 | 192.168.2.5 |
Apr 21, 2025 19:42:17.984831095 CEST | 49710 | 443 | 192.168.2.5 | 150.171.27.254 |
Apr 21, 2025 19:42:18.586381912 CEST | 443 | 49699 | 192.178.49.164 | 192.168.2.5 |
Apr 21, 2025 19:42:18.586453915 CEST | 443 | 49699 | 192.178.49.164 | 192.168.2.5 |
Apr 21, 2025 19:42:18.586582899 CEST | 49699 | 443 | 192.168.2.5 | 192.178.49.164 |
Apr 21, 2025 19:42:19.545780897 CEST | 49699 | 443 | 192.168.2.5 | 192.178.49.164 |
Apr 21, 2025 19:42:19.545802116 CEST | 443 | 49699 | 192.178.49.164 | 192.168.2.5 |
Apr 21, 2025 19:42:19.559294939 CEST | 49676 | 443 | 192.168.2.5 | 20.189.173.14 |
Apr 21, 2025 19:43:05.637742043 CEST | 49697 | 80 | 192.168.2.5 | 142.250.68.227 |
Apr 21, 2025 19:43:05.785510063 CEST | 80 | 49697 | 142.250.68.227 | 192.168.2.5 |
Apr 21, 2025 19:43:05.785612106 CEST | 49697 | 80 | 192.168.2.5 | 142.250.68.227 |
Apr 21, 2025 19:43:08.185709000 CEST | 49715 | 443 | 192.168.2.5 | 192.178.49.164 |
Apr 21, 2025 19:43:08.185745955 CEST | 443 | 49715 | 192.178.49.164 | 192.168.2.5 |
Apr 21, 2025 19:43:08.185815096 CEST | 49715 | 443 | 192.168.2.5 | 192.178.49.164 |
Apr 21, 2025 19:43:08.186028004 CEST | 49715 | 443 | 192.168.2.5 | 192.178.49.164 |
Apr 21, 2025 19:43:08.186038017 CEST | 443 | 49715 | 192.178.49.164 | 192.168.2.5 |
Apr 21, 2025 19:43:08.499835014 CEST | 443 | 49715 | 192.178.49.164 | 192.168.2.5 |
Apr 21, 2025 19:43:08.500294924 CEST | 49715 | 443 | 192.168.2.5 | 192.178.49.164 |
Apr 21, 2025 19:43:08.500309944 CEST | 443 | 49715 | 192.178.49.164 | 192.168.2.5 |
Apr 21, 2025 19:43:18.510253906 CEST | 443 | 49715 | 192.178.49.164 | 192.168.2.5 |
Apr 21, 2025 19:43:18.510309935 CEST | 443 | 49715 | 192.178.49.164 | 192.168.2.5 |
Apr 21, 2025 19:43:18.510349989 CEST | 49715 | 443 | 192.168.2.5 | 192.178.49.164 |
Apr 21, 2025 19:43:18.552705050 CEST | 49715 | 443 | 192.168.2.5 | 192.178.49.164 |
Apr 21, 2025 19:43:18.552728891 CEST | 443 | 49715 | 192.178.49.164 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 21, 2025 19:42:03.970273972 CEST | 53 | 50510 | 1.1.1.1 | 192.168.2.5 |
Apr 21, 2025 19:42:03.972007990 CEST | 53 | 62571 | 1.1.1.1 | 192.168.2.5 |
Apr 21, 2025 19:42:04.851484060 CEST | 53 | 51388 | 1.1.1.1 | 192.168.2.5 |
Apr 21, 2025 19:42:05.132817030 CEST | 53 | 60023 | 1.1.1.1 | 192.168.2.5 |
Apr 21, 2025 19:42:08.124011040 CEST | 64080 | 53 | 192.168.2.5 | 1.1.1.1 |
Apr 21, 2025 19:42:08.124250889 CEST | 63969 | 53 | 192.168.2.5 | 1.1.1.1 |
Apr 21, 2025 19:42:08.264203072 CEST | 53 | 64080 | 1.1.1.1 | 192.168.2.5 |
Apr 21, 2025 19:42:08.264659882 CEST | 53 | 63969 | 1.1.1.1 | 192.168.2.5 |
Apr 21, 2025 19:42:09.285056114 CEST | 54455 | 53 | 192.168.2.5 | 1.1.1.1 |
Apr 21, 2025 19:42:09.285794973 CEST | 61093 | 53 | 192.168.2.5 | 1.1.1.1 |
Apr 21, 2025 19:42:09.457485914 CEST | 53 | 54455 | 1.1.1.1 | 192.168.2.5 |
Apr 21, 2025 19:42:09.459031105 CEST | 53 | 61093 | 1.1.1.1 | 192.168.2.5 |
Apr 21, 2025 19:42:10.784046888 CEST | 53 | 52920 | 1.1.1.1 | 192.168.2.5 |
Apr 21, 2025 19:42:22.160053015 CEST | 53 | 54458 | 1.1.1.1 | 192.168.2.5 |
Apr 21, 2025 19:42:40.935403109 CEST | 53 | 58146 | 1.1.1.1 | 192.168.2.5 |
Apr 21, 2025 19:43:03.421060085 CEST | 53 | 56310 | 1.1.1.1 | 192.168.2.5 |
Apr 21, 2025 19:43:03.533793926 CEST | 53 | 58969 | 1.1.1.1 | 192.168.2.5 |
Apr 21, 2025 19:43:03.644805908 CEST | 138 | 138 | 192.168.2.5 | 192.168.2.255 |
Apr 21, 2025 19:43:06.779014111 CEST | 53 | 62271 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Apr 21, 2025 19:42:08.124011040 CEST | 192.168.2.5 | 1.1.1.1 | 0xbc5d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 21, 2025 19:42:08.124250889 CEST | 192.168.2.5 | 1.1.1.1 | 0x3143 | Standard query (0) | 65 | IN (0x0001) | false | |
Apr 21, 2025 19:42:09.285056114 CEST | 192.168.2.5 | 1.1.1.1 | 0x7882 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 21, 2025 19:42:09.285794973 CEST | 192.168.2.5 | 1.1.1.1 | 0x129c | Standard query (0) | 65 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Apr 21, 2025 19:42:08.264203072 CEST | 1.1.1.1 | 192.168.2.5 | 0xbc5d | No error (0) | 192.178.49.164 | A (IP address) | IN (0x0001) | false | ||
Apr 21, 2025 19:42:08.264659882 CEST | 1.1.1.1 | 192.168.2.5 | 0x3143 | No error (0) | 65 | IN (0x0001) | false | |||
Apr 21, 2025 19:42:09.457485914 CEST | 1.1.1.1 | 192.168.2.5 | 0x7882 | No error (0) | 172.67.153.22 | A (IP address) | IN (0x0001) | false | ||
Apr 21, 2025 19:42:09.457485914 CEST | 1.1.1.1 | 192.168.2.5 | 0x7882 | No error (0) | 104.21.32.171 | A (IP address) | IN (0x0001) | false | ||
Apr 21, 2025 19:42:09.459031105 CEST | 1.1.1.1 | 192.168.2.5 | 0x129c | No error (0) | 65 | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port |
---|---|---|---|---|
0 | 192.168.2.5 | 49697 | 142.250.68.227 | 80 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Apr 21, 2025 19:42:05.326396942 CEST | 200 | OUT | |
Apr 21, 2025 19:42:05.474706888 CEST | 1243 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49701 | 172.67.153.22 | 443 | 6816 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-04-21 17:42:09 UTC | 659 | OUT | |
2025-04-21 17:42:10 UTC | 352 | IN | |
2025-04-21 17:42:10 UTC | 1017 | IN | |
2025-04-21 17:42:10 UTC | 1239 | IN | |
2025-04-21 17:42:10 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49702 | 172.67.153.22 | 443 | 6816 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-04-21 17:42:11 UTC | 581 | OUT | |
2025-04-21 17:42:12 UTC | 284 | IN | |
2025-04-21 17:42:12 UTC | 278 | IN | |
2025-04-21 17:42:12 UTC | 5 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 1 |
Start time: | 13:41:56 |
Start date: | 21/04/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff768d10000 |
File size: | 3'388'000 bytes |
MD5 hash: | E81F54E6C1129887AEA47E7D092680BF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 4 |
Start time: | 13:42:01 |
Start date: | 21/04/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff768d10000 |
File size: | 3'388'000 bytes |
MD5 hash: | E81F54E6C1129887AEA47E7D092680BF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 8 |
Start time: | 13:42:04 |
Start date: | 21/04/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff768d10000 |
File size: | 3'388'000 bytes |
MD5 hash: | E81F54E6C1129887AEA47E7D092680BF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 11 |
Start time: | 13:42:07 |
Start date: | 21/04/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff768d10000 |
File size: | 3'388'000 bytes |
MD5 hash: | E81F54E6C1129887AEA47E7D092680BF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |