Windows
Analysis Report
https://na4.documents.adobe.com/public/esign?tsid=CBFCIBAACBSCTBABDUAAABACAABAAUDwspAy7QD502hzyLJ-SpwR93P4-0eg6vJM0VREGnzXDSBC2EmgJ8Ke7lx4i8Fs1P_-XwgT4dkJc1NSUtHiaYWpksON0WEUEjoNtLceqGZiHSKnGrgJcEvOmnS6jvBWT&
Overview
General Information
Detection
Score: | 0 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- chrome.exe (PID: 2840 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 3992 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2040 --fi eld-trial- handle=197 6,i,485632 2800474458 559,147785 9766740776 8629,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- chrome.exe (PID: 6464 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://na4.d ocuments.a dobe.com/p ublic/esig n?tsid=CBF CIBAACBSCT BABDUAAABA CAABAAUDws pAy7QD502h zyLJ-SpwR9 3P4-0eg6vJ M0VREGnzXD SBC2EmgJ8K e7lx4i8Fs1 P_-XwgT4dk Jc1NSUtHia YWpksON0WE UEjoNtLceq GZiHSKnGrg JcEvOmnS6j vBWT&" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Window detected: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Process Injection | 1 Process Injection | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 1 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
1% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse | ||
0% | Virustotal | Browse | ||
0% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Virustotal | Browse |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
bg.microsoft.map.fastly.net | 199.232.214.172 | true | false |
| unknown |
www.google.com | 64.233.177.106 | true | false | high | |
secure.na4dc2.echosign.com | 44.234.124.131 | true | false | high | |
fp2e7a.wpc.phicdn.net | 192.229.211.108 | true | false |
| unknown |
use.typekit.net | unknown | unknown | false | high | |
secure.na4.echocdn.com | unknown | unknown | false |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
64.233.177.106 | www.google.com | United States | 15169 | GOOGLEUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false |
IP |
---|
192.168.2.4 |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1431776 |
Start date and time: | 2024-04-25 18:59:15 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 5s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | https://na4.documents.adobe.com/public/esign?tsid=CBFCIBAACBSCTBABDUAAABACAABAAUDwspAy7QD502hzyLJ-SpwR93P4-0eg6vJM0VREGnzXDSBC2EmgJ8Ke7lx4i8Fs1P_-XwgT4dkJc1NSUtHiaYWpksON0WEUEjoNtLceqGZiHSKnGrgJcEvOmnS6jvBWT& |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean0.win@16/16@6/3 |
EGA Information: | Failed |
HCA Information: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 74.125.138.94, 64.233.177.101, 64.233.177.102, 64.233.177.113, 64.233.177.139, 64.233.177.100, 64.233.177.138, 108.177.122.84, 34.104.35.123, 44.234.124.133, 44.234.124.132, 44.234.124.131, 96.7.225.18, 96.7.225.11, 20.114.59.183, 23.40.205.73, 23.40.205.40, 199.232.214.172, 192.229.211.108, 20.242.39.171, 20.3.187.198, 172.253.124.94
- Excluded domains from analysis (whitelisted): fs.microsoft.com, accounts.google.com, stls.adobe.com-cn.edgesuite.net.globalredir.akadns.net, slscr.update.microsoft.com, clientservices.googleapis.com, ctldl.windowsupdate.com, wu-bg-shim.trafficmanager.net, stls.adobe.com-cn.edgesuite.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, na4.documents.adobe.com, use-stls.adobe.com.edgesuite.net, ocsp.digicert.com, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, a1815.dscr.akamai.net, sls.update.microsoft.com, update.googleapis.com, clients.l.google.com, www.adobe.com, a1988.dscg1.akamai.net, glb.sls.prod.dcat.dsp.trafficmanager.net
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtSetInformationFile calls found.
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 5632 |
Entropy (8bit): | 5.320327818450802 |
Encrypted: | false |
SSDEEP: | 48:4uTVQW0Q/tCkJquYzg55551T5lU6wVAnq1pDlIVKynCFfludpYmCSJFfeuEtMVuJ:LT6g/ZuWx1t+VAnq1pDlKCXpSJ+WkaAF |
MD5: | 4B3C669E1B6B635DE4B64BE0A1157D42 |
SHA1: | 65DE7AB428CC08DF3DF028181ACDC53E10014AC7 |
SHA-256: | 0AFA57E1DD77793527F83DD90004CA5E09647B5B5B08FF7D02A723C9468BFE4C |
SHA-512: | 80A40B7B46D9491ADC8C3CCF8F2B72EA89FFC00A465F07ED2526F3C1B1063805F0C0A0B3AC43664B538732E9DA415DD87F07A36BD264A5B20DB848849FA1FA88 |
Malicious: | false |
Reputation: | low |
URL: | https://secure.na4.echocdn.com/resource/1730650309/bundles/toast-message.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 77493 |
Entropy (8bit): | 5.781608461985365 |
Encrypted: | false |
SSDEEP: | 768:fKF2+CV2Ub5meb+m88sbxeQ6gdKV7FaeCvVstAliVNgdKV7Uf3GhvdYFhvdYwhvZ:fK3CX8plkFWkFUv |
MD5: | DC8D34966443C527E00358DFF0772799 |
SHA1: | 34ACCA8C275A61A80350038A6F0C92C6489692E7 |
SHA-256: | 9BEB3A18B34136438721D95B3FCB843BAA524B9031B5E770028E93DE9C9ACC7B |
SHA-512: | 808A65C7A124695A6D5A94C438AF051F0993ADBA4A74F9675ACE704F02DDD46130D14533BD848166878EE49F3D8D9533CEF1031177281010E23D9FCC2EB1230E |
Malicious: | false |
Reputation: | low |
URL: | https://secure.na4.echocdn.com/resource/1715228063/bundles/esignResponsive.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 17476 |
Entropy (8bit): | 5.5562021281521154 |
Encrypted: | false |
SSDEEP: | 384:mIHI2hpIgIVsUGiRm4lIeU4iDFeFs2NdFJsQF+i:mIHg7GiRm4X0JqsG7Ui |
MD5: | 80AA1425E8422CAEF6A4DEFFDA2F5A38 |
SHA1: | BCADA77A87D8F10F1CA4ADE8D393B2AD9988AD13 |
SHA-256: | 1B3329DED46F847B991CE76CBD6252FC0322BED2ADA2535143B58543109E271D |
SHA-512: | 9DD29547A084858ACD7ADA9E451185983F8BD1B5C1D35DDA15A6BB52CA7D3B65DD8A604BDAE580B000748481DC71A224A0EAE7006C576F50F5EE8087C3B1DF2D |
Malicious: | false |
Reputation: | low |
URL: | https://use.typekit.net/fqg8osp.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 135602 |
Entropy (8bit): | 5.052432544669672 |
Encrypted: | false |
SSDEEP: | 1536:Po36puuzWBlflZQspIfqPQ3ZiRFjBRvxm+DRarYf2LI2IlIRIIIwWEQ1lePh:Po36putBlflRPRXRH2LI2IlIRIIIwWy |
MD5: | 2356B03B907A7EC07D8116FB0A2050B0 |
SHA1: | 0B22F9D97B5DA8501FF22FC42EFE203883625BDF |
SHA-256: | 524F0F5D0AE32D1DDFFBA2C0AB8D530D8EE634CD5259AF326FBF6B6557F7372B |
SHA-512: | 16C9A9E6E2469A2398BD5C62BF6EBEDB1DCCC19A9BAD4FBF3A4EBCD8094619A9964FDB727703D521097E5C2817881D52997EAB8A6A1AFF313EF800D20A56BA17 |
Malicious: | false |
Reputation: | low |
URL: | https://secure.na4.echocdn.com/resource/1097130768/bundles/esignJS.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 1210636 |
Entropy (8bit): | 5.4368448012650505 |
Encrypted: | false |
SSDEEP: | 24576:nhqsx5yEH5i+1EaCGRTK16Asebc1hPhYtVOSr0/9CyHmz0CK:hqIHH5i+1EaCGRTK16Asebc1hPhYtVOD |
MD5: | F9480B84F852C3B321A77E46310AF086 |
SHA1: | 7D9C2D3988D665979EE7A361B2F7596CBA6A34C4 |
SHA-256: | F4A70684164143E8EA469C2E1C6CABA92501BCE9B243B5FD047CC677DF9DD340 |
SHA-512: | B6B4A9DB89D19F933174B45685D3585C9AC6B1D13ECD93E3E4C1450718EF914DDBD3766E09080CCF3216827AE6E05935CF9D330601A3FD581A0C0522AC4EF2F0 |
Malicious: | false |
Reputation: | low |
URL: | https://secure.na4.echocdn.com/resource/1248589626.en_US/bundles/app-esign.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 936918 |
Entropy (8bit): | 5.519080124550211 |
Encrypted: | false |
SSDEEP: | 12288:50jTWVt3qz0Kcl42KOusstfuqr0VHbz0JPHihkUgxC:50mHqz0JlvusstfuqoVHbz0JPHiKNs |
MD5: | D5BC5F9EFA5502DB137917C2393A6235 |
SHA1: | A15AB65C8DA9B29B25AFE6C5AEDB6F33093B5760 |
SHA-256: | 063BD760F04093F287BB7CD04EAF06E4C649F80D5C09F3BEA8E37858E39FB79C |
SHA-512: | 7FA94257090FC1C95AB03F4689664BFDABA78AC05B5BB9C08FDADBFCABBA7C22192CCD4619D4D351323CFA647EED61FB7F50B59843052453D230B7CEE7174ED5 |
Malicious: | false |
Reputation: | low |
URL: | https://secure.na4.echocdn.com/resource/372557605.en_US/bundles/app-main.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 369897 |
Entropy (8bit): | 5.444028530568237 |
Encrypted: | false |
SSDEEP: | 3072:ZXKElkD8gK1C8lizh3ODBvOkBBO/mCs4QAEf2tEfVfs2i8:ZXI8gK1C8lizh3ODBvOkBBOOCh+h9i8 |
MD5: | D2836BB701B215B7F6CC1A65F7137FFD |
SHA1: | 5A0C8062616E2B4E2DC55B54AD7BA333F56EA19B |
SHA-256: | EE1EEF26F4071F30477DBA5B1BDD77D90B3B1A8EAEF85AA55E2317C9F26982DB |
SHA-512: | 8381426D335EBB379145E85093CF2D7D854B288083AE86CCE52AFA84E4CD1AE6C8D4166A7F93816EEFCE769EE20B0FEC1644D343B83F431FA57766BFA84064E4 |
Malicious: | false |
Reputation: | low |
URL: | https://secure.na4.echocdn.com/resource/N1614084111/bundles/app-theme.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 488483 |
Entropy (8bit): | 5.103272772215297 |
Encrypted: | false |
SSDEEP: | 3072:bivxgPYrcTjVqodlvK3tfg6NtOJPGUdF4PHmTvFfERO8OA:Wvh6jVqSvEtfgWIJPVdF4vqvFf+OA |
MD5: | 26E29F0C91622E83BD33DEDF2C7FF0CA |
SHA1: | 645A266B9979279786BD273F6084166736A1FF10 |
SHA-256: | 3567438FF892CE3947216B7648C506926CFCD080E577F1C46CBE1D87DF41040B |
SHA-512: | 741E1F978D6CCD3302D1710133B36880D7FD3DFBCE300AD004BC2274C0BEB8152B1816472EB3D8474655BBCF5DBDC06ED1EE3E581750B9DA75247AA917B485FC |
Malicious: | false |
Reputation: | low |
URL: | https://secure.na4.echocdn.com/resource/N2068235899.en_US/bundles/translations.js |
Preview: |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 25, 2024 18:59:57.174248934 CEST | 49675 | 443 | 192.168.2.4 | 173.222.162.32 |
Apr 25, 2024 18:59:57.955497980 CEST | 49678 | 443 | 192.168.2.4 | 104.46.162.224 |
Apr 25, 2024 19:00:06.784132957 CEST | 49675 | 443 | 192.168.2.4 | 173.222.162.32 |
Apr 25, 2024 19:00:07.933562994 CEST | 49739 | 443 | 192.168.2.4 | 64.233.177.106 |
Apr 25, 2024 19:00:07.933598042 CEST | 443 | 49739 | 64.233.177.106 | 192.168.2.4 |
Apr 25, 2024 19:00:07.933671951 CEST | 49739 | 443 | 192.168.2.4 | 64.233.177.106 |
Apr 25, 2024 19:00:07.934094906 CEST | 49739 | 443 | 192.168.2.4 | 64.233.177.106 |
Apr 25, 2024 19:00:07.934103966 CEST | 443 | 49739 | 64.233.177.106 | 192.168.2.4 |
Apr 25, 2024 19:00:08.166290045 CEST | 443 | 49739 | 64.233.177.106 | 192.168.2.4 |
Apr 25, 2024 19:00:08.166729927 CEST | 49739 | 443 | 192.168.2.4 | 64.233.177.106 |
Apr 25, 2024 19:00:08.166757107 CEST | 443 | 49739 | 64.233.177.106 | 192.168.2.4 |
Apr 25, 2024 19:00:08.168237925 CEST | 443 | 49739 | 64.233.177.106 | 192.168.2.4 |
Apr 25, 2024 19:00:08.168294907 CEST | 49739 | 443 | 192.168.2.4 | 64.233.177.106 |
Apr 25, 2024 19:00:08.170380116 CEST | 49739 | 443 | 192.168.2.4 | 64.233.177.106 |
Apr 25, 2024 19:00:08.170459986 CEST | 443 | 49739 | 64.233.177.106 | 192.168.2.4 |
Apr 25, 2024 19:00:08.210500956 CEST | 49739 | 443 | 192.168.2.4 | 64.233.177.106 |
Apr 25, 2024 19:00:08.210540056 CEST | 443 | 49739 | 64.233.177.106 | 192.168.2.4 |
Apr 25, 2024 19:00:08.250727892 CEST | 49739 | 443 | 192.168.2.4 | 64.233.177.106 |
Apr 25, 2024 19:00:09.518237114 CEST | 49740 | 443 | 192.168.2.4 | 23.46.200.91 |
Apr 25, 2024 19:00:09.518287897 CEST | 443 | 49740 | 23.46.200.91 | 192.168.2.4 |
Apr 25, 2024 19:00:09.518486023 CEST | 49740 | 443 | 192.168.2.4 | 23.46.200.91 |
Apr 25, 2024 19:00:09.532835007 CEST | 49740 | 443 | 192.168.2.4 | 23.46.200.91 |
Apr 25, 2024 19:00:09.532867908 CEST | 443 | 49740 | 23.46.200.91 | 192.168.2.4 |
Apr 25, 2024 19:00:09.764673948 CEST | 443 | 49740 | 23.46.200.91 | 192.168.2.4 |
Apr 25, 2024 19:00:09.764818907 CEST | 49740 | 443 | 192.168.2.4 | 23.46.200.91 |
Apr 25, 2024 19:00:09.772903919 CEST | 49740 | 443 | 192.168.2.4 | 23.46.200.91 |
Apr 25, 2024 19:00:09.772922993 CEST | 443 | 49740 | 23.46.200.91 | 192.168.2.4 |
Apr 25, 2024 19:00:09.773422956 CEST | 443 | 49740 | 23.46.200.91 | 192.168.2.4 |
Apr 25, 2024 19:00:09.815562963 CEST | 49740 | 443 | 192.168.2.4 | 23.46.200.91 |
Apr 25, 2024 19:00:09.845079899 CEST | 49740 | 443 | 192.168.2.4 | 23.46.200.91 |
Apr 25, 2024 19:00:09.888132095 CEST | 443 | 49740 | 23.46.200.91 | 192.168.2.4 |
Apr 25, 2024 19:00:09.979526997 CEST | 443 | 49740 | 23.46.200.91 | 192.168.2.4 |
Apr 25, 2024 19:00:09.979675055 CEST | 443 | 49740 | 23.46.200.91 | 192.168.2.4 |
Apr 25, 2024 19:00:09.979724884 CEST | 49740 | 443 | 192.168.2.4 | 23.46.200.91 |
Apr 25, 2024 19:00:09.979865074 CEST | 49740 | 443 | 192.168.2.4 | 23.46.200.91 |
Apr 25, 2024 19:00:09.979887009 CEST | 443 | 49740 | 23.46.200.91 | 192.168.2.4 |
Apr 25, 2024 19:00:09.979923010 CEST | 49740 | 443 | 192.168.2.4 | 23.46.200.91 |
Apr 25, 2024 19:00:09.979928017 CEST | 443 | 49740 | 23.46.200.91 | 192.168.2.4 |
Apr 25, 2024 19:00:10.028811932 CEST | 49741 | 443 | 192.168.2.4 | 23.46.200.91 |
Apr 25, 2024 19:00:10.028877974 CEST | 443 | 49741 | 23.46.200.91 | 192.168.2.4 |
Apr 25, 2024 19:00:10.028945923 CEST | 49741 | 443 | 192.168.2.4 | 23.46.200.91 |
Apr 25, 2024 19:00:10.029448986 CEST | 49741 | 443 | 192.168.2.4 | 23.46.200.91 |
Apr 25, 2024 19:00:10.029468060 CEST | 443 | 49741 | 23.46.200.91 | 192.168.2.4 |
Apr 25, 2024 19:00:10.259649038 CEST | 443 | 49741 | 23.46.200.91 | 192.168.2.4 |
Apr 25, 2024 19:00:10.259758949 CEST | 49741 | 443 | 192.168.2.4 | 23.46.200.91 |
Apr 25, 2024 19:00:10.284864902 CEST | 49741 | 443 | 192.168.2.4 | 23.46.200.91 |
Apr 25, 2024 19:00:10.284913063 CEST | 443 | 49741 | 23.46.200.91 | 192.168.2.4 |
Apr 25, 2024 19:00:10.285257101 CEST | 443 | 49741 | 23.46.200.91 | 192.168.2.4 |
Apr 25, 2024 19:00:10.288852930 CEST | 49741 | 443 | 192.168.2.4 | 23.46.200.91 |
Apr 25, 2024 19:00:10.332123995 CEST | 443 | 49741 | 23.46.200.91 | 192.168.2.4 |
Apr 25, 2024 19:00:10.498723984 CEST | 443 | 49741 | 23.46.200.91 | 192.168.2.4 |
Apr 25, 2024 19:00:10.498820066 CEST | 443 | 49741 | 23.46.200.91 | 192.168.2.4 |
Apr 25, 2024 19:00:10.498995066 CEST | 49741 | 443 | 192.168.2.4 | 23.46.200.91 |
Apr 25, 2024 19:00:10.499655962 CEST | 49741 | 443 | 192.168.2.4 | 23.46.200.91 |
Apr 25, 2024 19:00:10.499705076 CEST | 443 | 49741 | 23.46.200.91 | 192.168.2.4 |
Apr 25, 2024 19:00:10.499735117 CEST | 49741 | 443 | 192.168.2.4 | 23.46.200.91 |
Apr 25, 2024 19:00:10.499749899 CEST | 443 | 49741 | 23.46.200.91 | 192.168.2.4 |
Apr 25, 2024 19:00:18.158098936 CEST | 443 | 49739 | 64.233.177.106 | 192.168.2.4 |
Apr 25, 2024 19:00:18.158281088 CEST | 443 | 49739 | 64.233.177.106 | 192.168.2.4 |
Apr 25, 2024 19:00:18.158324003 CEST | 49739 | 443 | 192.168.2.4 | 64.233.177.106 |
Apr 25, 2024 19:00:19.070549965 CEST | 49739 | 443 | 192.168.2.4 | 64.233.177.106 |
Apr 25, 2024 19:00:19.070581913 CEST | 443 | 49739 | 64.233.177.106 | 192.168.2.4 |
Apr 25, 2024 19:01:07.877715111 CEST | 49760 | 443 | 192.168.2.4 | 64.233.177.106 |
Apr 25, 2024 19:01:07.877758980 CEST | 443 | 49760 | 64.233.177.106 | 192.168.2.4 |
Apr 25, 2024 19:01:07.878058910 CEST | 49760 | 443 | 192.168.2.4 | 64.233.177.106 |
Apr 25, 2024 19:01:07.878058910 CEST | 49760 | 443 | 192.168.2.4 | 64.233.177.106 |
Apr 25, 2024 19:01:07.878101110 CEST | 443 | 49760 | 64.233.177.106 | 192.168.2.4 |
Apr 25, 2024 19:01:08.108359098 CEST | 443 | 49760 | 64.233.177.106 | 192.168.2.4 |
Apr 25, 2024 19:01:08.108648062 CEST | 49760 | 443 | 192.168.2.4 | 64.233.177.106 |
Apr 25, 2024 19:01:08.108669996 CEST | 443 | 49760 | 64.233.177.106 | 192.168.2.4 |
Apr 25, 2024 19:01:08.109754086 CEST | 443 | 49760 | 64.233.177.106 | 192.168.2.4 |
Apr 25, 2024 19:01:08.110285997 CEST | 49760 | 443 | 192.168.2.4 | 64.233.177.106 |
Apr 25, 2024 19:01:08.110459089 CEST | 443 | 49760 | 64.233.177.106 | 192.168.2.4 |
Apr 25, 2024 19:01:08.162797928 CEST | 49760 | 443 | 192.168.2.4 | 64.233.177.106 |
Apr 25, 2024 19:01:16.878746033 CEST | 49723 | 80 | 192.168.2.4 | 23.40.205.26 |
Apr 25, 2024 19:01:16.878866911 CEST | 49724 | 80 | 192.168.2.4 | 23.40.205.9 |
Apr 25, 2024 19:01:16.988619089 CEST | 80 | 49723 | 23.40.205.26 | 192.168.2.4 |
Apr 25, 2024 19:01:16.989617109 CEST | 49723 | 80 | 192.168.2.4 | 23.40.205.26 |
Apr 25, 2024 19:01:17.030107021 CEST | 80 | 49724 | 23.40.205.9 | 192.168.2.4 |
Apr 25, 2024 19:01:17.034759045 CEST | 80 | 49724 | 23.40.205.9 | 192.168.2.4 |
Apr 25, 2024 19:01:17.035051107 CEST | 49724 | 80 | 192.168.2.4 | 23.40.205.9 |
Apr 25, 2024 19:01:18.119491100 CEST | 443 | 49760 | 64.233.177.106 | 192.168.2.4 |
Apr 25, 2024 19:01:18.119662046 CEST | 443 | 49760 | 64.233.177.106 | 192.168.2.4 |
Apr 25, 2024 19:01:18.119724035 CEST | 49760 | 443 | 192.168.2.4 | 64.233.177.106 |
Apr 25, 2024 19:01:19.229090929 CEST | 49760 | 443 | 192.168.2.4 | 64.233.177.106 |
Apr 25, 2024 19:01:19.229130983 CEST | 443 | 49760 | 64.233.177.106 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 25, 2024 19:00:04.856197119 CEST | 53 | 53576 | 1.1.1.1 | 192.168.2.4 |
Apr 25, 2024 19:00:05.020534039 CEST | 53 | 54832 | 1.1.1.1 | 192.168.2.4 |
Apr 25, 2024 19:00:05.646405935 CEST | 53 | 64472 | 1.1.1.1 | 192.168.2.4 |
Apr 25, 2024 19:00:06.762111902 CEST | 53 | 56914 | 1.1.1.1 | 192.168.2.4 |
Apr 25, 2024 19:00:07.821460962 CEST | 50948 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 25, 2024 19:00:07.821710110 CEST | 57101 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 25, 2024 19:00:07.931924105 CEST | 53 | 50948 | 1.1.1.1 | 192.168.2.4 |
Apr 25, 2024 19:00:07.931984901 CEST | 53 | 57101 | 1.1.1.1 | 192.168.2.4 |
Apr 25, 2024 19:00:12.431725025 CEST | 60360 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 25, 2024 19:00:12.431971073 CEST | 61583 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 25, 2024 19:00:12.542994976 CEST | 53 | 60360 | 1.1.1.1 | 192.168.2.4 |
Apr 25, 2024 19:00:12.546530962 CEST | 53 | 61583 | 1.1.1.1 | 192.168.2.4 |
Apr 25, 2024 19:00:20.008121967 CEST | 55723 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 25, 2024 19:00:20.009077072 CEST | 54549 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 25, 2024 19:00:22.680861950 CEST | 53 | 55835 | 1.1.1.1 | 192.168.2.4 |
Apr 25, 2024 19:00:28.485220909 CEST | 138 | 138 | 192.168.2.4 | 192.168.2.255 |
Apr 25, 2024 19:00:41.566273928 CEST | 53 | 52289 | 1.1.1.1 | 192.168.2.4 |
Apr 25, 2024 19:01:04.037058115 CEST | 53 | 63696 | 1.1.1.1 | 192.168.2.4 |
Apr 25, 2024 19:01:04.702665091 CEST | 53 | 50828 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Apr 25, 2024 19:00:07.821460962 CEST | 192.168.2.4 | 1.1.1.1 | 0xadd4 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 25, 2024 19:00:07.821710110 CEST | 192.168.2.4 | 1.1.1.1 | 0xf481 | Standard query (0) | 65 | IN (0x0001) | false | |
Apr 25, 2024 19:00:12.431725025 CEST | 192.168.2.4 | 1.1.1.1 | 0xf118 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 25, 2024 19:00:12.431971073 CEST | 192.168.2.4 | 1.1.1.1 | 0x18d1 | Standard query (0) | 65 | IN (0x0001) | false | |
Apr 25, 2024 19:00:20.008121967 CEST | 192.168.2.4 | 1.1.1.1 | 0xc84a | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 25, 2024 19:00:20.009077072 CEST | 192.168.2.4 | 1.1.1.1 | 0xc37c | Standard query (0) | 65 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Apr 25, 2024 19:00:07.931924105 CEST | 1.1.1.1 | 192.168.2.4 | 0xadd4 | No error (0) | 64.233.177.106 | A (IP address) | IN (0x0001) | false | ||
Apr 25, 2024 19:00:07.931924105 CEST | 1.1.1.1 | 192.168.2.4 | 0xadd4 | No error (0) | 64.233.177.103 | A (IP address) | IN (0x0001) | false | ||
Apr 25, 2024 19:00:07.931924105 CEST | 1.1.1.1 | 192.168.2.4 | 0xadd4 | No error (0) | 64.233.177.105 | A (IP address) | IN (0x0001) | false | ||
Apr 25, 2024 19:00:07.931924105 CEST | 1.1.1.1 | 192.168.2.4 | 0xadd4 | No error (0) | 64.233.177.104 | A (IP address) | IN (0x0001) | false | ||
Apr 25, 2024 19:00:07.931924105 CEST | 1.1.1.1 | 192.168.2.4 | 0xadd4 | No error (0) | 64.233.177.147 | A (IP address) | IN (0x0001) | false | ||
Apr 25, 2024 19:00:07.931924105 CEST | 1.1.1.1 | 192.168.2.4 | 0xadd4 | No error (0) | 64.233.177.99 | A (IP address) | IN (0x0001) | false | ||
Apr 25, 2024 19:00:07.931984901 CEST | 1.1.1.1 | 192.168.2.4 | 0xf481 | No error (0) | 65 | IN (0x0001) | false | |||
Apr 25, 2024 19:00:12.542994976 CEST | 1.1.1.1 | 192.168.2.4 | 0xf118 | No error (0) | secure.na4dc2.echosign.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 25, 2024 19:00:12.542994976 CEST | 1.1.1.1 | 192.168.2.4 | 0xf118 | No error (0) | 44.234.124.131 | A (IP address) | IN (0x0001) | false | ||
Apr 25, 2024 19:00:12.542994976 CEST | 1.1.1.1 | 192.168.2.4 | 0xf118 | No error (0) | 44.234.124.133 | A (IP address) | IN (0x0001) | false | ||
Apr 25, 2024 19:00:12.542994976 CEST | 1.1.1.1 | 192.168.2.4 | 0xf118 | No error (0) | 44.234.124.132 | A (IP address) | IN (0x0001) | false | ||
Apr 25, 2024 19:00:12.546530962 CEST | 1.1.1.1 | 192.168.2.4 | 0x18d1 | No error (0) | secure.na4dc2.echosign.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 25, 2024 19:00:20.118344069 CEST | 1.1.1.1 | 192.168.2.4 | 0xc84a | No error (0) | use-stls.adobe.com.edgesuite.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 25, 2024 19:00:20.119587898 CEST | 1.1.1.1 | 192.168.2.4 | 0xc37c | No error (0) | use-stls.adobe.com.edgesuite.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 25, 2024 19:00:21.061959982 CEST | 1.1.1.1 | 192.168.2.4 | 0x43be | No error (0) | 199.232.214.172 | A (IP address) | IN (0x0001) | false | ||
Apr 25, 2024 19:00:21.061959982 CEST | 1.1.1.1 | 192.168.2.4 | 0x43be | No error (0) | 199.232.210.172 | A (IP address) | IN (0x0001) | false | ||
Apr 25, 2024 19:00:21.484317064 CEST | 1.1.1.1 | 192.168.2.4 | 0xe467 | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 25, 2024 19:00:21.484317064 CEST | 1.1.1.1 | 192.168.2.4 | 0xe467 | No error (0) | 192.229.211.108 | A (IP address) | IN (0x0001) | false | ||
Apr 25, 2024 19:00:34.474406958 CEST | 1.1.1.1 | 192.168.2.4 | 0x101a | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 25, 2024 19:00:34.474406958 CEST | 1.1.1.1 | 192.168.2.4 | 0x101a | No error (0) | 192.229.211.108 | A (IP address) | IN (0x0001) | false | ||
Apr 25, 2024 19:00:56.685425997 CEST | 1.1.1.1 | 192.168.2.4 | 0xbd1 | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 25, 2024 19:00:56.685425997 CEST | 1.1.1.1 | 192.168.2.4 | 0xbd1 | No error (0) | 192.229.211.108 | A (IP address) | IN (0x0001) | false | ||
Apr 25, 2024 19:01:17.768954992 CEST | 1.1.1.1 | 192.168.2.4 | 0xf452 | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 25, 2024 19:01:17.768954992 CEST | 1.1.1.1 | 192.168.2.4 | 0xf452 | No error (0) | 192.229.211.108 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49740 | 23.46.200.91 | 443 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-04-25 17:00:09 UTC | 161 | OUT | |
2024-04-25 17:00:09 UTC | 467 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49741 | 23.46.200.91 | 443 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-04-25 17:00:10 UTC | 239 | OUT | |
2024-04-25 17:00:10 UTC | 531 | IN | |
2024-04-25 17:00:10 UTC | 55 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 18:59:59 |
Start date: | 25/04/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff76e190000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 1 |
Start time: | 19:00:01 |
Start date: | 25/04/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff76e190000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 3 |
Start time: | 19:00:05 |
Start date: | 25/04/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff76e190000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |