Windows
Analysis Report
https://res.cdn.office.net/assets/mail/file-icon/png/folder_16x16.png
Overview
General Information
Detection
Score: | 0 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
chrome.exe (PID: 5360 cmdline:
C:\Program Files\Goo gle\Chrome \Applicati on\chrome. exe" --sta rt-maximiz ed "about: blank MD5: 0FEC2748F363150DC54C1CAFFB1A9408) chrome.exe (PID: 5156 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =1960 --fi eld-trial- handle=179 2,i,128192 5120081785 6026,17660 1127228487 26206,1310 72 --disab le-feature s=Optimiza tionGuideM odelDownlo ading,Opti mizationHi nts,Optimi zationTarg etPredicti on /prefet ch:8 MD5: 0FEC2748F363150DC54C1CAFFB1A9408)
chrome.exe (PID: 5124 cmdline:
C:\Program Files\Goo gle\Chrome \Applicati on\chrome. exe" "http s://res.cd n.office.n et/assets/ mail/file- icon/png/f older_16x1 6.png MD5: 0FEC2748F363150DC54C1CAFFB1A9408)
- cleanup
- • Compliance
- • Networking
- • System Summary
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | Directory created: | Jump to behavior |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTP traffic detected: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Directory created: | Jump to behavior |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Process Injection | 2 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | 1 Encrypted Channel | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | 3 Non-Application Layer Protocol | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | 4 Application Layer Protocol | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | 1 Ingress Tool Transfer | SIM Card Swap | Carrier Billing Fraud |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
1% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
accounts.google.com | 142.250.203.109 | true | false | high | |
www.google.com | 142.250.203.100 | true | false | high | |
clients.l.google.com | 142.250.203.110 | true | false | high | |
clients2.google.com | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.250.203.100 | www.google.com | United States | 15169 | GOOGLEUS | false | |
142.250.203.110 | clients.l.google.com | United States | 15169 | GOOGLEUS | false | |
142.250.203.109 | accounts.google.com | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.1 |
127.0.0.1 |
Joe Sandbox Version: | 37.0.0 Beryl |
Analysis ID: | 824073 |
Start date and time: | 2023-03-10 13:51:55 +01:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 4m 28s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | https://res.cdn.office.net/assets/mail/file-icon/png/folder_16x16.png |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 10 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean0.win@25/2@5/6 |
EGA Information: | Failed |
HDC Information: | Failed |
HCA Information: |
|
- Exclude process from analysis
(whitelisted): SgrmBroker.exe, svchost.exe - Excluded IPs from analysis (wh
itelisted): 142.250.203.99, 10 4.109.250.194, 104.109.250.187 , 104.109.250.172, 104.109.250 .170, 104.109.250.180, 104.109 .250.149, 104.109.250.189, 104 .109.250.179, 34.104.35.123 - Excluded domains from analysis
(whitelisted): www.bing.com, e40491.dscg.akamaiedge.net, cl ient.wns.windows.com, fs.micro soft.com, ctldl.windowsupdate. com, clientservices.googleapis .com, res-prod.trafficmanager. net, owamail.public.cdn.office .net.edgekey.net, edgedl.me.gv t1.com, update.googleapis.com, owamail.public.cdn.office.net .edgekey.net.globalredir.akadn s.net, res.cdn.office.net, res -1-tls.cdn.office.net - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtWriteVirtualMemory c alls found.
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 144 |
Entropy (8bit): | 5.694778733555366 |
Encrypted: | false |
SSDEEP: | 3:yionv//thPl9vt3lUkC9/h+qOef/nx5eoKkPxO/o9h5YPGwHRtsup:6v/lhPU3+qO6x5Zhh/wxeup |
MD5: | E06BF183DB660F2327897036FD13D149 |
SHA1: | C8F0CBCDE837E86CEB109EBC92C08816A0047A81 |
SHA-256: | 74E33FADBA887770E73E3BBA12EFFB49AEE834E7DD593FA2D3FF2622B701FA92 |
SHA-512: | 8641E669B582508B82B9B105DEC9CDCDCA4032DC868870335E690FAB2D367014D50ECFE28574A36E5C02DD6D26F719FD49156AA66101EF34124B9537D39F427E |
Malicious: | false |
Reputation: | low |
URL: | https://res.cdn.office.net/assets/mail/file-icon/png/folder_16x16.png |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 226 |
Entropy (8bit): | 5.283689221751446 |
Encrypted: | false |
SSDEEP: | 6:JiMVBdgqZj8DHgWdzRiAU2uvxV1uWDv2WCnHoAWAg6n:MMHdVBMHgWdzR05BDDCHoAWF6 |
MD5: | 76707744898079486CD57CE41C00D5D0 |
SHA1: | 84FB6EB62B3BD97BD0AA2804A99F77DE4073E7B5 |
SHA-256: | BC0EF1E863FF71D5B8681A9E43FE216CF68C4F5AF13A000E658A1F0BDA5D3EE9 |
SHA-512: | 56286D887218A9B670EFF32FFFACACF51DCD32E7304D5F4DE931A81E3B8F83A32E228773C8AB071BCD8F0EED43ED20F9F3B1E2AF0128252C55572D17F81AF7AA |
Malicious: | false |
Reputation: | low |
URL: | https://res.cdn.office.net/favicon.ico |
Preview: |
Download Network PCAP: filtered – full
- Total Packets: 69
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 10, 2023 13:52:57.412384987 CET | 49711 | 443 | 192.168.2.6 | 142.250.203.110 |
Mar 10, 2023 13:52:57.412431002 CET | 443 | 49711 | 142.250.203.110 | 192.168.2.6 |
Mar 10, 2023 13:52:57.412520885 CET | 49711 | 443 | 192.168.2.6 | 142.250.203.110 |
Mar 10, 2023 13:52:57.415251970 CET | 49712 | 443 | 192.168.2.6 | 142.250.203.110 |
Mar 10, 2023 13:52:57.415311098 CET | 443 | 49712 | 142.250.203.110 | 192.168.2.6 |
Mar 10, 2023 13:52:57.415383101 CET | 49712 | 443 | 192.168.2.6 | 142.250.203.110 |
Mar 10, 2023 13:52:57.415610075 CET | 49711 | 443 | 192.168.2.6 | 142.250.203.110 |
Mar 10, 2023 13:52:57.415637016 CET | 443 | 49711 | 142.250.203.110 | 192.168.2.6 |
Mar 10, 2023 13:52:57.416099072 CET | 49712 | 443 | 192.168.2.6 | 142.250.203.110 |
Mar 10, 2023 13:52:57.416112900 CET | 443 | 49712 | 142.250.203.110 | 192.168.2.6 |
Mar 10, 2023 13:52:57.489087105 CET | 443 | 49711 | 142.250.203.110 | 192.168.2.6 |
Mar 10, 2023 13:52:57.494798899 CET | 443 | 49712 | 142.250.203.110 | 192.168.2.6 |
Mar 10, 2023 13:52:57.531388998 CET | 49711 | 443 | 192.168.2.6 | 142.250.203.110 |
Mar 10, 2023 13:52:57.541348934 CET | 49712 | 443 | 192.168.2.6 | 142.250.203.110 |
Mar 10, 2023 13:52:58.447490931 CET | 49712 | 443 | 192.168.2.6 | 142.250.203.110 |
Mar 10, 2023 13:52:58.447561979 CET | 443 | 49712 | 142.250.203.110 | 192.168.2.6 |
Mar 10, 2023 13:52:58.447714090 CET | 49711 | 443 | 192.168.2.6 | 142.250.203.110 |
Mar 10, 2023 13:52:58.447751999 CET | 443 | 49711 | 142.250.203.110 | 192.168.2.6 |
Mar 10, 2023 13:52:58.449394941 CET | 443 | 49712 | 142.250.203.110 | 192.168.2.6 |
Mar 10, 2023 13:52:58.449434042 CET | 443 | 49711 | 142.250.203.110 | 192.168.2.6 |
Mar 10, 2023 13:52:58.449451923 CET | 49713 | 443 | 192.168.2.6 | 142.250.203.109 |
Mar 10, 2023 13:52:58.449505091 CET | 443 | 49713 | 142.250.203.109 | 192.168.2.6 |
Mar 10, 2023 13:52:58.449558020 CET | 49712 | 443 | 192.168.2.6 | 142.250.203.110 |
Mar 10, 2023 13:52:58.449580908 CET | 49711 | 443 | 192.168.2.6 | 142.250.203.110 |
Mar 10, 2023 13:52:58.449610949 CET | 49713 | 443 | 192.168.2.6 | 142.250.203.109 |
Mar 10, 2023 13:52:58.450438023 CET | 49714 | 443 | 192.168.2.6 | 142.250.203.109 |
Mar 10, 2023 13:52:58.450493097 CET | 443 | 49714 | 142.250.203.109 | 192.168.2.6 |
Mar 10, 2023 13:52:58.450575113 CET | 49714 | 443 | 192.168.2.6 | 142.250.203.109 |
Mar 10, 2023 13:52:58.452964067 CET | 443 | 49712 | 142.250.203.110 | 192.168.2.6 |
Mar 10, 2023 13:52:58.453052998 CET | 49712 | 443 | 192.168.2.6 | 142.250.203.110 |
Mar 10, 2023 13:52:58.453104019 CET | 443 | 49711 | 142.250.203.110 | 192.168.2.6 |
Mar 10, 2023 13:52:58.453176022 CET | 49711 | 443 | 192.168.2.6 | 142.250.203.110 |
Mar 10, 2023 13:52:58.479825974 CET | 49713 | 443 | 192.168.2.6 | 142.250.203.109 |
Mar 10, 2023 13:52:58.479865074 CET | 443 | 49713 | 142.250.203.109 | 192.168.2.6 |
Mar 10, 2023 13:52:58.480279922 CET | 49714 | 443 | 192.168.2.6 | 142.250.203.109 |
Mar 10, 2023 13:52:58.480314970 CET | 443 | 49714 | 142.250.203.109 | 192.168.2.6 |
Mar 10, 2023 13:52:58.481028080 CET | 49712 | 443 | 192.168.2.6 | 142.250.203.110 |
Mar 10, 2023 13:52:58.481087923 CET | 443 | 49712 | 142.250.203.110 | 192.168.2.6 |
Mar 10, 2023 13:52:58.481403112 CET | 49712 | 443 | 192.168.2.6 | 142.250.203.110 |
Mar 10, 2023 13:52:58.481432915 CET | 443 | 49712 | 142.250.203.110 | 192.168.2.6 |
Mar 10, 2023 13:52:58.481628895 CET | 443 | 49712 | 142.250.203.110 | 192.168.2.6 |
Mar 10, 2023 13:52:58.481640100 CET | 49711 | 443 | 192.168.2.6 | 142.250.203.110 |
Mar 10, 2023 13:52:58.481683969 CET | 443 | 49711 | 142.250.203.110 | 192.168.2.6 |
Mar 10, 2023 13:52:58.482095003 CET | 443 | 49711 | 142.250.203.110 | 192.168.2.6 |
Mar 10, 2023 13:52:58.516316891 CET | 443 | 49712 | 142.250.203.110 | 192.168.2.6 |
Mar 10, 2023 13:52:58.516436100 CET | 49712 | 443 | 192.168.2.6 | 142.250.203.110 |
Mar 10, 2023 13:52:58.516473055 CET | 443 | 49712 | 142.250.203.110 | 192.168.2.6 |
Mar 10, 2023 13:52:58.516690016 CET | 443 | 49712 | 142.250.203.110 | 192.168.2.6 |
Mar 10, 2023 13:52:58.516793013 CET | 49712 | 443 | 192.168.2.6 | 142.250.203.110 |
Mar 10, 2023 13:52:58.528702021 CET | 49712 | 443 | 192.168.2.6 | 142.250.203.110 |
Mar 10, 2023 13:52:58.528739929 CET | 443 | 49712 | 142.250.203.110 | 192.168.2.6 |
Mar 10, 2023 13:52:58.571608067 CET | 49711 | 443 | 192.168.2.6 | 142.250.203.110 |
Mar 10, 2023 13:52:58.571635008 CET | 443 | 49711 | 142.250.203.110 | 192.168.2.6 |
Mar 10, 2023 13:52:58.591173887 CET | 443 | 49713 | 142.250.203.109 | 192.168.2.6 |
Mar 10, 2023 13:52:58.591202021 CET | 443 | 49714 | 142.250.203.109 | 192.168.2.6 |
Mar 10, 2023 13:52:58.598560095 CET | 49714 | 443 | 192.168.2.6 | 142.250.203.109 |
Mar 10, 2023 13:52:58.598618984 CET | 443 | 49714 | 142.250.203.109 | 192.168.2.6 |
Mar 10, 2023 13:52:58.598779917 CET | 49713 | 443 | 192.168.2.6 | 142.250.203.109 |
Mar 10, 2023 13:52:58.598809958 CET | 443 | 49713 | 142.250.203.109 | 192.168.2.6 |
Mar 10, 2023 13:52:58.600087881 CET | 443 | 49714 | 142.250.203.109 | 192.168.2.6 |
Mar 10, 2023 13:52:58.600183010 CET | 49714 | 443 | 192.168.2.6 | 142.250.203.109 |
Mar 10, 2023 13:52:58.600207090 CET | 443 | 49713 | 142.250.203.109 | 192.168.2.6 |
Mar 10, 2023 13:52:58.600274086 CET | 49713 | 443 | 192.168.2.6 | 142.250.203.109 |
Mar 10, 2023 13:52:58.642244101 CET | 49714 | 443 | 192.168.2.6 | 142.250.203.109 |
Mar 10, 2023 13:52:58.642292976 CET | 443 | 49714 | 142.250.203.109 | 192.168.2.6 |
Mar 10, 2023 13:52:58.642487049 CET | 443 | 49714 | 142.250.203.109 | 192.168.2.6 |
Mar 10, 2023 13:52:58.643002033 CET | 49713 | 443 | 192.168.2.6 | 142.250.203.109 |
Mar 10, 2023 13:52:58.643037081 CET | 443 | 49713 | 142.250.203.109 | 192.168.2.6 |
Mar 10, 2023 13:52:58.643263102 CET | 49714 | 443 | 192.168.2.6 | 142.250.203.109 |
Mar 10, 2023 13:52:58.643312931 CET | 443 | 49714 | 142.250.203.109 | 192.168.2.6 |
Mar 10, 2023 13:52:58.643349886 CET | 443 | 49713 | 142.250.203.109 | 192.168.2.6 |
Mar 10, 2023 13:52:58.691456079 CET | 49713 | 443 | 192.168.2.6 | 142.250.203.109 |
Mar 10, 2023 13:52:58.691498995 CET | 443 | 49713 | 142.250.203.109 | 192.168.2.6 |
Mar 10, 2023 13:52:58.697096109 CET | 443 | 49714 | 142.250.203.109 | 192.168.2.6 |
Mar 10, 2023 13:52:58.697269917 CET | 49714 | 443 | 192.168.2.6 | 142.250.203.109 |
Mar 10, 2023 13:52:58.697309971 CET | 443 | 49714 | 142.250.203.109 | 192.168.2.6 |
Mar 10, 2023 13:52:58.697465897 CET | 443 | 49714 | 142.250.203.109 | 192.168.2.6 |
Mar 10, 2023 13:52:58.697556019 CET | 49714 | 443 | 192.168.2.6 | 142.250.203.109 |
Mar 10, 2023 13:52:58.706269979 CET | 49714 | 443 | 192.168.2.6 | 142.250.203.109 |
Mar 10, 2023 13:52:58.706331968 CET | 443 | 49714 | 142.250.203.109 | 192.168.2.6 |
Mar 10, 2023 13:52:58.762186050 CET | 49711 | 443 | 192.168.2.6 | 142.250.203.110 |
Mar 10, 2023 13:52:58.791407108 CET | 49713 | 443 | 192.168.2.6 | 142.250.203.109 |
Mar 10, 2023 13:52:59.674230099 CET | 49720 | 443 | 192.168.2.6 | 142.250.203.100 |
Mar 10, 2023 13:52:59.674302101 CET | 443 | 49720 | 142.250.203.100 | 192.168.2.6 |
Mar 10, 2023 13:52:59.674385071 CET | 49720 | 443 | 192.168.2.6 | 142.250.203.100 |
Mar 10, 2023 13:52:59.675390959 CET | 49720 | 443 | 192.168.2.6 | 142.250.203.100 |
Mar 10, 2023 13:52:59.675429106 CET | 443 | 49720 | 142.250.203.100 | 192.168.2.6 |
Mar 10, 2023 13:52:59.739063978 CET | 443 | 49720 | 142.250.203.100 | 192.168.2.6 |
Mar 10, 2023 13:52:59.739427090 CET | 49720 | 443 | 192.168.2.6 | 142.250.203.100 |
Mar 10, 2023 13:52:59.739474058 CET | 443 | 49720 | 142.250.203.100 | 192.168.2.6 |
Mar 10, 2023 13:52:59.741677999 CET | 443 | 49720 | 142.250.203.100 | 192.168.2.6 |
Mar 10, 2023 13:52:59.741820097 CET | 49720 | 443 | 192.168.2.6 | 142.250.203.100 |
Mar 10, 2023 13:52:59.753680944 CET | 49720 | 443 | 192.168.2.6 | 142.250.203.100 |
Mar 10, 2023 13:52:59.753721952 CET | 443 | 49720 | 142.250.203.100 | 192.168.2.6 |
Mar 10, 2023 13:52:59.754029036 CET | 443 | 49720 | 142.250.203.100 | 192.168.2.6 |
Mar 10, 2023 13:52:59.891556978 CET | 49720 | 443 | 192.168.2.6 | 142.250.203.100 |
Mar 10, 2023 13:52:59.891606092 CET | 443 | 49720 | 142.250.203.100 | 192.168.2.6 |
Mar 10, 2023 13:52:59.991549015 CET | 49720 | 443 | 192.168.2.6 | 142.250.203.100 |
Mar 10, 2023 13:53:09.786345959 CET | 443 | 49720 | 142.250.203.100 | 192.168.2.6 |
Mar 10, 2023 13:53:09.786468029 CET | 443 | 49720 | 142.250.203.100 | 192.168.2.6 |
Mar 10, 2023 13:53:09.786613941 CET | 49720 | 443 | 192.168.2.6 | 142.250.203.100 |
Mar 10, 2023 13:53:14.545773029 CET | 49720 | 443 | 192.168.2.6 | 142.250.203.100 |
Mar 10, 2023 13:53:14.545830011 CET | 443 | 49720 | 142.250.203.100 | 192.168.2.6 |
Mar 10, 2023 13:53:43.580347061 CET | 49711 | 443 | 192.168.2.6 | 142.250.203.110 |
Mar 10, 2023 13:53:43.580374956 CET | 443 | 49711 | 142.250.203.110 | 192.168.2.6 |
Mar 10, 2023 13:53:43.705336094 CET | 49713 | 443 | 192.168.2.6 | 142.250.203.109 |
Mar 10, 2023 13:53:43.705368042 CET | 443 | 49713 | 142.250.203.109 | 192.168.2.6 |
Mar 10, 2023 13:53:59.649588108 CET | 49713 | 443 | 192.168.2.6 | 142.250.203.109 |
Mar 10, 2023 13:53:59.649674892 CET | 49711 | 443 | 192.168.2.6 | 142.250.203.110 |
Mar 10, 2023 13:53:59.649791956 CET | 443 | 49713 | 142.250.203.109 | 192.168.2.6 |
Mar 10, 2023 13:53:59.649878979 CET | 49713 | 443 | 192.168.2.6 | 142.250.203.109 |
Mar 10, 2023 13:53:59.650126934 CET | 49786 | 443 | 192.168.2.6 | 142.250.203.100 |
Mar 10, 2023 13:53:59.650172949 CET | 443 | 49786 | 142.250.203.100 | 192.168.2.6 |
Mar 10, 2023 13:53:59.650248051 CET | 49786 | 443 | 192.168.2.6 | 142.250.203.100 |
Mar 10, 2023 13:53:59.650356054 CET | 443 | 49711 | 142.250.203.110 | 192.168.2.6 |
Mar 10, 2023 13:53:59.650434017 CET | 49711 | 443 | 192.168.2.6 | 142.250.203.110 |
Mar 10, 2023 13:53:59.650883913 CET | 49786 | 443 | 192.168.2.6 | 142.250.203.100 |
Mar 10, 2023 13:53:59.650907040 CET | 443 | 49786 | 142.250.203.100 | 192.168.2.6 |
Mar 10, 2023 13:53:59.706499100 CET | 443 | 49786 | 142.250.203.100 | 192.168.2.6 |
Mar 10, 2023 13:53:59.707103968 CET | 49786 | 443 | 192.168.2.6 | 142.250.203.100 |
Mar 10, 2023 13:53:59.707155943 CET | 443 | 49786 | 142.250.203.100 | 192.168.2.6 |
Mar 10, 2023 13:53:59.707833052 CET | 443 | 49786 | 142.250.203.100 | 192.168.2.6 |
Mar 10, 2023 13:53:59.708508968 CET | 49786 | 443 | 192.168.2.6 | 142.250.203.100 |
Mar 10, 2023 13:53:59.708544016 CET | 443 | 49786 | 142.250.203.100 | 192.168.2.6 |
Mar 10, 2023 13:53:59.708656073 CET | 443 | 49786 | 142.250.203.100 | 192.168.2.6 |
Mar 10, 2023 13:53:59.753532887 CET | 49786 | 443 | 192.168.2.6 | 142.250.203.100 |
Mar 10, 2023 13:54:09.703752041 CET | 443 | 49786 | 142.250.203.100 | 192.168.2.6 |
Mar 10, 2023 13:54:09.703862906 CET | 443 | 49786 | 142.250.203.100 | 192.168.2.6 |
Mar 10, 2023 13:54:09.704020977 CET | 49786 | 443 | 192.168.2.6 | 142.250.203.100 |
Mar 10, 2023 13:54:11.515899897 CET | 49786 | 443 | 192.168.2.6 | 142.250.203.100 |
Mar 10, 2023 13:54:11.515928984 CET | 443 | 49786 | 142.250.203.100 | 192.168.2.6 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 10, 2023 13:52:56.086560965 CET | 49448 | 53 | 192.168.2.6 | 8.8.8.8 |
Mar 10, 2023 13:52:56.113842964 CET | 53 | 49448 | 8.8.8.8 | 192.168.2.6 |
Mar 10, 2023 13:52:56.115852118 CET | 59082 | 53 | 192.168.2.6 | 8.8.8.8 |
Mar 10, 2023 13:52:56.155571938 CET | 53 | 59082 | 8.8.8.8 | 192.168.2.6 |
Mar 10, 2023 13:52:59.567552090 CET | 54903 | 53 | 192.168.2.6 | 8.8.8.8 |
Mar 10, 2023 13:52:59.586787939 CET | 53 | 54903 | 8.8.8.8 | 192.168.2.6 |
Mar 10, 2023 13:52:59.650439024 CET | 51530 | 53 | 192.168.2.6 | 8.8.8.8 |
Mar 10, 2023 13:52:59.669697046 CET | 53 | 51530 | 8.8.8.8 | 192.168.2.6 |
Mar 10, 2023 13:53:59.596425056 CET | 56750 | 53 | 192.168.2.6 | 8.8.8.8 |
Mar 10, 2023 13:53:59.613883018 CET | 53 | 56750 | 8.8.8.8 | 192.168.2.6 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Mar 10, 2023 13:52:56.086560965 CET | 192.168.2.6 | 8.8.8.8 | 0xf39f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 10, 2023 13:52:56.115852118 CET | 192.168.2.6 | 8.8.8.8 | 0x2956 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 10, 2023 13:52:59.567552090 CET | 192.168.2.6 | 8.8.8.8 | 0x2ffb | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 10, 2023 13:52:59.650439024 CET | 192.168.2.6 | 8.8.8.8 | 0x8b8d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 10, 2023 13:53:59.596425056 CET | 192.168.2.6 | 8.8.8.8 | 0x6f4d | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Mar 10, 2023 13:52:56.113842964 CET | 8.8.8.8 | 192.168.2.6 | 0xf39f | No error (0) | clients.l.google.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 10, 2023 13:52:56.113842964 CET | 8.8.8.8 | 192.168.2.6 | 0xf39f | No error (0) | 142.250.203.110 | A (IP address) | IN (0x0001) | false | ||
Mar 10, 2023 13:52:56.155571938 CET | 8.8.8.8 | 192.168.2.6 | 0x2956 | No error (0) | 142.250.203.109 | A (IP address) | IN (0x0001) | false | ||
Mar 10, 2023 13:52:59.586787939 CET | 8.8.8.8 | 192.168.2.6 | 0x2ffb | No error (0) | 142.250.203.100 | A (IP address) | IN (0x0001) | false | ||
Mar 10, 2023 13:52:59.669697046 CET | 8.8.8.8 | 192.168.2.6 | 0x8b8d | No error (0) | 142.250.203.100 | A (IP address) | IN (0x0001) | false | ||
Mar 10, 2023 13:53:59.613883018 CET | 8.8.8.8 | 192.168.2.6 | 0x6f4d | No error (0) | 142.250.203.100 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
0 | 192.168.2.6 | 49712 | 142.250.203.110 | 443 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
2023-03-10 12:52:58 UTC | 0 | OUT | |
2023-03-10 12:52:58 UTC | 0 | IN | |
2023-03-10 12:52:58 UTC | 1 | IN | |
2023-03-10 12:52:58 UTC | 1 | IN | |
2023-03-10 12:52:58 UTC | 2 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
1 | 192.168.2.6 | 49714 | 142.250.203.109 | 443 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
2023-03-10 12:52:58 UTC | 2 | OUT | |
2023-03-10 12:52:58 UTC | 2 | OUT | |
2023-03-10 12:52:58 UTC | 2 | IN | |
2023-03-10 12:52:58 UTC | 4 | IN | |
2023-03-10 12:52:58 UTC | 4 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 13:52:52 |
Start date: | 10/03/2023 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6f9750000 |
File size: | 2851656 bytes |
MD5 hash: | 0FEC2748F363150DC54C1CAFFB1A9408 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Target ID: | 1 |
Start time: | 13:52:53 |
Start date: | 10/03/2023 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6f9750000 |
File size: | 2851656 bytes |
MD5 hash: | 0FEC2748F363150DC54C1CAFFB1A9408 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Target ID: | 2 |
Start time: | 13:52:54 |
Start date: | 10/03/2023 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6f9750000 |
File size: | 2851656 bytes |
MD5 hash: | 0FEC2748F363150DC54C1CAFFB1A9408 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |