Windows
Analysis Report
https://ws.inspectlet.com
Overview
Detection
Score: | 0 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w7x64
- chrome.exe (PID: 1536 cmdline:
"C:\Progra m Files (x 86)\Google \Chrome\Ap plication\ chrome.exe " --start- maximized "about:bla nk" MD5: FFA2B8E17F645BCC20F0E0201FEF83ED) - chrome.exe (PID: 1288 cmdline:
"C:\Progra m Files (x 86)\Google \Chrome\Ap plication\ chrome.exe " --type=u tility --u tility-sub -type=netw ork.mojom. NetworkSer vice --lan g=en-US -- service-sa ndbox-type =none --mo jo-platfor m-channel- handle=144 0 --field- trial-hand le=1272,i, 9955278197 684841087, 5057222275 304817250, 131072 --d isable-fea tures=Opti mizationGu ideModelDo wnloading, Optimizati onHints,Op timization HintsFetch ing,Optimi zationTarg etPredicti on /prefet ch:8 MD5: FFA2B8E17F645BCC20F0E0201FEF83ED)
- chrome.exe (PID: 200 cmdline:
"C:\Progra m Files (x 86)\Google \Chrome\Ap plication\ chrome.exe " "https:/ /ws.inspec tlet.com" MD5: FFA2B8E17F645BCC20F0E0201FEF83ED)
- cleanup
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTP Parser: |
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Process Injection | 2 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 1 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
ws.inspectlet.com.herokudns.com | 52.20.78.240 | true | false | unknown | |
www.google.com | 142.250.186.132 | true | false | unknown | |
ws.inspectlet.com | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | unknown | ||
false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.250.186.132 | www.google.com | United States | 15169 | GOOGLEUS | false | |
52.20.78.240 | ws.inspectlet.com.herokudns.com | United States | 14618 | AMAZON-AESUS | false |
IP |
---|
192.168.2.7 |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1531117 |
Start date and time: | 2024-10-10 21:30:16 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 2m 57s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | https://ws.inspectlet.com |
Analysis system description: | Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2) |
Number of analysed new started processes analysed: | 4 |
Number of new started drivers analysed: | 2 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean0.win@18/4@4/4 |
- Exclude process from analysis (whitelisted): vga.dll, WMIADAP.exe
- Excluded IPs from analysis (whitelisted): 216.58.206.35, 142.250.185.206, 142.251.31.84, 34.104.35.123, 172.217.18.3
- Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, edgedl.me.gvt1.com, update.googleapis.com, clientservices.googleapis.com, clients.l.google.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtSetInformationFile calls found.
- VT rate limit hit for: https://ws.inspectlet.com
Process: | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 16 |
Entropy (8bit): | 3.452819531114783 |
Encrypted: | false |
SSDEEP: | 3:gCYASCU:gCYASCU |
MD5: | 7580E1F4E34B963D5CE1BBB35001F953 |
SHA1: | E8D50714F0D06C06F26475FB748357F864E9952B |
SHA-256: | 16487236D4ED74EDFB51EBE50BE675D723C9A26CB8CDE749A5E9E62405FAD183 |
SHA-512: | C6A6E063DD73722AAB4B3C2392CB2070702B12EF59A0267384378786FAD28AED56D3FFA4498B777BBFC008B79DFC4CF1BF3ADA8FB10A8958A6372F380FE84209 |
Malicious: | false |
Reputation: | low |
URL: | https://ws.inspectlet.com/ |
Preview: |
Process: | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 16 |
Entropy (8bit): | 3.452819531114783 |
Encrypted: | false |
SSDEEP: | 3:gCYASCU:gCYASCU |
MD5: | 7580E1F4E34B963D5CE1BBB35001F953 |
SHA1: | E8D50714F0D06C06F26475FB748357F864E9952B |
SHA-256: | 16487236D4ED74EDFB51EBE50BE675D723C9A26CB8CDE749A5E9E62405FAD183 |
SHA-512: | C6A6E063DD73722AAB4B3C2392CB2070702B12EF59A0267384378786FAD28AED56D3FFA4498B777BBFC008B79DFC4CF1BF3ADA8FB10A8958A6372F380FE84209 |
Malicious: | false |
Reputation: | low |
URL: | https://ws.inspectlet.com/favicon.ico |
Preview: |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 10, 2024 21:31:19.209180117 CEST | 49166 | 443 | 192.168.2.22 | 52.20.78.240 |
Oct 10, 2024 21:31:19.209239006 CEST | 443 | 49166 | 52.20.78.240 | 192.168.2.22 |
Oct 10, 2024 21:31:19.209285975 CEST | 49166 | 443 | 192.168.2.22 | 52.20.78.240 |
Oct 10, 2024 21:31:19.217447996 CEST | 49167 | 443 | 192.168.2.22 | 52.20.78.240 |
Oct 10, 2024 21:31:19.217490911 CEST | 443 | 49167 | 52.20.78.240 | 192.168.2.22 |
Oct 10, 2024 21:31:19.217539072 CEST | 49167 | 443 | 192.168.2.22 | 52.20.78.240 |
Oct 10, 2024 21:31:19.218880892 CEST | 49166 | 443 | 192.168.2.22 | 52.20.78.240 |
Oct 10, 2024 21:31:19.218914986 CEST | 443 | 49166 | 52.20.78.240 | 192.168.2.22 |
Oct 10, 2024 21:31:19.219233990 CEST | 49167 | 443 | 192.168.2.22 | 52.20.78.240 |
Oct 10, 2024 21:31:19.219247103 CEST | 443 | 49167 | 52.20.78.240 | 192.168.2.22 |
Oct 10, 2024 21:31:19.689946890 CEST | 443 | 49167 | 52.20.78.240 | 192.168.2.22 |
Oct 10, 2024 21:31:19.690300941 CEST | 49167 | 443 | 192.168.2.22 | 52.20.78.240 |
Oct 10, 2024 21:31:19.690330029 CEST | 443 | 49167 | 52.20.78.240 | 192.168.2.22 |
Oct 10, 2024 21:31:19.691366911 CEST | 443 | 49167 | 52.20.78.240 | 192.168.2.22 |
Oct 10, 2024 21:31:19.691422939 CEST | 49167 | 443 | 192.168.2.22 | 52.20.78.240 |
Oct 10, 2024 21:31:19.693698883 CEST | 49167 | 443 | 192.168.2.22 | 52.20.78.240 |
Oct 10, 2024 21:31:19.693778038 CEST | 443 | 49167 | 52.20.78.240 | 192.168.2.22 |
Oct 10, 2024 21:31:19.694000006 CEST | 49167 | 443 | 192.168.2.22 | 52.20.78.240 |
Oct 10, 2024 21:31:19.694009066 CEST | 443 | 49167 | 52.20.78.240 | 192.168.2.22 |
Oct 10, 2024 21:31:19.713175058 CEST | 443 | 49166 | 52.20.78.240 | 192.168.2.22 |
Oct 10, 2024 21:31:19.713556051 CEST | 49166 | 443 | 192.168.2.22 | 52.20.78.240 |
Oct 10, 2024 21:31:19.713583946 CEST | 443 | 49166 | 52.20.78.240 | 192.168.2.22 |
Oct 10, 2024 21:31:19.715034962 CEST | 443 | 49166 | 52.20.78.240 | 192.168.2.22 |
Oct 10, 2024 21:31:19.715095997 CEST | 49166 | 443 | 192.168.2.22 | 52.20.78.240 |
Oct 10, 2024 21:31:19.715527058 CEST | 49166 | 443 | 192.168.2.22 | 52.20.78.240 |
Oct 10, 2024 21:31:19.715606928 CEST | 443 | 49166 | 52.20.78.240 | 192.168.2.22 |
Oct 10, 2024 21:31:19.841581106 CEST | 443 | 49167 | 52.20.78.240 | 192.168.2.22 |
Oct 10, 2024 21:31:19.841664076 CEST | 49167 | 443 | 192.168.2.22 | 52.20.78.240 |
Oct 10, 2024 21:31:19.843311071 CEST | 49167 | 443 | 192.168.2.22 | 52.20.78.240 |
Oct 10, 2024 21:31:19.843336105 CEST | 443 | 49167 | 52.20.78.240 | 192.168.2.22 |
Oct 10, 2024 21:31:19.900506973 CEST | 49166 | 443 | 192.168.2.22 | 52.20.78.240 |
Oct 10, 2024 21:31:19.900547981 CEST | 443 | 49166 | 52.20.78.240 | 192.168.2.22 |
Oct 10, 2024 21:31:20.010051966 CEST | 443 | 49166 | 52.20.78.240 | 192.168.2.22 |
Oct 10, 2024 21:31:20.010118961 CEST | 49166 | 443 | 192.168.2.22 | 52.20.78.240 |
Oct 10, 2024 21:31:20.011853933 CEST | 49166 | 443 | 192.168.2.22 | 52.20.78.240 |
Oct 10, 2024 21:31:20.011876106 CEST | 443 | 49166 | 52.20.78.240 | 192.168.2.22 |
Oct 10, 2024 21:31:21.858392954 CEST | 49169 | 443 | 192.168.2.22 | 142.250.186.132 |
Oct 10, 2024 21:31:21.858442068 CEST | 443 | 49169 | 142.250.186.132 | 192.168.2.22 |
Oct 10, 2024 21:31:21.858485937 CEST | 49169 | 443 | 192.168.2.22 | 142.250.186.132 |
Oct 10, 2024 21:31:21.858715057 CEST | 49169 | 443 | 192.168.2.22 | 142.250.186.132 |
Oct 10, 2024 21:31:21.858721018 CEST | 443 | 49169 | 142.250.186.132 | 192.168.2.22 |
Oct 10, 2024 21:31:22.496258974 CEST | 443 | 49169 | 142.250.186.132 | 192.168.2.22 |
Oct 10, 2024 21:31:22.497095108 CEST | 49169 | 443 | 192.168.2.22 | 142.250.186.132 |
Oct 10, 2024 21:31:22.497114897 CEST | 443 | 49169 | 142.250.186.132 | 192.168.2.22 |
Oct 10, 2024 21:31:22.498557091 CEST | 443 | 49169 | 142.250.186.132 | 192.168.2.22 |
Oct 10, 2024 21:31:22.498960018 CEST | 49169 | 443 | 192.168.2.22 | 142.250.186.132 |
Oct 10, 2024 21:31:22.503643036 CEST | 49169 | 443 | 192.168.2.22 | 142.250.186.132 |
Oct 10, 2024 21:31:22.503906965 CEST | 443 | 49169 | 142.250.186.132 | 192.168.2.22 |
Oct 10, 2024 21:31:22.705141068 CEST | 49169 | 443 | 192.168.2.22 | 142.250.186.132 |
Oct 10, 2024 21:31:22.705159903 CEST | 443 | 49169 | 142.250.186.132 | 192.168.2.22 |
Oct 10, 2024 21:31:22.939405918 CEST | 443 | 49169 | 142.250.186.132 | 192.168.2.22 |
Oct 10, 2024 21:31:22.939445972 CEST | 49169 | 443 | 192.168.2.22 | 142.250.186.132 |
Oct 10, 2024 21:31:22.939634085 CEST | 49169 | 443 | 192.168.2.22 | 142.250.186.132 |
Oct 10, 2024 21:31:32.396998882 CEST | 443 | 49169 | 142.250.186.132 | 192.168.2.22 |
Oct 10, 2024 21:31:32.397138119 CEST | 443 | 49169 | 142.250.186.132 | 192.168.2.22 |
Oct 10, 2024 21:31:32.397445917 CEST | 49169 | 443 | 192.168.2.22 | 142.250.186.132 |
Oct 10, 2024 21:31:33.195394039 CEST | 49169 | 443 | 192.168.2.22 | 142.250.186.132 |
Oct 10, 2024 21:31:33.195441961 CEST | 443 | 49169 | 142.250.186.132 | 192.168.2.22 |
Oct 10, 2024 21:32:21.896487951 CEST | 49171 | 443 | 192.168.2.22 | 142.250.186.132 |
Oct 10, 2024 21:32:21.896531105 CEST | 443 | 49171 | 142.250.186.132 | 192.168.2.22 |
Oct 10, 2024 21:32:21.896622896 CEST | 49171 | 443 | 192.168.2.22 | 142.250.186.132 |
Oct 10, 2024 21:32:21.896975994 CEST | 49171 | 443 | 192.168.2.22 | 142.250.186.132 |
Oct 10, 2024 21:32:21.896990061 CEST | 443 | 49171 | 142.250.186.132 | 192.168.2.22 |
Oct 10, 2024 21:32:22.527338028 CEST | 443 | 49171 | 142.250.186.132 | 192.168.2.22 |
Oct 10, 2024 21:32:22.527749062 CEST | 49171 | 443 | 192.168.2.22 | 142.250.186.132 |
Oct 10, 2024 21:32:22.527781010 CEST | 443 | 49171 | 142.250.186.132 | 192.168.2.22 |
Oct 10, 2024 21:32:22.528132915 CEST | 443 | 49171 | 142.250.186.132 | 192.168.2.22 |
Oct 10, 2024 21:32:22.528521061 CEST | 49171 | 443 | 192.168.2.22 | 142.250.186.132 |
Oct 10, 2024 21:32:22.528587103 CEST | 443 | 49171 | 142.250.186.132 | 192.168.2.22 |
Oct 10, 2024 21:32:22.727135897 CEST | 49171 | 443 | 192.168.2.22 | 142.250.186.132 |
Oct 10, 2024 21:32:32.434890032 CEST | 443 | 49171 | 142.250.186.132 | 192.168.2.22 |
Oct 10, 2024 21:32:32.434962988 CEST | 443 | 49171 | 142.250.186.132 | 192.168.2.22 |
Oct 10, 2024 21:32:32.435566902 CEST | 49171 | 443 | 192.168.2.22 | 142.250.186.132 |
Oct 10, 2024 21:32:33.212382078 CEST | 49171 | 443 | 192.168.2.22 | 142.250.186.132 |
Oct 10, 2024 21:32:33.212415934 CEST | 443 | 49171 | 142.250.186.132 | 192.168.2.22 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 10, 2024 21:31:17.549257994 CEST | 53 | 54821 | 8.8.8.8 | 192.168.2.22 |
Oct 10, 2024 21:31:17.920137882 CEST | 53 | 52781 | 8.8.8.8 | 192.168.2.22 |
Oct 10, 2024 21:31:19.082838058 CEST | 65510 | 53 | 192.168.2.22 | 8.8.8.8 |
Oct 10, 2024 21:31:19.083379984 CEST | 62672 | 53 | 192.168.2.22 | 8.8.8.8 |
Oct 10, 2024 21:31:19.194719076 CEST | 53 | 65510 | 8.8.8.8 | 192.168.2.22 |
Oct 10, 2024 21:31:19.203907013 CEST | 53 | 62672 | 8.8.8.8 | 192.168.2.22 |
Oct 10, 2024 21:31:19.546803951 CEST | 53 | 49384 | 8.8.8.8 | 192.168.2.22 |
Oct 10, 2024 21:31:21.849189043 CEST | 57390 | 53 | 192.168.2.22 | 8.8.8.8 |
Oct 10, 2024 21:31:21.849529028 CEST | 58095 | 53 | 192.168.2.22 | 8.8.8.8 |
Oct 10, 2024 21:31:21.857088089 CEST | 53 | 57390 | 8.8.8.8 | 192.168.2.22 |
Oct 10, 2024 21:31:21.857106924 CEST | 53 | 58095 | 8.8.8.8 | 192.168.2.22 |
Oct 10, 2024 21:31:37.099312067 CEST | 53 | 52074 | 8.8.8.8 | 192.168.2.22 |
Oct 10, 2024 21:31:43.559174061 CEST | 53 | 51828 | 8.8.8.8 | 192.168.2.22 |
Oct 10, 2024 21:31:54.231620073 CEST | 53 | 65084 | 8.8.8.8 | 192.168.2.22 |
Oct 10, 2024 21:32:11.740534067 CEST | 53 | 63950 | 8.8.8.8 | 192.168.2.22 |
Oct 10, 2024 21:32:17.297404051 CEST | 53 | 49226 | 8.8.8.8 | 192.168.2.22 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Oct 10, 2024 21:31:19.082838058 CEST | 192.168.2.22 | 8.8.8.8 | 0xb304 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Oct 10, 2024 21:31:19.083379984 CEST | 192.168.2.22 | 8.8.8.8 | 0x7afd | Standard query (0) | 65 | IN (0x0001) | false | |
Oct 10, 2024 21:31:21.849189043 CEST | 192.168.2.22 | 8.8.8.8 | 0xb755 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Oct 10, 2024 21:31:21.849529028 CEST | 192.168.2.22 | 8.8.8.8 | 0xbbf6 | Standard query (0) | 65 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Oct 10, 2024 21:31:19.194719076 CEST | 8.8.8.8 | 192.168.2.22 | 0xb304 | No error (0) | ws.inspectlet.com.herokudns.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Oct 10, 2024 21:31:19.194719076 CEST | 8.8.8.8 | 192.168.2.22 | 0xb304 | No error (0) | 52.20.78.240 | A (IP address) | IN (0x0001) | false | ||
Oct 10, 2024 21:31:19.194719076 CEST | 8.8.8.8 | 192.168.2.22 | 0xb304 | No error (0) | 3.220.57.224 | A (IP address) | IN (0x0001) | false | ||
Oct 10, 2024 21:31:19.194719076 CEST | 8.8.8.8 | 192.168.2.22 | 0xb304 | No error (0) | 54.91.59.199 | A (IP address) | IN (0x0001) | false | ||
Oct 10, 2024 21:31:19.194719076 CEST | 8.8.8.8 | 192.168.2.22 | 0xb304 | No error (0) | 3.232.242.170 | A (IP address) | IN (0x0001) | false | ||
Oct 10, 2024 21:31:19.203907013 CEST | 8.8.8.8 | 192.168.2.22 | 0x7afd | No error (0) | ws.inspectlet.com.herokudns.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Oct 10, 2024 21:31:21.857088089 CEST | 8.8.8.8 | 192.168.2.22 | 0xb755 | No error (0) | 142.250.186.132 | A (IP address) | IN (0x0001) | false | ||
Oct 10, 2024 21:31:21.857106924 CEST | 8.8.8.8 | 192.168.2.22 | 0xbbf6 | No error (0) | 65 | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.22 | 49167 | 52.20.78.240 | 443 | 1288 | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-10 19:31:19 UTC | 661 | OUT | |
2024-10-10 19:31:19 UTC | 672 | IN | |
2024-10-10 19:31:19 UTC | 16 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.22 | 49166 | 52.20.78.240 | 443 | 1288 | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-10 19:31:19 UTC | 591 | OUT | |
2024-10-10 19:31:20 UTC | 672 | IN | |
2024-10-10 19:31:20 UTC | 16 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 15:31:15 |
Start date: | 10/10/2024 |
Path: | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x13f280000 |
File size: | 3'151'128 bytes |
MD5 hash: | FFA2B8E17F645BCC20F0E0201FEF83ED |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 1 |
Start time: | 15:31:16 |
Start date: | 10/10/2024 |
Path: | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x13f280000 |
File size: | 3'151'128 bytes |
MD5 hash: | FFA2B8E17F645BCC20F0E0201FEF83ED |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 4 |
Start time: | 15:31:18 |
Start date: | 10/10/2024 |
Path: | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x13f280000 |
File size: | 3'151'128 bytes |
MD5 hash: | FFA2B8E17F645BCC20F0E0201FEF83ED |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |