Windows
Analysis Report
https://outlook.office.com/mail/inbox/id/AAQkADc1YWE3OGU4LTk4NGEtNDczYy05MzNkLWQ1OTUwMjQ1YjUzMgAQAPLKSfo650ZHvSU0lQnO92c%3D
Overview
General Information
Detection
Score: | 0 |
Range: | 0 - 100 |
Confidence: | 80% |
Signatures
Classification
- System is w10x64
chrome.exe (PID: 2936 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --s tart-maxim ized "abou t:blank" MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 5500 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --no-pre-r ead-main-d ll --field -trial-han dle=2240,i ,912931953 2027183081 ,295444283 2803239303 ,262144 -- disable-fe atures=Opt imizationG uideModelD ownloading ,Optimizat ionHints,O ptimizatio nHintsFetc hing,Optim izationTar getPredict ion --vari ations-see d-version= 20250306-1 83004.4290 00 --mojo- platform-c hannel-han dle=2268 / prefetch:3 MD5: E81F54E6C1129887AEA47E7D092680BF)
chrome.exe (PID: 5556 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://outlo ok.office. com/mail/i nbox/id/AA QkADc1YWE3 OGU4LTk4NG EtNDczYy05 MzNkLWQ1OT UwMjQ1YjUz MgAQAPLKSf o650ZHvSU0 lQnO92c%3D " MD5: E81F54E6C1129887AEA47E7D092680BF)
- cleanup
- • Compliance
- • Networking
- • System Summary
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Window detected: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Process Injection | 1 Process Injection | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 1 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
SAT-efz.ms-acdc.office.com | 40.99.245.34 | true | false | high | |
www.google.com | 192.178.49.196 | true | false | high | |
outlook.office.com | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
192.178.49.196 | www.google.com | United States | 15169 | GOOGLEUS | false | |
40.99.245.34 | SAT-efz.ms-acdc.office.com | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false |
IP |
---|
192.168.2.4 |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1673651 |
Start date and time: | 2025-04-24 23:58:53 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 2m 6s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | https://outlook.office.com/mail/inbox/id/AAQkADc1YWE3OGU4LTk4NGEtNDczYy05MzNkLWQ1OTUwMjQ1YjUzMgAQAPLKSfo650ZHvSU0lQnO92c%3D |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 18 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | UNKNOWN |
Classification: | unknown0.win@19/0@4/3 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- URL not reachable
- Exclude process from analysis
(whitelisted): audiodg.exe, sp psvc.exe, RuntimeBroker.exe, S hellExperienceHost.exe, SIHCli ent.exe, SgrmBroker.exe, backg roundTaskHost.exe, svchost.exe - Excluded IPs from analysis (wh
itelisted): 142.250.68.238, 14 2.250.113.94, 173.194.208.84, 142.250.114.94, 142.250.69.14, 142.251.116.102, 142.251.116. 138, 142.251.116.101, 142.251. 116.113, 142.251.116.139, 142. 251.116.100, 84.201.221.36, 18 4.29.183.29, 20.109.210.53 - Excluded domains from analysis
(whitelisted): a-ring-fallbac k.msedge.net, fs.microsoft.com , clients2.google.com, account s.google.com, redirector.gvt1. com, slscr.update.microsoft.co m, ctldl.windowsupdate.com, cl ientservices.googleapis.com, c lients.l.google.com, teams-rin g.msedge.net, c.pki.goog, fe3c r.delivery.mp.microsoft.com - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtOpenFile calls found . - VT rate limit hit for: https:
//outlook.office.com/mail/inbo x/id/AAQkADc1YWE3OGU4LTk4NGEtN DczYy05MzNkLWQ1OTUwMjQ1YjUzMgA QAPLKSfo650ZHvSU0lQnO92c%3D
Download Network PCAP: filtered – full
- Total Packets: 48
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 24, 2025 23:59:51.142883062 CEST | 49671 | 443 | 192.168.2.4 | 204.79.197.203 |
Apr 24, 2025 23:59:51.752270937 CEST | 49671 | 443 | 192.168.2.4 | 204.79.197.203 |
Apr 24, 2025 23:59:52.955374002 CEST | 49671 | 443 | 192.168.2.4 | 204.79.197.203 |
Apr 24, 2025 23:59:55.361666918 CEST | 49671 | 443 | 192.168.2.4 | 204.79.197.203 |
Apr 24, 2025 23:59:59.944638014 CEST | 49678 | 443 | 192.168.2.4 | 20.189.173.27 |
Apr 25, 2025 00:00:00.182540894 CEST | 49671 | 443 | 192.168.2.4 | 204.79.197.203 |
Apr 25, 2025 00:00:00.283499002 CEST | 49678 | 443 | 192.168.2.4 | 20.189.173.27 |
Apr 25, 2025 00:00:00.985831976 CEST | 49678 | 443 | 192.168.2.4 | 20.189.173.27 |
Apr 25, 2025 00:00:02.284293890 CEST | 49678 | 443 | 192.168.2.4 | 20.189.173.27 |
Apr 25, 2025 00:00:03.568850994 CEST | 49727 | 443 | 192.168.2.4 | 192.178.49.196 |
Apr 25, 2025 00:00:03.568892002 CEST | 443 | 49727 | 192.178.49.196 | 192.168.2.4 |
Apr 25, 2025 00:00:03.568986893 CEST | 49727 | 443 | 192.168.2.4 | 192.178.49.196 |
Apr 25, 2025 00:00:03.569202900 CEST | 49727 | 443 | 192.168.2.4 | 192.178.49.196 |
Apr 25, 2025 00:00:03.569216013 CEST | 443 | 49727 | 192.178.49.196 | 192.168.2.4 |
Apr 25, 2025 00:00:03.888266087 CEST | 443 | 49727 | 192.178.49.196 | 192.168.2.4 |
Apr 25, 2025 00:00:03.888386965 CEST | 49727 | 443 | 192.168.2.4 | 192.178.49.196 |
Apr 25, 2025 00:00:03.889836073 CEST | 49727 | 443 | 192.168.2.4 | 192.178.49.196 |
Apr 25, 2025 00:00:03.889844894 CEST | 443 | 49727 | 192.178.49.196 | 192.168.2.4 |
Apr 25, 2025 00:00:03.890078068 CEST | 443 | 49727 | 192.178.49.196 | 192.168.2.4 |
Apr 25, 2025 00:00:03.940623999 CEST | 49727 | 443 | 192.168.2.4 | 192.178.49.196 |
Apr 25, 2025 00:00:04.688993931 CEST | 49678 | 443 | 192.168.2.4 | 20.189.173.27 |
Apr 25, 2025 00:00:06.232358932 CEST | 49728 | 443 | 192.168.2.4 | 40.99.245.34 |
Apr 25, 2025 00:00:06.232367039 CEST | 49729 | 443 | 192.168.2.4 | 40.99.245.34 |
Apr 25, 2025 00:00:06.232403040 CEST | 443 | 49728 | 40.99.245.34 | 192.168.2.4 |
Apr 25, 2025 00:00:06.232403040 CEST | 443 | 49729 | 40.99.245.34 | 192.168.2.4 |
Apr 25, 2025 00:00:06.232584000 CEST | 49728 | 443 | 192.168.2.4 | 40.99.245.34 |
Apr 25, 2025 00:00:06.232584953 CEST | 49729 | 443 | 192.168.2.4 | 40.99.245.34 |
Apr 25, 2025 00:00:06.232850075 CEST | 49728 | 443 | 192.168.2.4 | 40.99.245.34 |
Apr 25, 2025 00:00:06.232851028 CEST | 49729 | 443 | 192.168.2.4 | 40.99.245.34 |
Apr 25, 2025 00:00:06.232866049 CEST | 443 | 49728 | 40.99.245.34 | 192.168.2.4 |
Apr 25, 2025 00:00:06.232868910 CEST | 443 | 49729 | 40.99.245.34 | 192.168.2.4 |
Apr 25, 2025 00:00:06.776608944 CEST | 443 | 49728 | 40.99.245.34 | 192.168.2.4 |
Apr 25, 2025 00:00:06.776693106 CEST | 49728 | 443 | 192.168.2.4 | 40.99.245.34 |
Apr 25, 2025 00:00:06.780000925 CEST | 49728 | 443 | 192.168.2.4 | 40.99.245.34 |
Apr 25, 2025 00:00:06.780014038 CEST | 443 | 49728 | 40.99.245.34 | 192.168.2.4 |
Apr 25, 2025 00:00:06.780249119 CEST | 443 | 49728 | 40.99.245.34 | 192.168.2.4 |
Apr 25, 2025 00:00:06.781028986 CEST | 49728 | 443 | 192.168.2.4 | 40.99.245.34 |
Apr 25, 2025 00:00:06.782917023 CEST | 443 | 49729 | 40.99.245.34 | 192.168.2.4 |
Apr 25, 2025 00:00:06.782994032 CEST | 49729 | 443 | 192.168.2.4 | 40.99.245.34 |
Apr 25, 2025 00:00:06.794936895 CEST | 49729 | 443 | 192.168.2.4 | 40.99.245.34 |
Apr 25, 2025 00:00:06.794958115 CEST | 443 | 49729 | 40.99.245.34 | 192.168.2.4 |
Apr 25, 2025 00:00:06.795205116 CEST | 443 | 49729 | 40.99.245.34 | 192.168.2.4 |
Apr 25, 2025 00:00:06.824311972 CEST | 443 | 49728 | 40.99.245.34 | 192.168.2.4 |
Apr 25, 2025 00:00:06.840440035 CEST | 49729 | 443 | 192.168.2.4 | 40.99.245.34 |
Apr 25, 2025 00:00:07.165357113 CEST | 443 | 49728 | 40.99.245.34 | 192.168.2.4 |
Apr 25, 2025 00:00:07.165438890 CEST | 443 | 49728 | 40.99.245.34 | 192.168.2.4 |
Apr 25, 2025 00:00:07.165499926 CEST | 49728 | 443 | 192.168.2.4 | 40.99.245.34 |
Apr 25, 2025 00:00:07.166023016 CEST | 49728 | 443 | 192.168.2.4 | 40.99.245.34 |
Apr 25, 2025 00:00:07.166038990 CEST | 443 | 49728 | 40.99.245.34 | 192.168.2.4 |
Apr 25, 2025 00:00:09.501526117 CEST | 49678 | 443 | 192.168.2.4 | 20.189.173.27 |
Apr 25, 2025 00:00:09.782768965 CEST | 49671 | 443 | 192.168.2.4 | 204.79.197.203 |
Apr 25, 2025 00:00:12.146800995 CEST | 49730 | 443 | 192.168.2.4 | 131.253.33.254 |
Apr 25, 2025 00:00:12.146828890 CEST | 443 | 49730 | 131.253.33.254 | 192.168.2.4 |
Apr 25, 2025 00:00:12.146893978 CEST | 49730 | 443 | 192.168.2.4 | 131.253.33.254 |
Apr 25, 2025 00:00:12.147253036 CEST | 49730 | 443 | 192.168.2.4 | 131.253.33.254 |
Apr 25, 2025 00:00:12.147264957 CEST | 443 | 49730 | 131.253.33.254 | 192.168.2.4 |
Apr 25, 2025 00:00:12.710705042 CEST | 443 | 49730 | 131.253.33.254 | 192.168.2.4 |
Apr 25, 2025 00:00:12.710809946 CEST | 49730 | 443 | 192.168.2.4 | 131.253.33.254 |
Apr 25, 2025 00:00:13.875102997 CEST | 443 | 49727 | 192.178.49.196 | 192.168.2.4 |
Apr 25, 2025 00:00:13.875160933 CEST | 443 | 49727 | 192.178.49.196 | 192.168.2.4 |
Apr 25, 2025 00:00:13.875308037 CEST | 49727 | 443 | 192.168.2.4 | 192.178.49.196 |
Apr 25, 2025 00:00:14.409342051 CEST | 49727 | 443 | 192.168.2.4 | 192.178.49.196 |
Apr 25, 2025 00:00:14.409373999 CEST | 443 | 49727 | 192.178.49.196 | 192.168.2.4 |
Apr 25, 2025 00:00:16.063569069 CEST | 49734 | 80 | 192.168.2.4 | 142.250.68.227 |
Apr 25, 2025 00:00:16.210963011 CEST | 80 | 49734 | 142.250.68.227 | 192.168.2.4 |
Apr 25, 2025 00:00:16.211055040 CEST | 49734 | 80 | 192.168.2.4 | 142.250.68.227 |
Apr 25, 2025 00:00:16.211365938 CEST | 49734 | 80 | 192.168.2.4 | 142.250.68.227 |
Apr 25, 2025 00:00:16.359421015 CEST | 80 | 49734 | 142.250.68.227 | 192.168.2.4 |
Apr 25, 2025 00:00:16.359870911 CEST | 80 | 49734 | 142.250.68.227 | 192.168.2.4 |
Apr 25, 2025 00:00:16.410295963 CEST | 49734 | 80 | 192.168.2.4 | 142.250.68.227 |
Apr 25, 2025 00:00:19.102459908 CEST | 49678 | 443 | 192.168.2.4 | 20.189.173.27 |
Apr 25, 2025 00:00:23.724118948 CEST | 49738 | 443 | 192.168.2.4 | 40.99.245.34 |
Apr 25, 2025 00:00:23.724159956 CEST | 443 | 49738 | 40.99.245.34 | 192.168.2.4 |
Apr 25, 2025 00:00:23.724706888 CEST | 49738 | 443 | 192.168.2.4 | 40.99.245.34 |
Apr 25, 2025 00:00:23.725100040 CEST | 49738 | 443 | 192.168.2.4 | 40.99.245.34 |
Apr 25, 2025 00:00:23.725112915 CEST | 443 | 49738 | 40.99.245.34 | 192.168.2.4 |
Apr 25, 2025 00:00:23.738291979 CEST | 49729 | 443 | 192.168.2.4 | 40.99.245.34 |
Apr 25, 2025 00:00:23.780276060 CEST | 443 | 49729 | 40.99.245.34 | 192.168.2.4 |
Apr 25, 2025 00:00:23.969824076 CEST | 443 | 49729 | 40.99.245.34 | 192.168.2.4 |
Apr 25, 2025 00:00:23.969902039 CEST | 443 | 49729 | 40.99.245.34 | 192.168.2.4 |
Apr 25, 2025 00:00:23.970124960 CEST | 49729 | 443 | 192.168.2.4 | 40.99.245.34 |
Apr 25, 2025 00:00:23.970350981 CEST | 49729 | 443 | 192.168.2.4 | 40.99.245.34 |
Apr 25, 2025 00:00:23.970369101 CEST | 443 | 49729 | 40.99.245.34 | 192.168.2.4 |
Apr 25, 2025 00:00:23.970380068 CEST | 49729 | 443 | 192.168.2.4 | 40.99.245.34 |
Apr 25, 2025 00:00:23.970782995 CEST | 49729 | 443 | 192.168.2.4 | 40.99.245.34 |
Apr 25, 2025 00:00:24.264106035 CEST | 443 | 49738 | 40.99.245.34 | 192.168.2.4 |
Apr 25, 2025 00:00:24.264466047 CEST | 49738 | 443 | 192.168.2.4 | 40.99.245.34 |
Apr 25, 2025 00:00:24.264492035 CEST | 443 | 49738 | 40.99.245.34 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 25, 2025 00:00:00.387044907 CEST | 53 | 63070 | 1.1.1.1 | 192.168.2.4 |
Apr 25, 2025 00:00:00.855829954 CEST | 53 | 55497 | 1.1.1.1 | 192.168.2.4 |
Apr 25, 2025 00:00:01.602386951 CEST | 53 | 54456 | 1.1.1.1 | 192.168.2.4 |
Apr 25, 2025 00:00:02.089513063 CEST | 53 | 57672 | 1.1.1.1 | 192.168.2.4 |
Apr 25, 2025 00:00:03.426098108 CEST | 54392 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 25, 2025 00:00:03.427143097 CEST | 53707 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 25, 2025 00:00:03.566652060 CEST | 53 | 54392 | 1.1.1.1 | 192.168.2.4 |
Apr 25, 2025 00:00:03.567873001 CEST | 53 | 53707 | 1.1.1.1 | 192.168.2.4 |
Apr 25, 2025 00:00:06.088391066 CEST | 60328 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 25, 2025 00:00:06.088391066 CEST | 59703 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 25, 2025 00:00:06.228754044 CEST | 53 | 59703 | 1.1.1.1 | 192.168.2.4 |
Apr 25, 2025 00:00:06.231184959 CEST | 53 | 60328 | 1.1.1.1 | 192.168.2.4 |
Apr 25, 2025 00:00:19.243774891 CEST | 53 | 58441 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Apr 25, 2025 00:00:03.426098108 CEST | 192.168.2.4 | 1.1.1.1 | 0x88df | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 25, 2025 00:00:03.427143097 CEST | 192.168.2.4 | 1.1.1.1 | 0xf31d | Standard query (0) | 65 | IN (0x0001) | false | |
Apr 25, 2025 00:00:06.088391066 CEST | 192.168.2.4 | 1.1.1.1 | 0x21ec | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 25, 2025 00:00:06.088391066 CEST | 192.168.2.4 | 1.1.1.1 | 0xc1fb | Standard query (0) | 65 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Apr 25, 2025 00:00:03.566652060 CEST | 1.1.1.1 | 192.168.2.4 | 0x88df | No error (0) | 192.178.49.196 | A (IP address) | IN (0x0001) | false | ||
Apr 25, 2025 00:00:03.567873001 CEST | 1.1.1.1 | 192.168.2.4 | 0xf31d | No error (0) | 65 | IN (0x0001) | false | |||
Apr 25, 2025 00:00:06.228754044 CEST | 1.1.1.1 | 192.168.2.4 | 0xc1fb | No error (0) | substrate.office.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 25, 2025 00:00:06.228754044 CEST | 1.1.1.1 | 192.168.2.4 | 0xc1fb | No error (0) | outlook.office365.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 25, 2025 00:00:06.228754044 CEST | 1.1.1.1 | 192.168.2.4 | 0xc1fb | No error (0) | ooc-g2.tm-4.office.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 25, 2025 00:00:06.231184959 CEST | 1.1.1.1 | 192.168.2.4 | 0x21ec | No error (0) | substrate.office.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 25, 2025 00:00:06.231184959 CEST | 1.1.1.1 | 192.168.2.4 | 0x21ec | No error (0) | outlook.office365.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 25, 2025 00:00:06.231184959 CEST | 1.1.1.1 | 192.168.2.4 | 0x21ec | No error (0) | ooc-g2.tm-4.office.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 25, 2025 00:00:06.231184959 CEST | 1.1.1.1 | 192.168.2.4 | 0x21ec | No error (0) | outlook.ms-acdc.office.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 25, 2025 00:00:06.231184959 CEST | 1.1.1.1 | 192.168.2.4 | 0x21ec | No error (0) | SAT-efz.ms-acdc.office.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 25, 2025 00:00:06.231184959 CEST | 1.1.1.1 | 192.168.2.4 | 0x21ec | No error (0) | 40.99.245.34 | A (IP address) | IN (0x0001) | false | ||
Apr 25, 2025 00:00:06.231184959 CEST | 1.1.1.1 | 192.168.2.4 | 0x21ec | No error (0) | 40.99.169.162 | A (IP address) | IN (0x0001) | false | ||
Apr 25, 2025 00:00:06.231184959 CEST | 1.1.1.1 | 192.168.2.4 | 0x21ec | No error (0) | 40.97.121.18 | A (IP address) | IN (0x0001) | false | ||
Apr 25, 2025 00:00:06.231184959 CEST | 1.1.1.1 | 192.168.2.4 | 0x21ec | No error (0) | 52.96.57.98 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port |
---|---|---|---|---|
0 | 192.168.2.4 | 49734 | 142.250.68.227 | 80 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Apr 25, 2025 00:00:16.211365938 CEST | 200 | OUT | |
Apr 25, 2025 00:00:16.359870911 CEST | 1242 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49728 | 40.99.245.34 | 443 | 5500 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-04-24 22:00:06 UTC | 764 | OUT | |
2025-04-24 22:00:07 UTC | 664 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49729 | 40.99.245.34 | 443 | 5500 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-04-24 22:00:23 UTC | 796 | OUT | |
2025-04-24 22:00:23 UTC | 664 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 1 |
Start time: | 17:59:55 |
Start date: | 24/04/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff786830000 |
File size: | 3'388'000 bytes |
MD5 hash: | E81F54E6C1129887AEA47E7D092680BF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 2 |
Start time: | 17:59:57 |
Start date: | 24/04/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff786830000 |
File size: | 3'388'000 bytes |
MD5 hash: | E81F54E6C1129887AEA47E7D092680BF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 9 |
Start time: | 18:00:05 |
Start date: | 24/04/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff786830000 |
File size: | 3'388'000 bytes |
MD5 hash: | E81F54E6C1129887AEA47E7D092680BF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |