Windows
Analysis Report
https://assets-fra.mkt.dynamics.com/693cf829reb-ee1148%6045bd6e9afa/digitalassets/standaloneforms/aa7d5e09-b2eb-ee11-a1fd%6045bd6e68fb
Overview
General Information
Detection
Score: | 0 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
- System is w10x64
- chrome.exe (PID: 3592 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 5724 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2352 --fi eld-trial- handle=227 2,i,558849 9114242152 290,158715 2083793426 3375,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- chrome.exe (PID: 6532 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://asset s-fra.mkt. dynamics.c om/693cf82 9reb-ee114 8%6045bd6e 9afa/digit alassets/s tandalonef orms/aa7d5 e09-b2eb-e e11-a1fd%6 045bd6e68f b" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Window detected: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Process Injection | 1 Process Injection | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 3 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 4 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 3 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
www.google.com | 142.251.16.105 | true | false | high | |
part-0012.t-0009.t-msedge.net | 13.107.246.40 | true | false | unknown | |
fp2e7a.wpc.phicdn.net | 192.229.211.108 | true | false | unknown | |
windowsupdatebg.s.llnwi.net | 69.164.0.0 | true | false | unknown | |
assets-fra.mkt.dynamics.com | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
13.107.246.40 | part-0012.t-0009.t-msedge.net | United States | 8068 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.251.16.105 | www.google.com | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.16 |
192.168.2.4 |
192.168.2.5 |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1417194 |
Start date and time: | 2024-03-28 18:48:17 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 11s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | https://assets-fra.mkt.dynamics.com/693cf829reb-ee1148%6045bd6e9afa/digitalassets/standaloneforms/aa7d5e09-b2eb-ee11-a1fd%6045bd6e68fb |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 8 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean0.win@16/4@4/6 |
EGA Information: | Failed |
HCA Information: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 172.253.115.94, 142.251.163.138, 142.251.163.102, 142.251.163.101, 142.251.163.139, 142.251.163.100, 142.251.163.113, 172.253.122.84, 34.104.35.123, 20.114.59.183, 69.164.0.0, 52.165.164.15, 192.229.211.108, 20.166.126.56, 172.253.62.94
- Excluded domains from analysis (whitelisted): assets-mkt-fra.azureedge.net, fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, clientservices.googleapis.com, ctldl.windowsupdate.com, wu-bg-shim.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, assets-mkt-fra.afd.azureedge.net, fe3.delivery.mp.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, ocsp.digicert.com, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, update.googleapis.com, azureedge-t-prod.trafficmanager.net, clients.l.google.com, glb.sls.prod.dcat.dsp.trafficmanager.net
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtSetInformationFile calls found.
- VT rate limit hit for: https://assets-fra.mkt.dynamics.com/693cf829reb-ee1148%6045bd6e9afa/digitalassets/standaloneforms/aa7d5e09-b2eb-ee11-a1fd%6045bd6e68fb
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 548 |
Entropy (8bit): | 4.688532577858027 |
Encrypted: | false |
SSDEEP: | 12:TjeRHVIdtklI5r8INGlTF5TF5TF5TF5TF5TFK:neRH68DTPTPTPTPTPTc |
MD5: | 370E16C3B7DBA286CFF055F93B9A94D8 |
SHA1: | 65F3537C3C798F7DA146C55AEF536F7B5D0CB943 |
SHA-256: | D465172175D35D493FB1633E237700022BD849FA123164790B168B8318ACB090 |
SHA-512: | 75CD6A0AC7D6081D35140ABBEA018D1A2608DD936E2E21F61BF69E063F6FA16DD31C62392F5703D7A7C828EE3D4ECC838E73BFF029A98CED8986ACB5C8364966 |
Malicious: | false |
Reputation: | low |
URL: | https://assets-fra.mkt.dynamics.com/693cf829reb-ee1148%6045bd6e9afa/digitalassets/standaloneforms/aa7d5e09-b2eb-ee11-a1fd%6045bd6e68fb |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 548 |
Entropy (8bit): | 4.688532577858027 |
Encrypted: | false |
SSDEEP: | 12:TjeRHVIdtklI5r8INGlTF5TF5TF5TF5TF5TFK:neRH68DTPTPTPTPTPTc |
MD5: | 370E16C3B7DBA286CFF055F93B9A94D8 |
SHA1: | 65F3537C3C798F7DA146C55AEF536F7B5D0CB943 |
SHA-256: | D465172175D35D493FB1633E237700022BD849FA123164790B168B8318ACB090 |
SHA-512: | 75CD6A0AC7D6081D35140ABBEA018D1A2608DD936E2E21F61BF69E063F6FA16DD31C62392F5703D7A7C828EE3D4ECC838E73BFF029A98CED8986ACB5C8364966 |
Malicious: | false |
Reputation: | low |
URL: | https://assets-fra.mkt.dynamics.com/favicon.ico |
Preview: |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 28, 2024 18:49:03.937371016 CET | 49675 | 443 | 192.168.2.4 | 173.222.162.32 |
Mar 28, 2024 18:49:12.811252117 CET | 49735 | 443 | 192.168.2.4 | 13.107.246.40 |
Mar 28, 2024 18:49:12.811285019 CET | 443 | 49735 | 13.107.246.40 | 192.168.2.4 |
Mar 28, 2024 18:49:12.811376095 CET | 49735 | 443 | 192.168.2.4 | 13.107.246.40 |
Mar 28, 2024 18:49:12.815089941 CET | 49736 | 443 | 192.168.2.4 | 13.107.246.40 |
Mar 28, 2024 18:49:12.815139055 CET | 443 | 49736 | 13.107.246.40 | 192.168.2.4 |
Mar 28, 2024 18:49:12.815231085 CET | 49736 | 443 | 192.168.2.4 | 13.107.246.40 |
Mar 28, 2024 18:49:12.815330029 CET | 49735 | 443 | 192.168.2.4 | 13.107.246.40 |
Mar 28, 2024 18:49:12.815342903 CET | 443 | 49735 | 13.107.246.40 | 192.168.2.4 |
Mar 28, 2024 18:49:12.815484047 CET | 49736 | 443 | 192.168.2.4 | 13.107.246.40 |
Mar 28, 2024 18:49:12.815502882 CET | 443 | 49736 | 13.107.246.40 | 192.168.2.4 |
Mar 28, 2024 18:49:13.158045053 CET | 443 | 49735 | 13.107.246.40 | 192.168.2.4 |
Mar 28, 2024 18:49:13.158575058 CET | 49735 | 443 | 192.168.2.4 | 13.107.246.40 |
Mar 28, 2024 18:49:13.158607006 CET | 443 | 49735 | 13.107.246.40 | 192.168.2.4 |
Mar 28, 2024 18:49:13.159640074 CET | 443 | 49735 | 13.107.246.40 | 192.168.2.4 |
Mar 28, 2024 18:49:13.159698963 CET | 49735 | 443 | 192.168.2.4 | 13.107.246.40 |
Mar 28, 2024 18:49:13.161154032 CET | 49735 | 443 | 192.168.2.4 | 13.107.246.40 |
Mar 28, 2024 18:49:13.161221027 CET | 443 | 49735 | 13.107.246.40 | 192.168.2.4 |
Mar 28, 2024 18:49:13.161331892 CET | 49735 | 443 | 192.168.2.4 | 13.107.246.40 |
Mar 28, 2024 18:49:13.161341906 CET | 443 | 49735 | 13.107.246.40 | 192.168.2.4 |
Mar 28, 2024 18:49:13.172396898 CET | 443 | 49736 | 13.107.246.40 | 192.168.2.4 |
Mar 28, 2024 18:49:13.173350096 CET | 49736 | 443 | 192.168.2.4 | 13.107.246.40 |
Mar 28, 2024 18:49:13.173361063 CET | 443 | 49736 | 13.107.246.40 | 192.168.2.4 |
Mar 28, 2024 18:49:13.174537897 CET | 443 | 49736 | 13.107.246.40 | 192.168.2.4 |
Mar 28, 2024 18:49:13.174599886 CET | 49736 | 443 | 192.168.2.4 | 13.107.246.40 |
Mar 28, 2024 18:49:13.175074100 CET | 49736 | 443 | 192.168.2.4 | 13.107.246.40 |
Mar 28, 2024 18:49:13.175138950 CET | 443 | 49736 | 13.107.246.40 | 192.168.2.4 |
Mar 28, 2024 18:49:13.210979939 CET | 49735 | 443 | 192.168.2.4 | 13.107.246.40 |
Mar 28, 2024 18:49:13.226444006 CET | 49736 | 443 | 192.168.2.4 | 13.107.246.40 |
Mar 28, 2024 18:49:13.226453066 CET | 443 | 49736 | 13.107.246.40 | 192.168.2.4 |
Mar 28, 2024 18:49:13.272857904 CET | 49736 | 443 | 192.168.2.4 | 13.107.246.40 |
Mar 28, 2024 18:49:13.552109957 CET | 49675 | 443 | 192.168.2.4 | 173.222.162.32 |
Mar 28, 2024 18:49:13.710746050 CET | 443 | 49735 | 13.107.246.40 | 192.168.2.4 |
Mar 28, 2024 18:49:13.711159945 CET | 443 | 49735 | 13.107.246.40 | 192.168.2.4 |
Mar 28, 2024 18:49:13.711240053 CET | 49735 | 443 | 192.168.2.4 | 13.107.246.40 |
Mar 28, 2024 18:49:13.711730957 CET | 49735 | 443 | 192.168.2.4 | 13.107.246.40 |
Mar 28, 2024 18:49:13.711745977 CET | 443 | 49735 | 13.107.246.40 | 192.168.2.4 |
Mar 28, 2024 18:49:13.765099049 CET | 49736 | 443 | 192.168.2.4 | 13.107.246.40 |
Mar 28, 2024 18:49:13.812237024 CET | 443 | 49736 | 13.107.246.40 | 192.168.2.4 |
Mar 28, 2024 18:49:14.015942097 CET | 49739 | 443 | 192.168.2.4 | 142.251.16.105 |
Mar 28, 2024 18:49:14.015985966 CET | 443 | 49739 | 142.251.16.105 | 192.168.2.4 |
Mar 28, 2024 18:49:14.016047955 CET | 49739 | 443 | 192.168.2.4 | 142.251.16.105 |
Mar 28, 2024 18:49:14.016271114 CET | 49739 | 443 | 192.168.2.4 | 142.251.16.105 |
Mar 28, 2024 18:49:14.016283989 CET | 443 | 49739 | 142.251.16.105 | 192.168.2.4 |
Mar 28, 2024 18:49:14.229649067 CET | 443 | 49739 | 142.251.16.105 | 192.168.2.4 |
Mar 28, 2024 18:49:14.230571032 CET | 49739 | 443 | 192.168.2.4 | 142.251.16.105 |
Mar 28, 2024 18:49:14.230591059 CET | 443 | 49739 | 142.251.16.105 | 192.168.2.4 |
Mar 28, 2024 18:49:14.231652021 CET | 443 | 49739 | 142.251.16.105 | 192.168.2.4 |
Mar 28, 2024 18:49:14.231718063 CET | 49739 | 443 | 192.168.2.4 | 142.251.16.105 |
Mar 28, 2024 18:49:14.235220909 CET | 49739 | 443 | 192.168.2.4 | 142.251.16.105 |
Mar 28, 2024 18:49:14.235285044 CET | 443 | 49739 | 142.251.16.105 | 192.168.2.4 |
Mar 28, 2024 18:49:14.279407024 CET | 49739 | 443 | 192.168.2.4 | 142.251.16.105 |
Mar 28, 2024 18:49:14.279413939 CET | 443 | 49739 | 142.251.16.105 | 192.168.2.4 |
Mar 28, 2024 18:49:14.313647032 CET | 443 | 49736 | 13.107.246.40 | 192.168.2.4 |
Mar 28, 2024 18:49:14.313967943 CET | 443 | 49736 | 13.107.246.40 | 192.168.2.4 |
Mar 28, 2024 18:49:14.314013958 CET | 49736 | 443 | 192.168.2.4 | 13.107.246.40 |
Mar 28, 2024 18:49:14.322293997 CET | 49739 | 443 | 192.168.2.4 | 142.251.16.105 |
Mar 28, 2024 18:49:14.333112001 CET | 49736 | 443 | 192.168.2.4 | 13.107.246.40 |
Mar 28, 2024 18:49:14.333131075 CET | 443 | 49736 | 13.107.246.40 | 192.168.2.4 |
Mar 28, 2024 18:49:15.514981031 CET | 49740 | 443 | 192.168.2.4 | 23.221.242.90 |
Mar 28, 2024 18:49:15.515012980 CET | 443 | 49740 | 23.221.242.90 | 192.168.2.4 |
Mar 28, 2024 18:49:15.515923977 CET | 49740 | 443 | 192.168.2.4 | 23.221.242.90 |
Mar 28, 2024 18:49:15.517400980 CET | 49740 | 443 | 192.168.2.4 | 23.221.242.90 |
Mar 28, 2024 18:49:15.517415047 CET | 443 | 49740 | 23.221.242.90 | 192.168.2.4 |
Mar 28, 2024 18:49:17.117618084 CET | 443 | 49740 | 23.221.242.90 | 192.168.2.4 |
Mar 28, 2024 18:49:17.117696047 CET | 49740 | 443 | 192.168.2.4 | 23.221.242.90 |
Mar 28, 2024 18:49:17.129978895 CET | 49740 | 443 | 192.168.2.4 | 23.221.242.90 |
Mar 28, 2024 18:49:17.129990101 CET | 443 | 49740 | 23.221.242.90 | 192.168.2.4 |
Mar 28, 2024 18:49:17.130248070 CET | 443 | 49740 | 23.221.242.90 | 192.168.2.4 |
Mar 28, 2024 18:49:17.171087980 CET | 49740 | 443 | 192.168.2.4 | 23.221.242.90 |
Mar 28, 2024 18:49:17.339683056 CET | 49740 | 443 | 192.168.2.4 | 23.221.242.90 |
Mar 28, 2024 18:49:17.380245924 CET | 443 | 49740 | 23.221.242.90 | 192.168.2.4 |
Mar 28, 2024 18:49:17.513106108 CET | 443 | 49740 | 23.221.242.90 | 192.168.2.4 |
Mar 28, 2024 18:49:17.513186932 CET | 443 | 49740 | 23.221.242.90 | 192.168.2.4 |
Mar 28, 2024 18:49:17.513257980 CET | 49740 | 443 | 192.168.2.4 | 23.221.242.90 |
Mar 28, 2024 18:49:17.521411896 CET | 49740 | 443 | 192.168.2.4 | 23.221.242.90 |
Mar 28, 2024 18:49:17.521425009 CET | 443 | 49740 | 23.221.242.90 | 192.168.2.4 |
Mar 28, 2024 18:49:17.521466017 CET | 49740 | 443 | 192.168.2.4 | 23.221.242.90 |
Mar 28, 2024 18:49:17.521471024 CET | 443 | 49740 | 23.221.242.90 | 192.168.2.4 |
Mar 28, 2024 18:49:17.647084951 CET | 49741 | 443 | 192.168.2.4 | 23.221.242.90 |
Mar 28, 2024 18:49:17.647125959 CET | 443 | 49741 | 23.221.242.90 | 192.168.2.4 |
Mar 28, 2024 18:49:17.647201061 CET | 49741 | 443 | 192.168.2.4 | 23.221.242.90 |
Mar 28, 2024 18:49:17.647784948 CET | 49741 | 443 | 192.168.2.4 | 23.221.242.90 |
Mar 28, 2024 18:49:17.647808075 CET | 443 | 49741 | 23.221.242.90 | 192.168.2.4 |
Mar 28, 2024 18:49:18.209595919 CET | 443 | 49741 | 23.221.242.90 | 192.168.2.4 |
Mar 28, 2024 18:49:18.209721088 CET | 49741 | 443 | 192.168.2.4 | 23.221.242.90 |
Mar 28, 2024 18:49:18.211173058 CET | 49741 | 443 | 192.168.2.4 | 23.221.242.90 |
Mar 28, 2024 18:49:18.211182117 CET | 443 | 49741 | 23.221.242.90 | 192.168.2.4 |
Mar 28, 2024 18:49:18.211461067 CET | 443 | 49741 | 23.221.242.90 | 192.168.2.4 |
Mar 28, 2024 18:49:18.212910891 CET | 49741 | 443 | 192.168.2.4 | 23.221.242.90 |
Mar 28, 2024 18:49:18.260241985 CET | 443 | 49741 | 23.221.242.90 | 192.168.2.4 |
Mar 28, 2024 18:49:19.364828110 CET | 443 | 49741 | 23.221.242.90 | 192.168.2.4 |
Mar 28, 2024 18:49:19.364890099 CET | 443 | 49741 | 23.221.242.90 | 192.168.2.4 |
Mar 28, 2024 18:49:19.364964962 CET | 49741 | 443 | 192.168.2.4 | 23.221.242.90 |
Mar 28, 2024 18:49:19.391990900 CET | 49741 | 443 | 192.168.2.4 | 23.221.242.90 |
Mar 28, 2024 18:49:19.392005920 CET | 443 | 49741 | 23.221.242.90 | 192.168.2.4 |
Mar 28, 2024 18:49:19.392019033 CET | 49741 | 443 | 192.168.2.4 | 23.221.242.90 |
Mar 28, 2024 18:49:19.392024994 CET | 443 | 49741 | 23.221.242.90 | 192.168.2.4 |
Mar 28, 2024 18:49:24.294070959 CET | 443 | 49739 | 142.251.16.105 | 192.168.2.4 |
Mar 28, 2024 18:49:24.294131041 CET | 443 | 49739 | 142.251.16.105 | 192.168.2.4 |
Mar 28, 2024 18:49:24.294244051 CET | 49739 | 443 | 192.168.2.4 | 142.251.16.105 |
Mar 28, 2024 18:49:25.159218073 CET | 49739 | 443 | 192.168.2.4 | 142.251.16.105 |
Mar 28, 2024 18:49:25.159250021 CET | 443 | 49739 | 142.251.16.105 | 192.168.2.4 |
Mar 28, 2024 18:49:28.657198906 CET | 49723 | 80 | 192.168.2.4 | 72.21.81.240 |
Mar 28, 2024 18:49:28.751719952 CET | 80 | 49723 | 72.21.81.240 | 192.168.2.4 |
Mar 28, 2024 18:49:28.751775026 CET | 49723 | 80 | 192.168.2.4 | 72.21.81.240 |
Mar 28, 2024 18:50:13.969459057 CET | 49749 | 443 | 192.168.2.4 | 142.251.16.105 |
Mar 28, 2024 18:50:13.969490051 CET | 443 | 49749 | 142.251.16.105 | 192.168.2.4 |
Mar 28, 2024 18:50:13.969558001 CET | 49749 | 443 | 192.168.2.4 | 142.251.16.105 |
Mar 28, 2024 18:50:13.970139027 CET | 49749 | 443 | 192.168.2.4 | 142.251.16.105 |
Mar 28, 2024 18:50:13.970151901 CET | 443 | 49749 | 142.251.16.105 | 192.168.2.4 |
Mar 28, 2024 18:50:14.197366953 CET | 443 | 49749 | 142.251.16.105 | 192.168.2.4 |
Mar 28, 2024 18:50:14.197781086 CET | 49749 | 443 | 192.168.2.4 | 142.251.16.105 |
Mar 28, 2024 18:50:14.197794914 CET | 443 | 49749 | 142.251.16.105 | 192.168.2.4 |
Mar 28, 2024 18:50:14.198143005 CET | 443 | 49749 | 142.251.16.105 | 192.168.2.4 |
Mar 28, 2024 18:50:14.199146032 CET | 49749 | 443 | 192.168.2.4 | 142.251.16.105 |
Mar 28, 2024 18:50:14.199213982 CET | 443 | 49749 | 142.251.16.105 | 192.168.2.4 |
Mar 28, 2024 18:50:14.248831034 CET | 49749 | 443 | 192.168.2.4 | 142.251.16.105 |
Mar 28, 2024 18:50:18.202090979 CET | 49724 | 80 | 192.168.2.4 | 72.21.81.240 |
Mar 28, 2024 18:50:18.297605038 CET | 80 | 49724 | 72.21.81.240 | 192.168.2.4 |
Mar 28, 2024 18:50:18.297688961 CET | 49724 | 80 | 192.168.2.4 | 72.21.81.240 |
Mar 28, 2024 18:50:24.203785896 CET | 443 | 49749 | 142.251.16.105 | 192.168.2.4 |
Mar 28, 2024 18:50:24.203871012 CET | 443 | 49749 | 142.251.16.105 | 192.168.2.4 |
Mar 28, 2024 18:50:24.203926086 CET | 49749 | 443 | 192.168.2.4 | 142.251.16.105 |
Mar 28, 2024 18:50:25.154405117 CET | 49749 | 443 | 192.168.2.4 | 142.251.16.105 |
Mar 28, 2024 18:50:25.154431105 CET | 443 | 49749 | 142.251.16.105 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 28, 2024 18:49:10.932322979 CET | 53 | 57275 | 1.1.1.1 | 192.168.2.4 |
Mar 28, 2024 18:49:10.963464022 CET | 53 | 49492 | 1.1.1.1 | 192.168.2.4 |
Mar 28, 2024 18:49:12.093355894 CET | 53 | 55067 | 1.1.1.1 | 192.168.2.4 |
Mar 28, 2024 18:49:12.687377930 CET | 51816 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 28, 2024 18:49:12.687555075 CET | 52063 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 28, 2024 18:49:13.917751074 CET | 60362 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 28, 2024 18:49:13.917934895 CET | 51680 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 28, 2024 18:49:14.013478041 CET | 53 | 60362 | 1.1.1.1 | 192.168.2.4 |
Mar 28, 2024 18:49:14.014046907 CET | 53 | 51680 | 1.1.1.1 | 192.168.2.4 |
Mar 28, 2024 18:49:29.222527027 CET | 53 | 64018 | 1.1.1.1 | 192.168.2.4 |
Mar 28, 2024 18:49:29.786509037 CET | 138 | 138 | 192.168.2.4 | 192.168.2.255 |
Mar 28, 2024 18:49:48.231755972 CET | 53 | 55926 | 1.1.1.1 | 192.168.2.4 |
Mar 28, 2024 18:50:10.270864964 CET | 53 | 58145 | 1.1.1.1 | 192.168.2.4 |
Mar 28, 2024 18:50:10.827569008 CET | 53 | 62979 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Mar 28, 2024 18:49:12.687377930 CET | 192.168.2.4 | 1.1.1.1 | 0xdc76 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 28, 2024 18:49:12.687555075 CET | 192.168.2.4 | 1.1.1.1 | 0xd013 | Standard query (0) | 65 | IN (0x0001) | false | |
Mar 28, 2024 18:49:13.917751074 CET | 192.168.2.4 | 1.1.1.1 | 0x83f8 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 28, 2024 18:49:13.917934895 CET | 192.168.2.4 | 1.1.1.1 | 0x34e6 | Standard query (0) | 65 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Mar 28, 2024 18:49:12.803174973 CET | 1.1.1.1 | 192.168.2.4 | 0xd013 | No error (0) | assets-mkt-fra.azureedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 28, 2024 18:49:12.806606054 CET | 1.1.1.1 | 192.168.2.4 | 0xdc76 | No error (0) | assets-mkt-fra.azureedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 28, 2024 18:49:12.806606054 CET | 1.1.1.1 | 192.168.2.4 | 0xdc76 | No error (0) | part-0012.t-0009.t-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 28, 2024 18:49:12.806606054 CET | 1.1.1.1 | 192.168.2.4 | 0xdc76 | No error (0) | 13.107.246.40 | A (IP address) | IN (0x0001) | false | ||
Mar 28, 2024 18:49:12.806606054 CET | 1.1.1.1 | 192.168.2.4 | 0xdc76 | No error (0) | 13.107.213.40 | A (IP address) | IN (0x0001) | false | ||
Mar 28, 2024 18:49:14.013478041 CET | 1.1.1.1 | 192.168.2.4 | 0x83f8 | No error (0) | 142.251.16.105 | A (IP address) | IN (0x0001) | false | ||
Mar 28, 2024 18:49:14.013478041 CET | 1.1.1.1 | 192.168.2.4 | 0x83f8 | No error (0) | 142.251.16.106 | A (IP address) | IN (0x0001) | false | ||
Mar 28, 2024 18:49:14.013478041 CET | 1.1.1.1 | 192.168.2.4 | 0x83f8 | No error (0) | 142.251.16.99 | A (IP address) | IN (0x0001) | false | ||
Mar 28, 2024 18:49:14.013478041 CET | 1.1.1.1 | 192.168.2.4 | 0x83f8 | No error (0) | 142.251.16.147 | A (IP address) | IN (0x0001) | false | ||
Mar 28, 2024 18:49:14.013478041 CET | 1.1.1.1 | 192.168.2.4 | 0x83f8 | No error (0) | 142.251.16.104 | A (IP address) | IN (0x0001) | false | ||
Mar 28, 2024 18:49:14.013478041 CET | 1.1.1.1 | 192.168.2.4 | 0x83f8 | No error (0) | 142.251.16.103 | A (IP address) | IN (0x0001) | false | ||
Mar 28, 2024 18:49:14.014046907 CET | 1.1.1.1 | 192.168.2.4 | 0x34e6 | No error (0) | 65 | IN (0x0001) | false | |||
Mar 28, 2024 18:49:26.957844973 CET | 1.1.1.1 | 192.168.2.4 | 0xea04 | No error (0) | 69.164.0.0 | A (IP address) | IN (0x0001) | false | ||
Mar 28, 2024 18:49:26.957844973 CET | 1.1.1.1 | 192.168.2.4 | 0xea04 | No error (0) | 69.164.0.128 | A (IP address) | IN (0x0001) | false | ||
Mar 28, 2024 18:49:27.871644974 CET | 1.1.1.1 | 192.168.2.4 | 0xf48b | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 28, 2024 18:49:27.871644974 CET | 1.1.1.1 | 192.168.2.4 | 0xf48b | No error (0) | 192.229.211.108 | A (IP address) | IN (0x0001) | false | ||
Mar 28, 2024 18:49:44.299951077 CET | 1.1.1.1 | 192.168.2.4 | 0x7d19 | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 28, 2024 18:49:44.299951077 CET | 1.1.1.1 | 192.168.2.4 | 0x7d19 | No error (0) | 192.229.211.108 | A (IP address) | IN (0x0001) | false | ||
Mar 28, 2024 18:50:03.361972094 CET | 1.1.1.1 | 192.168.2.4 | 0x9a06 | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 28, 2024 18:50:03.361972094 CET | 1.1.1.1 | 192.168.2.4 | 0x9a06 | No error (0) | 192.229.211.108 | A (IP address) | IN (0x0001) | false | ||
Mar 28, 2024 18:50:22.985788107 CET | 1.1.1.1 | 192.168.2.4 | 0x516 | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 28, 2024 18:50:22.985788107 CET | 1.1.1.1 | 192.168.2.4 | 0x516 | No error (0) | 192.229.211.108 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49735 | 13.107.246.40 | 443 | 5724 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-03-28 17:49:13 UTC | 768 | OUT | |
2024-03-28 17:49:13 UTC | 313 | IN | |
2024-03-28 17:49:13 UTC | 548 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49736 | 13.107.246.40 | 443 | 5724 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-03-28 17:49:13 UTC | 708 | OUT | |
2024-03-28 17:49:14 UTC | 313 | IN | |
2024-03-28 17:49:14 UTC | 548 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49740 | 23.221.242.90 | 443 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-03-28 17:49:17 UTC | 161 | OUT | |
2024-03-28 17:49:17 UTC | 468 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49741 | 23.221.242.90 | 443 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-03-28 17:49:18 UTC | 239 | OUT | |
2024-03-28 17:49:19 UTC | 774 | IN | |
2024-03-28 17:49:19 UTC | 55 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 18:49:07 |
Start date: | 28/03/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff76e190000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 2 |
Start time: | 18:49:08 |
Start date: | 28/03/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff76e190000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 3 |
Start time: | 18:49:12 |
Start date: | 28/03/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff76e190000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |