Windows
Analysis Report
https://salmon-sand-04393a710.5.azurestaticapps.net/?bezp=5565454&clickid=836e9bd971fa3a7caf5ca499c64a32c9&phone=+1-866-993-6426
Overview
General Information
Detection
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- chrome.exe (PID: 2892 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 3736 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2088 --fi eld-trial- handle=200 4,i,147324 3047614557 1560,11078 3849474342 12630,2621 44 --disab le-feature s=Optimiza tionGuideM odelDownlo ading,Opti mizationHi nts,Optimi zationHint sFetching, Optimizati onTargetPr ediction / prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- chrome.exe (PID: 6416 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://salmo n-sand-043 93a710.5.a zurestatic apps.net/? bezp=55654 54&clickid =836e9bd97 1fa3a7caf5 ca499c64a3 2c9&phone= +1-866-993 -6426" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | SlashNext: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Window detected: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Process Injection | 1 Process Injection | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 3 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 4 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 3 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | SlashNext | Scareware type: Phishing & Social Engineering |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
waws-prod-bn1-79ce3d91.sip.p.azurewebsites.windows.net | 20.75.112.13 | true | false | high | |
www.google.com | 74.125.138.103 | true | false | high | |
fp2e7a.wpc.phicdn.net | 192.229.211.108 | true | false | unknown | |
salmon-sand-04393a710.5.azurestaticapps.net | unknown | unknown | false | unknown | |
ajax.aspnetcdn.com | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
20.75.112.13 | waws-prod-bn1-79ce3d91.sip.p.azurewebsites.windows.net | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
74.125.138.103 | www.google.com | United States | 15169 | GOOGLEUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false |
IP |
---|
192.168.2.4 |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1427693 |
Start date and time: | 2024-04-18 00:42:10 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 24s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | https://salmon-sand-04393a710.5.azurestaticapps.net/?bezp=5565454&clickid=836e9bd971fa3a7caf5ca499c64a32c9&phone=+1-866-993-6426 |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 8 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal48.win@16/21@6/4 |
EGA Information: | Failed |
HCA Information: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 173.194.219.94, 173.194.219.101, 173.194.219.139, 173.194.219.113, 173.194.219.100, 173.194.219.102, 173.194.219.138, 64.233.177.84, 34.104.35.123, 152.199.4.33, 72.21.81.200, 13.85.23.86, 72.21.81.240, 192.229.211.108, 20.242.39.171, 13.95.31.18, 142.250.9.94
- Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, clientservices.googleapis.com, wu.azureedge.net, clients2.google.com, mscomajax.vo.msecnd.net, ocsp.digicert.com, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, update.googleapis.com, azurestaticapps5.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, fs.microsoft.com, accounts.google.com, cs22.wpc.v0cdn.net, wu.ec.azureedge.net, ctldl.windowsupdate.com, wu-bg-shim.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, appservice.azureedge.net, fe3.delivery.mp.microsoft.com, edgedl.me.gvt1.com, appservice.ec.azureedge.net, clients.l.google.com, cs9.wpc.v0cdn.net
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtSetInformationFile calls found.
- VT rate limit hit for: https://salmon-sand-04393a710.5.azurestaticapps.net/?bezp=5565454&clickid=836e9bd971fa3a7caf5ca499c64a32c9&phone=+1-866-993-6426
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 4842 |
Entropy (8bit): | 4.526345891855864 |
Encrypted: | false |
SSDEEP: | 96:U7VrtvDN/KniSBgKcqWCq8n/Uuhm4owKkYVtSqxHBqeI:arJN/wFgVqtVeZwTqhI |
MD5: | B1EE4C89DD83CECE9412A3C847C2F815 |
SHA1: | 02DB4BC607FF302C1274CBA13CF31F8098681ACA |
SHA-256: | B4B809961668BD61715C146DFCF59B3D9EA9A1C6CC8091C29FA547302CDDF3C1 |
SHA-512: | 90D8ACBAB274906D3D25A78FFD30FF76B7A0FBA368FB76F68300305349FE0525837C28E7B3D01FC080D4BCC3A040BAD9F94BEC879E48E7D9F2A9A172832DEB3B |
Malicious: | false |
Reputation: | low |
URL: | https://appservice.azureedge.net/images/static-apps/v3/microsoft_azure_logo.svg |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 87533 |
Entropy (8bit): | 5.262536918435756 |
Encrypted: | false |
SSDEEP: | 1536:0RUX9uDgwxcy2KVBNwchN6SLaHEk2BSrBESp+a/IEk4aAocVi8SMBQ47GKr:sHNwcv9VBQpLl88SMBQ47GKr |
MD5: | 2C872DBE60F4BA70FB85356113D8B35E |
SHA1: | EE48592D1FFF952FCF06CE0B666ED4785493AFDC |
SHA-256: | FC9A93DD241F6B045CBFF0481CF4E1901BECD0E12FB45166A8F17F95823F0B1A |
SHA-512: | BF6089ED4698CB8270A8B0C8AD9508FF886A7A842278E98064D5C1790CA3A36D5D69D9F047EF196882554FC104DA2C88EB5395F1EE8CF0F3F6FF8869408350FE |
Malicious: | false |
Reputation: | low |
URL: | https://ajax.aspnetcdn.com/ajax/jquery/jquery-3.7.1.min.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 60404 |
Entropy (8bit): | 5.131593990679167 |
Encrypted: | false |
SSDEEP: | 768:pZYN+vOLQ11ObgUDZa8fW+l3sLaSLPe6CMhYVRK0H/9V2Vz/kq8GPnlcGpPX21b0:pKQjXht8xmeY8ssH2nvt |
MD5: | B0794583EC020A7852F0FC04D5CEFC52 |
SHA1: | 847DFF899B5BCF8EE434E389E2A910BA1DBAD76F |
SHA-256: | 9BCD4D0F29DC6556EBEEFF44EAA0965F0C7F7308EE58394708CCE2F698CCA1B0 |
SHA-512: | D7F46F6537020C452363F0B2A62333FA2AAAB5AA107C021398D489635ECCCA9E0CB3999DC4F4B9515EE239F759A3170687315B3A6EAC9ED4CA269A63BEE860E2 |
Malicious: | false |
Reputation: | low |
URL: | https://ajax.aspnetcdn.com/ajax/bootstrap/5.2.3/bootstrap.min.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8104 |
Entropy (8bit): | 4.675970903143818 |
Encrypted: | false |
SSDEEP: | 96:QZ3dSugxOrThfA4oYVmHWEUeBRUTRwD+cbfxjdIOfMDu1vFQ4wD5yTxK83AKOyA:TOPMGmHWEUe91guBOLEKMAF |
MD5: | 1A813EE7E1120C4D7B3E8EBD29AAF72F |
SHA1: | 5B3F94C56FD08BD6F582B2295D1996D484A66DD5 |
SHA-256: | AF633C8781D0E41FB1787E2709FF7926A0519C80A80BDD057021E00E1B48DDA2 |
SHA-512: | A552C43B2220DF6F2D1F1F3436AEA25BFEB7ADF89B5660D6CE752037933A2DF775CA1D4F8B3459DF77D480185579B1B6B672D178E06CFC73305F6E32BE2B23E7 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 1946 |
Entropy (8bit): | 5.0658464668720535 |
Encrypted: | false |
SSDEEP: | 48:zfnHxeob2c5Gr2W4PFzhkT104OOrbdT1dCkRM1iiHDgG3ax3u:D0Vx8dk04XgWM1iO |
MD5: | 909D8AC61BECBB0F646873BA6DED610E |
SHA1: | 30FA898D5052820BE3747E96641B9AE6B409BE75 |
SHA-256: | 30EFD61236D5F5FE2B02866F3B822CE9224D2315814FAC05DA9B7BFC76CA2E3F |
SHA-512: | 1D4A57981F330B2FC3AC5001C7D432553ED668D34E5A45709608F9F9910CE99B4BF90FBBB267CB82EE3EDCEBA6CCB4F313321358AFF84D4641E66C51CEE0991E |
Malicious: | false |
Reputation: | low |
URL: | https://appservice.azureedge.net/images/static-apps/v3/favicon.svg |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 2400 |
Entropy (8bit): | 5.141710386004859 |
Encrypted: | false |
SSDEEP: | 48:tTrzFLwNGCUzucfFipzv+6rI0E5Ucrpvjdf:JrZy4gJm6rI07at |
MD5: | 8B6E5A69AAFD321F4CFF4ED84BB3BDE1 |
SHA1: | B6E7634A826B088DC49DBD8F61B0121327846271 |
SHA-256: | 0A76274E99E285C9D7E18D094E71EA6FCA1B0274E30C28492A24218E53C61CB3 |
SHA-512: | ABEAE136E3B7C52BD00937E6257B15D0FB163A1BE77BBBA0818FDC1BF32B96C0F3F49DCFD7D8A726211B7B49C3E660CC30FC2A12A4144CA4BC83E08D57203DEE |
Malicious: | false |
Reputation: | low |
URL: | https://salmon-sand-04393a710.5.azurestaticapps.net/?bezp=5565454&clickid=836e9bd971fa3a7caf5ca499c64a32c9&phone=+1-866-993-6426 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 23 |
Entropy (8bit): | 3.882045108136863 |
Encrypted: | false |
SSDEEP: | 3:TMQvHEeovbn:ACHYvb |
MD5: | FBBC82923FF6881236B01520BAA9F0EF |
SHA1: | 20DE932A247D76E8865BCC2411E38DB4D9807C4A |
SHA-256: | BD6300F28F9701DDC7283D2E6629020FC7969E5064E4258A894FDD2EF6DA666F |
SHA-512: | 35F90567DDF751094FF1150B754D5B9B598252E77DEFFF5AA0ADA426209D9F75ECFF39C8E7D2CC933A1E2C9892B0CEEBB0A0E6278EE07BA1C5BBCDB3B6A2F13D |
Malicious: | false |
Reputation: | low |
URL: | https://appservice.azureedge.net/scripts/static-apps/v3/loc.min.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 8104 |
Entropy (8bit): | 4.675970903143818 |
Encrypted: | false |
SSDEEP: | 96:QZ3dSugxOrThfA4oYVmHWEUeBRUTRwD+cbfxjdIOfMDu1vFQ4wD5yTxK83AKOyA:TOPMGmHWEUe91guBOLEKMAF |
MD5: | 1A813EE7E1120C4D7B3E8EBD29AAF72F |
SHA1: | 5B3F94C56FD08BD6F582B2295D1996D484A66DD5 |
SHA-256: | AF633C8781D0E41FB1787E2709FF7926A0519C80A80BDD057021E00E1B48DDA2 |
SHA-512: | A552C43B2220DF6F2D1F1F3436AEA25BFEB7ADF89B5660D6CE752037933A2DF775CA1D4F8B3459DF77D480185579B1B6B672D178E06CFC73305F6E32BE2B23E7 |
Malicious: | false |
Reputation: | low |
URL: | https://appservice.azureedge.net/images/static-apps/v3/staticapps.svg |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 1134 |
Entropy (8bit): | 4.723354379446081 |
Encrypted: | false |
SSDEEP: | 24:Lll1tEPxz4Omvzxdc2iv9rJKsS1P7sPea7sP/9u:z/Kdb |
MD5: | 8DC1B0215D4842AAE9BB811E9B655919 |
SHA1: | 852DDB564BDFDF837E32D672B073734E15593283 |
SHA-256: | 666DD97A683171808B9AAAF4A1EF11C97865DF5046172FED704F70C78E940830 |
SHA-512: | D4A2B6F8E806959ADD66E1AE489982297F4E8C1C7EE25A27CF137023F0B7A957BBBC5453E53621AF661490A1DC5D5C1977A6D86FB9D04BC9DD6606CA9F6C1EF0 |
Malicious: | false |
Reputation: | low |
URL: | https://appservice.azureedge.net/css/static-apps/v3/main.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 194901 |
Entropy (8bit): | 5.014294143940012 |
Encrypted: | false |
SSDEEP: | 1536:ZtGg9JfWgeQK5wlP72qgOfI3N9LsqkVkpz600I4lp:ZtGg9JfWD9kVkpz600I4lp |
MD5: | 3F30C2C47D7D23C7A994DB0C862D45A5 |
SHA1: | 7791DD1F3173A0D62CC39C21D2AD71FC8DAD0E72 |
SHA-256: | C0BCF7898FDC3B87BABCA678CD19A8E3EF570E931C80A3AFBFFCC453738C951A |
SHA-512: | 49B891FDEBACA612A8315557CAC4CA1BFED5B1E5A28BE63715D1EBB741292A0A53A1979E9A1A8779978B58B849BADCFFDAEB76570D6E4048F631B445F9354150 |
Malicious: | false |
Reputation: | low |
URL: | https://ajax.aspnetcdn.com/ajax/bootstrap/5.2.3/css/bootstrap.min.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4842 |
Entropy (8bit): | 4.526345891855864 |
Encrypted: | false |
SSDEEP: | 96:U7VrtvDN/KniSBgKcqWCq8n/Uuhm4owKkYVtSqxHBqeI:arJN/wFgVqtVeZwTqhI |
MD5: | B1EE4C89DD83CECE9412A3C847C2F815 |
SHA1: | 02DB4BC607FF302C1274CBA13CF31F8098681ACA |
SHA-256: | B4B809961668BD61715C146DFCF59B3D9EA9A1C6CC8091C29FA547302CDDF3C1 |
SHA-512: | 90D8ACBAB274906D3D25A78FFD30FF76B7A0FBA368FB76F68300305349FE0525837C28E7B3D01FC080D4BCC3A040BAD9F94BEC879E48E7D9F2A9A172832DEB3B |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1946 |
Entropy (8bit): | 5.0658464668720535 |
Encrypted: | false |
SSDEEP: | 48:zfnHxeob2c5Gr2W4PFzhkT104OOrbdT1dCkRM1iiHDgG3ax3u:D0Vx8dk04XgWM1iO |
MD5: | 909D8AC61BECBB0F646873BA6DED610E |
SHA1: | 30FA898D5052820BE3747E96641B9AE6B409BE75 |
SHA-256: | 30EFD61236D5F5FE2B02866F3B822CE9224D2315814FAC05DA9B7BFC76CA2E3F |
SHA-512: | 1D4A57981F330B2FC3AC5001C7D432553ED668D34E5A45709608F9F9910CE99B4BF90FBBB267CB82EE3EDCEBA6CCB4F313321358AFF84D4641E66C51CEE0991E |
Malicious: | false |
Reputation: | low |
Preview: |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 18, 2024 00:42:54.810563087 CEST | 49675 | 443 | 192.168.2.4 | 173.222.162.32 |
Apr 18, 2024 00:43:03.830848932 CEST | 49735 | 443 | 192.168.2.4 | 20.75.112.13 |
Apr 18, 2024 00:43:03.830885887 CEST | 443 | 49735 | 20.75.112.13 | 192.168.2.4 |
Apr 18, 2024 00:43:03.830945969 CEST | 49735 | 443 | 192.168.2.4 | 20.75.112.13 |
Apr 18, 2024 00:43:03.831324100 CEST | 49736 | 443 | 192.168.2.4 | 20.75.112.13 |
Apr 18, 2024 00:43:03.831418037 CEST | 443 | 49736 | 20.75.112.13 | 192.168.2.4 |
Apr 18, 2024 00:43:03.831482887 CEST | 49736 | 443 | 192.168.2.4 | 20.75.112.13 |
Apr 18, 2024 00:43:03.831538916 CEST | 49735 | 443 | 192.168.2.4 | 20.75.112.13 |
Apr 18, 2024 00:43:03.831556082 CEST | 443 | 49735 | 20.75.112.13 | 192.168.2.4 |
Apr 18, 2024 00:43:03.831685066 CEST | 49736 | 443 | 192.168.2.4 | 20.75.112.13 |
Apr 18, 2024 00:43:03.831717968 CEST | 443 | 49736 | 20.75.112.13 | 192.168.2.4 |
Apr 18, 2024 00:43:04.212142944 CEST | 443 | 49736 | 20.75.112.13 | 192.168.2.4 |
Apr 18, 2024 00:43:04.212482929 CEST | 49736 | 443 | 192.168.2.4 | 20.75.112.13 |
Apr 18, 2024 00:43:04.212543964 CEST | 443 | 49736 | 20.75.112.13 | 192.168.2.4 |
Apr 18, 2024 00:43:04.214386940 CEST | 443 | 49736 | 20.75.112.13 | 192.168.2.4 |
Apr 18, 2024 00:43:04.214466095 CEST | 49736 | 443 | 192.168.2.4 | 20.75.112.13 |
Apr 18, 2024 00:43:04.214956045 CEST | 443 | 49735 | 20.75.112.13 | 192.168.2.4 |
Apr 18, 2024 00:43:04.215281963 CEST | 49735 | 443 | 192.168.2.4 | 20.75.112.13 |
Apr 18, 2024 00:43:04.215311050 CEST | 443 | 49735 | 20.75.112.13 | 192.168.2.4 |
Apr 18, 2024 00:43:04.215560913 CEST | 49736 | 443 | 192.168.2.4 | 20.75.112.13 |
Apr 18, 2024 00:43:04.215661049 CEST | 443 | 49736 | 20.75.112.13 | 192.168.2.4 |
Apr 18, 2024 00:43:04.215750933 CEST | 49736 | 443 | 192.168.2.4 | 20.75.112.13 |
Apr 18, 2024 00:43:04.215770960 CEST | 443 | 49736 | 20.75.112.13 | 192.168.2.4 |
Apr 18, 2024 00:43:04.217020988 CEST | 443 | 49735 | 20.75.112.13 | 192.168.2.4 |
Apr 18, 2024 00:43:04.217088938 CEST | 49735 | 443 | 192.168.2.4 | 20.75.112.13 |
Apr 18, 2024 00:43:04.217942953 CEST | 49735 | 443 | 192.168.2.4 | 20.75.112.13 |
Apr 18, 2024 00:43:04.218189955 CEST | 443 | 49735 | 20.75.112.13 | 192.168.2.4 |
Apr 18, 2024 00:43:04.268793106 CEST | 49735 | 443 | 192.168.2.4 | 20.75.112.13 |
Apr 18, 2024 00:43:04.268821001 CEST | 443 | 49735 | 20.75.112.13 | 192.168.2.4 |
Apr 18, 2024 00:43:04.268913984 CEST | 49736 | 443 | 192.168.2.4 | 20.75.112.13 |
Apr 18, 2024 00:43:04.315287113 CEST | 49735 | 443 | 192.168.2.4 | 20.75.112.13 |
Apr 18, 2024 00:43:04.422724009 CEST | 49675 | 443 | 192.168.2.4 | 173.222.162.32 |
Apr 18, 2024 00:43:04.448590994 CEST | 443 | 49736 | 20.75.112.13 | 192.168.2.4 |
Apr 18, 2024 00:43:04.448643923 CEST | 443 | 49736 | 20.75.112.13 | 192.168.2.4 |
Apr 18, 2024 00:43:04.448743105 CEST | 49736 | 443 | 192.168.2.4 | 20.75.112.13 |
Apr 18, 2024 00:43:04.448813915 CEST | 443 | 49736 | 20.75.112.13 | 192.168.2.4 |
Apr 18, 2024 00:43:04.448956966 CEST | 443 | 49736 | 20.75.112.13 | 192.168.2.4 |
Apr 18, 2024 00:43:04.449016094 CEST | 49736 | 443 | 192.168.2.4 | 20.75.112.13 |
Apr 18, 2024 00:43:04.449732065 CEST | 49736 | 443 | 192.168.2.4 | 20.75.112.13 |
Apr 18, 2024 00:43:04.449768066 CEST | 443 | 49736 | 20.75.112.13 | 192.168.2.4 |
Apr 18, 2024 00:43:06.170038939 CEST | 49750 | 443 | 192.168.2.4 | 74.125.138.103 |
Apr 18, 2024 00:43:06.170094013 CEST | 443 | 49750 | 74.125.138.103 | 192.168.2.4 |
Apr 18, 2024 00:43:06.170160055 CEST | 49750 | 443 | 192.168.2.4 | 74.125.138.103 |
Apr 18, 2024 00:43:06.170908928 CEST | 49750 | 443 | 192.168.2.4 | 74.125.138.103 |
Apr 18, 2024 00:43:06.170942068 CEST | 443 | 49750 | 74.125.138.103 | 192.168.2.4 |
Apr 18, 2024 00:43:06.397675991 CEST | 443 | 49750 | 74.125.138.103 | 192.168.2.4 |
Apr 18, 2024 00:43:06.398225069 CEST | 49750 | 443 | 192.168.2.4 | 74.125.138.103 |
Apr 18, 2024 00:43:06.398257017 CEST | 443 | 49750 | 74.125.138.103 | 192.168.2.4 |
Apr 18, 2024 00:43:06.399910927 CEST | 443 | 49750 | 74.125.138.103 | 192.168.2.4 |
Apr 18, 2024 00:43:06.399977922 CEST | 49750 | 443 | 192.168.2.4 | 74.125.138.103 |
Apr 18, 2024 00:43:06.838732004 CEST | 49751 | 443 | 192.168.2.4 | 23.33.136.127 |
Apr 18, 2024 00:43:06.838819981 CEST | 443 | 49751 | 23.33.136.127 | 192.168.2.4 |
Apr 18, 2024 00:43:06.839091063 CEST | 49751 | 443 | 192.168.2.4 | 23.33.136.127 |
Apr 18, 2024 00:43:06.841895103 CEST | 49751 | 443 | 192.168.2.4 | 23.33.136.127 |
Apr 18, 2024 00:43:06.841968060 CEST | 443 | 49751 | 23.33.136.127 | 192.168.2.4 |
Apr 18, 2024 00:43:07.059577942 CEST | 49750 | 443 | 192.168.2.4 | 74.125.138.103 |
Apr 18, 2024 00:43:07.060060024 CEST | 443 | 49750 | 74.125.138.103 | 192.168.2.4 |
Apr 18, 2024 00:43:07.073005915 CEST | 443 | 49751 | 23.33.136.127 | 192.168.2.4 |
Apr 18, 2024 00:43:07.073230028 CEST | 49751 | 443 | 192.168.2.4 | 23.33.136.127 |
Apr 18, 2024 00:43:07.108987093 CEST | 49750 | 443 | 192.168.2.4 | 74.125.138.103 |
Apr 18, 2024 00:43:07.109046936 CEST | 443 | 49750 | 74.125.138.103 | 192.168.2.4 |
Apr 18, 2024 00:43:07.155805111 CEST | 49750 | 443 | 192.168.2.4 | 74.125.138.103 |
Apr 18, 2024 00:43:07.309339046 CEST | 49751 | 443 | 192.168.2.4 | 23.33.136.127 |
Apr 18, 2024 00:43:07.309391022 CEST | 443 | 49751 | 23.33.136.127 | 192.168.2.4 |
Apr 18, 2024 00:43:07.310273886 CEST | 443 | 49751 | 23.33.136.127 | 192.168.2.4 |
Apr 18, 2024 00:43:07.372086048 CEST | 49751 | 443 | 192.168.2.4 | 23.33.136.127 |
Apr 18, 2024 00:43:07.601165056 CEST | 49751 | 443 | 192.168.2.4 | 23.33.136.127 |
Apr 18, 2024 00:43:07.644191027 CEST | 443 | 49751 | 23.33.136.127 | 192.168.2.4 |
Apr 18, 2024 00:43:07.706746101 CEST | 443 | 49751 | 23.33.136.127 | 192.168.2.4 |
Apr 18, 2024 00:43:07.706897974 CEST | 443 | 49751 | 23.33.136.127 | 192.168.2.4 |
Apr 18, 2024 00:43:07.706965923 CEST | 49751 | 443 | 192.168.2.4 | 23.33.136.127 |
Apr 18, 2024 00:43:07.709034920 CEST | 49751 | 443 | 192.168.2.4 | 23.33.136.127 |
Apr 18, 2024 00:43:07.709053993 CEST | 443 | 49751 | 23.33.136.127 | 192.168.2.4 |
Apr 18, 2024 00:43:07.866193056 CEST | 49754 | 443 | 192.168.2.4 | 104.123.200.136 |
Apr 18, 2024 00:43:07.866276979 CEST | 443 | 49754 | 104.123.200.136 | 192.168.2.4 |
Apr 18, 2024 00:43:07.866349936 CEST | 49754 | 443 | 192.168.2.4 | 104.123.200.136 |
Apr 18, 2024 00:43:07.866723061 CEST | 49754 | 443 | 192.168.2.4 | 104.123.200.136 |
Apr 18, 2024 00:43:07.866749048 CEST | 443 | 49754 | 104.123.200.136 | 192.168.2.4 |
Apr 18, 2024 00:43:08.085902929 CEST | 443 | 49754 | 104.123.200.136 | 192.168.2.4 |
Apr 18, 2024 00:43:08.085974932 CEST | 49754 | 443 | 192.168.2.4 | 104.123.200.136 |
Apr 18, 2024 00:43:08.087279081 CEST | 49754 | 443 | 192.168.2.4 | 104.123.200.136 |
Apr 18, 2024 00:43:08.087289095 CEST | 443 | 49754 | 104.123.200.136 | 192.168.2.4 |
Apr 18, 2024 00:43:08.088059902 CEST | 443 | 49754 | 104.123.200.136 | 192.168.2.4 |
Apr 18, 2024 00:43:08.088995934 CEST | 49754 | 443 | 192.168.2.4 | 104.123.200.136 |
Apr 18, 2024 00:43:08.132189989 CEST | 443 | 49754 | 104.123.200.136 | 192.168.2.4 |
Apr 18, 2024 00:43:08.299945116 CEST | 443 | 49754 | 104.123.200.136 | 192.168.2.4 |
Apr 18, 2024 00:43:08.300179958 CEST | 443 | 49754 | 104.123.200.136 | 192.168.2.4 |
Apr 18, 2024 00:43:08.300247908 CEST | 49754 | 443 | 192.168.2.4 | 104.123.200.136 |
Apr 18, 2024 00:43:08.302427053 CEST | 49754 | 443 | 192.168.2.4 | 104.123.200.136 |
Apr 18, 2024 00:43:08.302463055 CEST | 443 | 49754 | 104.123.200.136 | 192.168.2.4 |
Apr 18, 2024 00:43:08.302508116 CEST | 49754 | 443 | 192.168.2.4 | 104.123.200.136 |
Apr 18, 2024 00:43:08.302521944 CEST | 443 | 49754 | 104.123.200.136 | 192.168.2.4 |
Apr 18, 2024 00:43:16.388447046 CEST | 443 | 49750 | 74.125.138.103 | 192.168.2.4 |
Apr 18, 2024 00:43:16.388520002 CEST | 443 | 49750 | 74.125.138.103 | 192.168.2.4 |
Apr 18, 2024 00:43:16.388703108 CEST | 49750 | 443 | 192.168.2.4 | 74.125.138.103 |
Apr 18, 2024 00:43:18.665770054 CEST | 49750 | 443 | 192.168.2.4 | 74.125.138.103 |
Apr 18, 2024 00:43:18.665792942 CEST | 443 | 49750 | 74.125.138.103 | 192.168.2.4 |
Apr 18, 2024 00:43:23.020325899 CEST | 80 | 49723 | 69.164.42.0 | 192.168.2.4 |
Apr 18, 2024 00:43:23.020457983 CEST | 49723 | 80 | 192.168.2.4 | 69.164.42.0 |
Apr 18, 2024 00:43:23.020493031 CEST | 49723 | 80 | 192.168.2.4 | 69.164.42.0 |
Apr 18, 2024 00:43:23.125475883 CEST | 80 | 49723 | 69.164.42.0 | 192.168.2.4 |
Apr 18, 2024 00:43:37.329643011 CEST | 80 | 49724 | 69.164.42.0 | 192.168.2.4 |
Apr 18, 2024 00:43:37.329869032 CEST | 49724 | 80 | 192.168.2.4 | 69.164.42.0 |
Apr 18, 2024 00:43:37.329869986 CEST | 49724 | 80 | 192.168.2.4 | 69.164.42.0 |
Apr 18, 2024 00:43:37.434282064 CEST | 80 | 49724 | 69.164.42.0 | 192.168.2.4 |
Apr 18, 2024 00:43:49.278114080 CEST | 49735 | 443 | 192.168.2.4 | 20.75.112.13 |
Apr 18, 2024 00:43:49.278141022 CEST | 443 | 49735 | 20.75.112.13 | 192.168.2.4 |
Apr 18, 2024 00:44:04.223558903 CEST | 49735 | 443 | 192.168.2.4 | 20.75.112.13 |
Apr 18, 2024 00:44:04.223856926 CEST | 443 | 49735 | 20.75.112.13 | 192.168.2.4 |
Apr 18, 2024 00:44:04.223977089 CEST | 49735 | 443 | 192.168.2.4 | 20.75.112.13 |
Apr 18, 2024 00:44:06.086915016 CEST | 49763 | 443 | 192.168.2.4 | 74.125.138.103 |
Apr 18, 2024 00:44:06.086966038 CEST | 443 | 49763 | 74.125.138.103 | 192.168.2.4 |
Apr 18, 2024 00:44:06.087061882 CEST | 49763 | 443 | 192.168.2.4 | 74.125.138.103 |
Apr 18, 2024 00:44:06.087277889 CEST | 49763 | 443 | 192.168.2.4 | 74.125.138.103 |
Apr 18, 2024 00:44:06.087286949 CEST | 443 | 49763 | 74.125.138.103 | 192.168.2.4 |
Apr 18, 2024 00:44:06.306736946 CEST | 443 | 49763 | 74.125.138.103 | 192.168.2.4 |
Apr 18, 2024 00:44:06.307027102 CEST | 49763 | 443 | 192.168.2.4 | 74.125.138.103 |
Apr 18, 2024 00:44:06.307045937 CEST | 443 | 49763 | 74.125.138.103 | 192.168.2.4 |
Apr 18, 2024 00:44:06.308532953 CEST | 443 | 49763 | 74.125.138.103 | 192.168.2.4 |
Apr 18, 2024 00:44:06.308878899 CEST | 49763 | 443 | 192.168.2.4 | 74.125.138.103 |
Apr 18, 2024 00:44:06.309465885 CEST | 443 | 49763 | 74.125.138.103 | 192.168.2.4 |
Apr 18, 2024 00:44:06.354434967 CEST | 49763 | 443 | 192.168.2.4 | 74.125.138.103 |
Apr 18, 2024 00:44:16.325804949 CEST | 443 | 49763 | 74.125.138.103 | 192.168.2.4 |
Apr 18, 2024 00:44:16.325923920 CEST | 443 | 49763 | 74.125.138.103 | 192.168.2.4 |
Apr 18, 2024 00:44:16.325982094 CEST | 49763 | 443 | 192.168.2.4 | 74.125.138.103 |
Apr 18, 2024 00:44:18.395442963 CEST | 49763 | 443 | 192.168.2.4 | 74.125.138.103 |
Apr 18, 2024 00:44:18.395462036 CEST | 443 | 49763 | 74.125.138.103 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 18, 2024 00:43:01.893291950 CEST | 53 | 56027 | 1.1.1.1 | 192.168.2.4 |
Apr 18, 2024 00:43:02.008873940 CEST | 53 | 65072 | 1.1.1.1 | 192.168.2.4 |
Apr 18, 2024 00:43:02.626009941 CEST | 53 | 54596 | 1.1.1.1 | 192.168.2.4 |
Apr 18, 2024 00:43:03.596151114 CEST | 59245 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 18, 2024 00:43:03.596296072 CEST | 50573 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 18, 2024 00:43:04.464710951 CEST | 56421 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 18, 2024 00:43:04.464807034 CEST | 58806 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 18, 2024 00:43:05.974152088 CEST | 49977 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 18, 2024 00:43:05.976247072 CEST | 58578 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 18, 2024 00:43:06.079803944 CEST | 53 | 49977 | 1.1.1.1 | 192.168.2.4 |
Apr 18, 2024 00:43:06.080712080 CEST | 53 | 58578 | 1.1.1.1 | 192.168.2.4 |
Apr 18, 2024 00:43:19.743596077 CEST | 53 | 64717 | 1.1.1.1 | 192.168.2.4 |
Apr 18, 2024 00:43:24.135102987 CEST | 138 | 138 | 192.168.2.4 | 192.168.2.255 |
Apr 18, 2024 00:43:38.482675076 CEST | 53 | 64320 | 1.1.1.1 | 192.168.2.4 |
Apr 18, 2024 00:44:01.103436947 CEST | 53 | 52166 | 1.1.1.1 | 192.168.2.4 |
Apr 18, 2024 00:44:01.683593035 CEST | 53 | 61666 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Apr 18, 2024 00:43:03.596151114 CEST | 192.168.2.4 | 1.1.1.1 | 0xa134 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 18, 2024 00:43:03.596296072 CEST | 192.168.2.4 | 1.1.1.1 | 0xd9bc | Standard query (0) | 65 | IN (0x0001) | false | |
Apr 18, 2024 00:43:04.464710951 CEST | 192.168.2.4 | 1.1.1.1 | 0x30a | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 18, 2024 00:43:04.464807034 CEST | 192.168.2.4 | 1.1.1.1 | 0xeeea | Standard query (0) | 65 | IN (0x0001) | false | |
Apr 18, 2024 00:43:05.974152088 CEST | 192.168.2.4 | 1.1.1.1 | 0x4756 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 18, 2024 00:43:05.976247072 CEST | 192.168.2.4 | 1.1.1.1 | 0xfb01 | Standard query (0) | 65 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Apr 18, 2024 00:43:03.804127932 CEST | 1.1.1.1 | 192.168.2.4 | 0xd9bc | No error (0) | azurestaticapps5.trafficmanager.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 18, 2024 00:43:03.804127932 CEST | 1.1.1.1 | 192.168.2.4 | 0xd9bc | No error (0) | waws-prod-bn1-4358465d.sip.p.azurewebsites.windows.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 18, 2024 00:43:03.830120087 CEST | 1.1.1.1 | 192.168.2.4 | 0xa134 | No error (0) | azurestaticapps5.trafficmanager.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 18, 2024 00:43:03.830120087 CEST | 1.1.1.1 | 192.168.2.4 | 0xa134 | No error (0) | waws-prod-bn1-79ce3d91.sip.p.azurewebsites.windows.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 18, 2024 00:43:03.830120087 CEST | 1.1.1.1 | 192.168.2.4 | 0xa134 | No error (0) | 20.75.112.13 | A (IP address) | IN (0x0001) | false | ||
Apr 18, 2024 00:43:04.569473982 CEST | 1.1.1.1 | 192.168.2.4 | 0xeeea | No error (0) | mscomajax.vo.msecnd.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 18, 2024 00:43:04.570242882 CEST | 1.1.1.1 | 192.168.2.4 | 0x30a | No error (0) | mscomajax.vo.msecnd.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 18, 2024 00:43:06.079803944 CEST | 1.1.1.1 | 192.168.2.4 | 0x4756 | No error (0) | 74.125.138.103 | A (IP address) | IN (0x0001) | false | ||
Apr 18, 2024 00:43:06.079803944 CEST | 1.1.1.1 | 192.168.2.4 | 0x4756 | No error (0) | 74.125.138.104 | A (IP address) | IN (0x0001) | false | ||
Apr 18, 2024 00:43:06.079803944 CEST | 1.1.1.1 | 192.168.2.4 | 0x4756 | No error (0) | 74.125.138.99 | A (IP address) | IN (0x0001) | false | ||
Apr 18, 2024 00:43:06.079803944 CEST | 1.1.1.1 | 192.168.2.4 | 0x4756 | No error (0) | 74.125.138.105 | A (IP address) | IN (0x0001) | false | ||
Apr 18, 2024 00:43:06.079803944 CEST | 1.1.1.1 | 192.168.2.4 | 0x4756 | No error (0) | 74.125.138.106 | A (IP address) | IN (0x0001) | false | ||
Apr 18, 2024 00:43:06.079803944 CEST | 1.1.1.1 | 192.168.2.4 | 0x4756 | No error (0) | 74.125.138.147 | A (IP address) | IN (0x0001) | false | ||
Apr 18, 2024 00:43:06.080712080 CEST | 1.1.1.1 | 192.168.2.4 | 0xfb01 | No error (0) | 65 | IN (0x0001) | false | |||
Apr 18, 2024 00:43:18.232492924 CEST | 1.1.1.1 | 192.168.2.4 | 0xd1b4 | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 18, 2024 00:43:18.232492924 CEST | 1.1.1.1 | 192.168.2.4 | 0xd1b4 | No error (0) | 192.229.211.108 | A (IP address) | IN (0x0001) | false | ||
Apr 18, 2024 00:43:31.105571985 CEST | 1.1.1.1 | 192.168.2.4 | 0x71be | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 18, 2024 00:43:31.105571985 CEST | 1.1.1.1 | 192.168.2.4 | 0x71be | No error (0) | 192.229.211.108 | A (IP address) | IN (0x0001) | false | ||
Apr 18, 2024 00:43:53.571805954 CEST | 1.1.1.1 | 192.168.2.4 | 0xdb08 | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 18, 2024 00:43:53.571805954 CEST | 1.1.1.1 | 192.168.2.4 | 0xdb08 | No error (0) | 192.229.211.108 | A (IP address) | IN (0x0001) | false | ||
Apr 18, 2024 00:44:14.447988987 CEST | 1.1.1.1 | 192.168.2.4 | 0x41cd | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 18, 2024 00:44:14.447988987 CEST | 1.1.1.1 | 192.168.2.4 | 0x41cd | No error (0) | 192.229.211.108 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49736 | 20.75.112.13 | 443 | 3736 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-04-17 22:43:04 UTC | 762 | OUT | |
2024-04-17 22:43:04 UTC | 135 | IN | |
2024-04-17 22:43:04 UTC | 2407 | IN | |
2024-04-17 22:43:04 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49751 | 23.33.136.127 | 443 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-04-17 22:43:07 UTC | 161 | OUT | |
2024-04-17 22:43:07 UTC | 467 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49754 | 104.123.200.136 | 443 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-04-17 22:43:08 UTC | 239 | OUT | |
2024-04-17 22:43:08 UTC | 530 | IN | |
2024-04-17 22:43:08 UTC | 55 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 00:42:58 |
Start date: | 18/04/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff76e190000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 2 |
Start time: | 00:43:00 |
Start date: | 18/04/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff76e190000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 3 |
Start time: | 00:43:02 |
Start date: | 18/04/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff76e190000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |