Windows
Analysis Report
https://delightful-glacier-0a63b1710.5.azurestaticapps.net/?bezp=5565454&clickid=97a06722cf29085a7ee6b1e853b28f1e&phone=+1-866-993-6426
Overview
General Information
Detection
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- chrome.exe (PID: 5956 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 4228 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2324 --fi eld-trial- handle=222 4,i,848414 0261916216 697,784692 4340831957 304,262144 --disable -features= Optimizati onGuideMod elDownload ing,Optimi zationHint s,Optimiza tionHintsF etching,Op timization TargetPred iction /pr efetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- chrome.exe (PID: 6516 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://delig htful-glac ier-0a63b1 710.5.azur estaticapp s.net/?bez p=5565454& clickid=97 a06722cf29 085a7ee6b1 e853b28f1e &phone=+1- 866-993-64 26" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | SlashNext: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Window detected: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Process Injection | 1 Process Injection | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 3 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 4 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 3 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | SlashNext | Scareware type: Phishing & Social Engineering |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
waws-prod-bn1-4358465d.sip.p.azurewebsites.windows.net | 20.22.16.164 | true | false | high | |
www.google.com | 74.125.138.99 | true | false | high | |
fp2e7a.wpc.phicdn.net | 192.229.211.108 | true | false | unknown | |
delightful-glacier-0a63b1710.5.azurestaticapps.net | unknown | unknown | false | unknown | |
ajax.aspnetcdn.com | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
74.125.138.99 | www.google.com | United States | 15169 | GOOGLEUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
20.22.16.164 | waws-prod-bn1-4358465d.sip.p.azurewebsites.windows.net | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false |
IP |
---|
192.168.2.4 |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1427692 |
Start date and time: | 2024-04-18 00:37:08 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 24s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | https://delightful-glacier-0a63b1710.5.azurestaticapps.net/?bezp=5565454&clickid=97a06722cf29085a7ee6b1e853b28f1e&phone=+1-866-993-6426 |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 8 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal48.win@16/21@6/4 |
EGA Information: | Failed |
HCA Information: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 74.125.136.94, 64.233.185.84, 172.217.215.138, 172.217.215.113, 172.217.215.102, 172.217.215.139, 172.217.215.101, 172.217.215.100, 34.104.35.123, 152.199.4.33, 72.21.81.200, 40.127.169.103, 72.21.81.240, 20.166.126.56, 192.229.211.108, 13.85.23.206, 173.194.219.94
- Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, clientservices.googleapis.com, wu.azureedge.net, clients2.google.com, mscomajax.vo.msecnd.net, ocsp.digicert.com, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, update.googleapis.com, azurestaticapps5.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, fs.microsoft.com, accounts.google.com, cs22.wpc.v0cdn.net, wu.ec.azureedge.net, ctldl.windowsupdate.com, wu-bg-shim.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, appservice.azureedge.net, fe3.delivery.mp.microsoft.com, edgedl.me.gvt1.com, appservice.ec.azureedge.net, clients.l.google.com, cs9.wpc.v0cdn.net
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtSetInformationFile calls found.
- VT rate limit hit for: https://delightful-glacier-0a63b1710.5.azurestaticapps.net/?bezp=5565454&clickid=97a06722cf29085a7ee6b1e853b28f1e&phone=+1-866-993-6426
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 4842 |
Entropy (8bit): | 4.526345891855864 |
Encrypted: | false |
SSDEEP: | 96:U7VrtvDN/KniSBgKcqWCq8n/Uuhm4owKkYVtSqxHBqeI:arJN/wFgVqtVeZwTqhI |
MD5: | B1EE4C89DD83CECE9412A3C847C2F815 |
SHA1: | 02DB4BC607FF302C1274CBA13CF31F8098681ACA |
SHA-256: | B4B809961668BD61715C146DFCF59B3D9EA9A1C6CC8091C29FA547302CDDF3C1 |
SHA-512: | 90D8ACBAB274906D3D25A78FFD30FF76B7A0FBA368FB76F68300305349FE0525837C28E7B3D01FC080D4BCC3A040BAD9F94BEC879E48E7D9F2A9A172832DEB3B |
Malicious: | false |
Reputation: | low |
URL: | https://appservice.azureedge.net/images/static-apps/v3/microsoft_azure_logo.svg |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 87533 |
Entropy (8bit): | 5.262536918435756 |
Encrypted: | false |
SSDEEP: | 1536:0RUX9uDgwxcy2KVBNwchN6SLaHEk2BSrBESp+a/IEk4aAocVi8SMBQ47GKr:sHNwcv9VBQpLl88SMBQ47GKr |
MD5: | 2C872DBE60F4BA70FB85356113D8B35E |
SHA1: | EE48592D1FFF952FCF06CE0B666ED4785493AFDC |
SHA-256: | FC9A93DD241F6B045CBFF0481CF4E1901BECD0E12FB45166A8F17F95823F0B1A |
SHA-512: | BF6089ED4698CB8270A8B0C8AD9508FF886A7A842278E98064D5C1790CA3A36D5D69D9F047EF196882554FC104DA2C88EB5395F1EE8CF0F3F6FF8869408350FE |
Malicious: | false |
Reputation: | low |
URL: | https://ajax.aspnetcdn.com/ajax/jquery/jquery-3.7.1.min.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 60404 |
Entropy (8bit): | 5.131593990679167 |
Encrypted: | false |
SSDEEP: | 768:pZYN+vOLQ11ObgUDZa8fW+l3sLaSLPe6CMhYVRK0H/9V2Vz/kq8GPnlcGpPX21b0:pKQjXht8xmeY8ssH2nvt |
MD5: | B0794583EC020A7852F0FC04D5CEFC52 |
SHA1: | 847DFF899B5BCF8EE434E389E2A910BA1DBAD76F |
SHA-256: | 9BCD4D0F29DC6556EBEEFF44EAA0965F0C7F7308EE58394708CCE2F698CCA1B0 |
SHA-512: | D7F46F6537020C452363F0B2A62333FA2AAAB5AA107C021398D489635ECCCA9E0CB3999DC4F4B9515EE239F759A3170687315B3A6EAC9ED4CA269A63BEE860E2 |
Malicious: | false |
Reputation: | low |
URL: | https://ajax.aspnetcdn.com/ajax/bootstrap/5.2.3/bootstrap.min.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8104 |
Entropy (8bit): | 4.675970903143818 |
Encrypted: | false |
SSDEEP: | 96:QZ3dSugxOrThfA4oYVmHWEUeBRUTRwD+cbfxjdIOfMDu1vFQ4wD5yTxK83AKOyA:TOPMGmHWEUe91guBOLEKMAF |
MD5: | 1A813EE7E1120C4D7B3E8EBD29AAF72F |
SHA1: | 5B3F94C56FD08BD6F582B2295D1996D484A66DD5 |
SHA-256: | AF633C8781D0E41FB1787E2709FF7926A0519C80A80BDD057021E00E1B48DDA2 |
SHA-512: | A552C43B2220DF6F2D1F1F3436AEA25BFEB7ADF89B5660D6CE752037933A2DF775CA1D4F8B3459DF77D480185579B1B6B672D178E06CFC73305F6E32BE2B23E7 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 1946 |
Entropy (8bit): | 5.0658464668720535 |
Encrypted: | false |
SSDEEP: | 48:zfnHxeob2c5Gr2W4PFzhkT104OOrbdT1dCkRM1iiHDgG3ax3u:D0Vx8dk04XgWM1iO |
MD5: | 909D8AC61BECBB0F646873BA6DED610E |
SHA1: | 30FA898D5052820BE3747E96641B9AE6B409BE75 |
SHA-256: | 30EFD61236D5F5FE2B02866F3B822CE9224D2315814FAC05DA9B7BFC76CA2E3F |
SHA-512: | 1D4A57981F330B2FC3AC5001C7D432553ED668D34E5A45709608F9F9910CE99B4BF90FBBB267CB82EE3EDCEBA6CCB4F313321358AFF84D4641E66C51CEE0991E |
Malicious: | false |
Reputation: | low |
URL: | https://appservice.azureedge.net/images/static-apps/v3/favicon.svg |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 23 |
Entropy (8bit): | 3.882045108136863 |
Encrypted: | false |
SSDEEP: | 3:TMQvHEeovbn:ACHYvb |
MD5: | FBBC82923FF6881236B01520BAA9F0EF |
SHA1: | 20DE932A247D76E8865BCC2411E38DB4D9807C4A |
SHA-256: | BD6300F28F9701DDC7283D2E6629020FC7969E5064E4258A894FDD2EF6DA666F |
SHA-512: | 35F90567DDF751094FF1150B754D5B9B598252E77DEFFF5AA0ADA426209D9F75ECFF39C8E7D2CC933A1E2C9892B0CEEBB0A0E6278EE07BA1C5BBCDB3B6A2F13D |
Malicious: | false |
Reputation: | low |
URL: | https://appservice.azureedge.net/scripts/static-apps/v3/loc.min.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 8104 |
Entropy (8bit): | 4.675970903143818 |
Encrypted: | false |
SSDEEP: | 96:QZ3dSugxOrThfA4oYVmHWEUeBRUTRwD+cbfxjdIOfMDu1vFQ4wD5yTxK83AKOyA:TOPMGmHWEUe91guBOLEKMAF |
MD5: | 1A813EE7E1120C4D7B3E8EBD29AAF72F |
SHA1: | 5B3F94C56FD08BD6F582B2295D1996D484A66DD5 |
SHA-256: | AF633C8781D0E41FB1787E2709FF7926A0519C80A80BDD057021E00E1B48DDA2 |
SHA-512: | A552C43B2220DF6F2D1F1F3436AEA25BFEB7ADF89B5660D6CE752037933A2DF775CA1D4F8B3459DF77D480185579B1B6B672D178E06CFC73305F6E32BE2B23E7 |
Malicious: | false |
Reputation: | low |
URL: | https://appservice.azureedge.net/images/static-apps/v3/staticapps.svg |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 1134 |
Entropy (8bit): | 4.723354379446081 |
Encrypted: | false |
SSDEEP: | 24:Lll1tEPxz4Omvzxdc2iv9rJKsS1P7sPea7sP/9u:z/Kdb |
MD5: | 8DC1B0215D4842AAE9BB811E9B655919 |
SHA1: | 852DDB564BDFDF837E32D672B073734E15593283 |
SHA-256: | 666DD97A683171808B9AAAF4A1EF11C97865DF5046172FED704F70C78E940830 |
SHA-512: | D4A2B6F8E806959ADD66E1AE489982297F4E8C1C7EE25A27CF137023F0B7A957BBBC5453E53621AF661490A1DC5D5C1977A6D86FB9D04BC9DD6606CA9F6C1EF0 |
Malicious: | false |
Reputation: | low |
URL: | https://appservice.azureedge.net/css/static-apps/v3/main.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 194901 |
Entropy (8bit): | 5.014294143940012 |
Encrypted: | false |
SSDEEP: | 1536:ZtGg9JfWgeQK5wlP72qgOfI3N9LsqkVkpz600I4lp:ZtGg9JfWD9kVkpz600I4lp |
MD5: | 3F30C2C47D7D23C7A994DB0C862D45A5 |
SHA1: | 7791DD1F3173A0D62CC39C21D2AD71FC8DAD0E72 |
SHA-256: | C0BCF7898FDC3B87BABCA678CD19A8E3EF570E931C80A3AFBFFCC453738C951A |
SHA-512: | 49B891FDEBACA612A8315557CAC4CA1BFED5B1E5A28BE63715D1EBB741292A0A53A1979E9A1A8779978B58B849BADCFFDAEB76570D6E4048F631B445F9354150 |
Malicious: | false |
Reputation: | low |
URL: | https://ajax.aspnetcdn.com/ajax/bootstrap/5.2.3/css/bootstrap.min.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4842 |
Entropy (8bit): | 4.526345891855864 |
Encrypted: | false |
SSDEEP: | 96:U7VrtvDN/KniSBgKcqWCq8n/Uuhm4owKkYVtSqxHBqeI:arJN/wFgVqtVeZwTqhI |
MD5: | B1EE4C89DD83CECE9412A3C847C2F815 |
SHA1: | 02DB4BC607FF302C1274CBA13CF31F8098681ACA |
SHA-256: | B4B809961668BD61715C146DFCF59B3D9EA9A1C6CC8091C29FA547302CDDF3C1 |
SHA-512: | 90D8ACBAB274906D3D25A78FFD30FF76B7A0FBA368FB76F68300305349FE0525837C28E7B3D01FC080D4BCC3A040BAD9F94BEC879E48E7D9F2A9A172832DEB3B |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 2400 |
Entropy (8bit): | 5.141710386004859 |
Encrypted: | false |
SSDEEP: | 48:tTrzFLwNGCUzucfFipzv+6rI0E5Ucrpvjdf:JrZy4gJm6rI07at |
MD5: | 8B6E5A69AAFD321F4CFF4ED84BB3BDE1 |
SHA1: | B6E7634A826B088DC49DBD8F61B0121327846271 |
SHA-256: | 0A76274E99E285C9D7E18D094E71EA6FCA1B0274E30C28492A24218E53C61CB3 |
SHA-512: | ABEAE136E3B7C52BD00937E6257B15D0FB163A1BE77BBBA0818FDC1BF32B96C0F3F49DCFD7D8A726211B7B49C3E660CC30FC2A12A4144CA4BC83E08D57203DEE |
Malicious: | false |
Reputation: | low |
URL: | https://delightful-glacier-0a63b1710.5.azurestaticapps.net/?bezp=5565454&clickid=97a06722cf29085a7ee6b1e853b28f1e&phone=+1-866-993-6426 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1946 |
Entropy (8bit): | 5.0658464668720535 |
Encrypted: | false |
SSDEEP: | 48:zfnHxeob2c5Gr2W4PFzhkT104OOrbdT1dCkRM1iiHDgG3ax3u:D0Vx8dk04XgWM1iO |
MD5: | 909D8AC61BECBB0F646873BA6DED610E |
SHA1: | 30FA898D5052820BE3747E96641B9AE6B409BE75 |
SHA-256: | 30EFD61236D5F5FE2B02866F3B822CE9224D2315814FAC05DA9B7BFC76CA2E3F |
SHA-512: | 1D4A57981F330B2FC3AC5001C7D432553ED668D34E5A45709608F9F9910CE99B4BF90FBBB267CB82EE3EDCEBA6CCB4F313321358AFF84D4641E66C51CEE0991E |
Malicious: | false |
Reputation: | low |
Preview: |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 18, 2024 00:37:54.427025080 CEST | 49675 | 443 | 192.168.2.4 | 173.222.162.32 |
Apr 18, 2024 00:38:04.037117958 CEST | 49675 | 443 | 192.168.2.4 | 173.222.162.32 |
Apr 18, 2024 00:38:04.103275061 CEST | 49735 | 443 | 192.168.2.4 | 20.22.16.164 |
Apr 18, 2024 00:38:04.103315115 CEST | 443 | 49735 | 20.22.16.164 | 192.168.2.4 |
Apr 18, 2024 00:38:04.103478909 CEST | 49735 | 443 | 192.168.2.4 | 20.22.16.164 |
Apr 18, 2024 00:38:04.103776932 CEST | 49736 | 443 | 192.168.2.4 | 20.22.16.164 |
Apr 18, 2024 00:38:04.103852987 CEST | 443 | 49736 | 20.22.16.164 | 192.168.2.4 |
Apr 18, 2024 00:38:04.103863001 CEST | 49735 | 443 | 192.168.2.4 | 20.22.16.164 |
Apr 18, 2024 00:38:04.103884935 CEST | 443 | 49735 | 20.22.16.164 | 192.168.2.4 |
Apr 18, 2024 00:38:04.103976011 CEST | 49736 | 443 | 192.168.2.4 | 20.22.16.164 |
Apr 18, 2024 00:38:04.104223013 CEST | 49736 | 443 | 192.168.2.4 | 20.22.16.164 |
Apr 18, 2024 00:38:04.104255915 CEST | 443 | 49736 | 20.22.16.164 | 192.168.2.4 |
Apr 18, 2024 00:38:04.485275030 CEST | 443 | 49736 | 20.22.16.164 | 192.168.2.4 |
Apr 18, 2024 00:38:04.485671997 CEST | 49736 | 443 | 192.168.2.4 | 20.22.16.164 |
Apr 18, 2024 00:38:04.485707045 CEST | 443 | 49736 | 20.22.16.164 | 192.168.2.4 |
Apr 18, 2024 00:38:04.487339973 CEST | 443 | 49736 | 20.22.16.164 | 192.168.2.4 |
Apr 18, 2024 00:38:04.487530947 CEST | 49736 | 443 | 192.168.2.4 | 20.22.16.164 |
Apr 18, 2024 00:38:04.488785028 CEST | 49736 | 443 | 192.168.2.4 | 20.22.16.164 |
Apr 18, 2024 00:38:04.488851070 CEST | 49736 | 443 | 192.168.2.4 | 20.22.16.164 |
Apr 18, 2024 00:38:04.488862038 CEST | 443 | 49736 | 20.22.16.164 | 192.168.2.4 |
Apr 18, 2024 00:38:04.488882065 CEST | 443 | 49736 | 20.22.16.164 | 192.168.2.4 |
Apr 18, 2024 00:38:04.489120007 CEST | 443 | 49735 | 20.22.16.164 | 192.168.2.4 |
Apr 18, 2024 00:38:04.489698887 CEST | 49735 | 443 | 192.168.2.4 | 20.22.16.164 |
Apr 18, 2024 00:38:04.489727020 CEST | 443 | 49735 | 20.22.16.164 | 192.168.2.4 |
Apr 18, 2024 00:38:04.491372108 CEST | 443 | 49735 | 20.22.16.164 | 192.168.2.4 |
Apr 18, 2024 00:38:04.491440058 CEST | 49735 | 443 | 192.168.2.4 | 20.22.16.164 |
Apr 18, 2024 00:38:04.492170095 CEST | 49735 | 443 | 192.168.2.4 | 20.22.16.164 |
Apr 18, 2024 00:38:04.492275953 CEST | 443 | 49735 | 20.22.16.164 | 192.168.2.4 |
Apr 18, 2024 00:38:04.536402941 CEST | 49736 | 443 | 192.168.2.4 | 20.22.16.164 |
Apr 18, 2024 00:38:04.536418915 CEST | 443 | 49736 | 20.22.16.164 | 192.168.2.4 |
Apr 18, 2024 00:38:04.587491035 CEST | 49736 | 443 | 192.168.2.4 | 20.22.16.164 |
Apr 18, 2024 00:38:04.618637085 CEST | 49735 | 443 | 192.168.2.4 | 20.22.16.164 |
Apr 18, 2024 00:38:04.618664980 CEST | 443 | 49735 | 20.22.16.164 | 192.168.2.4 |
Apr 18, 2024 00:38:04.710539103 CEST | 49735 | 443 | 192.168.2.4 | 20.22.16.164 |
Apr 18, 2024 00:38:04.720351934 CEST | 443 | 49736 | 20.22.16.164 | 192.168.2.4 |
Apr 18, 2024 00:38:04.720407963 CEST | 443 | 49736 | 20.22.16.164 | 192.168.2.4 |
Apr 18, 2024 00:38:04.720480919 CEST | 49736 | 443 | 192.168.2.4 | 20.22.16.164 |
Apr 18, 2024 00:38:04.720513105 CEST | 443 | 49736 | 20.22.16.164 | 192.168.2.4 |
Apr 18, 2024 00:38:04.720557928 CEST | 443 | 49736 | 20.22.16.164 | 192.168.2.4 |
Apr 18, 2024 00:38:04.722126007 CEST | 49736 | 443 | 192.168.2.4 | 20.22.16.164 |
Apr 18, 2024 00:38:04.722145081 CEST | 443 | 49736 | 20.22.16.164 | 192.168.2.4 |
Apr 18, 2024 00:38:04.722174883 CEST | 49736 | 443 | 192.168.2.4 | 20.22.16.164 |
Apr 18, 2024 00:38:05.360970974 CEST | 49744 | 443 | 192.168.2.4 | 74.125.138.99 |
Apr 18, 2024 00:38:05.361026049 CEST | 443 | 49744 | 74.125.138.99 | 192.168.2.4 |
Apr 18, 2024 00:38:05.361150026 CEST | 49744 | 443 | 192.168.2.4 | 74.125.138.99 |
Apr 18, 2024 00:38:05.361351013 CEST | 49744 | 443 | 192.168.2.4 | 74.125.138.99 |
Apr 18, 2024 00:38:05.361375093 CEST | 443 | 49744 | 74.125.138.99 | 192.168.2.4 |
Apr 18, 2024 00:38:05.581669092 CEST | 443 | 49744 | 74.125.138.99 | 192.168.2.4 |
Apr 18, 2024 00:38:05.583772898 CEST | 49744 | 443 | 192.168.2.4 | 74.125.138.99 |
Apr 18, 2024 00:38:05.583808899 CEST | 443 | 49744 | 74.125.138.99 | 192.168.2.4 |
Apr 18, 2024 00:38:05.585484028 CEST | 443 | 49744 | 74.125.138.99 | 192.168.2.4 |
Apr 18, 2024 00:38:05.585587025 CEST | 49744 | 443 | 192.168.2.4 | 74.125.138.99 |
Apr 18, 2024 00:38:05.586479902 CEST | 49744 | 443 | 192.168.2.4 | 74.125.138.99 |
Apr 18, 2024 00:38:05.586574078 CEST | 443 | 49744 | 74.125.138.99 | 192.168.2.4 |
Apr 18, 2024 00:38:05.628621101 CEST | 49744 | 443 | 192.168.2.4 | 74.125.138.99 |
Apr 18, 2024 00:38:05.628658056 CEST | 443 | 49744 | 74.125.138.99 | 192.168.2.4 |
Apr 18, 2024 00:38:05.679076910 CEST | 49744 | 443 | 192.168.2.4 | 74.125.138.99 |
Apr 18, 2024 00:38:07.498471975 CEST | 49754 | 443 | 192.168.2.4 | 23.63.206.91 |
Apr 18, 2024 00:38:07.498524904 CEST | 443 | 49754 | 23.63.206.91 | 192.168.2.4 |
Apr 18, 2024 00:38:07.498622894 CEST | 49754 | 443 | 192.168.2.4 | 23.63.206.91 |
Apr 18, 2024 00:38:07.504477024 CEST | 49754 | 443 | 192.168.2.4 | 23.63.206.91 |
Apr 18, 2024 00:38:07.504494905 CEST | 443 | 49754 | 23.63.206.91 | 192.168.2.4 |
Apr 18, 2024 00:38:07.733417034 CEST | 443 | 49754 | 23.63.206.91 | 192.168.2.4 |
Apr 18, 2024 00:38:07.733493090 CEST | 49754 | 443 | 192.168.2.4 | 23.63.206.91 |
Apr 18, 2024 00:38:07.740073919 CEST | 49754 | 443 | 192.168.2.4 | 23.63.206.91 |
Apr 18, 2024 00:38:07.740087032 CEST | 443 | 49754 | 23.63.206.91 | 192.168.2.4 |
Apr 18, 2024 00:38:07.740514994 CEST | 443 | 49754 | 23.63.206.91 | 192.168.2.4 |
Apr 18, 2024 00:38:07.785305977 CEST | 49754 | 443 | 192.168.2.4 | 23.63.206.91 |
Apr 18, 2024 00:38:07.923206091 CEST | 49754 | 443 | 192.168.2.4 | 23.63.206.91 |
Apr 18, 2024 00:38:07.964168072 CEST | 443 | 49754 | 23.63.206.91 | 192.168.2.4 |
Apr 18, 2024 00:38:08.028553963 CEST | 443 | 49754 | 23.63.206.91 | 192.168.2.4 |
Apr 18, 2024 00:38:08.028703928 CEST | 443 | 49754 | 23.63.206.91 | 192.168.2.4 |
Apr 18, 2024 00:38:08.028778076 CEST | 49754 | 443 | 192.168.2.4 | 23.63.206.91 |
Apr 18, 2024 00:38:08.046957970 CEST | 49754 | 443 | 192.168.2.4 | 23.63.206.91 |
Apr 18, 2024 00:38:08.046978951 CEST | 443 | 49754 | 23.63.206.91 | 192.168.2.4 |
Apr 18, 2024 00:38:08.046994925 CEST | 49754 | 443 | 192.168.2.4 | 23.63.206.91 |
Apr 18, 2024 00:38:08.047003031 CEST | 443 | 49754 | 23.63.206.91 | 192.168.2.4 |
Apr 18, 2024 00:38:08.157836914 CEST | 49755 | 443 | 192.168.2.4 | 23.63.206.91 |
Apr 18, 2024 00:38:08.157922983 CEST | 443 | 49755 | 23.63.206.91 | 192.168.2.4 |
Apr 18, 2024 00:38:08.158205032 CEST | 49755 | 443 | 192.168.2.4 | 23.63.206.91 |
Apr 18, 2024 00:38:08.159435987 CEST | 49755 | 443 | 192.168.2.4 | 23.63.206.91 |
Apr 18, 2024 00:38:08.159517050 CEST | 443 | 49755 | 23.63.206.91 | 192.168.2.4 |
Apr 18, 2024 00:38:08.378977060 CEST | 443 | 49755 | 23.63.206.91 | 192.168.2.4 |
Apr 18, 2024 00:38:08.379118919 CEST | 49755 | 443 | 192.168.2.4 | 23.63.206.91 |
Apr 18, 2024 00:38:08.402663946 CEST | 49755 | 443 | 192.168.2.4 | 23.63.206.91 |
Apr 18, 2024 00:38:08.402743101 CEST | 443 | 49755 | 23.63.206.91 | 192.168.2.4 |
Apr 18, 2024 00:38:08.403486967 CEST | 443 | 49755 | 23.63.206.91 | 192.168.2.4 |
Apr 18, 2024 00:38:08.443408966 CEST | 49755 | 443 | 192.168.2.4 | 23.63.206.91 |
Apr 18, 2024 00:38:08.484121084 CEST | 443 | 49755 | 23.63.206.91 | 192.168.2.4 |
Apr 18, 2024 00:38:08.583584070 CEST | 443 | 49755 | 23.63.206.91 | 192.168.2.4 |
Apr 18, 2024 00:38:08.583708048 CEST | 443 | 49755 | 23.63.206.91 | 192.168.2.4 |
Apr 18, 2024 00:38:08.583791971 CEST | 49755 | 443 | 192.168.2.4 | 23.63.206.91 |
Apr 18, 2024 00:38:08.587286949 CEST | 49755 | 443 | 192.168.2.4 | 23.63.206.91 |
Apr 18, 2024 00:38:08.587286949 CEST | 49755 | 443 | 192.168.2.4 | 23.63.206.91 |
Apr 18, 2024 00:38:08.587351084 CEST | 443 | 49755 | 23.63.206.91 | 192.168.2.4 |
Apr 18, 2024 00:38:08.587385893 CEST | 443 | 49755 | 23.63.206.91 | 192.168.2.4 |
Apr 18, 2024 00:38:15.662054062 CEST | 443 | 49744 | 74.125.138.99 | 192.168.2.4 |
Apr 18, 2024 00:38:15.662184954 CEST | 443 | 49744 | 74.125.138.99 | 192.168.2.4 |
Apr 18, 2024 00:38:15.662389994 CEST | 49744 | 443 | 192.168.2.4 | 74.125.138.99 |
Apr 18, 2024 00:38:16.991837025 CEST | 49744 | 443 | 192.168.2.4 | 74.125.138.99 |
Apr 18, 2024 00:38:16.991869926 CEST | 443 | 49744 | 74.125.138.99 | 192.168.2.4 |
Apr 18, 2024 00:38:36.407515049 CEST | 80 | 49724 | 217.20.50.19 | 192.168.2.4 |
Apr 18, 2024 00:38:36.407629967 CEST | 49724 | 80 | 192.168.2.4 | 217.20.50.19 |
Apr 18, 2024 00:38:36.407681942 CEST | 49724 | 80 | 192.168.2.4 | 217.20.50.19 |
Apr 18, 2024 00:38:36.529119015 CEST | 80 | 49724 | 217.20.50.19 | 192.168.2.4 |
Apr 18, 2024 00:38:49.629302979 CEST | 49735 | 443 | 192.168.2.4 | 20.22.16.164 |
Apr 18, 2024 00:38:49.629334927 CEST | 443 | 49735 | 20.22.16.164 | 192.168.2.4 |
Apr 18, 2024 00:39:05.058614016 CEST | 49735 | 443 | 192.168.2.4 | 20.22.16.164 |
Apr 18, 2024 00:39:05.058916092 CEST | 443 | 49735 | 20.22.16.164 | 192.168.2.4 |
Apr 18, 2024 00:39:05.058989048 CEST | 49735 | 443 | 192.168.2.4 | 20.22.16.164 |
Apr 18, 2024 00:39:05.306133032 CEST | 49763 | 443 | 192.168.2.4 | 74.125.138.99 |
Apr 18, 2024 00:39:05.306216955 CEST | 443 | 49763 | 74.125.138.99 | 192.168.2.4 |
Apr 18, 2024 00:39:05.306298018 CEST | 49763 | 443 | 192.168.2.4 | 74.125.138.99 |
Apr 18, 2024 00:39:05.306718111 CEST | 49763 | 443 | 192.168.2.4 | 74.125.138.99 |
Apr 18, 2024 00:39:05.306754112 CEST | 443 | 49763 | 74.125.138.99 | 192.168.2.4 |
Apr 18, 2024 00:39:05.527013063 CEST | 443 | 49763 | 74.125.138.99 | 192.168.2.4 |
Apr 18, 2024 00:39:05.541074991 CEST | 49763 | 443 | 192.168.2.4 | 74.125.138.99 |
Apr 18, 2024 00:39:05.541096926 CEST | 443 | 49763 | 74.125.138.99 | 192.168.2.4 |
Apr 18, 2024 00:39:05.542556047 CEST | 443 | 49763 | 74.125.138.99 | 192.168.2.4 |
Apr 18, 2024 00:39:05.543356895 CEST | 49763 | 443 | 192.168.2.4 | 74.125.138.99 |
Apr 18, 2024 00:39:05.543793917 CEST | 443 | 49763 | 74.125.138.99 | 192.168.2.4 |
Apr 18, 2024 00:39:05.597981930 CEST | 49763 | 443 | 192.168.2.4 | 74.125.138.99 |
Apr 18, 2024 00:39:10.723706961 CEST | 49723 | 80 | 192.168.2.4 | 96.7.245.97 |
Apr 18, 2024 00:39:10.829042912 CEST | 80 | 49723 | 96.7.245.97 | 192.168.2.4 |
Apr 18, 2024 00:39:10.829227924 CEST | 49723 | 80 | 192.168.2.4 | 96.7.245.97 |
Apr 18, 2024 00:39:15.530102968 CEST | 443 | 49763 | 74.125.138.99 | 192.168.2.4 |
Apr 18, 2024 00:39:15.530260086 CEST | 443 | 49763 | 74.125.138.99 | 192.168.2.4 |
Apr 18, 2024 00:39:15.530386925 CEST | 49763 | 443 | 192.168.2.4 | 74.125.138.99 |
Apr 18, 2024 00:39:16.975349903 CEST | 49763 | 443 | 192.168.2.4 | 74.125.138.99 |
Apr 18, 2024 00:39:16.975379944 CEST | 443 | 49763 | 74.125.138.99 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 18, 2024 00:38:02.737626076 CEST | 53 | 64103 | 1.1.1.1 | 192.168.2.4 |
Apr 18, 2024 00:38:02.815614939 CEST | 53 | 61773 | 1.1.1.1 | 192.168.2.4 |
Apr 18, 2024 00:38:03.404211044 CEST | 53 | 54008 | 1.1.1.1 | 192.168.2.4 |
Apr 18, 2024 00:38:03.789066076 CEST | 61239 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 18, 2024 00:38:03.789417028 CEST | 61553 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 18, 2024 00:38:04.743089914 CEST | 60989 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 18, 2024 00:38:04.743174076 CEST | 62329 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 18, 2024 00:38:05.254829884 CEST | 51789 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 18, 2024 00:38:05.254908085 CEST | 56219 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 18, 2024 00:38:05.359992027 CEST | 53 | 51789 | 1.1.1.1 | 192.168.2.4 |
Apr 18, 2024 00:38:05.360053062 CEST | 53 | 56219 | 1.1.1.1 | 192.168.2.4 |
Apr 18, 2024 00:38:20.377866030 CEST | 53 | 63211 | 1.1.1.1 | 192.168.2.4 |
Apr 18, 2024 00:38:22.276725054 CEST | 138 | 138 | 192.168.2.4 | 192.168.2.255 |
Apr 18, 2024 00:38:39.236311913 CEST | 53 | 50550 | 1.1.1.1 | 192.168.2.4 |
Apr 18, 2024 00:39:02.255112886 CEST | 53 | 55878 | 1.1.1.1 | 192.168.2.4 |
Apr 18, 2024 00:39:02.328819036 CEST | 53 | 54580 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Apr 18, 2024 00:38:03.789066076 CEST | 192.168.2.4 | 1.1.1.1 | 0xdf0f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 18, 2024 00:38:03.789417028 CEST | 192.168.2.4 | 1.1.1.1 | 0x791b | Standard query (0) | 65 | IN (0x0001) | false | |
Apr 18, 2024 00:38:04.743089914 CEST | 192.168.2.4 | 1.1.1.1 | 0xf81a | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 18, 2024 00:38:04.743174076 CEST | 192.168.2.4 | 1.1.1.1 | 0x7531 | Standard query (0) | 65 | IN (0x0001) | false | |
Apr 18, 2024 00:38:05.254829884 CEST | 192.168.2.4 | 1.1.1.1 | 0xd9a7 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 18, 2024 00:38:05.254908085 CEST | 192.168.2.4 | 1.1.1.1 | 0x2a03 | Standard query (0) | 65 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Apr 18, 2024 00:38:04.025944948 CEST | 1.1.1.1 | 192.168.2.4 | 0x791b | No error (0) | azurestaticapps5.trafficmanager.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 18, 2024 00:38:04.025944948 CEST | 1.1.1.1 | 192.168.2.4 | 0x791b | No error (0) | waws-prod-bn1-79ce3d91.sip.p.azurewebsites.windows.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 18, 2024 00:38:04.102559090 CEST | 1.1.1.1 | 192.168.2.4 | 0xdf0f | No error (0) | azurestaticapps5.trafficmanager.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 18, 2024 00:38:04.102559090 CEST | 1.1.1.1 | 192.168.2.4 | 0xdf0f | No error (0) | waws-prod-bn1-4358465d.sip.p.azurewebsites.windows.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 18, 2024 00:38:04.102559090 CEST | 1.1.1.1 | 192.168.2.4 | 0xdf0f | No error (0) | 20.22.16.164 | A (IP address) | IN (0x0001) | false | ||
Apr 18, 2024 00:38:04.847723007 CEST | 1.1.1.1 | 192.168.2.4 | 0xf81a | No error (0) | mscomajax.vo.msecnd.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 18, 2024 00:38:04.847757101 CEST | 1.1.1.1 | 192.168.2.4 | 0x7531 | No error (0) | mscomajax.vo.msecnd.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 18, 2024 00:38:05.359992027 CEST | 1.1.1.1 | 192.168.2.4 | 0xd9a7 | No error (0) | 74.125.138.99 | A (IP address) | IN (0x0001) | false | ||
Apr 18, 2024 00:38:05.359992027 CEST | 1.1.1.1 | 192.168.2.4 | 0xd9a7 | No error (0) | 74.125.138.105 | A (IP address) | IN (0x0001) | false | ||
Apr 18, 2024 00:38:05.359992027 CEST | 1.1.1.1 | 192.168.2.4 | 0xd9a7 | No error (0) | 74.125.138.147 | A (IP address) | IN (0x0001) | false | ||
Apr 18, 2024 00:38:05.359992027 CEST | 1.1.1.1 | 192.168.2.4 | 0xd9a7 | No error (0) | 74.125.138.103 | A (IP address) | IN (0x0001) | false | ||
Apr 18, 2024 00:38:05.359992027 CEST | 1.1.1.1 | 192.168.2.4 | 0xd9a7 | No error (0) | 74.125.138.106 | A (IP address) | IN (0x0001) | false | ||
Apr 18, 2024 00:38:05.359992027 CEST | 1.1.1.1 | 192.168.2.4 | 0xd9a7 | No error (0) | 74.125.138.104 | A (IP address) | IN (0x0001) | false | ||
Apr 18, 2024 00:38:05.360053062 CEST | 1.1.1.1 | 192.168.2.4 | 0x2a03 | No error (0) | 65 | IN (0x0001) | false | |||
Apr 18, 2024 00:38:19.267988920 CEST | 1.1.1.1 | 192.168.2.4 | 0x8364 | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 18, 2024 00:38:19.267988920 CEST | 1.1.1.1 | 192.168.2.4 | 0x8364 | No error (0) | 192.229.211.108 | A (IP address) | IN (0x0001) | false | ||
Apr 18, 2024 00:38:35.455668926 CEST | 1.1.1.1 | 192.168.2.4 | 0xfb5e | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 18, 2024 00:38:35.455668926 CEST | 1.1.1.1 | 192.168.2.4 | 0xfb5e | No error (0) | 192.229.211.108 | A (IP address) | IN (0x0001) | false | ||
Apr 18, 2024 00:38:54.328480005 CEST | 1.1.1.1 | 192.168.2.4 | 0x2cd8 | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 18, 2024 00:38:54.328480005 CEST | 1.1.1.1 | 192.168.2.4 | 0x2cd8 | No error (0) | 192.229.211.108 | A (IP address) | IN (0x0001) | false | ||
Apr 18, 2024 00:39:15.036609888 CEST | 1.1.1.1 | 192.168.2.4 | 0x85e4 | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 18, 2024 00:39:15.036609888 CEST | 1.1.1.1 | 192.168.2.4 | 0x85e4 | No error (0) | 192.229.211.108 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49736 | 20.22.16.164 | 443 | 4228 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-04-17 22:38:04 UTC | 769 | OUT | |
2024-04-17 22:38:04 UTC | 135 | IN | |
2024-04-17 22:38:04 UTC | 2407 | IN | |
2024-04-17 22:38:04 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49754 | 23.63.206.91 | 443 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-04-17 22:38:07 UTC | 161 | OUT | |
2024-04-17 22:38:08 UTC | 467 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49755 | 23.63.206.91 | 443 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-04-17 22:38:08 UTC | 239 | OUT | |
2024-04-17 22:38:08 UTC | 530 | IN | |
2024-04-17 22:38:08 UTC | 55 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 00:37:57 |
Start date: | 18/04/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff76e190000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 2 |
Start time: | 00:38:01 |
Start date: | 18/04/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff76e190000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 3 |
Start time: | 00:38:03 |
Start date: | 18/04/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff76e190000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |