Windows
Analysis Report
https://ipfs.io/ipfs/QmY916BLaBAS5CASVhqaYfUNaKdYQkk9oBJGCSELFyw3yr/
Overview
General Information
Detection
Score: | 72 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
chrome.exe (PID: 4424 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) chrome.exe (PID: 1100 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2032 --fi eld-trial- handle=196 0,i,394649 0982391475 0,10538557 8283716482 ,262144 -- disable-fe atures=Opt imizationG uideModelD ownloading ,Optimizat ionHints,O ptimizatio nHintsFetc hing,Optim izationTar getPredict ion /prefe tch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
chrome.exe (PID: 5972 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://ipfs. io/ipfs/Qm Y916BLaBAS 5CASVhqaYf UNaKdYQkk9 oBJGCSELFy w3yr/" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_HtmlPhish_10 | Yara detected HtmlPhish_10 | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_HtmlPhish_10 | Yara detected HtmlPhish_10 | Joe Security | ||
JoeSecurity_HtmlPhish_10 | Yara detected HtmlPhish_10 | Joe Security |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: |
Phishing |
---|
Source: | Joe Sandbox AI: | ||
Source: | Joe Sandbox AI: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: |
Source: | Window detected: |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 3 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 4 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 3 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | phishing |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
outlook.saicmotor.com | 58.246.133.9 | true | false | unknown | |
cdnjs.cloudflare.com | 104.17.25.14 | true | false | high | |
www.google.com | 142.250.185.164 | true | false | high | |
ipfs.io | 209.94.90.1 | true | false | high | |
autodiscover.saicmotor.com | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false |
| unknown | |
false |
| unknown | |
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
true |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.17.24.14 | unknown | United States | 13335 | CLOUDFLARENETUS | false | |
58.246.133.9 | outlook.saicmotor.com | China | 17621 | CNCGROUP-SHChinaUnicomShanghainetworkCN | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.250.185.164 | www.google.com | United States | 15169 | GOOGLEUS | false | |
209.94.90.1 | ipfs.io | United States | 40680 | PROTOCOLUS | false | |
104.17.25.14 | cdnjs.cloudflare.com | United States | 13335 | CLOUDFLARENETUS | false |
IP |
---|
192.168.2.7 |
192.168.2.4 |
192.168.2.5 |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1620540 |
Start date and time: | 2025-02-21 01:38:00 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 4s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | https://ipfs.io/ipfs/QmY916BLaBAS5CASVhqaYfUNaKdYQkk9oBJGCSELFyw3yr/ |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal72.phis.win@16/16@10/9 |
EGA Information: | Failed |
HCA Information: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 172.217.18.3, 142.250.181.238, 64.233.184.84, 142.250.185.142, 172.217.16.142, 216.58.206.78, 216.58.212.138, 142.250.185.234, 142.250.185.74, 172.217.16.202, 142.250.185.138, 142.250.186.170, 172.217.23.106, 172.217.18.10, 142.250.185.202, 142.250.184.234, 142.250.184.202, 142.250.185.106, 216.58.206.42, 142.250.181.234, 142.250.185.170, 172.217.16.138, 216.58.206.74, 72.247.153.162, 2.23.77.188, 172.217.18.14, 142.250.186.142, 142.250.184.206, 216.58.212.163, 142.250.72.110, 74.125.0.137, 2.19.106.160, 4.175.87.197, 13.107.246.45
- Excluded domains from analysis (whitelisted): fs.microsoft.com, accounts.google.com, content-autofill.googleapis.com, r4.sn-ab5l6nk6.gvt1.com, slscr.update.microsoft.com, otelrules.azureedge.net, ajax.googleapis.com, ctldl.windowsupdate.com, clientservices.googleapis.com, fe3cr.delivery.mp.microsoft.com, clients2.google.com, ocsp.digicert.com, edgedl.me.gvt1.com, redirector.gvt1.com, r4---sn-ab5l6nk6.gvt1.com, update.googleapis.com, clients.l.google.com
- Not all processes where analyzed, report is missing behavior information
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: https://ipfs.io/ipfs/QmY916BLaBAS5CASVhqaYfUNaKdYQkk9oBJGCSELFyw3yr/
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.983850918355748 |
Encrypted: | false |
SSDEEP: | 48:8KdNWTty0sHtidAKZdA19ehwiZUklqehQy+3:8qWh9qvy |
MD5: | 859172E0502B77800C073CCE93070911 |
SHA1: | B044CC0D4DA0760426764DEBCDCD158D3E764460 |
SHA-256: | F15AFE6D840593820966C1C363BACDB25C910BD11A1ECC0A03BEEACBB2F3938E |
SHA-512: | 82B0E1641937048B0081ADD3555C9BCB17F17531C8C57BC069A1C6D6DDC15D63AD8381DB163432CEDEE7162E65962B5D3E06E341970DB1B48C85711E26BADF80 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.9998186169889043 |
Encrypted: | false |
SSDEEP: | 48:8PdNWTty0sHtidAKZdA1weh/iZUkAQkqehfy+2:8TWh9g9QWy |
MD5: | 34612C87F1A0609F0A5DD16F18B1E270 |
SHA1: | FDE6CE1E30621A5039AD5B5AE08524DDA846DA63 |
SHA-256: | 28E4231FFB4CA9B3A259DBA5A73CB5D6546C956044339FE895A309DBD393CF59 |
SHA-512: | B8B64316811B97627C61ED854D08092ED8E7812167550F86D4971D95026015DE34A4E91DDDD3645CE3C45184EB4279EDA50F62EF1E632221572281EB8DCB8EF2 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2693 |
Entropy (8bit): | 4.00986873296039 |
Encrypted: | false |
SSDEEP: | 48:8xddNWTty0sHtidAKZdA14tseh7sFiZUkmgqeh7sVy+BX:8xdWh94njy |
MD5: | A1BC5C1764CED3C3D03A0CA0A1867CB3 |
SHA1: | C65B550BD54B7E8016A405A03D17BDE4C1EA7130 |
SHA-256: | 4AA889D27E98FA9CB1C5C665D9CA40462244B5A8FDFA48B248D8F8F408543A88 |
SHA-512: | DC92E4FDF6573ECC4647924097F6557FF4E26EF01D5802D47952D6533E79DBE5B5500B03A6D4E4A7FC832332B2D77C931DD7A181EBC392374F1A95BFBA8B3AD9 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.997351020496052 |
Encrypted: | false |
SSDEEP: | 48:8cdNWTty0sHtidAKZdA1vehDiZUkwqehLy+R:84Wh9rdy |
MD5: | F0A14C18519C23438455D41E950AC9CE |
SHA1: | 79D2F0032E24DDFE5D3C634AE7B757889B97C7D5 |
SHA-256: | 045F4CEB707EE5CA23107250980D6335BE79E8D87DCA0CBA3B4F3D053A2CD3E9 |
SHA-512: | C2A2183DB45A105C6C6CB892D20BB15F1563F7090752B6CD7CE022EE8DC8E15A3C165F3644C3C787FE0C282A1DC79F62924DD2F30D406E4474B677220D450D8D |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.988524019126753 |
Encrypted: | false |
SSDEEP: | 48:8kdNWTty0sHtidAKZdA1hehBiZUk1W1qehJy+C:8gWh9r9py |
MD5: | 3D9339E105C1BCCAFAD9F2F18561A24C |
SHA1: | C860BD6483BAC8AD8197AB36AA24C4F0EFF15B7B |
SHA-256: | BC31A109750AE75362944E396322C7DEE14344B1059DD8D8A8C0C9410EB3BBA9 |
SHA-512: | 013A7C1153E9B708BB4A5CD4A237F5FD1E63297D1CBD7A802F142FF67DACB921CED1CC73F2667455C496B9B59B6D17320108C2B10BB9AD5DA5E4B275CA2023AA |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2683 |
Entropy (8bit): | 3.9993718271143397 |
Encrypted: | false |
SSDEEP: | 48:8AdNWTty0sHtidAKZdA1duT+ehOuTbbiZUk5OjqehOuTbjy+yT+:8sWh9LT/TbxWOvTbjy7T |
MD5: | 579AE434C7C506557E02028B4885DDE1 |
SHA1: | C075CE75211D0E4436E58B4D137F5A9082431870 |
SHA-256: | 6ED17F3313C057B67023F77940B075600B235D15414EA87B23780CD53005FD7F |
SHA-512: | 8AE7045068017F2B683C81275CB003B529C4838679F176EF3660EECCD7E1F30B9DFA4BE33ED965EDB724659796E66138EAEA90E016D2AA7EC8DB13FA59759E3D |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 40 |
Entropy (8bit): | 4.327567157116928 |
Encrypted: | false |
SSDEEP: | 3:mSryoSbSsvVXyY:mSrFSbScVXL |
MD5: | C561EA20923CC4A7C28FC7CBD47B7B27 |
SHA1: | 2B9BEB9F18C67725EF563E8D4997075EE7FABC14 |
SHA-256: | CF4C2F20FC4CD264541BDAAC94B46C06A6751D614518E1185C00DEF57B835C74 |
SHA-512: | 297F50815FA0FD8EA470E00250E3BE61529589608AC428D3D029892202B11420F394DECE84F98861AC544DE7075940ACFCCB5C93FD47E2522B0CCBB1B383DCD4 |
Malicious: | false |
Reputation: | low |
URL: | https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISHgmQKMxIIYEVLhIFDeeNQA4SBQ3OQUx6EgUNTx8adg==?alt=proto |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 14265 |
Entropy (8bit): | 5.155891752872181 |
Encrypted: | false |
SSDEEP: | 384:EOuDc2EytQAYZFPg9HN46W/rI9kWkaFaKYS6STFuT9eei:E6rD/rI9kqa66cFuT9e1 |
MD5: | 2EBF0D88E73A9C8D5E6D55A1A1CECA01 |
SHA1: | 962359C8CD63A3F8436171AD46D97D9F29ABAC4D |
SHA-256: | 2B26394AAC8199778CD337D8046535B6EA9CB2DC698E4102029CA963E080E19F |
SHA-512: | AAE1C2A7759B04D9302DF61431DF8AC01020A55BA426EE4C9DCB906965E00AB7E073108902AFDFA3EA2AAD128E8FE50A126C8C086DED6FC441EB75BE126ACE06 |
Malicious: | false |
Reputation: | low |
URL: | https://cdnjs.cloudflare.com/ajax/libs/axios/0.20.0/axios.min.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 85578 |
Entropy (8bit): | 5.366055229017455 |
Encrypted: | false |
SSDEEP: | 1536:EYE1JVoiB9JqZdXXe2pD3PgoIiulrUndZ6a4tfOR7WpfWBZ2BJda4w9W3qG9a986:v4J+OlfOhWppCW6G9a98Hr2 |
MD5: | 2F6B11A7E914718E0290410E85366FE9 |
SHA1: | 69BB69E25CA7D5EF0935317584E6153F3FD9A88C |
SHA-256: | 05B85D96F41FFF14D8F608DAD03AB71E2C1017C2DA0914D7C59291BAD7A54F8E |
SHA-512: | 0D40BCCAA59FEDECF7243D63B33C42592541D0330FEFC78EC81A4C6B9689922D5B211011CA4BE23AE22621CCE4C658F52A1552C92D7AC3615241EB640F8514DB |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 67260 |
Entropy (8bit): | 5.797402562037307 |
Encrypted: | false |
SSDEEP: | 1536:08NydKTOJDhkF5J4nFulMc7cFXXkF5dWtB:08NydKTOghXoWeB |
MD5: | 41E293C532D1E2BF1A9C3E6CBD8D0774 |
SHA1: | 7CEF34A2A2ED304C6AB30E5788C524C20B659BF1 |
SHA-256: | A7CE6BED3EDABD8D964263930BB86917071972514790B88236E1FAA77B362899 |
SHA-512: | 7D13D3B02B6F2F64FF6F6252156F509CE3573981AC50E279A98737F3336D116954CC315E7E15DE3676E60405D831B85707FEFAAC26F4C4B9120BD409854F8033 |
Malicious: | false |
Reputation: | low |
URL: | https://ipfs.io/ipfs/QmY916BLaBAS5CASVhqaYfUNaKdYQkk9oBJGCSELFyw3yr/ |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 85578 |
Entropy (8bit): | 5.366055229017455 |
Encrypted: | false |
SSDEEP: | 1536:EYE1JVoiB9JqZdXXe2pD3PgoIiulrUndZ6a4tfOR7WpfWBZ2BJda4w9W3qG9a986:v4J+OlfOhWppCW6G9a98Hr2 |
MD5: | 2F6B11A7E914718E0290410E85366FE9 |
SHA1: | 69BB69E25CA7D5EF0935317584E6153F3FD9A88C |
SHA-256: | 05B85D96F41FFF14D8F608DAD03AB71E2C1017C2DA0914D7C59291BAD7A54F8E |
SHA-512: | 0D40BCCAA59FEDECF7243D63B33C42592541D0330FEFC78EC81A4C6B9689922D5B211011CA4BE23AE22621CCE4C658F52A1552C92D7AC3615241EB640F8514DB |
Malicious: | false |
Reputation: | low |
URL: | https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 14265 |
Entropy (8bit): | 5.155891752872181 |
Encrypted: | false |
SSDEEP: | 384:EOuDc2EytQAYZFPg9HN46W/rI9kWkaFaKYS6STFuT9eei:E6rD/rI9kqa66cFuT9e1 |
MD5: | 2EBF0D88E73A9C8D5E6D55A1A1CECA01 |
SHA1: | 962359C8CD63A3F8436171AD46D97D9F29ABAC4D |
SHA-256: | 2B26394AAC8199778CD337D8046535B6EA9CB2DC698E4102029CA963E080E19F |
SHA-512: | AAE1C2A7759B04D9302DF61431DF8AC01020A55BA426EE4C9DCB906965E00AB7E073108902AFDFA3EA2AAD128E8FE50A126C8C086DED6FC441EB75BE126ACE06 |
Malicious: | false |
Reputation: | low |
Preview: |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Feb 21, 2025 01:38:47.663846016 CET | 49675 | 443 | 192.168.2.5 | 23.1.237.91 |
Feb 21, 2025 01:38:47.663861036 CET | 49674 | 443 | 192.168.2.5 | 23.1.237.91 |
Feb 21, 2025 01:38:47.773188114 CET | 49673 | 443 | 192.168.2.5 | 23.1.237.91 |
Feb 21, 2025 01:38:57.264380932 CET | 49674 | 443 | 192.168.2.5 | 23.1.237.91 |
Feb 21, 2025 01:38:57.264460087 CET | 49675 | 443 | 192.168.2.5 | 23.1.237.91 |
Feb 21, 2025 01:38:57.373718023 CET | 49673 | 443 | 192.168.2.5 | 23.1.237.91 |
Feb 21, 2025 01:38:58.805284977 CET | 49712 | 443 | 192.168.2.5 | 142.250.185.164 |
Feb 21, 2025 01:38:58.805366039 CET | 443 | 49712 | 142.250.185.164 | 192.168.2.5 |
Feb 21, 2025 01:38:58.805468082 CET | 49712 | 443 | 192.168.2.5 | 142.250.185.164 |
Feb 21, 2025 01:38:58.805798054 CET | 49712 | 443 | 192.168.2.5 | 142.250.185.164 |
Feb 21, 2025 01:38:58.805835962 CET | 443 | 49712 | 142.250.185.164 | 192.168.2.5 |
Feb 21, 2025 01:38:59.031971931 CET | 443 | 49703 | 23.1.237.91 | 192.168.2.5 |
Feb 21, 2025 01:38:59.032188892 CET | 49703 | 443 | 192.168.2.5 | 23.1.237.91 |
Feb 21, 2025 01:38:59.450659990 CET | 443 | 49712 | 142.250.185.164 | 192.168.2.5 |
Feb 21, 2025 01:38:59.453731060 CET | 49712 | 443 | 192.168.2.5 | 142.250.185.164 |
Feb 21, 2025 01:38:59.453766108 CET | 443 | 49712 | 142.250.185.164 | 192.168.2.5 |
Feb 21, 2025 01:38:59.455324888 CET | 443 | 49712 | 142.250.185.164 | 192.168.2.5 |
Feb 21, 2025 01:38:59.455387115 CET | 49712 | 443 | 192.168.2.5 | 142.250.185.164 |
Feb 21, 2025 01:38:59.457004070 CET | 49712 | 443 | 192.168.2.5 | 142.250.185.164 |
Feb 21, 2025 01:38:59.457093000 CET | 443 | 49712 | 142.250.185.164 | 192.168.2.5 |
Feb 21, 2025 01:38:59.498680115 CET | 49712 | 443 | 192.168.2.5 | 142.250.185.164 |
Feb 21, 2025 01:38:59.498689890 CET | 443 | 49712 | 142.250.185.164 | 192.168.2.5 |
Feb 21, 2025 01:38:59.545552969 CET | 49712 | 443 | 192.168.2.5 | 142.250.185.164 |
Feb 21, 2025 01:39:00.286708117 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:00.286734104 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:00.286885977 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:00.286943913 CET | 49716 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:00.286974907 CET | 443 | 49716 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:00.287034988 CET | 49716 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:00.287215948 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:00.287220955 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:00.287426949 CET | 49716 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:00.287434101 CET | 443 | 49716 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:00.767024040 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:00.767321110 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:00.767337084 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:00.768872976 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:00.769052982 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:00.769393921 CET | 443 | 49716 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:00.770842075 CET | 49716 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:00.770850897 CET | 443 | 49716 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:00.771711111 CET | 443 | 49716 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:00.771768093 CET | 49716 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:00.774523973 CET | 49716 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:00.774569988 CET | 443 | 49716 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:00.774692059 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:00.774692059 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:00.774709940 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:00.774786949 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:00.814512968 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:00.814532042 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:00.814558029 CET | 49716 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:00.814563990 CET | 443 | 49716 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:00.858190060 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:00.858208895 CET | 49716 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:00.924218893 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:00.924277067 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:00.924310923 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:00.924345016 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:00.924380064 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:00.924406052 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:00.924406052 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:00.924413919 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:00.924447060 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:00.924501896 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:00.924555063 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:00.924555063 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:00.924561024 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:00.929001093 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:00.929040909 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:00.931345940 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:00.931360006 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:00.931529999 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:01.012754917 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.012826920 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.012861013 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.012896061 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.012907028 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:01.012923002 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.012954950 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.013392925 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.013411999 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:01.013411999 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:01.013420105 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.013536930 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.013611078 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.013679981 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.013715029 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:01.013715029 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:01.013720989 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.014172077 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.014369965 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:01.014378071 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.014403105 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.014529943 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:01.014549971 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.014622927 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.014688969 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:01.014694929 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.014715910 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.014822960 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:01.014837027 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.015346050 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:01.015352011 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.015428066 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.015635014 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:01.015649080 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.059459925 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:01.060682058 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.099643946 CET | 49718 | 443 | 192.168.2.5 | 58.246.133.9 |
Feb 21, 2025 01:39:01.099673986 CET | 443 | 49718 | 58.246.133.9 | 192.168.2.5 |
Feb 21, 2025 01:39:01.100019932 CET | 49718 | 443 | 192.168.2.5 | 58.246.133.9 |
Feb 21, 2025 01:39:01.100224018 CET | 49718 | 443 | 192.168.2.5 | 58.246.133.9 |
Feb 21, 2025 01:39:01.100238085 CET | 443 | 49718 | 58.246.133.9 | 192.168.2.5 |
Feb 21, 2025 01:39:01.101457119 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.101499081 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.101609945 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.101639986 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:01.101648092 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.101691008 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.101722956 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:01.101727962 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.101747990 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.101847887 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:01.101847887 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:01.101855040 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.102191925 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:01.102204084 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.102222919 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.102349997 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:01.102375031 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.102581024 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.103143930 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:01.105443001 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:01.111349106 CET | 49715 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:01.111361027 CET | 443 | 49715 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.124428988 CET | 49721 | 443 | 192.168.2.5 | 104.17.25.14 |
Feb 21, 2025 01:39:01.124461889 CET | 443 | 49721 | 104.17.25.14 | 192.168.2.5 |
Feb 21, 2025 01:39:01.124588013 CET | 49721 | 443 | 192.168.2.5 | 104.17.25.14 |
Feb 21, 2025 01:39:01.125293016 CET | 49721 | 443 | 192.168.2.5 | 104.17.25.14 |
Feb 21, 2025 01:39:01.125304937 CET | 443 | 49721 | 104.17.25.14 | 192.168.2.5 |
Feb 21, 2025 01:39:01.607764006 CET | 443 | 49721 | 104.17.25.14 | 192.168.2.5 |
Feb 21, 2025 01:39:01.608066082 CET | 49721 | 443 | 192.168.2.5 | 104.17.25.14 |
Feb 21, 2025 01:39:01.608082056 CET | 443 | 49721 | 104.17.25.14 | 192.168.2.5 |
Feb 21, 2025 01:39:01.609750032 CET | 443 | 49721 | 104.17.25.14 | 192.168.2.5 |
Feb 21, 2025 01:39:01.609817982 CET | 49721 | 443 | 192.168.2.5 | 104.17.25.14 |
Feb 21, 2025 01:39:01.611085892 CET | 49721 | 443 | 192.168.2.5 | 104.17.25.14 |
Feb 21, 2025 01:39:01.611172915 CET | 443 | 49721 | 104.17.25.14 | 192.168.2.5 |
Feb 21, 2025 01:39:01.611387014 CET | 49721 | 443 | 192.168.2.5 | 104.17.25.14 |
Feb 21, 2025 01:39:01.611394882 CET | 443 | 49721 | 104.17.25.14 | 192.168.2.5 |
Feb 21, 2025 01:39:01.654752970 CET | 49721 | 443 | 192.168.2.5 | 104.17.25.14 |
Feb 21, 2025 01:39:01.736069918 CET | 443 | 49721 | 104.17.25.14 | 192.168.2.5 |
Feb 21, 2025 01:39:01.736130953 CET | 443 | 49721 | 104.17.25.14 | 192.168.2.5 |
Feb 21, 2025 01:39:01.736171961 CET | 443 | 49721 | 104.17.25.14 | 192.168.2.5 |
Feb 21, 2025 01:39:01.736213923 CET | 443 | 49721 | 104.17.25.14 | 192.168.2.5 |
Feb 21, 2025 01:39:01.736217976 CET | 49721 | 443 | 192.168.2.5 | 104.17.25.14 |
Feb 21, 2025 01:39:01.736248970 CET | 443 | 49721 | 104.17.25.14 | 192.168.2.5 |
Feb 21, 2025 01:39:01.736272097 CET | 49721 | 443 | 192.168.2.5 | 104.17.25.14 |
Feb 21, 2025 01:39:01.736294985 CET | 443 | 49721 | 104.17.25.14 | 192.168.2.5 |
Feb 21, 2025 01:39:01.736336946 CET | 49721 | 443 | 192.168.2.5 | 104.17.25.14 |
Feb 21, 2025 01:39:01.736344099 CET | 443 | 49721 | 104.17.25.14 | 192.168.2.5 |
Feb 21, 2025 01:39:01.736643076 CET | 443 | 49721 | 104.17.25.14 | 192.168.2.5 |
Feb 21, 2025 01:39:01.736709118 CET | 49721 | 443 | 192.168.2.5 | 104.17.25.14 |
Feb 21, 2025 01:39:01.736716032 CET | 443 | 49721 | 104.17.25.14 | 192.168.2.5 |
Feb 21, 2025 01:39:01.740951061 CET | 443 | 49721 | 104.17.25.14 | 192.168.2.5 |
Feb 21, 2025 01:39:01.740987062 CET | 443 | 49721 | 104.17.25.14 | 192.168.2.5 |
Feb 21, 2025 01:39:01.741020918 CET | 49721 | 443 | 192.168.2.5 | 104.17.25.14 |
Feb 21, 2025 01:39:01.741031885 CET | 443 | 49721 | 104.17.25.14 | 192.168.2.5 |
Feb 21, 2025 01:39:01.741063118 CET | 49721 | 443 | 192.168.2.5 | 104.17.25.14 |
Feb 21, 2025 01:39:01.741070032 CET | 443 | 49721 | 104.17.25.14 | 192.168.2.5 |
Feb 21, 2025 01:39:01.741138935 CET | 443 | 49721 | 104.17.25.14 | 192.168.2.5 |
Feb 21, 2025 01:39:01.741219044 CET | 49721 | 443 | 192.168.2.5 | 104.17.25.14 |
Feb 21, 2025 01:39:01.741667032 CET | 49721 | 443 | 192.168.2.5 | 104.17.25.14 |
Feb 21, 2025 01:39:01.741688967 CET | 443 | 49721 | 104.17.25.14 | 192.168.2.5 |
Feb 21, 2025 01:39:01.754343987 CET | 49722 | 443 | 192.168.2.5 | 104.17.24.14 |
Feb 21, 2025 01:39:01.754390001 CET | 443 | 49722 | 104.17.24.14 | 192.168.2.5 |
Feb 21, 2025 01:39:01.754460096 CET | 49722 | 443 | 192.168.2.5 | 104.17.24.14 |
Feb 21, 2025 01:39:01.754726887 CET | 49722 | 443 | 192.168.2.5 | 104.17.24.14 |
Feb 21, 2025 01:39:01.754740000 CET | 443 | 49722 | 104.17.24.14 | 192.168.2.5 |
Feb 21, 2025 01:39:02.215712070 CET | 443 | 49722 | 104.17.24.14 | 192.168.2.5 |
Feb 21, 2025 01:39:02.257407904 CET | 49722 | 443 | 192.168.2.5 | 104.17.24.14 |
Feb 21, 2025 01:39:02.387423038 CET | 49722 | 443 | 192.168.2.5 | 104.17.24.14 |
Feb 21, 2025 01:39:02.387438059 CET | 443 | 49722 | 104.17.24.14 | 192.168.2.5 |
Feb 21, 2025 01:39:02.391345978 CET | 443 | 49722 | 104.17.24.14 | 192.168.2.5 |
Feb 21, 2025 01:39:02.391437054 CET | 49722 | 443 | 192.168.2.5 | 104.17.24.14 |
Feb 21, 2025 01:39:02.394331932 CET | 49722 | 443 | 192.168.2.5 | 104.17.24.14 |
Feb 21, 2025 01:39:02.394511938 CET | 443 | 49722 | 104.17.24.14 | 192.168.2.5 |
Feb 21, 2025 01:39:02.395900011 CET | 49722 | 443 | 192.168.2.5 | 104.17.24.14 |
Feb 21, 2025 01:39:02.395906925 CET | 443 | 49722 | 104.17.24.14 | 192.168.2.5 |
Feb 21, 2025 01:39:02.441478014 CET | 49722 | 443 | 192.168.2.5 | 104.17.24.14 |
Feb 21, 2025 01:39:02.488090992 CET | 443 | 49718 | 58.246.133.9 | 192.168.2.5 |
Feb 21, 2025 01:39:02.488351107 CET | 49718 | 443 | 192.168.2.5 | 58.246.133.9 |
Feb 21, 2025 01:39:02.488394022 CET | 443 | 49718 | 58.246.133.9 | 192.168.2.5 |
Feb 21, 2025 01:39:02.490087032 CET | 443 | 49718 | 58.246.133.9 | 192.168.2.5 |
Feb 21, 2025 01:39:02.490164995 CET | 49718 | 443 | 192.168.2.5 | 58.246.133.9 |
Feb 21, 2025 01:39:02.491363049 CET | 49718 | 443 | 192.168.2.5 | 58.246.133.9 |
Feb 21, 2025 01:39:02.491475105 CET | 443 | 49718 | 58.246.133.9 | 192.168.2.5 |
Feb 21, 2025 01:39:02.491493940 CET | 49718 | 443 | 192.168.2.5 | 58.246.133.9 |
Feb 21, 2025 01:39:02.502738953 CET | 443 | 49722 | 104.17.24.14 | 192.168.2.5 |
Feb 21, 2025 01:39:02.502784014 CET | 443 | 49722 | 104.17.24.14 | 192.168.2.5 |
Feb 21, 2025 01:39:02.502825975 CET | 443 | 49722 | 104.17.24.14 | 192.168.2.5 |
Feb 21, 2025 01:39:02.502855062 CET | 443 | 49722 | 104.17.24.14 | 192.168.2.5 |
Feb 21, 2025 01:39:02.502872944 CET | 49722 | 443 | 192.168.2.5 | 104.17.24.14 |
Feb 21, 2025 01:39:02.502890110 CET | 443 | 49722 | 104.17.24.14 | 192.168.2.5 |
Feb 21, 2025 01:39:02.502902985 CET | 49722 | 443 | 192.168.2.5 | 104.17.24.14 |
Feb 21, 2025 01:39:02.503453016 CET | 443 | 49722 | 104.17.24.14 | 192.168.2.5 |
Feb 21, 2025 01:39:02.503487110 CET | 443 | 49722 | 104.17.24.14 | 192.168.2.5 |
Feb 21, 2025 01:39:02.503493071 CET | 49722 | 443 | 192.168.2.5 | 104.17.24.14 |
Feb 21, 2025 01:39:02.503499031 CET | 443 | 49722 | 104.17.24.14 | 192.168.2.5 |
Feb 21, 2025 01:39:02.503541946 CET | 49722 | 443 | 192.168.2.5 | 104.17.24.14 |
Feb 21, 2025 01:39:02.503546953 CET | 443 | 49722 | 104.17.24.14 | 192.168.2.5 |
Feb 21, 2025 01:39:02.507751942 CET | 443 | 49722 | 104.17.24.14 | 192.168.2.5 |
Feb 21, 2025 01:39:02.507776976 CET | 443 | 49722 | 104.17.24.14 | 192.168.2.5 |
Feb 21, 2025 01:39:02.507802010 CET | 49722 | 443 | 192.168.2.5 | 104.17.24.14 |
Feb 21, 2025 01:39:02.507810116 CET | 443 | 49722 | 104.17.24.14 | 192.168.2.5 |
Feb 21, 2025 01:39:02.507844925 CET | 49722 | 443 | 192.168.2.5 | 104.17.24.14 |
Feb 21, 2025 01:39:02.507848978 CET | 443 | 49722 | 104.17.24.14 | 192.168.2.5 |
Feb 21, 2025 01:39:02.507903099 CET | 443 | 49722 | 104.17.24.14 | 192.168.2.5 |
Feb 21, 2025 01:39:02.507992029 CET | 49722 | 443 | 192.168.2.5 | 104.17.24.14 |
Feb 21, 2025 01:39:02.508174896 CET | 49722 | 443 | 192.168.2.5 | 104.17.24.14 |
Feb 21, 2025 01:39:02.508191109 CET | 443 | 49722 | 104.17.24.14 | 192.168.2.5 |
Feb 21, 2025 01:39:02.508199930 CET | 49722 | 443 | 192.168.2.5 | 104.17.24.14 |
Feb 21, 2025 01:39:02.508265972 CET | 49722 | 443 | 192.168.2.5 | 104.17.24.14 |
Feb 21, 2025 01:39:02.535142899 CET | 49718 | 443 | 192.168.2.5 | 58.246.133.9 |
Feb 21, 2025 01:39:02.535167933 CET | 443 | 49718 | 58.246.133.9 | 192.168.2.5 |
Feb 21, 2025 01:39:02.576700926 CET | 49718 | 443 | 192.168.2.5 | 58.246.133.9 |
Feb 21, 2025 01:39:02.868634939 CET | 443 | 49718 | 58.246.133.9 | 192.168.2.5 |
Feb 21, 2025 01:39:02.868810892 CET | 443 | 49718 | 58.246.133.9 | 192.168.2.5 |
Feb 21, 2025 01:39:02.868890047 CET | 49718 | 443 | 192.168.2.5 | 58.246.133.9 |
Feb 21, 2025 01:39:02.869294882 CET | 49718 | 443 | 192.168.2.5 | 58.246.133.9 |
Feb 21, 2025 01:39:02.869343996 CET | 443 | 49718 | 58.246.133.9 | 192.168.2.5 |
Feb 21, 2025 01:39:02.869390011 CET | 49718 | 443 | 192.168.2.5 | 58.246.133.9 |
Feb 21, 2025 01:39:02.869412899 CET | 49718 | 443 | 192.168.2.5 | 58.246.133.9 |
Feb 21, 2025 01:39:09.432023048 CET | 443 | 49712 | 142.250.185.164 | 192.168.2.5 |
Feb 21, 2025 01:39:09.432116032 CET | 443 | 49712 | 142.250.185.164 | 192.168.2.5 |
Feb 21, 2025 01:39:09.432235003 CET | 49712 | 443 | 192.168.2.5 | 142.250.185.164 |
Feb 21, 2025 01:39:10.540380001 CET | 49712 | 443 | 192.168.2.5 | 142.250.185.164 |
Feb 21, 2025 01:39:10.540461063 CET | 443 | 49712 | 142.250.185.164 | 192.168.2.5 |
Feb 21, 2025 01:39:15.673858881 CET | 443 | 49716 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:15.673943996 CET | 443 | 49716 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:15.674026012 CET | 49716 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:16.488976002 CET | 49716 | 443 | 192.168.2.5 | 209.94.90.1 |
Feb 21, 2025 01:39:16.489013910 CET | 443 | 49716 | 209.94.90.1 | 192.168.2.5 |
Feb 21, 2025 01:39:16.489473104 CET | 49768 | 443 | 192.168.2.5 | 58.246.133.9 |
Feb 21, 2025 01:39:16.489506960 CET | 443 | 49768 | 58.246.133.9 | 192.168.2.5 |
Feb 21, 2025 01:39:16.489685059 CET | 49768 | 443 | 192.168.2.5 | 58.246.133.9 |
Feb 21, 2025 01:39:16.490210056 CET | 49768 | 443 | 192.168.2.5 | 58.246.133.9 |
Feb 21, 2025 01:39:16.490216017 CET | 443 | 49768 | 58.246.133.9 | 192.168.2.5 |
Feb 21, 2025 01:39:17.930084944 CET | 443 | 49768 | 58.246.133.9 | 192.168.2.5 |
Feb 21, 2025 01:39:17.930476904 CET | 49768 | 443 | 192.168.2.5 | 58.246.133.9 |
Feb 21, 2025 01:39:17.930495024 CET | 443 | 49768 | 58.246.133.9 | 192.168.2.5 |
Feb 21, 2025 01:39:17.930804968 CET | 443 | 49768 | 58.246.133.9 | 192.168.2.5 |
Feb 21, 2025 01:39:17.931200027 CET | 49768 | 443 | 192.168.2.5 | 58.246.133.9 |
Feb 21, 2025 01:39:17.931283951 CET | 443 | 49768 | 58.246.133.9 | 192.168.2.5 |
Feb 21, 2025 01:39:17.931338072 CET | 49768 | 443 | 192.168.2.5 | 58.246.133.9 |
Feb 21, 2025 01:39:17.979342937 CET | 443 | 49768 | 58.246.133.9 | 192.168.2.5 |
Feb 21, 2025 01:39:18.282941103 CET | 443 | 49768 | 58.246.133.9 | 192.168.2.5 |
Feb 21, 2025 01:39:18.283147097 CET | 443 | 49768 | 58.246.133.9 | 192.168.2.5 |
Feb 21, 2025 01:39:18.283325911 CET | 49768 | 443 | 192.168.2.5 | 58.246.133.9 |
Feb 21, 2025 01:39:18.283461094 CET | 49768 | 443 | 192.168.2.5 | 58.246.133.9 |
Feb 21, 2025 01:39:18.283462048 CET | 49768 | 443 | 192.168.2.5 | 58.246.133.9 |
Feb 21, 2025 01:39:18.283476114 CET | 443 | 49768 | 58.246.133.9 | 192.168.2.5 |
Feb 21, 2025 01:39:18.283513069 CET | 49768 | 443 | 192.168.2.5 | 58.246.133.9 |
Feb 21, 2025 01:39:58.858972073 CET | 50000 | 443 | 192.168.2.5 | 142.250.185.164 |
Feb 21, 2025 01:39:58.859014988 CET | 443 | 50000 | 142.250.185.164 | 192.168.2.5 |
Feb 21, 2025 01:39:58.859428883 CET | 50000 | 443 | 192.168.2.5 | 142.250.185.164 |
Feb 21, 2025 01:39:58.859694958 CET | 50000 | 443 | 192.168.2.5 | 142.250.185.164 |
Feb 21, 2025 01:39:58.859707117 CET | 443 | 50000 | 142.250.185.164 | 192.168.2.5 |
Feb 21, 2025 01:39:58.897038937 CET | 65215 | 53 | 192.168.2.5 | 1.1.1.1 |
Feb 21, 2025 01:39:58.902162075 CET | 53 | 65215 | 1.1.1.1 | 192.168.2.5 |
Feb 21, 2025 01:39:58.902242899 CET | 65215 | 53 | 192.168.2.5 | 1.1.1.1 |
Feb 21, 2025 01:39:58.902334929 CET | 65215 | 53 | 192.168.2.5 | 1.1.1.1 |
Feb 21, 2025 01:39:58.907493114 CET | 53 | 65215 | 1.1.1.1 | 192.168.2.5 |
Feb 21, 2025 01:39:59.356801033 CET | 53 | 65215 | 1.1.1.1 | 192.168.2.5 |
Feb 21, 2025 01:39:59.357755899 CET | 65215 | 53 | 192.168.2.5 | 1.1.1.1 |
Feb 21, 2025 01:39:59.363125086 CET | 53 | 65215 | 1.1.1.1 | 192.168.2.5 |
Feb 21, 2025 01:39:59.363209963 CET | 65215 | 53 | 192.168.2.5 | 1.1.1.1 |
Feb 21, 2025 01:39:59.509160995 CET | 443 | 50000 | 142.250.185.164 | 192.168.2.5 |
Feb 21, 2025 01:39:59.510261059 CET | 50000 | 443 | 192.168.2.5 | 142.250.185.164 |
Feb 21, 2025 01:39:59.510288954 CET | 443 | 50000 | 142.250.185.164 | 192.168.2.5 |
Feb 21, 2025 01:39:59.510608912 CET | 443 | 50000 | 142.250.185.164 | 192.168.2.5 |
Feb 21, 2025 01:39:59.510922909 CET | 50000 | 443 | 192.168.2.5 | 142.250.185.164 |
Feb 21, 2025 01:39:59.510981083 CET | 443 | 50000 | 142.250.185.164 | 192.168.2.5 |
Feb 21, 2025 01:39:59.560626984 CET | 50000 | 443 | 192.168.2.5 | 142.250.185.164 |
Feb 21, 2025 01:40:09.438138962 CET | 443 | 50000 | 142.250.185.164 | 192.168.2.5 |
Feb 21, 2025 01:40:09.438210964 CET | 443 | 50000 | 142.250.185.164 | 192.168.2.5 |
Feb 21, 2025 01:40:09.438344955 CET | 50000 | 443 | 192.168.2.5 | 142.250.185.164 |
Feb 21, 2025 01:40:10.531791925 CET | 50000 | 443 | 192.168.2.5 | 142.250.185.164 |
Feb 21, 2025 01:40:10.531822920 CET | 443 | 50000 | 142.250.185.164 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Feb 21, 2025 01:38:54.184690952 CET | 53 | 60757 | 1.1.1.1 | 192.168.2.5 |
Feb 21, 2025 01:38:54.243113995 CET | 53 | 59329 | 1.1.1.1 | 192.168.2.5 |
Feb 21, 2025 01:38:55.224915028 CET | 53 | 60296 | 1.1.1.1 | 192.168.2.5 |
Feb 21, 2025 01:38:58.796801090 CET | 51522 | 53 | 192.168.2.5 | 1.1.1.1 |
Feb 21, 2025 01:38:58.796926975 CET | 60836 | 53 | 192.168.2.5 | 1.1.1.1 |
Feb 21, 2025 01:38:58.804114103 CET | 53 | 60836 | 1.1.1.1 | 192.168.2.5 |
Feb 21, 2025 01:38:58.804155111 CET | 53 | 51522 | 1.1.1.1 | 192.168.2.5 |
Feb 21, 2025 01:39:00.275892973 CET | 51117 | 53 | 192.168.2.5 | 1.1.1.1 |
Feb 21, 2025 01:39:00.276099920 CET | 53787 | 53 | 192.168.2.5 | 1.1.1.1 |
Feb 21, 2025 01:39:00.283020020 CET | 53 | 51117 | 1.1.1.1 | 192.168.2.5 |
Feb 21, 2025 01:39:00.284116983 CET | 53 | 53787 | 1.1.1.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.069876909 CET | 57613 | 53 | 192.168.2.5 | 1.1.1.1 |
Feb 21, 2025 01:39:01.070228100 CET | 61229 | 53 | 192.168.2.5 | 1.1.1.1 |
Feb 21, 2025 01:39:01.092350006 CET | 53 | 57613 | 1.1.1.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.115020037 CET | 50352 | 53 | 192.168.2.5 | 1.1.1.1 |
Feb 21, 2025 01:39:01.115365982 CET | 60401 | 53 | 192.168.2.5 | 1.1.1.1 |
Feb 21, 2025 01:39:01.117793083 CET | 53 | 54546 | 1.1.1.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.122169018 CET | 53 | 50352 | 1.1.1.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.122617960 CET | 53 | 60401 | 1.1.1.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.193451881 CET | 53 | 61229 | 1.1.1.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.746553898 CET | 52777 | 53 | 192.168.2.5 | 1.1.1.1 |
Feb 21, 2025 01:39:01.746718884 CET | 57832 | 53 | 192.168.2.5 | 1.1.1.1 |
Feb 21, 2025 01:39:01.753638029 CET | 53 | 52777 | 1.1.1.1 | 192.168.2.5 |
Feb 21, 2025 01:39:01.753669024 CET | 53 | 57832 | 1.1.1.1 | 192.168.2.5 |
Feb 21, 2025 01:39:02.408454895 CET | 53 | 61130 | 1.1.1.1 | 192.168.2.5 |
Feb 21, 2025 01:39:02.437962055 CET | 53 | 56324 | 1.1.1.1 | 192.168.2.5 |
Feb 21, 2025 01:39:12.408751965 CET | 53 | 52962 | 1.1.1.1 | 192.168.2.5 |
Feb 21, 2025 01:39:31.421400070 CET | 53 | 64371 | 1.1.1.1 | 192.168.2.5 |
Feb 21, 2025 01:39:53.849847078 CET | 53 | 49692 | 1.1.1.1 | 192.168.2.5 |
Feb 21, 2025 01:39:54.023228884 CET | 53 | 56741 | 1.1.1.1 | 192.168.2.5 |
Feb 21, 2025 01:39:58.896472931 CET | 53 | 51008 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Checksum | Code | Type |
---|---|---|---|---|---|
Feb 21, 2025 01:39:01.195225000 CET | 192.168.2.5 | 1.1.1.1 | c250 | (Port unreachable) | Destination Unreachable |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Feb 21, 2025 01:38:58.796801090 CET | 192.168.2.5 | 1.1.1.1 | 0x868f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Feb 21, 2025 01:38:58.796926975 CET | 192.168.2.5 | 1.1.1.1 | 0x96bb | Standard query (0) | 65 | IN (0x0001) | false | |
Feb 21, 2025 01:39:00.275892973 CET | 192.168.2.5 | 1.1.1.1 | 0x2610 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Feb 21, 2025 01:39:00.276099920 CET | 192.168.2.5 | 1.1.1.1 | 0x78eb | Standard query (0) | 65 | IN (0x0001) | false | |
Feb 21, 2025 01:39:01.069876909 CET | 192.168.2.5 | 1.1.1.1 | 0xc83c | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Feb 21, 2025 01:39:01.070228100 CET | 192.168.2.5 | 1.1.1.1 | 0x4f99 | Standard query (0) | 65 | IN (0x0001) | false | |
Feb 21, 2025 01:39:01.115020037 CET | 192.168.2.5 | 1.1.1.1 | 0xc18e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Feb 21, 2025 01:39:01.115365982 CET | 192.168.2.5 | 1.1.1.1 | 0xc7e3 | Standard query (0) | 65 | IN (0x0001) | false | |
Feb 21, 2025 01:39:01.746553898 CET | 192.168.2.5 | 1.1.1.1 | 0x7021 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Feb 21, 2025 01:39:01.746718884 CET | 192.168.2.5 | 1.1.1.1 | 0xc98 | Standard query (0) | 65 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Feb 21, 2025 01:38:58.804114103 CET | 1.1.1.1 | 192.168.2.5 | 0x96bb | No error (0) | 65 | IN (0x0001) | false | |||
Feb 21, 2025 01:38:58.804155111 CET | 1.1.1.1 | 192.168.2.5 | 0x868f | No error (0) | 142.250.185.164 | A (IP address) | IN (0x0001) | false | ||
Feb 21, 2025 01:39:00.283020020 CET | 1.1.1.1 | 192.168.2.5 | 0x2610 | No error (0) | 209.94.90.1 | A (IP address) | IN (0x0001) | false | ||
Feb 21, 2025 01:39:00.284116983 CET | 1.1.1.1 | 192.168.2.5 | 0x78eb | No error (0) | 65 | IN (0x0001) | false | |||
Feb 21, 2025 01:39:01.092350006 CET | 1.1.1.1 | 192.168.2.5 | 0xc83c | No error (0) | outlook.saicmotor.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Feb 21, 2025 01:39:01.092350006 CET | 1.1.1.1 | 192.168.2.5 | 0xc83c | No error (0) | 58.246.133.9 | A (IP address) | IN (0x0001) | false | ||
Feb 21, 2025 01:39:01.122169018 CET | 1.1.1.1 | 192.168.2.5 | 0xc18e | No error (0) | 104.17.25.14 | A (IP address) | IN (0x0001) | false | ||
Feb 21, 2025 01:39:01.122169018 CET | 1.1.1.1 | 192.168.2.5 | 0xc18e | No error (0) | 104.17.24.14 | A (IP address) | IN (0x0001) | false | ||
Feb 21, 2025 01:39:01.122617960 CET | 1.1.1.1 | 192.168.2.5 | 0xc7e3 | No error (0) | 65 | IN (0x0001) | false | |||
Feb 21, 2025 01:39:01.193451881 CET | 1.1.1.1 | 192.168.2.5 | 0x4f99 | No error (0) | outlook.saicmotor.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Feb 21, 2025 01:39:01.753638029 CET | 1.1.1.1 | 192.168.2.5 | 0x7021 | No error (0) | 104.17.24.14 | A (IP address) | IN (0x0001) | false | ||
Feb 21, 2025 01:39:01.753638029 CET | 1.1.1.1 | 192.168.2.5 | 0x7021 | No error (0) | 104.17.25.14 | A (IP address) | IN (0x0001) | false | ||
Feb 21, 2025 01:39:01.753669024 CET | 1.1.1.1 | 192.168.2.5 | 0xc98 | No error (0) | 65 | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49715 | 209.94.90.1 | 443 | 1100 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-02-21 00:39:00 UTC | 702 | OUT | |
2025-02-21 00:39:00 UTC | 1044 | IN | |
2025-02-21 00:39:00 UTC | 325 | IN | |
2025-02-21 00:39:00 UTC | 1369 | IN | |
2025-02-21 00:39:00 UTC | 1369 | IN | |
2025-02-21 00:39:00 UTC | 1369 | IN | |
2025-02-21 00:39:00 UTC | 1369 | IN | |
2025-02-21 00:39:00 UTC | 1369 | IN | |
2025-02-21 00:39:00 UTC | 1369 | IN | |
2025-02-21 00:39:00 UTC | 1369 | IN | |
2025-02-21 00:39:00 UTC | 1369 | IN | |
2025-02-21 00:39:00 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49721 | 104.17.25.14 | 443 | 1100 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-02-21 00:39:01 UTC | 546 | OUT | |
2025-02-21 00:39:01 UTC | 956 | IN | |
2025-02-21 00:39:01 UTC | 413 | IN | |
2025-02-21 00:39:01 UTC | 1369 | IN | |
2025-02-21 00:39:01 UTC | 1369 | IN | |
2025-02-21 00:39:01 UTC | 1369 | IN | |
2025-02-21 00:39:01 UTC | 1369 | IN | |
2025-02-21 00:39:01 UTC | 1369 | IN | |
2025-02-21 00:39:01 UTC | 1369 | IN | |
2025-02-21 00:39:01 UTC | 1369 | IN | |
2025-02-21 00:39:01 UTC | 1369 | IN | |
2025-02-21 00:39:01 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49722 | 104.17.24.14 | 443 | 1100 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-02-21 00:39:02 UTC | 379 | OUT | |
2025-02-21 00:39:02 UTC | 956 | IN | |
2025-02-21 00:39:02 UTC | 413 | IN | |
2025-02-21 00:39:02 UTC | 1369 | IN | |
2025-02-21 00:39:02 UTC | 1369 | IN | |
2025-02-21 00:39:02 UTC | 1369 | IN | |
2025-02-21 00:39:02 UTC | 1369 | IN | |
2025-02-21 00:39:02 UTC | 1369 | IN | |
2025-02-21 00:39:02 UTC | 1369 | IN | |
2025-02-21 00:39:02 UTC | 1369 | IN | |
2025-02-21 00:39:02 UTC | 1369 | IN | |
2025-02-21 00:39:02 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.5 | 49718 | 58.246.133.9 | 443 | 1100 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-02-21 00:39:02 UTC | 592 | OUT | |
2025-02-21 00:39:02 UTC | 201 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.5 | 49768 | 58.246.133.9 | 443 | 1100 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-02-21 00:39:17 UTC | 594 | OUT | |
2025-02-21 00:39:18 UTC | 201 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 19:38:48 |
Start date: | 20/02/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 2 |
Start time: | 19:38:52 |
Start date: | 20/02/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 3 |
Start time: | 19:38:58 |
Start date: | 20/02/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |