Windows
Analysis Report
https://m3ins.azurewebsites.net/?user-agent=Mozilla/5.0%20(Windows%20NT%2010.0;%20Win64;%20x64)%20AppleWebKit/537.36%20(KHTML
Overview
General Information
Detection
Score: | 92 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- chrome.exe (PID: 1748 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 3260 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2284 --fi eld-trial- handle=223 2,i,377512 2873185962 186,106637 8764432766 8169,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- chrome.exe (PID: 6500 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://m3ins .azurewebs ites.net/? user-agent =Mozilla/5 .0%20(Wind ows%20NT%2 010.0;%20W in64;%20x6 4)%20Apple WebKit/537 .36%20(KHT ML" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_HtmlPhish_44 | Yara detected HtmlPhish_44 | Joe Security | ||
JoeSecurity_Obshtml | Yara detected obfuscated html page | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_HtmlPhish_29 | Yara detected HtmlPhish_29 | Joe Security | ||
JoeSecurity_HtmlPhish_10 | Yara detected HtmlPhish_10 | Joe Security | ||
JoeSecurity_HtmlPhish_29 | Yara detected HtmlPhish_29 | Joe Security | ||
JoeSecurity_HtmlPhish_10 | Yara detected HtmlPhish_10 | Joe Security |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: |
Phishing |
---|
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: |
Source: | File source: |
Source: | File source: |
Source: | Joe Sandbox AI: |
Source: | Joe Sandbox AI: |
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Classification label: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Window detected: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 2 Browser Extensions | 1 Process Injection | 1 Process Injection | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 1 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | phishing |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
s-part-0016.t-0009.t-msedge.net | 13.107.246.44 | true | false | high | |
s-part-0017.t-0009.t-msedge.net | 13.107.246.45 | true | false | high | |
www.google.com | 142.250.185.132 | true | false | high | |
api.allorigins.win | 188.114.97.3 | true | false | high | |
m3ins.azurewebsites.net | unknown | unknown | true | unknown | |
aadcdn.msftauth.net | unknown | unknown | false | high | |
login.microsoftonline.com | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
true | unknown | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.250.185.132 | www.google.com | United States | 15169 | GOOGLEUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
188.114.97.3 | api.allorigins.win | European Union | 13335 | CLOUDFLARENETUS | false | |
188.114.96.3 | unknown | European Union | 13335 | CLOUDFLARENETUS | false |
IP |
---|
192.168.2.4 |
192.168.2.5 |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1592365 |
Start date and time: | 2025-01-16 01:44:05 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 11s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | https://m3ins.azurewebsites.net/?user-agent=Mozilla/5.0%20(Windows%20NT%2010.0;%20Win64;%20x64)%20AppleWebKit/537.36%20(KHTML |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 8 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal92.phis.win@17/33@12/6 |
EGA Information: | Failed |
HCA Information: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 172.217.16.195, 142.250.185.174, 108.177.15.84, 142.250.184.206, 216.58.212.174, 216.58.206.46, 20.49.104.53, 142.250.184.234, 142.250.185.106, 172.190.213.174, 20.76.201.171, 20.70.246.20, 20.112.250.133, 20.236.44.162, 20.231.239.246, 95.101.149.131, 40.126.32.138, 40.126.32.140, 20.190.160.22, 40.126.32.134, 20.190.160.17, 20.190.160.20, 40.126.32.133, 20.190.160.14, 217.20.57.34, 2.23.209.34, 2.23.209.17, 40.126.32.76, 40.126.32.72, 40.126.32.74, 2.23.77.188, 142.250.186.170, 142.250.186.138, 172.217.18.10, 216.58.212.170, 142.250.185.202, 216.58.206.74, 142.250.186.42, 142.250.185.170, 142.250.185.138, 142.250.185.234, 172.217.23.106, 172.217.16.202, 142.250.186.74, 142.250.185.74, 142.250.185.110, 216.58.206.78, 142.250.186.46, 172.217.18.14, 142.250.186.174, 142.250.185.67, 142.250.186.78, 142.250.185.142, 142.250.185.238, 52.138.229.66, 52.178.17.3, 184.28.90.27, 4.245.163.56, 13.107.246.44, 13.107.246.45
- Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, waws-prod-blu-287-d32d.eastus.cloudapp.azure.com, e13678.dscb.akamaiedge.net, www.tm.aadcdn.msftauth.trafficmanager.net, www.tm.lg.prod.aadmsa.akadns.net, clientservices.googleapis.com, _8443._https.m3insdevices.eastus.cloudapp.azure.com, ak.privatelink.msidentity.com, onedscolprdneu14.northeurope.cloudapp.azure.com, www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net, www.microsoft.com-c-3.edgekey.net, clients2.google.com, ocsp.digicert.com, redirector.gvt1.com, login.live.com, update.googleapis.com, login.mso.msidentity.com, www.tm.ak.prd.aadg.trafficmanager.net, e329293.dscd.akamaiedge.net, prdv4a.aadg.msidentity.com, fs.microsoft.com, accounts.google.com, content-autofill.googleapis.com, otelrules.azureedge.net, ajax.googleapis.com, aadcdnoriginwus2.azureedge.net, www.tm.v4.a.prd.aadg.trafficmanager.net, ctldl.windowsupdate.com, m3insdevices.eastus.cloudapp.azure.com, aadcdn.msauth.net, firstparty-azurefd-prod.trafficmanager.ne
- Not all processes where analyzed, report is missing behavior information
- VT rate limit hit for: https://m3ins.azurewebsites.net/?user-agent=Mozilla/5.0%20(Windows%20NT%2010.0;%20Win64;%20x64)%20AppleWebKit/537.36%20(KHTML
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 61052 |
Entropy (8bit): | 7.996159932827634 |
Encrypted: | true |
SSDEEP: | 1536:HQaq1Q7XOos5ZBIp+1Zr52IGmCJijm1qAxTe9wzf:fq1HoUBIpU5TG7JSmwuTe+b |
MD5: | C1E82BF71ADD622AD0F3BF8572F634FC |
SHA1: | 6CA863D4CAB96669202548D301693B3F5F80B0D5 |
SHA-256: | BA48AF15D297DB450DC4870242482145ADDB2D18375A4871C490429E2DC5464A |
SHA-512: | 820A7F8A0C8EA33A8FE1E90CDC35F45DC1E143E836B0D8EA047E1E312F8CAEC72CDEE4E7DB54760A4D749CD0ACFE103A27E39A9A56EB2D704E448A67B0D0C079 |
Malicious: | false |
Reputation: | low |
URL: | https://aadcdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 3452 |
Entropy (8bit): | 5.117912766689607 |
Encrypted: | false |
SSDEEP: | 96:3qO9I9Sz9KHULI5m4UidBGLosqAsosushswsosry:a2IYz95qTdBac |
MD5: | CB06E9A552B197D5C0EA600B431A3407 |
SHA1: | 04E167433F2F1038C78F387F8A166BB6542C2008 |
SHA-256: | 1F4EDBD2416E15BD82E61BA1A8E5558D44C4E914536B1B07712181BF57934021 |
SHA-512: | 1B4A3919E442EE4D2F30AE29B1C70DF7274E5428BCB6B3EDD84DCB92D60A0D6BDD9FA6D9DDE8EAB341FF4C12DE00A50858BF1FC5B6135B71E9E177F5A9ED34B9 |
Malicious: | false |
Reputation: | low |
URL: | https://login.live.com/Me.htm?v=3 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 61052 |
Entropy (8bit): | 7.996159932827634 |
Encrypted: | true |
SSDEEP: | 1536:HQaq1Q7XOos5ZBIp+1Zr52IGmCJijm1qAxTe9wzf:fq1HoUBIpU5TG7JSmwuTe+b |
MD5: | C1E82BF71ADD622AD0F3BF8572F634FC |
SHA1: | 6CA863D4CAB96669202548D301693B3F5F80B0D5 |
SHA-256: | BA48AF15D297DB450DC4870242482145ADDB2D18375A4871C490429E2DC5464A |
SHA-512: | 820A7F8A0C8EA33A8FE1E90CDC35F45DC1E143E836B0D8EA047E1E312F8CAEC72CDEE4E7DB54760A4D749CD0ACFE103A27E39A9A56EB2D704E448A67B0D0C079 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 1435 |
Entropy (8bit): | 7.8613342322590265 |
Encrypted: | false |
SSDEEP: | 24:XjtSZi0kq+yVCGYXVrO4vDxik/N/z5VaLPbholJvf6dblke68eRZJyBDz3BnZcNX:XgDkpyVCGca4b//9z5oPXdbl9688qRzY |
MD5: | 9F368BC4580FED907775F31C6B26D6CF |
SHA1: | E393A40B3E337F43057EEE3DE189F197AB056451 |
SHA-256: | 7ECBBA946C099539C3D9C03F4B6804958900E5B90D48336EEA7E5A2ED050FA36 |
SHA-512: | 0023B04D1EEC26719363AED57C95C1A91244C5AFF0BB53091938798FB16E230680E1F972D166B633C1D2B314B34FE0B9D7C18442410DB7DD6024E279AAFD61B0 |
Malicious: | false |
Reputation: | low |
URL: | https://aadcdn.msauth.net/shared/1.0/content/images/microsoft_logo_564db913a7fa0ca42727161c6d031bef.svg |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1435 |
Entropy (8bit): | 7.8613342322590265 |
Encrypted: | false |
SSDEEP: | 24:XjtSZi0kq+yVCGYXVrO4vDxik/N/z5VaLPbholJvf6dblke68eRZJyBDz3BnZcNX:XgDkpyVCGca4b//9z5oPXdbl9688qRzY |
MD5: | 9F368BC4580FED907775F31C6B26D6CF |
SHA1: | E393A40B3E337F43057EEE3DE189F197AB056451 |
SHA-256: | 7ECBBA946C099539C3D9C03F4B6804958900E5B90D48336EEA7E5A2ED050FA36 |
SHA-512: | 0023B04D1EEC26719363AED57C95C1A91244C5AFF0BB53091938798FB16E230680E1F972D166B633C1D2B314B34FE0B9D7C18442410DB7DD6024E279AAFD61B0 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 798 |
Entropy (8bit): | 5.618815955763162 |
Encrypted: | false |
SSDEEP: | 24:YdREVKXdwvd3PrKx8Okerkq+sPmBK5UsQ9/Zd3n:YdREVedk/rKx8Okerkq+sPd5Up9Rd3n |
MD5: | 75C986FDC6EF640EA9E3293CC089EA49 |
SHA1: | BAF0DF40A7E47DFCA3B1CC5D503942A237FF7BF1 |
SHA-256: | 90AFECCEB9F39C9DD40B0972783A1F2831664870923AA32BC9548EEB20C884AB |
SHA-512: | 9A08227875E4619F3B00F6403490B9121B84C1EAF04FD0102C9796636A0CEF40936469C3C1985FA3BE8C9ED18D67B5CE17D4DC64C88C04B560981786D1817B72 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 72 |
Entropy (8bit): | 4.241202481433726 |
Encrypted: | false |
SSDEEP: | 3:YozDD/RNgQJzRWWlKFiFD3e4xCzY:YovtNgmzR/wYFDxkY |
MD5: | 9E576E34B18E986347909C29AE6A82C6 |
SHA1: | 532C767978DC2B55854B3CA2D2DF5B4DB221C934 |
SHA-256: | 88BDF5AF090328963973990DE427779F9C4DF3B8E1F5BADC3D972BAC3087006D |
SHA-512: | 5EF6DCFFD93434D45760888BF4B95FF134D53F34DA9DC904AD3C5EBEDC58409073483F531FEA4233869ED3EC75F38B022A70B2E179A5D3A13BDB10AB5C46B124 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8090 |
Entropy (8bit): | 7.975679351839074 |
Encrypted: | false |
SSDEEP: | 192:MSdzwq/zLrHsuC5nI+dVzYUrXE0R2Q2TEbmmMmdaBnm:MYzwqfgrP/zZEk2+FaZm |
MD5: | 9592A0648C596D9CDC5E3A73CAB857BB |
SHA1: | BDDEEA86025E441F67BF0426B7287B60EFA83874 |
SHA-256: | 57B3F939261945BAB128A44FDF5D57E562AAE88848D69B246DF10B4FEFCD177F |
SHA-512: | 6805023DA09722FA1E704DB8482E739B0DFF885214FB3CA4E2AB078F2ED8D230E9BAA5AB2CDC6469BF7C2C7C5631DAA78CAE82A2AFDBEC7C6996E9F37990D84F |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 16 |
Entropy (8bit): | 3.875 |
Encrypted: | false |
SSDEEP: | 3:H1lL:7 |
MD5: | 5A3A3572E06B97C4807EAE7D7E35452A |
SHA1: | 6A7370E2CE6C3A7F21FF85FAD4A69E1C9669315E |
SHA-256: | DE6C506CA5C3E6315DAF83C43AB01143AC20A7C836EE5235B1B595925232D1A4 |
SHA-512: | E64DEA03003CC54867506EE87850DC87152D596ED87704A33324202B5F28399CDDDF94BC3D8D5923CBC0E39E8EB5813AE125882EE137FBEF3B2B1770606CAF3E |
Malicious: | false |
Reputation: | low |
URL: | https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISEAmEUZnkeSaGbBIFDZjXF6c=?alt=proto |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 189188 |
Entropy (8bit): | 3.295179432918858 |
Encrypted: | false |
SSDEEP: | 768:M4iQ2vQQ3QwLQmBwuI8+pN4bJaMiykDp097rt1AApXFOHggpFD99c9gGFx3z5+4l:Ylvv3XL968+DEMb39rGg4DgqM2 |
MD5: | 3E84203A657DE6005DCE4847724DD0C0 |
SHA1: | C8917031B6359ECFAAB4C7EF022E268D86B20425 |
SHA-256: | DD733835DC3D4A33E9801E5FBE40A7FC8AF6D3AB8D1551B9DF9593BBE594F45E |
SHA-512: | F6307D5E2DCD7A69A2E5240DAF09E4A2B122AE4A1C2825247C8F1BD3C60AD33232BAA22BAF3A4C3FB92FC7036D10E04E920DB29068561E0606ABA119283F4DA2 |
Malicious: | false |
Reputation: | low |
URL: | https://m3ins.azurewebsites.net/?user-agent=Mozilla/5.0%20(Windows%20NT%2010.0;%20Win64;%20x64)%20AppleWebKit/537.36%20(KHTML |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 798 |
Entropy (8bit): | 5.615117360724269 |
Encrypted: | false |
SSDEEP: | 24:YdReAVtivsthziS5Kx8OkCkq+sPmBK5UsQ9QRZd3n:YdRtVtivikQKx8OkCkq+sPd5Up9Gd3n |
MD5: | 0ECEB58D5BFE5FBBE137F64850D25D32 |
SHA1: | 6F1CB2C3CEA00D27802A6C1D6ADB0F4B144978E3 |
SHA-256: | 6BF85F70414CF82B0CC631EBADC47DF178A5E90B31CC69727D064BB05D0A7FE8 |
SHA-512: | B6AAF15F9BC8459BB5FBF11A2F3D0C24F53388FEEE9AD8CF4072507E17010CF7C06529005FA1C10212F007B6650F79AA63103F32BEE834AF179FA090B8984B7A |
Malicious: | false |
Reputation: | low |
URL: | https://api.allorigins.win/get?url=https%3A%2F%2Flogin.microsoftonline.com%2Fcommon%2Foauth2%2Fdevicecode%3Fapi-version%3D1.0%26client_id%3Dd3590ed6-52b3-4102-aeff-aad2292ab01c%26resource%3Dhttps%3A%2F%2Fgraph.windows.net |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 89476 |
Entropy (8bit): | 5.2896589255084425 |
Encrypted: | false |
SSDEEP: | 1536:AjExXUqrnxDjoXEZxkMV4SYSt0zvDD6ip3h8cApwEjOPrBeU6QLiTFbc0QlQvakF:AYh8eip3huuf6IidlrvakdtQ47GK1 |
MD5: | DC5E7F18C8D36AC1D3D4753A87C98D0A |
SHA1: | C8E1C8B386DC5B7A9184C763C88D19A346EB3342 |
SHA-256: | F7F6A5894F1D19DDAD6FA392B2ECE2C5E578CBF7DA4EA805B6885EB6985B6E3D |
SHA-512: | 6CB4F4426F559C06190DF97229C05A436820D21498350AC9F118A5625758435171418A022ED523BAE46E668F9F8EA871FEAB6AFF58AD2740B67A30F196D65516 |
Malicious: | false |
Reputation: | low |
URL: | https://ajax.googleapis.com/ajax/libs/jquery/3.5.1/jquery.min.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 81698 |
Entropy (8bit): | 7.9965391327210344 |
Encrypted: | true |
SSDEEP: | 1536:ojvWOQyRXQETuzOx0V0NZ0hwPgFLGsIn4EfDp+I4hVAeA39ZiUl3:oOCgESzOx0mXVYFk4EL45rAeCT3 |
MD5: | B5E7C40DB0AA8EBCC3A46E913A5BF24E |
SHA1: | E9E4ACB84F840C93588BC8FED111272AE4039ED6 |
SHA-256: | 6BC3647C76DEEA622976A1C9C05B71D33E9347397317BC9A73BB71518544F94E |
SHA-512: | F9AA08FDE94ED9638B42C2AC5BE694BF17DC7DDB27F082B5EB31E7890245A995A1D54FD05132C103F4FF3E7C04D1BCE39B8C71A4A11DFBAEF7D786EA06147DB2 |
Malicious: | false |
Reputation: | low |
URL: | https://aadcdn.msauth.net/shared/1.0/content/js/ConvergedRemoteConnect_Core_1VtikzWJ5y74GFf-oA3ODw2.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 17174 |
Entropy (8bit): | 2.9129715116732746 |
Encrypted: | false |
SSDEEP: | 24:QSNTmTFxg4lyyyyyyyyyyyyyio7eeeeeeeeekzgsLsLsLsLsLsQZp:nfgyyyyyyyyyyyyynzQQQQQO |
MD5: | 12E3DAC858061D088023B2BD48E2FA96 |
SHA1: | E08CE1A144ECEAE0C3C2EA7A9D6FBC5658F24CE5 |
SHA-256: | 90CDAF487716184E4034000935C605D1633926D348116D198F355A98B8C6CD21 |
SHA-512: | C5030C55A855E7A9E20E22F4C70BF1E0F3C558A9B7D501CFAB6992AC2656AE5E41B050CCAC541EFA55F9603E0D349B247EB4912EE169D44044271789C719CD01 |
Malicious: | false |
Reputation: | low |
URL: | https://aadcdn.msauth.net/shared/1.0/content/images/favicon_a_eupayfgghqiai7k9sol6lg2.ico |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 673 |
Entropy (8bit): | 7.6596900876595075 |
Encrypted: | false |
SSDEEP: | 12:Xl0t8TUViiYi5m6FhSBXWPsigK99WCqKMvBBFThSqfLd81CK6bC+k7LqZLsFlD:XFUVpkNK0Rwid81p6btk7LqZ6D |
MD5: | 0E176276362B94279A4492511BFCBD98 |
SHA1: | 389FE6B51F62254BB98939896B8C89EBEFFE2A02 |
SHA-256: | 9A2C174AE45CAC057822844211156A5ED293E65C5F69E1D211A7206472C5C80C |
SHA-512: | 8D61C9E464C8F3C77BF1729E32F92BBB1B426A19907E418862EFE117DBD1F0A26FCC3A6FE1D1B22B836853D43C964F6B6D25E414649767FBEA7FE10D2048D7A1 |
Malicious: | false |
Reputation: | low |
URL: | https://aadcdn.msauth.net/shared/1.0/content/images/backgrounds/2_11d9e3bcdfede9ce5ce5ace2d129f1c4.svg |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 20410 |
Entropy (8bit): | 7.980582012022051 |
Encrypted: | false |
SSDEEP: | 384:8RvmaMFysnOXZ2m9zM+udO6GGUpeAU02oDGnN5EsQwWUQGTS8r2k:8pmm7ZFM+ObGGUIjN5PJV3Tp |
MD5: | 3BA4D76A17ADD0A6C34EE696F28C8541 |
SHA1: | 5E8A4B8334539A7EAB798A7799F6E232016CB263 |
SHA-256: | 17D6FF63DD857A72F37292B5906B40DC087EA27D7B1DEFCFA6DD1BA82AEA0B59 |
SHA-512: | 8DA16A9759BB68A6B408F9F274B882ABB3EE7BA19F888448E495B721094BDB2CE5664E9A26BAE306A00491235EB94C143E53F618CCD6D50307C3C7F2EF1B4455 |
Malicious: | false |
Reputation: | low |
URL: | https://aadcdn.msauth.net/ests/2.1/content/cdnbundles/converged.v2.login.min_81imvbluez-v5hbzpkxfcg2.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 89476 |
Entropy (8bit): | 5.2896589255084425 |
Encrypted: | false |
SSDEEP: | 1536:AjExXUqrnxDjoXEZxkMV4SYSt0zvDD6ip3h8cApwEjOPrBeU6QLiTFbc0QlQvakF:AYh8eip3huuf6IidlrvakdtQ47GK1 |
MD5: | DC5E7F18C8D36AC1D3D4753A87C98D0A |
SHA1: | C8E1C8B386DC5B7A9184C763C88D19A346EB3342 |
SHA-256: | F7F6A5894F1D19DDAD6FA392B2ECE2C5E578CBF7DA4EA805B6885EB6985B6E3D |
SHA-512: | 6CB4F4426F559C06190DF97229C05A436820D21498350AC9F118A5625758435171418A022ED523BAE46E668F9F8EA871FEAB6AFF58AD2740B67A30F196D65516 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 8090 |
Entropy (8bit): | 7.975679351839074 |
Encrypted: | false |
SSDEEP: | 192:MSdzwq/zLrHsuC5nI+dVzYUrXE0R2Q2TEbmmMmdaBnm:MYzwqfgrP/zZEk2+FaZm |
MD5: | 9592A0648C596D9CDC5E3A73CAB857BB |
SHA1: | BDDEEA86025E441F67BF0426B7287B60EFA83874 |
SHA-256: | 57B3F939261945BAB128A44FDF5D57E562AAE88848D69B246DF10B4FEFCD177F |
SHA-512: | 6805023DA09722FA1E704DB8482E739B0DFF885214FB3CA4E2AB078F2ED8D230E9BAA5AB2CDC6469BF7C2C7C5631DAA78CAE82A2AFDBEC7C6996E9F37990D84F |
Malicious: | false |
Reputation: | low |
URL: | https://aadcdn.msauth.net/ests/2.1/content/cdnbundles/ux.converged.remote.connect.strings-en.min_x4ets0-72hmcbgax1qnvvw2.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 673 |
Entropy (8bit): | 7.6596900876595075 |
Encrypted: | false |
SSDEEP: | 12:Xl0t8TUViiYi5m6FhSBXWPsigK99WCqKMvBBFThSqfLd81CK6bC+k7LqZLsFlD:XFUVpkNK0Rwid81p6btk7LqZ6D |
MD5: | 0E176276362B94279A4492511BFCBD98 |
SHA1: | 389FE6B51F62254BB98939896B8C89EBEFFE2A02 |
SHA-256: | 9A2C174AE45CAC057822844211156A5ED293E65C5F69E1D211A7206472C5C80C |
SHA-512: | 8D61C9E464C8F3C77BF1729E32F92BBB1B426A19907E418862EFE117DBD1F0A26FCC3A6FE1D1B22B836853D43C964F6B6D25E414649767FBEA7FE10D2048D7A1 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 17174 |
Entropy (8bit): | 2.9129715116732746 |
Encrypted: | false |
SSDEEP: | 24:QSNTmTFxg4lyyyyyyyyyyyyyio7eeeeeeeeekzgsLsLsLsLsLsQZp:nfgyyyyyyyyyyyyynzQQQQQO |
MD5: | 12E3DAC858061D088023B2BD48E2FA96 |
SHA1: | E08CE1A144ECEAE0C3C2EA7A9D6FBC5658F24CE5 |
SHA-256: | 90CDAF487716184E4034000935C605D1633926D348116D198F355A98B8C6CD21 |
SHA-512: | C5030C55A855E7A9E20E22F4C70BF1E0F3C558A9B7D501CFAB6992AC2656AE5E41B050CCAC541EFA55F9603E0D349B247EB4912EE169D44044271789C719CD01 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 81698 |
Entropy (8bit): | 7.9965391327210344 |
Encrypted: | true |
SSDEEP: | 1536:ojvWOQyRXQETuzOx0V0NZ0hwPgFLGsIn4EfDp+I4hVAeA39ZiUl3:oOCgESzOx0mXVYFk4EL45rAeCT3 |
MD5: | B5E7C40DB0AA8EBCC3A46E913A5BF24E |
SHA1: | E9E4ACB84F840C93588BC8FED111272AE4039ED6 |
SHA-256: | 6BC3647C76DEEA622976A1C9C05B71D33E9347397317BC9A73BB71518544F94E |
SHA-512: | F9AA08FDE94ED9638B42C2AC5BE694BF17DC7DDB27F082B5EB31E7890245A995A1D54FD05132C103F4FF3E7C04D1BCE39B8C71A4A11DFBAEF7D786EA06147DB2 |
Malicious: | false |
Reputation: | low |
Preview: |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 16, 2025 01:44:59.658437014 CET | 49675 | 443 | 192.168.2.4 | 173.222.162.32 |
Jan 16, 2025 01:45:05.449404955 CET | 49739 | 443 | 192.168.2.4 | 142.250.185.132 |
Jan 16, 2025 01:45:05.449460983 CET | 443 | 49739 | 142.250.185.132 | 192.168.2.4 |
Jan 16, 2025 01:45:05.449554920 CET | 49739 | 443 | 192.168.2.4 | 142.250.185.132 |
Jan 16, 2025 01:45:05.449796915 CET | 49739 | 443 | 192.168.2.4 | 142.250.185.132 |
Jan 16, 2025 01:45:05.449820042 CET | 443 | 49739 | 142.250.185.132 | 192.168.2.4 |
Jan 16, 2025 01:45:06.107459068 CET | 443 | 49739 | 142.250.185.132 | 192.168.2.4 |
Jan 16, 2025 01:45:06.108076096 CET | 49739 | 443 | 192.168.2.4 | 142.250.185.132 |
Jan 16, 2025 01:45:06.108134031 CET | 443 | 49739 | 142.250.185.132 | 192.168.2.4 |
Jan 16, 2025 01:45:06.109298944 CET | 443 | 49739 | 142.250.185.132 | 192.168.2.4 |
Jan 16, 2025 01:45:06.109385014 CET | 49739 | 443 | 192.168.2.4 | 142.250.185.132 |
Jan 16, 2025 01:45:06.110717058 CET | 49739 | 443 | 192.168.2.4 | 142.250.185.132 |
Jan 16, 2025 01:45:06.110790968 CET | 443 | 49739 | 142.250.185.132 | 192.168.2.4 |
Jan 16, 2025 01:45:06.157557964 CET | 49739 | 443 | 192.168.2.4 | 142.250.185.132 |
Jan 16, 2025 01:45:06.157589912 CET | 443 | 49739 | 142.250.185.132 | 192.168.2.4 |
Jan 16, 2025 01:45:06.204253912 CET | 49739 | 443 | 192.168.2.4 | 142.250.185.132 |
Jan 16, 2025 01:45:09.582938910 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 16, 2025 01:45:09.582958937 CET | 443 | 49746 | 188.114.97.3 | 192.168.2.4 |
Jan 16, 2025 01:45:09.583061934 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 16, 2025 01:45:09.583719969 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 16, 2025 01:45:09.583730936 CET | 443 | 49746 | 188.114.97.3 | 192.168.2.4 |
Jan 16, 2025 01:45:10.090197086 CET | 443 | 49746 | 188.114.97.3 | 192.168.2.4 |
Jan 16, 2025 01:45:10.090590954 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 16, 2025 01:45:10.090614080 CET | 443 | 49746 | 188.114.97.3 | 192.168.2.4 |
Jan 16, 2025 01:45:10.092308044 CET | 443 | 49746 | 188.114.97.3 | 192.168.2.4 |
Jan 16, 2025 01:45:10.092402935 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 16, 2025 01:45:10.093455076 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 16, 2025 01:45:10.093496084 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 16, 2025 01:45:10.093540907 CET | 443 | 49746 | 188.114.97.3 | 192.168.2.4 |
Jan 16, 2025 01:45:10.093602896 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 16, 2025 01:45:10.093614101 CET | 443 | 49746 | 188.114.97.3 | 192.168.2.4 |
Jan 16, 2025 01:45:10.093627930 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 16, 2025 01:45:10.093667984 CET | 49746 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 16, 2025 01:45:10.094119072 CET | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 16, 2025 01:45:10.094156981 CET | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Jan 16, 2025 01:45:10.094244957 CET | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 16, 2025 01:45:10.094450951 CET | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 16, 2025 01:45:10.094465971 CET | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Jan 16, 2025 01:45:10.590154886 CET | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Jan 16, 2025 01:45:10.590465069 CET | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 16, 2025 01:45:10.590480089 CET | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Jan 16, 2025 01:45:10.592144012 CET | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Jan 16, 2025 01:45:10.592231989 CET | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 16, 2025 01:45:10.593338966 CET | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 16, 2025 01:45:10.593430042 CET | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Jan 16, 2025 01:45:10.593636990 CET | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 16, 2025 01:45:10.593647003 CET | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Jan 16, 2025 01:45:10.635479927 CET | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 16, 2025 01:45:11.039762974 CET | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Jan 16, 2025 01:45:11.039891958 CET | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Jan 16, 2025 01:45:11.039953947 CET | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 16, 2025 01:45:11.052470922 CET | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 16, 2025 01:45:11.052500010 CET | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Jan 16, 2025 01:45:11.265753984 CET | 49749 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 16, 2025 01:45:11.265774012 CET | 443 | 49749 | 188.114.96.3 | 192.168.2.4 |
Jan 16, 2025 01:45:11.265832901 CET | 49749 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 16, 2025 01:45:11.266154051 CET | 49749 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 16, 2025 01:45:11.266171932 CET | 443 | 49749 | 188.114.96.3 | 192.168.2.4 |
Jan 16, 2025 01:45:11.730284929 CET | 443 | 49749 | 188.114.96.3 | 192.168.2.4 |
Jan 16, 2025 01:45:11.734947920 CET | 49749 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 16, 2025 01:45:11.734975100 CET | 443 | 49749 | 188.114.96.3 | 192.168.2.4 |
Jan 16, 2025 01:45:11.735853910 CET | 443 | 49749 | 188.114.96.3 | 192.168.2.4 |
Jan 16, 2025 01:45:11.735925913 CET | 49749 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 16, 2025 01:45:11.742396116 CET | 49749 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 16, 2025 01:45:11.742463112 CET | 443 | 49749 | 188.114.96.3 | 192.168.2.4 |
Jan 16, 2025 01:45:11.742547035 CET | 49749 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 16, 2025 01:45:11.742563963 CET | 443 | 49749 | 188.114.96.3 | 192.168.2.4 |
Jan 16, 2025 01:45:11.742702007 CET | 49749 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 16, 2025 01:45:11.742728949 CET | 443 | 49749 | 188.114.96.3 | 192.168.2.4 |
Jan 16, 2025 01:45:11.742746115 CET | 49749 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 16, 2025 01:45:11.742770910 CET | 49749 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 16, 2025 01:45:11.743402958 CET | 49752 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 16, 2025 01:45:11.743438959 CET | 443 | 49752 | 188.114.96.3 | 192.168.2.4 |
Jan 16, 2025 01:45:11.743495941 CET | 49752 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 16, 2025 01:45:11.743807077 CET | 49752 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 16, 2025 01:45:11.743820906 CET | 443 | 49752 | 188.114.96.3 | 192.168.2.4 |
Jan 16, 2025 01:45:11.979255915 CET | 49672 | 443 | 192.168.2.4 | 173.222.162.32 |
Jan 16, 2025 01:45:11.979299068 CET | 443 | 49672 | 173.222.162.32 | 192.168.2.4 |
Jan 16, 2025 01:45:12.207604885 CET | 443 | 49752 | 188.114.96.3 | 192.168.2.4 |
Jan 16, 2025 01:45:12.208576918 CET | 49752 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 16, 2025 01:45:12.208591938 CET | 443 | 49752 | 188.114.96.3 | 192.168.2.4 |
Jan 16, 2025 01:45:12.209556103 CET | 443 | 49752 | 188.114.96.3 | 192.168.2.4 |
Jan 16, 2025 01:45:12.209615946 CET | 49752 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 16, 2025 01:45:12.210180044 CET | 49752 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 16, 2025 01:45:12.210239887 CET | 443 | 49752 | 188.114.96.3 | 192.168.2.4 |
Jan 16, 2025 01:45:12.210671902 CET | 49752 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 16, 2025 01:45:12.210680962 CET | 443 | 49752 | 188.114.96.3 | 192.168.2.4 |
Jan 16, 2025 01:45:12.267060995 CET | 49752 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 16, 2025 01:45:12.529908895 CET | 443 | 49752 | 188.114.96.3 | 192.168.2.4 |
Jan 16, 2025 01:45:12.530004025 CET | 443 | 49752 | 188.114.96.3 | 192.168.2.4 |
Jan 16, 2025 01:45:12.530154943 CET | 49752 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 16, 2025 01:45:12.535265923 CET | 49752 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 16, 2025 01:45:12.535290003 CET | 443 | 49752 | 188.114.96.3 | 192.168.2.4 |
Jan 16, 2025 01:45:16.023897886 CET | 443 | 49739 | 142.250.185.132 | 192.168.2.4 |
Jan 16, 2025 01:45:16.024043083 CET | 443 | 49739 | 142.250.185.132 | 192.168.2.4 |
Jan 16, 2025 01:45:16.024128914 CET | 49739 | 443 | 192.168.2.4 | 142.250.185.132 |
Jan 16, 2025 01:45:16.117575884 CET | 49739 | 443 | 192.168.2.4 | 142.250.185.132 |
Jan 16, 2025 01:45:16.117599010 CET | 443 | 49739 | 142.250.185.132 | 192.168.2.4 |
Jan 16, 2025 01:45:16.950861931 CET | 49723 | 80 | 192.168.2.4 | 199.232.210.172 |
Jan 16, 2025 01:45:16.956057072 CET | 80 | 49723 | 199.232.210.172 | 192.168.2.4 |
Jan 16, 2025 01:45:16.956155062 CET | 49723 | 80 | 192.168.2.4 | 199.232.210.172 |
Jan 16, 2025 01:46:05.502862930 CET | 49841 | 443 | 192.168.2.4 | 142.250.185.132 |
Jan 16, 2025 01:46:05.502912045 CET | 443 | 49841 | 142.250.185.132 | 192.168.2.4 |
Jan 16, 2025 01:46:05.502971888 CET | 49841 | 443 | 192.168.2.4 | 142.250.185.132 |
Jan 16, 2025 01:46:05.503354073 CET | 49841 | 443 | 192.168.2.4 | 142.250.185.132 |
Jan 16, 2025 01:46:05.503366947 CET | 443 | 49841 | 142.250.185.132 | 192.168.2.4 |
Jan 16, 2025 01:46:06.140139103 CET | 443 | 49841 | 142.250.185.132 | 192.168.2.4 |
Jan 16, 2025 01:46:06.140558004 CET | 49841 | 443 | 192.168.2.4 | 142.250.185.132 |
Jan 16, 2025 01:46:06.140590906 CET | 443 | 49841 | 142.250.185.132 | 192.168.2.4 |
Jan 16, 2025 01:46:06.141683102 CET | 443 | 49841 | 142.250.185.132 | 192.168.2.4 |
Jan 16, 2025 01:46:06.142107010 CET | 49841 | 443 | 192.168.2.4 | 142.250.185.132 |
Jan 16, 2025 01:46:06.142281055 CET | 443 | 49841 | 142.250.185.132 | 192.168.2.4 |
Jan 16, 2025 01:46:06.189291000 CET | 49841 | 443 | 192.168.2.4 | 142.250.185.132 |
Jan 16, 2025 01:46:06.301002979 CET | 49724 | 80 | 192.168.2.4 | 199.232.210.172 |
Jan 16, 2025 01:46:06.306205034 CET | 80 | 49724 | 199.232.210.172 | 192.168.2.4 |
Jan 16, 2025 01:46:06.306344032 CET | 49724 | 80 | 192.168.2.4 | 199.232.210.172 |
Jan 16, 2025 01:46:16.076488018 CET | 443 | 49841 | 142.250.185.132 | 192.168.2.4 |
Jan 16, 2025 01:46:16.076555014 CET | 443 | 49841 | 142.250.185.132 | 192.168.2.4 |
Jan 16, 2025 01:46:16.076694012 CET | 49841 | 443 | 192.168.2.4 | 142.250.185.132 |
Jan 16, 2025 01:46:16.128300905 CET | 49841 | 443 | 192.168.2.4 | 142.250.185.132 |
Jan 16, 2025 01:46:16.128320932 CET | 443 | 49841 | 142.250.185.132 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 16, 2025 01:45:01.312603951 CET | 53 | 64945 | 1.1.1.1 | 192.168.2.4 |
Jan 16, 2025 01:45:01.835235119 CET | 53 | 53764 | 1.1.1.1 | 192.168.2.4 |
Jan 16, 2025 01:45:02.808609962 CET | 53 | 53942 | 1.1.1.1 | 192.168.2.4 |
Jan 16, 2025 01:45:05.441226006 CET | 50257 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 16, 2025 01:45:05.441405058 CET | 54267 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 16, 2025 01:45:05.448224068 CET | 53 | 54267 | 1.1.1.1 | 192.168.2.4 |
Jan 16, 2025 01:45:05.448386908 CET | 53 | 50257 | 1.1.1.1 | 192.168.2.4 |
Jan 16, 2025 01:45:07.198523045 CET | 50210 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 16, 2025 01:45:07.198918104 CET | 50420 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 16, 2025 01:45:07.240478992 CET | 53 | 50420 | 1.1.1.1 | 192.168.2.4 |
Jan 16, 2025 01:45:08.309094906 CET | 53 | 53180 | 1.1.1.1 | 192.168.2.4 |
Jan 16, 2025 01:45:09.566508055 CET | 53 | 51820 | 1.1.1.1 | 192.168.2.4 |
Jan 16, 2025 01:45:09.570883036 CET | 50883 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 16, 2025 01:45:09.571161032 CET | 63655 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 16, 2025 01:45:09.579947948 CET | 53 | 63655 | 1.1.1.1 | 192.168.2.4 |
Jan 16, 2025 01:45:09.582344055 CET | 53 | 50883 | 1.1.1.1 | 192.168.2.4 |
Jan 16, 2025 01:45:11.110316038 CET | 53 | 61752 | 1.1.1.1 | 192.168.2.4 |
Jan 16, 2025 01:45:11.194113016 CET | 53 | 52536 | 1.1.1.1 | 192.168.2.4 |
Jan 16, 2025 01:45:11.243082047 CET | 65306 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 16, 2025 01:45:11.243237019 CET | 50366 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 16, 2025 01:45:11.251880884 CET | 53 | 50366 | 1.1.1.1 | 192.168.2.4 |
Jan 16, 2025 01:45:11.252988100 CET | 53 | 65306 | 1.1.1.1 | 192.168.2.4 |
Jan 16, 2025 01:45:11.493776083 CET | 53 | 55180 | 1.1.1.1 | 192.168.2.4 |
Jan 16, 2025 01:45:14.007145882 CET | 59912 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 16, 2025 01:45:14.007299900 CET | 59615 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 16, 2025 01:45:15.147794962 CET | 57440 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 16, 2025 01:45:15.147963047 CET | 49289 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 16, 2025 01:45:16.868411064 CET | 53 | 55444 | 1.1.1.1 | 192.168.2.4 |
Jan 16, 2025 01:45:17.869091988 CET | 138 | 138 | 192.168.2.4 | 192.168.2.255 |
Jan 16, 2025 01:45:20.040386915 CET | 53 | 50017 | 1.1.1.1 | 192.168.2.4 |
Jan 16, 2025 01:45:40.886495113 CET | 53 | 52456 | 1.1.1.1 | 192.168.2.4 |
Jan 16, 2025 01:45:40.886794090 CET | 53 | 64538 | 1.1.1.1 | 192.168.2.4 |
Jan 16, 2025 01:46:00.995812893 CET | 53 | 52040 | 1.1.1.1 | 192.168.2.4 |
Jan 16, 2025 01:46:02.072338104 CET | 53 | 58063 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Checksum | Code | Type |
---|---|---|---|---|---|
Jan 16, 2025 01:45:16.597091913 CET | 192.168.2.4 | 1.1.1.1 | c2dc | (Port unreachable) | Destination Unreachable |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 16, 2025 01:45:05.441226006 CET | 192.168.2.4 | 1.1.1.1 | 0x7c6b | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 16, 2025 01:45:05.441405058 CET | 192.168.2.4 | 1.1.1.1 | 0x8636 | Standard query (0) | 65 | IN (0x0001) | false | |
Jan 16, 2025 01:45:07.198523045 CET | 192.168.2.4 | 1.1.1.1 | 0x42b7 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 16, 2025 01:45:07.198918104 CET | 192.168.2.4 | 1.1.1.1 | 0xb7d4 | Standard query (0) | 65 | IN (0x0001) | false | |
Jan 16, 2025 01:45:09.570883036 CET | 192.168.2.4 | 1.1.1.1 | 0x2a06 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 16, 2025 01:45:09.571161032 CET | 192.168.2.4 | 1.1.1.1 | 0xb0cf | Standard query (0) | 65 | IN (0x0001) | false | |
Jan 16, 2025 01:45:11.243082047 CET | 192.168.2.4 | 1.1.1.1 | 0xdcb | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 16, 2025 01:45:11.243237019 CET | 192.168.2.4 | 1.1.1.1 | 0x8414 | Standard query (0) | 65 | IN (0x0001) | false | |
Jan 16, 2025 01:45:14.007145882 CET | 192.168.2.4 | 1.1.1.1 | 0xc829 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 16, 2025 01:45:14.007299900 CET | 192.168.2.4 | 1.1.1.1 | 0x6690 | Standard query (0) | 65 | IN (0x0001) | false | |
Jan 16, 2025 01:45:15.147794962 CET | 192.168.2.4 | 1.1.1.1 | 0x43c0 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 16, 2025 01:45:15.147963047 CET | 192.168.2.4 | 1.1.1.1 | 0x369b | Standard query (0) | 65 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 16, 2025 01:45:05.448224068 CET | 1.1.1.1 | 192.168.2.4 | 0x8636 | No error (0) | 65 | IN (0x0001) | false | |||
Jan 16, 2025 01:45:05.448386908 CET | 1.1.1.1 | 192.168.2.4 | 0x7c6b | No error (0) | 142.250.185.132 | A (IP address) | IN (0x0001) | false | ||
Jan 16, 2025 01:45:07.237905025 CET | 1.1.1.1 | 192.168.2.4 | 0x42b7 | No error (0) | waws-prod-blu-287.sip.azurewebsites.windows.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 16, 2025 01:45:07.237905025 CET | 1.1.1.1 | 192.168.2.4 | 0x42b7 | No error (0) | waws-prod-blu-287-d32d.eastus.cloudapp.azure.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 16, 2025 01:45:07.240478992 CET | 1.1.1.1 | 192.168.2.4 | 0xb7d4 | No error (0) | waws-prod-blu-287.sip.azurewebsites.windows.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 16, 2025 01:45:07.240478992 CET | 1.1.1.1 | 192.168.2.4 | 0xb7d4 | No error (0) | waws-prod-blu-287-d32d.eastus.cloudapp.azure.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 16, 2025 01:45:09.579947948 CET | 1.1.1.1 | 192.168.2.4 | 0xb0cf | No error (0) | 65 | IN (0x0001) | false | |||
Jan 16, 2025 01:45:09.582344055 CET | 1.1.1.1 | 192.168.2.4 | 0x2a06 | No error (0) | 188.114.97.3 | A (IP address) | IN (0x0001) | false | ||
Jan 16, 2025 01:45:09.582344055 CET | 1.1.1.1 | 192.168.2.4 | 0x2a06 | No error (0) | 188.114.96.3 | A (IP address) | IN (0x0001) | false | ||
Jan 16, 2025 01:45:11.251880884 CET | 1.1.1.1 | 192.168.2.4 | 0x8414 | No error (0) | 65 | IN (0x0001) | false | |||
Jan 16, 2025 01:45:11.252988100 CET | 1.1.1.1 | 192.168.2.4 | 0xdcb | No error (0) | 188.114.96.3 | A (IP address) | IN (0x0001) | false | ||
Jan 16, 2025 01:45:11.252988100 CET | 1.1.1.1 | 192.168.2.4 | 0xdcb | No error (0) | 188.114.97.3 | A (IP address) | IN (0x0001) | false | ||
Jan 16, 2025 01:45:14.013854980 CET | 1.1.1.1 | 192.168.2.4 | 0xc829 | No error (0) | login.mso.msidentity.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 16, 2025 01:45:14.014105082 CET | 1.1.1.1 | 192.168.2.4 | 0x6690 | No error (0) | login.mso.msidentity.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 16, 2025 01:45:15.153202057 CET | 1.1.1.1 | 192.168.2.4 | 0xb276 | No error (0) | s-part-0016.t-0009.t-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 16, 2025 01:45:15.153202057 CET | 1.1.1.1 | 192.168.2.4 | 0xb276 | No error (0) | 13.107.246.44 | A (IP address) | IN (0x0001) | false | ||
Jan 16, 2025 01:45:15.154907942 CET | 1.1.1.1 | 192.168.2.4 | 0x369b | No error (0) | www.tm.aadcdn.msftauth.trafficmanager.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 16, 2025 01:45:15.154992104 CET | 1.1.1.1 | 192.168.2.4 | 0x43c0 | No error (0) | www.tm.aadcdn.msftauth.trafficmanager.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 16, 2025 01:45:16.576868057 CET | 1.1.1.1 | 192.168.2.4 | 0x3f6c | No error (0) | s-part-0017.t-0009.t-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 16, 2025 01:45:16.576868057 CET | 1.1.1.1 | 192.168.2.4 | 0x3f6c | No error (0) | 13.107.246.45 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49747 | 188.114.97.3 | 443 | 3260 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-16 00:45:10 UTC | 756 | OUT | |
2025-01-16 00:45:11 UTC | 1168 | IN | |
2025-01-16 00:45:11 UTC | 201 | IN | |
2025-01-16 00:45:11 UTC | 597 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49752 | 188.114.96.3 | 443 | 3260 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-16 00:45:12 UTC | 536 | OUT | |
2025-01-16 00:45:12 UTC | 1126 | IN | |
2025-01-16 00:45:12 UTC | 243 | IN | |
2025-01-16 00:45:12 UTC | 555 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 19:44:54 |
Start date: | 15/01/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff76e190000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 2 |
Start time: | 19:44:59 |
Start date: | 15/01/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff76e190000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 3 |
Start time: | 19:45:05 |
Start date: | 15/01/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff76e190000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |