Windows
Analysis Report
http://r1.visualwebsiteoptimizer.com/analyze?_a=609617&_u=https://www.nbcnews.com/news/us-news/fbi-sending-more-agents-louisville-kentucky-tackle-violent-crime-gangs-n1277556
Overview
General Information
Detection
Score: | 0 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
chrome.exe (PID: 5612 cmdline:
C:\Program Files\Goo gle\Chrome \Applicati on\chrome. exe" --sta rt-maximiz ed "about: blank MD5: 0FEC2748F363150DC54C1CAFFB1A9408) chrome.exe (PID: 5968 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =1932 --fi eld-trial- handle=173 2,i,162009 8492872315 0921,89861 7183918751 7471,13107 2 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationTarge tPredictio n /prefetc h:8 MD5: 0FEC2748F363150DC54C1CAFFB1A9408)
chrome.exe (PID: 6348 cmdline:
C:\Program Files\Goo gle\Chrome \Applicati on\chrome. exe" "http ://r1.visu alwebsiteo ptimizer.c om/analyze ?_a=609617 &_u=https: //www.nbcn ews.com/ne ws/us-news /fbi-sendi ng-more-ag ents-louis ville-kent ucky-tackl e-violent- crime-gang s-n1277556 MD5: 0FEC2748F363150DC54C1CAFFB1A9408)
- cleanup
- • Phishing
- • Compliance
- • Networking
- • System Summary
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | Directory created: | Jump to behavior |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTP traffic detected: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Window detected: |
Source: | Directory created: | Jump to behavior |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Process Injection | 2 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | 1 Encrypted Channel | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | 3 Non-Application Layer Protocol | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | 4 Application Layer Protocol | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | 1 Ingress Tool Transfer | SIM Card Swap | Carrier Billing Fraud |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
accounts.google.com | 172.217.168.45 | true | false | high | |
r1.visualwebsiteoptimizer.com | 35.245.208.72 | true | false | high | |
www.google.com | 142.250.203.100 | true | false | high | |
clients.l.google.com | 216.58.215.238 | true | false | high | |
clients2.google.com | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
35.245.208.72 | r1.visualwebsiteoptimizer.com | United States | 15169 | GOOGLEUS | false | |
172.217.168.45 | accounts.google.com | United States | 15169 | GOOGLEUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
216.58.215.238 | clients.l.google.com | United States | 15169 | GOOGLEUS | false | |
142.250.203.100 | www.google.com | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.22 |
192.168.2.1 |
Joe Sandbox Version: | 37.1.0 Beryl |
Analysis ID: | 874255 |
Start date and time: | 2023-05-24 00:57:06 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 4m 45s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | http://r1.visualwebsiteoptimizer.com/analyze?_a=609617&_u=https://www.nbcnews.com/news/us-news/fbi-sending-more-agents-louisville-kentucky-tackle-violent-crime-gangs-n1277556 |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 5 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean0.win@24/3@5/7 |
EGA Information: | Failed |
HDC Information: | Failed |
HCA Information: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, c onhost.exe - Excluded IPs from analysis (wh
itelisted): 142.250.203.99, 34 .104.35.123, 216.58.215.227 - Excluded domains from analysis
(whitelisted): edgedl.me.gvt1 .com, update.googleapis.com, c lientservices.googleapis.com - Not all processes where analyz
ed, report is missing behavior information
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 20 |
Entropy (8bit): | 1.2917601481809733 |
Encrypted: | false |
SSDEEP: | 3:Ftt:Xt |
MD5: | 7029066C27AC6F5EF18D660D5741979A |
SHA1: | 46C6643F07AA7F6BFE7118DE926B86DEFC5087C4 |
SHA-256: | 59869DB34853933B239F1E2219CF7D431DA006AA919635478511FABBFC8849D2 |
SHA-512: | 7E8E93F4A89CE7FAE011403E14A1D53544C6E6F6B6010D61129DC27937806D2B03802610D7999EAB33A4C36B0F9E001D9D76001B8354087634C1AA9C740C536F |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 35 |
Entropy (8bit): | 2.9889227488523016 |
Encrypted: | false |
SSDEEP: | 3:CUdrllHh/:HJ/ |
MD5: | 28D6814F309EA289F847C69CF91194C6 |
SHA1: | 0F4E929DD5BB2564F7AB9C76338E04E292A42ACE |
SHA-256: | 8337212354871836E6763A41E615916C89BAC5B3F1F0ADF60BA43C7C806E1015 |
SHA-512: | 1D68B92E8D822FE82DC7563EDD7B37F3418A02A89F1A9F0454CCA664C2FC2565235E0D85540FF9BE0B20175BE3F5B7B4EAE1175067465D5CCA13486AAB4C582C |
Malicious: | false |
Reputation: | low |
URL: | http://r1.visualwebsiteoptimizer.com/analyze?_a=609617&_u=https://www.nbcnews.com/news/us-news/fbi-sending-more-agents-louisville-kentucky-tackle-violent-crime-gangs-n1277556 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 20 |
Entropy (8bit): | 1.2917601481809733 |
Encrypted: | false |
SSDEEP: | 3:Ftt:Xt |
MD5: | 7029066C27AC6F5EF18D660D5741979A |
SHA1: | 46C6643F07AA7F6BFE7118DE926B86DEFC5087C4 |
SHA-256: | 59869DB34853933B239F1E2219CF7D431DA006AA919635478511FABBFC8849D2 |
SHA-512: | 7E8E93F4A89CE7FAE011403E14A1D53544C6E6F6B6010D61129DC27937806D2B03802610D7999EAB33A4C36B0F9E001D9D76001B8354087634C1AA9C740C536F |
Malicious: | false |
Reputation: | low |
URL: | http://r1.visualwebsiteoptimizer.com/favicon.ico |
Preview: |
Download Network PCAP: filtered – full
- Total Packets: 62
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
May 24, 2023 00:57:59.894068956 CEST | 49697 | 443 | 192.168.2.3 | 172.217.168.45 |
May 24, 2023 00:57:59.894146919 CEST | 443 | 49697 | 172.217.168.45 | 192.168.2.3 |
May 24, 2023 00:57:59.894301891 CEST | 49697 | 443 | 192.168.2.3 | 172.217.168.45 |
May 24, 2023 00:57:59.895158052 CEST | 49699 | 443 | 192.168.2.3 | 216.58.215.238 |
May 24, 2023 00:57:59.895224094 CEST | 443 | 49699 | 216.58.215.238 | 192.168.2.3 |
May 24, 2023 00:57:59.895314932 CEST | 49699 | 443 | 192.168.2.3 | 216.58.215.238 |
May 24, 2023 00:57:59.895826101 CEST | 49697 | 443 | 192.168.2.3 | 172.217.168.45 |
May 24, 2023 00:57:59.895869970 CEST | 443 | 49697 | 172.217.168.45 | 192.168.2.3 |
May 24, 2023 00:57:59.897011042 CEST | 49699 | 443 | 192.168.2.3 | 216.58.215.238 |
May 24, 2023 00:57:59.897066116 CEST | 443 | 49699 | 216.58.215.238 | 192.168.2.3 |
May 24, 2023 00:58:00.033041954 CEST | 443 | 49697 | 172.217.168.45 | 192.168.2.3 |
May 24, 2023 00:58:00.033474922 CEST | 49697 | 443 | 192.168.2.3 | 172.217.168.45 |
May 24, 2023 00:58:00.033526897 CEST | 443 | 49697 | 172.217.168.45 | 192.168.2.3 |
May 24, 2023 00:58:00.035068035 CEST | 443 | 49699 | 216.58.215.238 | 192.168.2.3 |
May 24, 2023 00:58:00.035649061 CEST | 443 | 49697 | 172.217.168.45 | 192.168.2.3 |
May 24, 2023 00:58:00.035747051 CEST | 49697 | 443 | 192.168.2.3 | 172.217.168.45 |
May 24, 2023 00:58:00.036396980 CEST | 49699 | 443 | 192.168.2.3 | 216.58.215.238 |
May 24, 2023 00:58:00.036443949 CEST | 443 | 49699 | 216.58.215.238 | 192.168.2.3 |
May 24, 2023 00:58:00.037622929 CEST | 443 | 49699 | 216.58.215.238 | 192.168.2.3 |
May 24, 2023 00:58:00.037720919 CEST | 49699 | 443 | 192.168.2.3 | 216.58.215.238 |
May 24, 2023 00:58:00.038930893 CEST | 443 | 49699 | 216.58.215.238 | 192.168.2.3 |
May 24, 2023 00:58:00.039000034 CEST | 49699 | 443 | 192.168.2.3 | 216.58.215.238 |
May 24, 2023 00:58:00.353105068 CEST | 49697 | 443 | 192.168.2.3 | 172.217.168.45 |
May 24, 2023 00:58:00.353318930 CEST | 49697 | 443 | 192.168.2.3 | 172.217.168.45 |
May 24, 2023 00:58:00.353344917 CEST | 443 | 49697 | 172.217.168.45 | 192.168.2.3 |
May 24, 2023 00:58:00.353523970 CEST | 443 | 49697 | 172.217.168.45 | 192.168.2.3 |
May 24, 2023 00:58:00.353837013 CEST | 49699 | 443 | 192.168.2.3 | 216.58.215.238 |
May 24, 2023 00:58:00.353945971 CEST | 49699 | 443 | 192.168.2.3 | 216.58.215.238 |
May 24, 2023 00:58:00.353969097 CEST | 443 | 49699 | 216.58.215.238 | 192.168.2.3 |
May 24, 2023 00:58:00.354216099 CEST | 443 | 49699 | 216.58.215.238 | 192.168.2.3 |
May 24, 2023 00:58:00.386260986 CEST | 443 | 49699 | 216.58.215.238 | 192.168.2.3 |
May 24, 2023 00:58:00.386487961 CEST | 49699 | 443 | 192.168.2.3 | 216.58.215.238 |
May 24, 2023 00:58:00.386509895 CEST | 443 | 49699 | 216.58.215.238 | 192.168.2.3 |
May 24, 2023 00:58:00.386598110 CEST | 49699 | 443 | 192.168.2.3 | 216.58.215.238 |
May 24, 2023 00:58:00.398899078 CEST | 49697 | 443 | 192.168.2.3 | 172.217.168.45 |
May 24, 2023 00:58:00.398958921 CEST | 443 | 49697 | 172.217.168.45 | 192.168.2.3 |
May 24, 2023 00:58:00.401690006 CEST | 443 | 49697 | 172.217.168.45 | 192.168.2.3 |
May 24, 2023 00:58:00.401823044 CEST | 49697 | 443 | 192.168.2.3 | 172.217.168.45 |
May 24, 2023 00:58:00.401873112 CEST | 443 | 49697 | 172.217.168.45 | 192.168.2.3 |
May 24, 2023 00:58:00.401988029 CEST | 443 | 49697 | 172.217.168.45 | 192.168.2.3 |
May 24, 2023 00:58:00.402091026 CEST | 49697 | 443 | 192.168.2.3 | 172.217.168.45 |
May 24, 2023 00:58:00.430926085 CEST | 49697 | 443 | 192.168.2.3 | 172.217.168.45 |
May 24, 2023 00:58:00.430977106 CEST | 443 | 49697 | 172.217.168.45 | 192.168.2.3 |
May 24, 2023 00:58:00.431576967 CEST | 49699 | 443 | 192.168.2.3 | 216.58.215.238 |
May 24, 2023 00:58:00.431610107 CEST | 443 | 49699 | 216.58.215.238 | 192.168.2.3 |
May 24, 2023 00:58:01.857640028 CEST | 49701 | 80 | 192.168.2.3 | 35.245.208.72 |
May 24, 2023 00:58:01.858338118 CEST | 49702 | 80 | 192.168.2.3 | 35.245.208.72 |
May 24, 2023 00:58:01.996100903 CEST | 80 | 49701 | 35.245.208.72 | 192.168.2.3 |
May 24, 2023 00:58:01.996329069 CEST | 49701 | 80 | 192.168.2.3 | 35.245.208.72 |
May 24, 2023 00:58:01.996357918 CEST | 80 | 49702 | 35.245.208.72 | 192.168.2.3 |
May 24, 2023 00:58:01.996512890 CEST | 49702 | 80 | 192.168.2.3 | 35.245.208.72 |
May 24, 2023 00:58:02.033539057 CEST | 49702 | 80 | 192.168.2.3 | 35.245.208.72 |
May 24, 2023 00:58:02.171883106 CEST | 80 | 49702 | 35.245.208.72 | 192.168.2.3 |
May 24, 2023 00:58:02.172070980 CEST | 80 | 49702 | 35.245.208.72 | 192.168.2.3 |
May 24, 2023 00:58:02.246423960 CEST | 49702 | 80 | 192.168.2.3 | 35.245.208.72 |
May 24, 2023 00:58:02.577907085 CEST | 49702 | 80 | 192.168.2.3 | 35.245.208.72 |
May 24, 2023 00:58:02.716409922 CEST | 80 | 49702 | 35.245.208.72 | 192.168.2.3 |
May 24, 2023 00:58:02.759625912 CEST | 49702 | 80 | 192.168.2.3 | 35.245.208.72 |
May 24, 2023 00:58:03.176359892 CEST | 49702 | 80 | 192.168.2.3 | 35.245.208.72 |
May 24, 2023 00:58:03.316593885 CEST | 80 | 49702 | 35.245.208.72 | 192.168.2.3 |
May 24, 2023 00:58:03.446340084 CEST | 49702 | 80 | 192.168.2.3 | 35.245.208.72 |
May 24, 2023 00:58:03.507859945 CEST | 49702 | 80 | 192.168.2.3 | 35.245.208.72 |
May 24, 2023 00:58:03.574204922 CEST | 49704 | 443 | 192.168.2.3 | 142.250.203.100 |
May 24, 2023 00:58:03.574275017 CEST | 443 | 49704 | 142.250.203.100 | 192.168.2.3 |
May 24, 2023 00:58:03.574374914 CEST | 49704 | 443 | 192.168.2.3 | 142.250.203.100 |
May 24, 2023 00:58:03.574743986 CEST | 49704 | 443 | 192.168.2.3 | 142.250.203.100 |
May 24, 2023 00:58:03.574780941 CEST | 443 | 49704 | 142.250.203.100 | 192.168.2.3 |
May 24, 2023 00:58:03.637578011 CEST | 443 | 49704 | 142.250.203.100 | 192.168.2.3 |
May 24, 2023 00:58:03.638340950 CEST | 49704 | 443 | 192.168.2.3 | 142.250.203.100 |
May 24, 2023 00:58:03.638421059 CEST | 443 | 49704 | 142.250.203.100 | 192.168.2.3 |
May 24, 2023 00:58:03.639616966 CEST | 443 | 49704 | 142.250.203.100 | 192.168.2.3 |
May 24, 2023 00:58:03.639717102 CEST | 49704 | 443 | 192.168.2.3 | 142.250.203.100 |
May 24, 2023 00:58:03.646275997 CEST | 80 | 49702 | 35.245.208.72 | 192.168.2.3 |
May 24, 2023 00:58:03.654422045 CEST | 49704 | 443 | 192.168.2.3 | 142.250.203.100 |
May 24, 2023 00:58:03.654706001 CEST | 443 | 49704 | 142.250.203.100 | 192.168.2.3 |
May 24, 2023 00:58:03.671355963 CEST | 49702 | 80 | 192.168.2.3 | 35.245.208.72 |
May 24, 2023 00:58:03.809782982 CEST | 80 | 49702 | 35.245.208.72 | 192.168.2.3 |
May 24, 2023 00:58:03.811990023 CEST | 49704 | 443 | 192.168.2.3 | 142.250.203.100 |
May 24, 2023 00:58:03.812015057 CEST | 443 | 49704 | 142.250.203.100 | 192.168.2.3 |
May 24, 2023 00:58:03.858978987 CEST | 49702 | 80 | 192.168.2.3 | 35.245.208.72 |
May 24, 2023 00:58:04.015116930 CEST | 49704 | 443 | 192.168.2.3 | 142.250.203.100 |
May 24, 2023 00:58:04.238773108 CEST | 80 | 49701 | 35.245.208.72 | 192.168.2.3 |
May 24, 2023 00:58:04.238864899 CEST | 49701 | 80 | 192.168.2.3 | 35.245.208.72 |
May 24, 2023 00:58:05.094243050 CEST | 49701 | 80 | 192.168.2.3 | 35.245.208.72 |
May 24, 2023 00:58:05.232693911 CEST | 80 | 49701 | 35.245.208.72 | 192.168.2.3 |
May 24, 2023 00:58:13.231157064 CEST | 80 | 49702 | 35.245.208.72 | 192.168.2.3 |
May 24, 2023 00:58:13.231300116 CEST | 49702 | 80 | 192.168.2.3 | 35.245.208.72 |
May 24, 2023 00:58:13.684468985 CEST | 443 | 49704 | 142.250.203.100 | 192.168.2.3 |
May 24, 2023 00:58:13.684598923 CEST | 443 | 49704 | 142.250.203.100 | 192.168.2.3 |
May 24, 2023 00:58:13.684706926 CEST | 49704 | 443 | 192.168.2.3 | 142.250.203.100 |
May 24, 2023 00:58:16.418060064 CEST | 49702 | 80 | 192.168.2.3 | 35.245.208.72 |
May 24, 2023 00:58:16.418097973 CEST | 49704 | 443 | 192.168.2.3 | 142.250.203.100 |
May 24, 2023 00:58:16.418140888 CEST | 443 | 49704 | 142.250.203.100 | 192.168.2.3 |
May 24, 2023 00:58:16.556476116 CEST | 80 | 49702 | 35.245.208.72 | 192.168.2.3 |
May 24, 2023 00:59:03.635691881 CEST | 49708 | 443 | 192.168.2.3 | 142.250.203.100 |
May 24, 2023 00:59:03.635771990 CEST | 443 | 49708 | 142.250.203.100 | 192.168.2.3 |
May 24, 2023 00:59:03.635885000 CEST | 49708 | 443 | 192.168.2.3 | 142.250.203.100 |
May 24, 2023 00:59:03.636285067 CEST | 49708 | 443 | 192.168.2.3 | 142.250.203.100 |
May 24, 2023 00:59:03.636320114 CEST | 443 | 49708 | 142.250.203.100 | 192.168.2.3 |
May 24, 2023 00:59:03.692953110 CEST | 443 | 49708 | 142.250.203.100 | 192.168.2.3 |
May 24, 2023 00:59:03.696152925 CEST | 49708 | 443 | 192.168.2.3 | 142.250.203.100 |
May 24, 2023 00:59:03.696224928 CEST | 443 | 49708 | 142.250.203.100 | 192.168.2.3 |
May 24, 2023 00:59:03.696788073 CEST | 443 | 49708 | 142.250.203.100 | 192.168.2.3 |
May 24, 2023 00:59:03.702877998 CEST | 49708 | 443 | 192.168.2.3 | 142.250.203.100 |
May 24, 2023 00:59:03.703231096 CEST | 443 | 49708 | 142.250.203.100 | 192.168.2.3 |
May 24, 2023 00:59:03.773706913 CEST | 49708 | 443 | 192.168.2.3 | 142.250.203.100 |
May 24, 2023 00:59:13.727273941 CEST | 443 | 49708 | 142.250.203.100 | 192.168.2.3 |
May 24, 2023 00:59:13.727408886 CEST | 443 | 49708 | 142.250.203.100 | 192.168.2.3 |
May 24, 2023 00:59:13.727597952 CEST | 49708 | 443 | 192.168.2.3 | 142.250.203.100 |
May 24, 2023 00:59:15.102001905 CEST | 49708 | 443 | 192.168.2.3 | 142.250.203.100 |
May 24, 2023 00:59:15.102062941 CEST | 443 | 49708 | 142.250.203.100 | 192.168.2.3 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
May 24, 2023 00:57:59.667354107 CEST | 56924 | 53 | 192.168.2.3 | 8.8.8.8 |
May 24, 2023 00:57:59.667447090 CEST | 60625 | 53 | 192.168.2.3 | 8.8.8.8 |
May 24, 2023 00:57:59.695939064 CEST | 53 | 56924 | 8.8.8.8 | 192.168.2.3 |
May 24, 2023 00:57:59.695991993 CEST | 53 | 60625 | 8.8.8.8 | 192.168.2.3 |
May 24, 2023 00:58:01.530781031 CEST | 60582 | 53 | 192.168.2.3 | 8.8.8.8 |
May 24, 2023 00:58:01.559369087 CEST | 53 | 60582 | 8.8.8.8 | 192.168.2.3 |
May 24, 2023 00:58:03.548372030 CEST | 62050 | 53 | 192.168.2.3 | 8.8.8.8 |
May 24, 2023 00:58:03.572118044 CEST | 53 | 62050 | 8.8.8.8 | 192.168.2.3 |
May 24, 2023 00:59:03.608247995 CEST | 64823 | 53 | 192.168.2.3 | 8.8.8.8 |
May 24, 2023 00:59:03.631642103 CEST | 53 | 64823 | 8.8.8.8 | 192.168.2.3 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
May 24, 2023 00:57:59.667354107 CEST | 192.168.2.3 | 8.8.8.8 | 0x41ff | Standard query (0) | A (IP address) | IN (0x0001) | false | |
May 24, 2023 00:57:59.667447090 CEST | 192.168.2.3 | 8.8.8.8 | 0xa5a5 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
May 24, 2023 00:58:01.530781031 CEST | 192.168.2.3 | 8.8.8.8 | 0x2cd6 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
May 24, 2023 00:58:03.548372030 CEST | 192.168.2.3 | 8.8.8.8 | 0x4d5d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
May 24, 2023 00:59:03.608247995 CEST | 192.168.2.3 | 8.8.8.8 | 0x75db | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
May 24, 2023 00:57:59.695939064 CEST | 8.8.8.8 | 192.168.2.3 | 0x41ff | No error (0) | 172.217.168.45 | A (IP address) | IN (0x0001) | false | ||
May 24, 2023 00:57:59.695991993 CEST | 8.8.8.8 | 192.168.2.3 | 0xa5a5 | No error (0) | clients.l.google.com | CNAME (Canonical name) | IN (0x0001) | false | ||
May 24, 2023 00:57:59.695991993 CEST | 8.8.8.8 | 192.168.2.3 | 0xa5a5 | No error (0) | 216.58.215.238 | A (IP address) | IN (0x0001) | false | ||
May 24, 2023 00:58:01.559369087 CEST | 8.8.8.8 | 192.168.2.3 | 0x2cd6 | No error (0) | 35.245.208.72 | A (IP address) | IN (0x0001) | false | ||
May 24, 2023 00:58:03.572118044 CEST | 8.8.8.8 | 192.168.2.3 | 0x4d5d | No error (0) | 142.250.203.100 | A (IP address) | IN (0x0001) | false | ||
May 24, 2023 00:59:03.631642103 CEST | 8.8.8.8 | 192.168.2.3 | 0x75db | No error (0) | 142.250.203.100 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
0 | 192.168.2.3 | 49697 | 172.217.168.45 | 443 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | kBytes transferred | Direction | Data |
---|
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
1 | 192.168.2.3 | 49699 | 216.58.215.238 | 443 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | kBytes transferred | Direction | Data |
---|
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
2 | 192.168.2.3 | 49702 | 35.245.208.72 | 80 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
May 24, 2023 00:58:02.033539057 CEST | 538 | OUT | |
May 24, 2023 00:58:02.172070980 CEST | 539 | IN | |
May 24, 2023 00:58:02.577907085 CEST | 539 | OUT | |
May 24, 2023 00:58:02.716409922 CEST | 539 | IN | |
May 24, 2023 00:58:03.176359892 CEST | 540 | OUT | |
May 24, 2023 00:58:03.316593885 CEST | 541 | IN | |
May 24, 2023 00:58:03.507859945 CEST | 541 | OUT | |
May 24, 2023 00:58:03.646275997 CEST | 547 | IN | |
May 24, 2023 00:58:03.671355963 CEST | 547 | OUT | |
May 24, 2023 00:58:03.809782982 CEST | 548 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
0 | 192.168.2.3 | 49697 | 172.217.168.45 | 443 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
2023-05-23 22:58:00 UTC | 0 | OUT | |
2023-05-23 22:58:00 UTC | 0 | OUT | |
2023-05-23 22:58:00 UTC | 2 | IN | |
2023-05-23 22:58:00 UTC | 4 | IN | |
2023-05-23 22:58:00 UTC | 4 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
1 | 192.168.2.3 | 49699 | 216.58.215.238 | 443 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
2023-05-23 22:58:00 UTC | 0 | OUT | |
2023-05-23 22:58:00 UTC | 1 | IN | |
2023-05-23 22:58:00 UTC | 1 | IN | |
2023-05-23 22:58:00 UTC | 2 | IN | |
2023-05-23 22:58:00 UTC | 2 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 00:57:56 |
Start date: | 24/05/2023 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff614650000 |
File size: | 2851656 bytes |
MD5 hash: | 0FEC2748F363150DC54C1CAFFB1A9408 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Target ID: | 1 |
Start time: | 00:57:57 |
Start date: | 24/05/2023 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff614650000 |
File size: | 2851656 bytes |
MD5 hash: | 0FEC2748F363150DC54C1CAFFB1A9408 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Target ID: | 2 |
Start time: | 00:57:59 |
Start date: | 24/05/2023 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff614650000 |
File size: | 2851656 bytes |
MD5 hash: | 0FEC2748F363150DC54C1CAFFB1A9408 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |