Windows
Analysis Report
https://cdn.customgpt.ai/js/chat.js
Overview
Detection
Score: | 0 |
Range: | 0 - 100 |
Confidence: | 80% |
Signatures
Classification
- System is w10x64
chrome.exe (PID: 6528 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --s tart-maxim ized "abou t:blank" MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 6880 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --no-pre-r ead-main-d ll --field -trial-han dle=2200,i ,543381968 2843097322 ,182307509 8963158391 5,262144 - -disable-f eatures=Op timization GuideModel Downloadin g,Optimiza tionHints, Optimizati onHintsFet ching,Opti mizationTa rgetPredic tion --var iations-se ed-version =20250306- 183004.429 000 --mojo -platform- channel-ha ndle=2220 /prefetch: 3 MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 5176 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= printing.m ojom.Unsan dboxedPrin tBackendHo st --lang= en-US --se rvice-sand box-type=n one --no-p re-read-ma in-dll --f ield-trial -handle=22 00,i,54338 1968284309 7322,18230 7509896315 83915,2621 44 --disab le-feature s=Optimiza tionGuideM odelDownlo ading,Opti mizationHi nts,Optimi zationHint sFetching, Optimizati onTargetPr ediction - -variation s-seed-ver sion=20250 306-183004 .429000 -- mojo-platf orm-channe l-handle=4 984 /prefe tch:8 MD5: E81F54E6C1129887AEA47E7D092680BF)
chrome.exe (PID: 4064 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://cdn.c ustomgpt.a i/js/chat. js" MD5: E81F54E6C1129887AEA47E7D092680BF)
- cleanup
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Window detected: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Process Injection | 1 Process Injection | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 3 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 4 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 3 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
d23d3wcthtl67x.cloudfront.net | 3.161.163.103 | true | false | unknown | |
www.google.com | 173.194.219.106 | true | false | high | |
cdn.customgpt.ai | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
3.161.163.103 | d23d3wcthtl67x.cloudfront.net | United States | 16509 | AMAZON-02US | false | |
173.194.219.106 | www.google.com | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.5 |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1665805 |
Start date and time: | 2025-04-15 21:20:19 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 2s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | https://cdn.customgpt.ai/js/chat.js |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 15 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean0.win@23/4@4/3 |
EGA Information: | Failed |
HCA Information: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 23.76.34.6, 199.232.214.172, 142.250.9.94, 108.177.122.138, 108.177.122.139, 108.177.122.100, 108.177.122.101, 108.177.122.113, 108.177.122.102, 74.125.136.139, 74.125.136.102, 74.125.136.138, 74.125.136.100, 74.125.136.101, 74.125.136.113, 64.233.185.84, 172.253.124.100, 172.253.124.138, 172.253.124.139, 172.253.124.113, 172.253.124.102, 172.253.124.101, 173.194.219.138, 173.194.219.100, 173.194.219.113, 173.194.219.102, 173.194.219.139, 173.194.219.101, 64.233.177.102, 64.233.177.101, 64.233.177.138, 64.233.177.100, 64.233.177.113, 64.233.177.139, 108.177.122.94, 64.233.177.84, 74.125.21.138, 74.125.21.101, 74.125.21.139, 74.125.21.102, 74.125.21.113, 74.125.21.100, 4.245.163.56
- Excluded domains from analysis (whitelisted): fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, clientservices.googleapis.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, e16604.dscf.akamaiedge.net, fe3cr.delivery.mp.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, redirector.gvt1.com, update.googleapis.com, clients.l.google.com, prod.fs.microsoft.com.akadns.net, c.pki.goog
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenFile calls found.
- VT rate limit hit for: https://cdn.customgpt.ai/js/chat.js
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 28296 |
Entropy (8bit): | 5.3194784212025334 |
Encrypted: | false |
SSDEEP: | 768:NBQSxctwFppZ7hjV5aLvZLVIO6T8m6ycAZ5:tOMFlKLCp6or |
MD5: | 8DF66E07FB01CB831C42C3317CB0A0F2 |
SHA1: | BE0A89B33C4FD984C26F12F01E5ED55B2855F583 |
SHA-256: | E63B7B111273B00DD78E1E4BC4C87EF1A839C1F68164DCFACC06B3E8AF064667 |
SHA-512: | CB250A967344A4409BD1C8D118FB91494EC512DC72B8B6B663E8E8B24E8239D02066CFF80C03E826D2C12725FFF8534952E7521780F92293317271C7D2CD5106 |
Malicious: | false |
Reputation: | low |
URL: | https://cdn.customgpt.ai/js/chat.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 111 |
Entropy (8bit): | 4.655766260772407 |
Encrypted: | false |
SSDEEP: | 3:vFWWMNHU8LdgCfZbZj+PBMkmKqWWU66bukoL9KgqLn:TMVBd/ZbZjZvKtWRV8g6n |
MD5: | B6C792C0F58FA3EC92173C074885221F |
SHA1: | 0DDE8FD9111D807E202B2FB37F8BCC4052FD861E |
SHA-256: | A824BC7739E226E1B40EA0F8C4E4F4C6F796FC3B4ABFA6E9ABE3BD119A30D938 |
SHA-512: | 83C8B765EDCC44F6AAF19445881C315239095B4AC90E9BB85716084DB9B9EC75F74876B49340CBAF5AE8D173E517AF9EAF82E628D1D32090CD0B4AC8A5D08875 |
Malicious: | false |
Reputation: | low |
URL: | https://cdn.customgpt.ai/favicon.ico |
Preview: |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 15, 2025 21:21:06.418931007 CEST | 49672 | 443 | 192.168.2.5 | 204.79.197.203 |
Apr 15, 2025 21:21:10.354522943 CEST | 49676 | 443 | 192.168.2.5 | 20.189.173.14 |
Apr 15, 2025 21:21:10.668896914 CEST | 49676 | 443 | 192.168.2.5 | 20.189.173.14 |
Apr 15, 2025 21:21:11.231405020 CEST | 49672 | 443 | 192.168.2.5 | 204.79.197.203 |
Apr 15, 2025 21:21:11.278393030 CEST | 49676 | 443 | 192.168.2.5 | 20.189.173.14 |
Apr 15, 2025 21:21:12.497004986 CEST | 49676 | 443 | 192.168.2.5 | 20.189.173.14 |
Apr 15, 2025 21:21:15.028297901 CEST | 49676 | 443 | 192.168.2.5 | 20.189.173.14 |
Apr 15, 2025 21:21:17.161490917 CEST | 49699 | 80 | 192.168.2.5 | 173.194.219.94 |
Apr 15, 2025 21:21:17.268038034 CEST | 80 | 49699 | 173.194.219.94 | 192.168.2.5 |
Apr 15, 2025 21:21:17.268145084 CEST | 49699 | 80 | 192.168.2.5 | 173.194.219.94 |
Apr 15, 2025 21:21:17.268279076 CEST | 49699 | 80 | 192.168.2.5 | 173.194.219.94 |
Apr 15, 2025 21:21:17.374672890 CEST | 80 | 49699 | 173.194.219.94 | 192.168.2.5 |
Apr 15, 2025 21:21:17.375356913 CEST | 80 | 49699 | 173.194.219.94 | 192.168.2.5 |
Apr 15, 2025 21:21:17.497222900 CEST | 49699 | 80 | 192.168.2.5 | 173.194.219.94 |
Apr 15, 2025 21:21:19.840683937 CEST | 49676 | 443 | 192.168.2.5 | 20.189.173.14 |
Apr 15, 2025 21:21:20.841069937 CEST | 49672 | 443 | 192.168.2.5 | 204.79.197.203 |
Apr 15, 2025 21:21:21.121509075 CEST | 49702 | 443 | 192.168.2.5 | 173.194.219.106 |
Apr 15, 2025 21:21:21.121539116 CEST | 443 | 49702 | 173.194.219.106 | 192.168.2.5 |
Apr 15, 2025 21:21:21.121687889 CEST | 49702 | 443 | 192.168.2.5 | 173.194.219.106 |
Apr 15, 2025 21:21:21.121840954 CEST | 49702 | 443 | 192.168.2.5 | 173.194.219.106 |
Apr 15, 2025 21:21:21.121851921 CEST | 443 | 49702 | 173.194.219.106 | 192.168.2.5 |
Apr 15, 2025 21:21:21.346631050 CEST | 443 | 49702 | 173.194.219.106 | 192.168.2.5 |
Apr 15, 2025 21:21:21.346720934 CEST | 49702 | 443 | 192.168.2.5 | 173.194.219.106 |
Apr 15, 2025 21:21:21.347795963 CEST | 49702 | 443 | 192.168.2.5 | 173.194.219.106 |
Apr 15, 2025 21:21:21.347801924 CEST | 443 | 49702 | 173.194.219.106 | 192.168.2.5 |
Apr 15, 2025 21:21:21.348181963 CEST | 443 | 49702 | 173.194.219.106 | 192.168.2.5 |
Apr 15, 2025 21:21:21.387897968 CEST | 49702 | 443 | 192.168.2.5 | 173.194.219.106 |
Apr 15, 2025 21:21:22.435940981 CEST | 49703 | 443 | 192.168.2.5 | 3.161.163.103 |
Apr 15, 2025 21:21:22.435980082 CEST | 443 | 49703 | 3.161.163.103 | 192.168.2.5 |
Apr 15, 2025 21:21:22.436167002 CEST | 49703 | 443 | 192.168.2.5 | 3.161.163.103 |
Apr 15, 2025 21:21:22.436295986 CEST | 49703 | 443 | 192.168.2.5 | 3.161.163.103 |
Apr 15, 2025 21:21:22.436305046 CEST | 443 | 49703 | 3.161.163.103 | 192.168.2.5 |
Apr 15, 2025 21:21:22.460609913 CEST | 49704 | 443 | 192.168.2.5 | 3.161.163.103 |
Apr 15, 2025 21:21:22.460642099 CEST | 443 | 49704 | 3.161.163.103 | 192.168.2.5 |
Apr 15, 2025 21:21:22.460832119 CEST | 49704 | 443 | 192.168.2.5 | 3.161.163.103 |
Apr 15, 2025 21:21:22.461051941 CEST | 49704 | 443 | 192.168.2.5 | 3.161.163.103 |
Apr 15, 2025 21:21:22.461059093 CEST | 443 | 49704 | 3.161.163.103 | 192.168.2.5 |
Apr 15, 2025 21:21:22.670241117 CEST | 443 | 49703 | 3.161.163.103 | 192.168.2.5 |
Apr 15, 2025 21:21:22.670358896 CEST | 49703 | 443 | 192.168.2.5 | 3.161.163.103 |
Apr 15, 2025 21:21:22.672821999 CEST | 49703 | 443 | 192.168.2.5 | 3.161.163.103 |
Apr 15, 2025 21:21:22.672835112 CEST | 443 | 49703 | 3.161.163.103 | 192.168.2.5 |
Apr 15, 2025 21:21:22.673237085 CEST | 443 | 49703 | 3.161.163.103 | 192.168.2.5 |
Apr 15, 2025 21:21:22.673584938 CEST | 49703 | 443 | 192.168.2.5 | 3.161.163.103 |
Apr 15, 2025 21:21:22.684782982 CEST | 443 | 49704 | 3.161.163.103 | 192.168.2.5 |
Apr 15, 2025 21:21:22.684876919 CEST | 49704 | 443 | 192.168.2.5 | 3.161.163.103 |
Apr 15, 2025 21:21:22.691726923 CEST | 49704 | 443 | 192.168.2.5 | 3.161.163.103 |
Apr 15, 2025 21:21:22.691732883 CEST | 443 | 49704 | 3.161.163.103 | 192.168.2.5 |
Apr 15, 2025 21:21:22.691971064 CEST | 443 | 49704 | 3.161.163.103 | 192.168.2.5 |
Apr 15, 2025 21:21:22.716306925 CEST | 443 | 49703 | 3.161.163.103 | 192.168.2.5 |
Apr 15, 2025 21:21:22.734002113 CEST | 49704 | 443 | 192.168.2.5 | 3.161.163.103 |
Apr 15, 2025 21:21:22.881726980 CEST | 443 | 49703 | 3.161.163.103 | 192.168.2.5 |
Apr 15, 2025 21:21:22.881757975 CEST | 443 | 49703 | 3.161.163.103 | 192.168.2.5 |
Apr 15, 2025 21:21:22.881777048 CEST | 443 | 49703 | 3.161.163.103 | 192.168.2.5 |
Apr 15, 2025 21:21:22.881884098 CEST | 49703 | 443 | 192.168.2.5 | 3.161.163.103 |
Apr 15, 2025 21:21:22.881885052 CEST | 49703 | 443 | 192.168.2.5 | 3.161.163.103 |
Apr 15, 2025 21:21:22.881910086 CEST | 443 | 49703 | 3.161.163.103 | 192.168.2.5 |
Apr 15, 2025 21:21:22.881978989 CEST | 49703 | 443 | 192.168.2.5 | 3.161.163.103 |
Apr 15, 2025 21:21:22.890450001 CEST | 443 | 49703 | 3.161.163.103 | 192.168.2.5 |
Apr 15, 2025 21:21:22.890506983 CEST | 443 | 49703 | 3.161.163.103 | 192.168.2.5 |
Apr 15, 2025 21:21:22.890578032 CEST | 49703 | 443 | 192.168.2.5 | 3.161.163.103 |
Apr 15, 2025 21:21:22.890588045 CEST | 443 | 49703 | 3.161.163.103 | 192.168.2.5 |
Apr 15, 2025 21:21:22.890654087 CEST | 49703 | 443 | 192.168.2.5 | 3.161.163.103 |
Apr 15, 2025 21:21:22.893390894 CEST | 443 | 49703 | 3.161.163.103 | 192.168.2.5 |
Apr 15, 2025 21:21:22.893503904 CEST | 49703 | 443 | 192.168.2.5 | 3.161.163.103 |
Apr 15, 2025 21:21:22.893512011 CEST | 443 | 49703 | 3.161.163.103 | 192.168.2.5 |
Apr 15, 2025 21:21:22.893567085 CEST | 443 | 49703 | 3.161.163.103 | 192.168.2.5 |
Apr 15, 2025 21:21:22.893728018 CEST | 49703 | 443 | 192.168.2.5 | 3.161.163.103 |
Apr 15, 2025 21:21:22.900111914 CEST | 49703 | 443 | 192.168.2.5 | 3.161.163.103 |
Apr 15, 2025 21:21:22.900136948 CEST | 443 | 49703 | 3.161.163.103 | 192.168.2.5 |
Apr 15, 2025 21:21:23.026098967 CEST | 49704 | 443 | 192.168.2.5 | 3.161.163.103 |
Apr 15, 2025 21:21:23.072278023 CEST | 443 | 49704 | 3.161.163.103 | 192.168.2.5 |
Apr 15, 2025 21:21:23.408423901 CEST | 443 | 49704 | 3.161.163.103 | 192.168.2.5 |
Apr 15, 2025 21:21:23.408519983 CEST | 443 | 49704 | 3.161.163.103 | 192.168.2.5 |
Apr 15, 2025 21:21:23.408655882 CEST | 49704 | 443 | 192.168.2.5 | 3.161.163.103 |
Apr 15, 2025 21:21:23.427088976 CEST | 49704 | 443 | 192.168.2.5 | 3.161.163.103 |
Apr 15, 2025 21:21:23.427118063 CEST | 443 | 49704 | 3.161.163.103 | 192.168.2.5 |
Apr 15, 2025 21:21:29.451488972 CEST | 49676 | 443 | 192.168.2.5 | 20.189.173.14 |
Apr 15, 2025 21:21:31.338095903 CEST | 443 | 49702 | 173.194.219.106 | 192.168.2.5 |
Apr 15, 2025 21:21:31.338236094 CEST | 443 | 49702 | 173.194.219.106 | 192.168.2.5 |
Apr 15, 2025 21:21:31.338316917 CEST | 49702 | 443 | 192.168.2.5 | 173.194.219.106 |
Apr 15, 2025 21:21:31.937649965 CEST | 49702 | 443 | 192.168.2.5 | 173.194.219.106 |
Apr 15, 2025 21:21:31.937701941 CEST | 443 | 49702 | 173.194.219.106 | 192.168.2.5 |
Apr 15, 2025 21:22:17.481761932 CEST | 49699 | 80 | 192.168.2.5 | 173.194.219.94 |
Apr 15, 2025 21:22:17.588231087 CEST | 80 | 49699 | 173.194.219.94 | 192.168.2.5 |
Apr 15, 2025 21:22:17.588299036 CEST | 49699 | 80 | 192.168.2.5 | 173.194.219.94 |
Apr 15, 2025 21:22:21.076668024 CEST | 49712 | 443 | 192.168.2.5 | 173.194.219.106 |
Apr 15, 2025 21:22:21.076709986 CEST | 443 | 49712 | 173.194.219.106 | 192.168.2.5 |
Apr 15, 2025 21:22:21.076782942 CEST | 49712 | 443 | 192.168.2.5 | 173.194.219.106 |
Apr 15, 2025 21:22:21.077073097 CEST | 49712 | 443 | 192.168.2.5 | 173.194.219.106 |
Apr 15, 2025 21:22:21.077088118 CEST | 443 | 49712 | 173.194.219.106 | 192.168.2.5 |
Apr 15, 2025 21:22:21.300322056 CEST | 443 | 49712 | 173.194.219.106 | 192.168.2.5 |
Apr 15, 2025 21:22:21.300654888 CEST | 49712 | 443 | 192.168.2.5 | 173.194.219.106 |
Apr 15, 2025 21:22:21.300678968 CEST | 443 | 49712 | 173.194.219.106 | 192.168.2.5 |
Apr 15, 2025 21:22:31.297693968 CEST | 443 | 49712 | 173.194.219.106 | 192.168.2.5 |
Apr 15, 2025 21:22:31.297744989 CEST | 443 | 49712 | 173.194.219.106 | 192.168.2.5 |
Apr 15, 2025 21:22:31.297806025 CEST | 49712 | 443 | 192.168.2.5 | 173.194.219.106 |
Apr 15, 2025 21:22:31.936723948 CEST | 49712 | 443 | 192.168.2.5 | 173.194.219.106 |
Apr 15, 2025 21:22:31.936791897 CEST | 443 | 49712 | 173.194.219.106 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 15, 2025 21:21:16.754225016 CEST | 53 | 56167 | 1.1.1.1 | 192.168.2.5 |
Apr 15, 2025 21:21:16.779124975 CEST | 53 | 61356 | 1.1.1.1 | 192.168.2.5 |
Apr 15, 2025 21:21:17.583019018 CEST | 53 | 52400 | 1.1.1.1 | 192.168.2.5 |
Apr 15, 2025 21:21:17.760710001 CEST | 53 | 58833 | 1.1.1.1 | 192.168.2.5 |
Apr 15, 2025 21:21:21.013664007 CEST | 65154 | 53 | 192.168.2.5 | 1.1.1.1 |
Apr 15, 2025 21:21:21.013793945 CEST | 49316 | 53 | 192.168.2.5 | 1.1.1.1 |
Apr 15, 2025 21:21:21.120449066 CEST | 53 | 49316 | 1.1.1.1 | 192.168.2.5 |
Apr 15, 2025 21:21:21.120697021 CEST | 53 | 65154 | 1.1.1.1 | 192.168.2.5 |
Apr 15, 2025 21:21:22.313843966 CEST | 49816 | 53 | 192.168.2.5 | 1.1.1.1 |
Apr 15, 2025 21:21:22.314011097 CEST | 54977 | 53 | 192.168.2.5 | 1.1.1.1 |
Apr 15, 2025 21:21:22.421740055 CEST | 53 | 54977 | 1.1.1.1 | 192.168.2.5 |
Apr 15, 2025 21:21:22.435245991 CEST | 53 | 49816 | 1.1.1.1 | 192.168.2.5 |
Apr 15, 2025 21:21:34.748326063 CEST | 53 | 61875 | 1.1.1.1 | 192.168.2.5 |
Apr 15, 2025 21:21:53.450141907 CEST | 53 | 55085 | 1.1.1.1 | 192.168.2.5 |
Apr 15, 2025 21:22:13.541552067 CEST | 138 | 138 | 192.168.2.5 | 192.168.2.255 |
Apr 15, 2025 21:22:16.123394966 CEST | 53 | 53801 | 1.1.1.1 | 192.168.2.5 |
Apr 15, 2025 21:22:16.422666073 CEST | 53 | 51379 | 1.1.1.1 | 192.168.2.5 |
Apr 15, 2025 21:22:18.047419071 CEST | 53 | 58590 | 1.1.1.1 | 192.168.2.5 |
Apr 15, 2025 21:22:19.434112072 CEST | 53 | 53960 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Apr 15, 2025 21:21:21.013664007 CEST | 192.168.2.5 | 1.1.1.1 | 0x4ddd | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 15, 2025 21:21:21.013793945 CEST | 192.168.2.5 | 1.1.1.1 | 0x99af | Standard query (0) | 65 | IN (0x0001) | false | |
Apr 15, 2025 21:21:22.313843966 CEST | 192.168.2.5 | 1.1.1.1 | 0xa977 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 15, 2025 21:21:22.314011097 CEST | 192.168.2.5 | 1.1.1.1 | 0x951d | Standard query (0) | 65 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Apr 15, 2025 21:21:21.120449066 CEST | 1.1.1.1 | 192.168.2.5 | 0x99af | No error (0) | 65 | IN (0x0001) | false | |||
Apr 15, 2025 21:21:21.120697021 CEST | 1.1.1.1 | 192.168.2.5 | 0x4ddd | No error (0) | 173.194.219.106 | A (IP address) | IN (0x0001) | false | ||
Apr 15, 2025 21:21:21.120697021 CEST | 1.1.1.1 | 192.168.2.5 | 0x4ddd | No error (0) | 173.194.219.103 | A (IP address) | IN (0x0001) | false | ||
Apr 15, 2025 21:21:21.120697021 CEST | 1.1.1.1 | 192.168.2.5 | 0x4ddd | No error (0) | 173.194.219.147 | A (IP address) | IN (0x0001) | false | ||
Apr 15, 2025 21:21:21.120697021 CEST | 1.1.1.1 | 192.168.2.5 | 0x4ddd | No error (0) | 173.194.219.99 | A (IP address) | IN (0x0001) | false | ||
Apr 15, 2025 21:21:21.120697021 CEST | 1.1.1.1 | 192.168.2.5 | 0x4ddd | No error (0) | 173.194.219.104 | A (IP address) | IN (0x0001) | false | ||
Apr 15, 2025 21:21:21.120697021 CEST | 1.1.1.1 | 192.168.2.5 | 0x4ddd | No error (0) | 173.194.219.105 | A (IP address) | IN (0x0001) | false | ||
Apr 15, 2025 21:21:22.421740055 CEST | 1.1.1.1 | 192.168.2.5 | 0x951d | No error (0) | d23d3wcthtl67x.cloudfront.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 15, 2025 21:21:22.435245991 CEST | 1.1.1.1 | 192.168.2.5 | 0xa977 | No error (0) | d23d3wcthtl67x.cloudfront.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 15, 2025 21:21:22.435245991 CEST | 1.1.1.1 | 192.168.2.5 | 0xa977 | No error (0) | 3.161.163.103 | A (IP address) | IN (0x0001) | false | ||
Apr 15, 2025 21:21:22.435245991 CEST | 1.1.1.1 | 192.168.2.5 | 0xa977 | No error (0) | 3.161.163.77 | A (IP address) | IN (0x0001) | false | ||
Apr 15, 2025 21:21:22.435245991 CEST | 1.1.1.1 | 192.168.2.5 | 0xa977 | No error (0) | 3.161.163.111 | A (IP address) | IN (0x0001) | false | ||
Apr 15, 2025 21:21:22.435245991 CEST | 1.1.1.1 | 192.168.2.5 | 0xa977 | No error (0) | 3.161.163.74 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port |
---|---|---|---|---|
0 | 192.168.2.5 | 49699 | 173.194.219.94 | 80 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Apr 15, 2025 21:21:17.268279076 CEST | 200 | OUT | |
Apr 15, 2025 21:21:17.375356913 CEST | 1243 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49703 | 3.161.163.103 | 443 | 6880 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-04-15 19:21:22 UTC | 676 | OUT | |
2025-04-15 19:21:22 UTC | 570 | IN | |
2025-04-15 19:21:22 UTC | 15814 | IN | |
2025-04-15 19:21:22 UTC | 9770 | IN | |
2025-04-15 19:21:22 UTC | 2712 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49704 | 3.161.163.103 | 443 | 6880 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-04-15 19:21:23 UTC | 605 | OUT | |
2025-04-15 19:21:23 UTC | 371 | IN | |
2025-04-15 19:21:23 UTC | 117 | IN | |
2025-04-15 19:21:23 UTC | 5 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 3 |
Start time: | 15:21:09 |
Start date: | 15/04/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff71d6b0000 |
File size: | 3'388'000 bytes |
MD5 hash: | E81F54E6C1129887AEA47E7D092680BF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 5 |
Start time: | 15:21:15 |
Start date: | 15/04/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff71d6b0000 |
File size: | 3'388'000 bytes |
MD5 hash: | E81F54E6C1129887AEA47E7D092680BF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 8 |
Start time: | 15:21:17 |
Start date: | 15/04/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff71d6b0000 |
File size: | 3'388'000 bytes |
MD5 hash: | E81F54E6C1129887AEA47E7D092680BF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 11 |
Start time: | 15:21:21 |
Start date: | 15/04/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff71d6b0000 |
File size: | 3'388'000 bytes |
MD5 hash: | E81F54E6C1129887AEA47E7D092680BF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |