Windows
Analysis Report
https://abcglobalservices.lt.emlnk9.com/Prod/link-tracker?n
Overview
General Information
Detection
Score: | 1 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 60% |
Signatures
Classification
Analysis Advice
Joe Sandbox was unable to browse the URL (domain or webserver down or HTTPS issue), try to browse the URL again later |
Some HTTP requests failed (404). It is likely that the sample will exhibit less behavior. |
- System is w10x64
- chrome.exe (PID: 5624 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 5492 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2268 --fi eld-trial- handle=219 6,i,118684 6321109265 0293,10916 8731613240 40047,2621 44 --disab le-feature s=Optimiza tionGuideM odelDownlo ading,Opti mizationHi nts,Optimi zationHint sFetching, Optimizati onTargetPr ediction / prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- chrome.exe (PID: 5892 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://abcgl obalservic es.lt.emln k9.com/Pro d/link-tra cker?n" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTPS traffic detected: |
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: |
Source: | Window detected: |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 3 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 4 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 3 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
1% | Virustotal | Browse |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
abcglobalservices.lt.emlnk9.com | 34.225.160.212 | true | false | unknown | |
www.google.com | 142.250.9.105 | true | false | high | |
fp2e7a.wpc.phicdn.net | 192.229.211.108 | true | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.250.9.105 | www.google.com | United States | 15169 | GOOGLEUS | false | |
34.225.160.212 | abcglobalservices.lt.emlnk9.com | United States | 14618 | AMAZON-AESUS | false |
IP |
---|
192.168.2.5 |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1431658 |
Start date and time: | 2024-04-25 15:26:32 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 2m 6s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | https://abcglobalservices.lt.emlnk9.com/Prod/link-tracker?n |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | UNKNOWN |
Classification: | unknown1.win@17/6@4/4 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- URL not reachable
- Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 64.233.185.94, 172.253.124.139, 172.253.124.113, 172.253.124.138, 172.253.124.102, 172.253.124.100, 172.253.124.101, 74.125.136.84, 34.104.35.123, 23.216.73.151, 13.85.23.86, 72.21.81.240, 192.229.211.108, 52.165.164.15
- Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, clientservices.googleapis.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wu.azureedge.net, clients2.google.com, ocsp.digicert.com, e16604.g.akamaiedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, prod.fs.microsoft.com.akadns.net, glb.sls.prod.dcat.dsp.trafficmanager.net, fs.microsoft.com, accounts.google.com, wu.ec.azureedge.net, ctldl.windowsupdate.com, wu-bg-shim.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, edgedl.me.gvt1.com, clients.l.google.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtSetInformationFile calls found.
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.974993681338411 |
Encrypted: | false |
SSDEEP: | 48:89daTmq1+H2idAKZdA19ehwiZUklqehTy+3:8K3pIy |
MD5: | 282EAAC07111772DC2417ED8B6F3E14B |
SHA1: | 1D6453A9C84E824895E0DD19F349F17007675BDC |
SHA-256: | 931FF43265EFF36FDB65D12C8F194CAFFC4073262EF7E2BF8ACBB675C177664F |
SHA-512: | B462DA30D63CF1BEC980A79474140724A16E6CC95B5A87FCB83E7F8D4A3EF5589337D6D69B9F728E26708F0FFB1FAB242C657D5E7156E1DB05DBE43968D26A05 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.9886425322283814 |
Encrypted: | false |
SSDEEP: | 48:88vdaTmq1+H2idAKZdA1weh/iZUkAQkqeh4y+2:88c379Q1y |
MD5: | 1D3B1F3D9D8CFE0A406F84D181B7281F |
SHA1: | 2433AFACD5E9FAF1A2E6C1FCFCDAADB51F75925F |
SHA-256: | CFD978DCE044FA5CC1AF41D91B70234B34245F71434605A3DA8B18200416CB07 |
SHA-512: | 74B9DD5669E948567F1F18B9372FC0F9E53033083E62D70E3A03DB9736414524B9487FA74E4CD2FCD523807F68D1F1A5C33597DC0B77A48F6E905561BF6CD645 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2693 |
Entropy (8bit): | 4.001444900476502 |
Encrypted: | false |
SSDEEP: | 48:8xzdaTmqsH2idAKZdA14tseh7sFiZUkmgqeh7s6y+BX:8xQ3bnUy |
MD5: | 05D21389093CD876AEF03BDA1C8B5927 |
SHA1: | 209D1DCCB49A93BEC95DF1405D1B120E3773112F |
SHA-256: | B071B8B37613E0EC34AF52DB180E4C4E344A6CE5E187E84D8917F4890E692446 |
SHA-512: | 9B5989BB363DD315FA0A1F77D33FF7D28CDE6639CBBCDF931249167DC48D97EC3E047714D28262C331986FAF3C9102EF071141D5D517FAB132726886C8485B5C |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.987586929394831 |
Encrypted: | false |
SSDEEP: | 48:8ddaTmq1+H2idAKZdA1vehDiZUkwqeh8y+R:8q3YCy |
MD5: | EA313B968D11B48AEAAF53D72E9C9B95 |
SHA1: | 9DE46A2E1445C47177C8C04F94AC7A9E946F9FC1 |
SHA-256: | 74DAA8C6FF81D17CDC2DD9053AC2A2B6A6A27C37023FA3C3793EE7AD81924DE2 |
SHA-512: | 2A7BAEE3B1E1A5FB31937AB876589912CC150AD7D4CAF6183DDEADCE0D378C44CBE7F80A84FC0DB14DE6D08A625A075B568768037F0EAAB7C424C003BE605ED6 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.977185864596696 |
Encrypted: | false |
SSDEEP: | 48:88zdaTmq1+H2idAKZdA1hehBiZUk1W1qehGy+C:88Q3I9my |
MD5: | 05DBE1C37BCAA5DFC114BC8B83553DD4 |
SHA1: | B5683F8586747BC027AE1FF00992EFE0FD4D56F3 |
SHA-256: | 2A401364708B1E3FA4313BEA1F7912A2D5DEDD8DA09A8E5DF89EF2A81D2D5518 |
SHA-512: | 0BFC9524B342B67E66203AEC23DCB386E148ED078FEF921E46186254F23F29AA5ED65EDB64F5B748C96B951AFA5AC1221B870F6D188DAAC8E7E42E62C8AA4993 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2683 |
Entropy (8bit): | 3.9883702174260582 |
Encrypted: | false |
SSDEEP: | 48:8vdaTmq1+H2idAKZdA1duT+ehOuTbbiZUk5OjqehOuTbUy+yT+:8c3mT/TbxWOvTbUy7T |
MD5: | 1844C41F24FCC7B452B451DF865F41DF |
SHA1: | 497EFCFC6A6B159E0DCAF8512493F46200D54BF5 |
SHA-256: | C52E4A00FE153FA27D3EE50AB94EA72EE8DE086C8EAB6DB564885FD40ADCF96B |
SHA-512: | B76591F897440FF22CAC0FFC0CEF2824F1355B36A704AE579F50CA88E4D4A938ABBA7559E1476A5A5657C1D189E8C92C387FA925AE1990BEF5CDC76B56DB9ED7 |
Malicious: | false |
Reputation: | low |
Preview: |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 25, 2024 15:27:21.239379883 CEST | 49674 | 443 | 192.168.2.5 | 23.1.237.91 |
Apr 25, 2024 15:27:21.239414930 CEST | 49675 | 443 | 192.168.2.5 | 23.1.237.91 |
Apr 25, 2024 15:27:21.364442110 CEST | 49673 | 443 | 192.168.2.5 | 23.1.237.91 |
Apr 25, 2024 15:27:29.371325016 CEST | 49710 | 443 | 192.168.2.5 | 34.225.160.212 |
Apr 25, 2024 15:27:29.371359110 CEST | 443 | 49710 | 34.225.160.212 | 192.168.2.5 |
Apr 25, 2024 15:27:29.371486902 CEST | 49710 | 443 | 192.168.2.5 | 34.225.160.212 |
Apr 25, 2024 15:27:29.371838093 CEST | 49711 | 443 | 192.168.2.5 | 34.225.160.212 |
Apr 25, 2024 15:27:29.371881008 CEST | 443 | 49711 | 34.225.160.212 | 192.168.2.5 |
Apr 25, 2024 15:27:29.371934891 CEST | 49711 | 443 | 192.168.2.5 | 34.225.160.212 |
Apr 25, 2024 15:27:29.372035027 CEST | 49710 | 443 | 192.168.2.5 | 34.225.160.212 |
Apr 25, 2024 15:27:29.372050047 CEST | 443 | 49710 | 34.225.160.212 | 192.168.2.5 |
Apr 25, 2024 15:27:29.372246027 CEST | 49711 | 443 | 192.168.2.5 | 34.225.160.212 |
Apr 25, 2024 15:27:29.372262001 CEST | 443 | 49711 | 34.225.160.212 | 192.168.2.5 |
Apr 25, 2024 15:27:29.630012035 CEST | 443 | 49710 | 34.225.160.212 | 192.168.2.5 |
Apr 25, 2024 15:27:29.630357027 CEST | 49710 | 443 | 192.168.2.5 | 34.225.160.212 |
Apr 25, 2024 15:27:29.630371094 CEST | 443 | 49710 | 34.225.160.212 | 192.168.2.5 |
Apr 25, 2024 15:27:29.630893946 CEST | 443 | 49710 | 34.225.160.212 | 192.168.2.5 |
Apr 25, 2024 15:27:29.631041050 CEST | 49710 | 443 | 192.168.2.5 | 34.225.160.212 |
Apr 25, 2024 15:27:29.631575108 CEST | 443 | 49710 | 34.225.160.212 | 192.168.2.5 |
Apr 25, 2024 15:27:29.631624937 CEST | 49710 | 443 | 192.168.2.5 | 34.225.160.212 |
Apr 25, 2024 15:27:29.631969929 CEST | 443 | 49711 | 34.225.160.212 | 192.168.2.5 |
Apr 25, 2024 15:27:29.632138968 CEST | 49711 | 443 | 192.168.2.5 | 34.225.160.212 |
Apr 25, 2024 15:27:29.632164001 CEST | 443 | 49711 | 34.225.160.212 | 192.168.2.5 |
Apr 25, 2024 15:27:29.632663012 CEST | 443 | 49711 | 34.225.160.212 | 192.168.2.5 |
Apr 25, 2024 15:27:29.632733107 CEST | 49711 | 443 | 192.168.2.5 | 34.225.160.212 |
Apr 25, 2024 15:27:29.632822037 CEST | 49710 | 443 | 192.168.2.5 | 34.225.160.212 |
Apr 25, 2024 15:27:29.632889032 CEST | 443 | 49710 | 34.225.160.212 | 192.168.2.5 |
Apr 25, 2024 15:27:29.633270979 CEST | 49710 | 443 | 192.168.2.5 | 34.225.160.212 |
Apr 25, 2024 15:27:29.633279085 CEST | 443 | 49710 | 34.225.160.212 | 192.168.2.5 |
Apr 25, 2024 15:27:29.633708000 CEST | 443 | 49711 | 34.225.160.212 | 192.168.2.5 |
Apr 25, 2024 15:27:29.633753061 CEST | 49711 | 443 | 192.168.2.5 | 34.225.160.212 |
Apr 25, 2024 15:27:29.634445906 CEST | 49711 | 443 | 192.168.2.5 | 34.225.160.212 |
Apr 25, 2024 15:27:29.634529114 CEST | 443 | 49711 | 34.225.160.212 | 192.168.2.5 |
Apr 25, 2024 15:27:29.681782961 CEST | 49711 | 443 | 192.168.2.5 | 34.225.160.212 |
Apr 25, 2024 15:27:29.681791067 CEST | 49710 | 443 | 192.168.2.5 | 34.225.160.212 |
Apr 25, 2024 15:27:29.681812048 CEST | 443 | 49711 | 34.225.160.212 | 192.168.2.5 |
Apr 25, 2024 15:27:29.729010105 CEST | 49711 | 443 | 192.168.2.5 | 34.225.160.212 |
Apr 25, 2024 15:27:29.897670984 CEST | 443 | 49710 | 34.225.160.212 | 192.168.2.5 |
Apr 25, 2024 15:27:29.897861958 CEST | 443 | 49710 | 34.225.160.212 | 192.168.2.5 |
Apr 25, 2024 15:27:29.897942066 CEST | 49710 | 443 | 192.168.2.5 | 34.225.160.212 |
Apr 25, 2024 15:27:29.898299932 CEST | 49710 | 443 | 192.168.2.5 | 34.225.160.212 |
Apr 25, 2024 15:27:29.898329020 CEST | 443 | 49710 | 34.225.160.212 | 192.168.2.5 |
Apr 25, 2024 15:27:29.898338079 CEST | 49710 | 443 | 192.168.2.5 | 34.225.160.212 |
Apr 25, 2024 15:27:29.898380995 CEST | 49710 | 443 | 192.168.2.5 | 34.225.160.212 |
Apr 25, 2024 15:27:30.257463932 CEST | 49713 | 443 | 192.168.2.5 | 142.250.9.105 |
Apr 25, 2024 15:27:30.257502079 CEST | 443 | 49713 | 142.250.9.105 | 192.168.2.5 |
Apr 25, 2024 15:27:30.257580996 CEST | 49713 | 443 | 192.168.2.5 | 142.250.9.105 |
Apr 25, 2024 15:27:30.257951021 CEST | 49713 | 443 | 192.168.2.5 | 142.250.9.105 |
Apr 25, 2024 15:27:30.257966995 CEST | 443 | 49713 | 142.250.9.105 | 192.168.2.5 |
Apr 25, 2024 15:27:30.498765945 CEST | 443 | 49713 | 142.250.9.105 | 192.168.2.5 |
Apr 25, 2024 15:27:30.499044895 CEST | 49713 | 443 | 192.168.2.5 | 142.250.9.105 |
Apr 25, 2024 15:27:30.499063015 CEST | 443 | 49713 | 142.250.9.105 | 192.168.2.5 |
Apr 25, 2024 15:27:30.500741005 CEST | 443 | 49713 | 142.250.9.105 | 192.168.2.5 |
Apr 25, 2024 15:27:30.500823975 CEST | 49713 | 443 | 192.168.2.5 | 142.250.9.105 |
Apr 25, 2024 15:27:30.501936913 CEST | 49713 | 443 | 192.168.2.5 | 142.250.9.105 |
Apr 25, 2024 15:27:30.502022028 CEST | 443 | 49713 | 142.250.9.105 | 192.168.2.5 |
Apr 25, 2024 15:27:30.556518078 CEST | 49713 | 443 | 192.168.2.5 | 142.250.9.105 |
Apr 25, 2024 15:27:30.556529999 CEST | 443 | 49713 | 142.250.9.105 | 192.168.2.5 |
Apr 25, 2024 15:27:30.603403091 CEST | 49713 | 443 | 192.168.2.5 | 142.250.9.105 |
Apr 25, 2024 15:27:30.853364944 CEST | 49674 | 443 | 192.168.2.5 | 23.1.237.91 |
Apr 25, 2024 15:27:30.853385925 CEST | 49675 | 443 | 192.168.2.5 | 23.1.237.91 |
Apr 25, 2024 15:27:30.977374077 CEST | 49673 | 443 | 192.168.2.5 | 23.1.237.91 |
Apr 25, 2024 15:27:32.367233038 CEST | 443 | 49703 | 23.1.237.91 | 192.168.2.5 |
Apr 25, 2024 15:27:32.367361069 CEST | 49703 | 443 | 192.168.2.5 | 23.1.237.91 |
Apr 25, 2024 15:27:40.485918045 CEST | 443 | 49713 | 142.250.9.105 | 192.168.2.5 |
Apr 25, 2024 15:27:40.486054897 CEST | 443 | 49713 | 142.250.9.105 | 192.168.2.5 |
Apr 25, 2024 15:27:40.486150026 CEST | 49713 | 443 | 192.168.2.5 | 142.250.9.105 |
Apr 25, 2024 15:27:42.121803045 CEST | 49713 | 443 | 192.168.2.5 | 142.250.9.105 |
Apr 25, 2024 15:27:42.121829033 CEST | 443 | 49713 | 142.250.9.105 | 192.168.2.5 |
Apr 25, 2024 15:27:42.391239882 CEST | 49703 | 443 | 192.168.2.5 | 23.1.237.91 |
Apr 25, 2024 15:27:42.391350985 CEST | 49703 | 443 | 192.168.2.5 | 23.1.237.91 |
Apr 25, 2024 15:27:42.393348932 CEST | 49720 | 443 | 192.168.2.5 | 23.1.237.91 |
Apr 25, 2024 15:27:42.393378973 CEST | 443 | 49720 | 23.1.237.91 | 192.168.2.5 |
Apr 25, 2024 15:27:42.393634081 CEST | 49720 | 443 | 192.168.2.5 | 23.1.237.91 |
Apr 25, 2024 15:27:42.395605087 CEST | 49720 | 443 | 192.168.2.5 | 23.1.237.91 |
Apr 25, 2024 15:27:42.395618916 CEST | 443 | 49720 | 23.1.237.91 | 192.168.2.5 |
Apr 25, 2024 15:27:42.548880100 CEST | 443 | 49703 | 23.1.237.91 | 192.168.2.5 |
Apr 25, 2024 15:27:42.548896074 CEST | 443 | 49703 | 23.1.237.91 | 192.168.2.5 |
Apr 25, 2024 15:27:42.723750114 CEST | 443 | 49720 | 23.1.237.91 | 192.168.2.5 |
Apr 25, 2024 15:27:42.723820925 CEST | 49720 | 443 | 192.168.2.5 | 23.1.237.91 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 25, 2024 15:27:27.866055012 CEST | 53 | 57838 | 1.1.1.1 | 192.168.2.5 |
Apr 25, 2024 15:27:27.868009090 CEST | 53 | 54268 | 1.1.1.1 | 192.168.2.5 |
Apr 25, 2024 15:27:28.506107092 CEST | 53 | 65515 | 1.1.1.1 | 192.168.2.5 |
Apr 25, 2024 15:27:29.254352093 CEST | 61632 | 53 | 192.168.2.5 | 1.1.1.1 |
Apr 25, 2024 15:27:29.254679918 CEST | 63680 | 53 | 192.168.2.5 | 1.1.1.1 |
Apr 25, 2024 15:27:29.367074966 CEST | 53 | 61632 | 1.1.1.1 | 192.168.2.5 |
Apr 25, 2024 15:27:29.368880987 CEST | 53 | 63680 | 1.1.1.1 | 192.168.2.5 |
Apr 25, 2024 15:27:30.145365953 CEST | 57171 | 53 | 192.168.2.5 | 1.1.1.1 |
Apr 25, 2024 15:27:30.145495892 CEST | 51488 | 53 | 192.168.2.5 | 1.1.1.1 |
Apr 25, 2024 15:27:30.256508112 CEST | 53 | 57171 | 1.1.1.1 | 192.168.2.5 |
Apr 25, 2024 15:27:30.256525040 CEST | 53 | 51488 | 1.1.1.1 | 192.168.2.5 |
Apr 25, 2024 15:27:45.479212999 CEST | 53 | 63807 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Apr 25, 2024 15:27:29.254352093 CEST | 192.168.2.5 | 1.1.1.1 | 0x3fb2 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 25, 2024 15:27:29.254679918 CEST | 192.168.2.5 | 1.1.1.1 | 0xfc96 | Standard query (0) | 65 | IN (0x0001) | false | |
Apr 25, 2024 15:27:30.145365953 CEST | 192.168.2.5 | 1.1.1.1 | 0x82e6 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 25, 2024 15:27:30.145495892 CEST | 192.168.2.5 | 1.1.1.1 | 0x3016 | Standard query (0) | 65 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Apr 25, 2024 15:27:29.367074966 CEST | 1.1.1.1 | 192.168.2.5 | 0x3fb2 | No error (0) | 34.225.160.212 | A (IP address) | IN (0x0001) | false | ||
Apr 25, 2024 15:27:29.367074966 CEST | 1.1.1.1 | 192.168.2.5 | 0x3fb2 | No error (0) | 18.213.228.248 | A (IP address) | IN (0x0001) | false | ||
Apr 25, 2024 15:27:29.367074966 CEST | 1.1.1.1 | 192.168.2.5 | 0x3fb2 | No error (0) | 44.196.32.222 | A (IP address) | IN (0x0001) | false | ||
Apr 25, 2024 15:27:30.256508112 CEST | 1.1.1.1 | 192.168.2.5 | 0x82e6 | No error (0) | 142.250.9.105 | A (IP address) | IN (0x0001) | false | ||
Apr 25, 2024 15:27:30.256508112 CEST | 1.1.1.1 | 192.168.2.5 | 0x82e6 | No error (0) | 142.250.9.104 | A (IP address) | IN (0x0001) | false | ||
Apr 25, 2024 15:27:30.256508112 CEST | 1.1.1.1 | 192.168.2.5 | 0x82e6 | No error (0) | 142.250.9.106 | A (IP address) | IN (0x0001) | false | ||
Apr 25, 2024 15:27:30.256508112 CEST | 1.1.1.1 | 192.168.2.5 | 0x82e6 | No error (0) | 142.250.9.99 | A (IP address) | IN (0x0001) | false | ||
Apr 25, 2024 15:27:30.256508112 CEST | 1.1.1.1 | 192.168.2.5 | 0x82e6 | No error (0) | 142.250.9.103 | A (IP address) | IN (0x0001) | false | ||
Apr 25, 2024 15:27:30.256508112 CEST | 1.1.1.1 | 192.168.2.5 | 0x82e6 | No error (0) | 142.250.9.147 | A (IP address) | IN (0x0001) | false | ||
Apr 25, 2024 15:27:30.256525040 CEST | 1.1.1.1 | 192.168.2.5 | 0x3016 | No error (0) | 65 | IN (0x0001) | false | |||
Apr 25, 2024 15:27:42.153780937 CEST | 1.1.1.1 | 192.168.2.5 | 0xec36 | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 25, 2024 15:27:42.153780937 CEST | 1.1.1.1 | 192.168.2.5 | 0xec36 | No error (0) | 192.229.211.108 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49710 | 34.225.160.212 | 443 | 5492 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-04-25 13:27:29 UTC | 693 | OUT | |
2024-04-25 13:27:29 UTC | 329 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 15:27:21 |
Start date: | 25/04/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 1 |
Start time: | 15:27:24 |
Start date: | 25/04/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 3 |
Start time: | 15:27:28 |
Start date: | 25/04/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |