Windows
Analysis Report
https://telemgram-rg.org/
Overview
General Information
Detection
Score: | 52 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- chrome.exe (PID: 3660 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 3992 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2248 --fi eld-trial- handle=202 0,i,503756 6686179676 251,302186 2681494806 399,262144 --disable -features= Optimizati onGuideMod elDownload ing,Optimi zationHint s,Optimiza tionHintsF etching,Op timization TargetPred iction /pr efetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- chrome.exe (PID: 2296 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://telem gram-rg.or g/" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: |
Phishing |
---|
Source: | Joe Sandbox AI: | ||
Source: | Joe Sandbox AI: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: |
Source: | Window detected: |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Browser Extensions | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 Registry Run Keys / Startup Folder | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | phishing |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
google.com | 142.250.186.78 | true | false | high | |
www.google.com | 216.58.206.36 | true | false | high | |
telemgram-rg.org | unknown | unknown | true | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
216.58.206.36 | www.google.com | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.5 |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1591415 |
Start date and time: | 2025-01-15 00:23:20 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 2m 8s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | https://telemgram-rg.org/ |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal52.win@20/6@17/3 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- URL not reachable
- Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 142.250.184.227, 142.250.185.238, 142.250.110.84, 142.250.186.46, 142.250.184.238, 172.217.16.206, 199.232.210.172, 2.17.190.73, 216.58.206.46, 142.250.181.238, 2.23.242.162, 4.175.87.197, 13.107.246.45
- Excluded domains from analysis (whitelisted): fs.microsoft.com, clients2.google.com, ocsp.digicert.com, accounts.google.com, redirector.gvt1.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, clientservices.googleapis.com, clients.l.google.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- VT rate limit hit for: https://telemgram-rg.org/
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9739658429169102 |
Encrypted: | false |
SSDEEP: | 48:8jdmsTr3i/HeidAKZdA19ehwiZUklqehry+3:8Qsfic8y |
MD5: | B5B49C5F039FBF03D3C66FC76AC776AC |
SHA1: | F607CD28B668124ABB960905469B3183022E6396 |
SHA-256: | 3C1D1C2761CCCF4CD5FE655CC1727AE70C16195A01D1E8C1527DC1F42CD13915 |
SHA-512: | 43B1C57EB5CDD27356BB7BB2AE52C72BAD7BBA3B203873D28EF8F3DB85A4CA5E072BA4ECE9E913CBACA48142D7020E710BBB041691A968FBC7A0F553C41D69D7 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.9876035633605116 |
Encrypted: | false |
SSDEEP: | 48:8odmsTr3i/HeidAKZdA1weh/iZUkAQkqehsy+2:8Hsfiu9Qxy |
MD5: | 26094B643CB213785D8A7F46F84555FF |
SHA1: | 908B58FE4FD3BB5EC4A04681A3BBD4639AB9658B |
SHA-256: | 2F3C1C89B6DA0D0FFCBCA100B1DA722A7EF3BAFCAF94D97E316951FC51F827DA |
SHA-512: | 480BA6BB7DB4AA552BE518C5AF6443849FFAEB89F0D512846318C1946510906F73C67B69E5580B3961EC9158F65075A96E67D3DB0401B78B9DE9DFF9DFFAF838 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2693 |
Entropy (8bit): | 4.002921491192383 |
Encrypted: | false |
SSDEEP: | 48:8xIdmsTr3sHeidAKZdA14tseh7sFiZUkmgqeh7sqy+BX:8xnsfznwy |
MD5: | 59B9B8EDF20CCDFAF3C6D0F61C7426C5 |
SHA1: | 79895159E7C82E3315C387FA30206737566F50E5 |
SHA-256: | DB25D1324507FC835F6481BD8CBD23A8BE2EA4FAE29156AE9F533BA769E818EF |
SHA-512: | 82A029B49C2DE293C13A47FBEC32F19F92F33704561289E14C694FB331D7D3B1E9152E989E1F0ABED444D749208CC8F1074C313A86469BE9132F83C6385A3212 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.988715325517813 |
Encrypted: | false |
SSDEEP: | 48:8HhdmsTr3i/HeidAKZdA1vehDiZUkwqehYy+R:8HCsfi1yy |
MD5: | 76688029230CBACDB2391FA4FC10F8B7 |
SHA1: | 26A528BBF97177495991744A095073474EE27F60 |
SHA-256: | 5A04E2DB878187AD464D289454AB00132BE5B3E01D54F21232D7E312DA4DAA7D |
SHA-512: | 519289409CBCEFA65376605569886229BC65055A7B2EA6AEAF295CD29F00BDECEE6C011D8C4075364C90E9619768A39F8EEE16B7E7619BD38642EED10FF9364C |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.9753660621308473 |
Encrypted: | false |
SSDEEP: | 48:8PdmsTr3i/HeidAKZdA1hehBiZUk1W1qehuy+C:8Esfil9Oy |
MD5: | 3169B3332DF629F1045542BE2AE427F8 |
SHA1: | DB8DCC0C963A7292ED4F7B8C2D3F8C4A67155143 |
SHA-256: | 5FBA3ECD37682508B685B8BDB51E2DCDB7EDBC3365914C619C93B2CFBBFE3489 |
SHA-512: | 23DF14B632FB3D8C5745C88212561B1EB31530B2F737ABD3D806465290FB45FD430A1261B71DB1764388039CD694BB453E35560C8235A5D994BB91951E27AB17 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2683 |
Entropy (8bit): | 3.9883920023325645 |
Encrypted: | false |
SSDEEP: | 48:8LdmsTr3i/HeidAKZdA1duT+ehOuTbbiZUk5OjqehOuTbwy+yT+:8osfi5T/TbxWOvTbwy7T |
MD5: | FE4782888A221B619F43C3B39FA1FC87 |
SHA1: | 16E40E8072DF94799CC2B0547A5607A9C1A08CCB |
SHA-256: | 8DC980EDB6785F6BB53002698B5E82B91A3880450BEA82B6C9575D5B500BB2D0 |
SHA-512: | CA16FF578E00C86C8964ACCF485173E54C2CCF58B061EFBEF4933ECECD6EDAB265C3ADBC28EB8E2D78C2EC46243A27F8B3EF24EA57D37CE745696E1A2F259A14 |
Malicious: | false |
Reputation: | low |
Preview: |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 15, 2025 00:24:06.124739885 CET | 49675 | 443 | 192.168.2.5 | 23.1.237.91 |
Jan 15, 2025 00:24:06.124747038 CET | 49674 | 443 | 192.168.2.5 | 23.1.237.91 |
Jan 15, 2025 00:24:06.218502998 CET | 49673 | 443 | 192.168.2.5 | 23.1.237.91 |
Jan 15, 2025 00:24:15.734739065 CET | 49674 | 443 | 192.168.2.5 | 23.1.237.91 |
Jan 15, 2025 00:24:15.734791040 CET | 49675 | 443 | 192.168.2.5 | 23.1.237.91 |
Jan 15, 2025 00:24:15.828471899 CET | 49673 | 443 | 192.168.2.5 | 23.1.237.91 |
Jan 15, 2025 00:24:17.510337114 CET | 443 | 49703 | 23.1.237.91 | 192.168.2.5 |
Jan 15, 2025 00:24:17.510451078 CET | 49703 | 443 | 192.168.2.5 | 23.1.237.91 |
Jan 15, 2025 00:24:17.841087103 CET | 49711 | 443 | 192.168.2.5 | 216.58.206.36 |
Jan 15, 2025 00:24:17.841130972 CET | 443 | 49711 | 216.58.206.36 | 192.168.2.5 |
Jan 15, 2025 00:24:17.841253042 CET | 49711 | 443 | 192.168.2.5 | 216.58.206.36 |
Jan 15, 2025 00:24:17.841473103 CET | 49711 | 443 | 192.168.2.5 | 216.58.206.36 |
Jan 15, 2025 00:24:17.841485023 CET | 443 | 49711 | 216.58.206.36 | 192.168.2.5 |
Jan 15, 2025 00:24:18.506316900 CET | 443 | 49711 | 216.58.206.36 | 192.168.2.5 |
Jan 15, 2025 00:24:18.507025957 CET | 49711 | 443 | 192.168.2.5 | 216.58.206.36 |
Jan 15, 2025 00:24:18.507045984 CET | 443 | 49711 | 216.58.206.36 | 192.168.2.5 |
Jan 15, 2025 00:24:18.508058071 CET | 443 | 49711 | 216.58.206.36 | 192.168.2.5 |
Jan 15, 2025 00:24:18.508120060 CET | 49711 | 443 | 192.168.2.5 | 216.58.206.36 |
Jan 15, 2025 00:24:18.509582996 CET | 49711 | 443 | 192.168.2.5 | 216.58.206.36 |
Jan 15, 2025 00:24:18.509643078 CET | 443 | 49711 | 216.58.206.36 | 192.168.2.5 |
Jan 15, 2025 00:24:18.562786102 CET | 49711 | 443 | 192.168.2.5 | 216.58.206.36 |
Jan 15, 2025 00:24:18.562798977 CET | 443 | 49711 | 216.58.206.36 | 192.168.2.5 |
Jan 15, 2025 00:24:18.609663010 CET | 49711 | 443 | 192.168.2.5 | 216.58.206.36 |
Jan 15, 2025 00:24:28.425466061 CET | 443 | 49711 | 216.58.206.36 | 192.168.2.5 |
Jan 15, 2025 00:24:28.425534010 CET | 443 | 49711 | 216.58.206.36 | 192.168.2.5 |
Jan 15, 2025 00:24:28.425662041 CET | 49711 | 443 | 192.168.2.5 | 216.58.206.36 |
Jan 15, 2025 00:24:29.719846010 CET | 49711 | 443 | 192.168.2.5 | 216.58.206.36 |
Jan 15, 2025 00:24:29.719880104 CET | 443 | 49711 | 216.58.206.36 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 15, 2025 00:24:13.344544888 CET | 53 | 58153 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 00:24:13.352952003 CET | 53 | 57717 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 00:24:14.560355902 CET | 53 | 51904 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 00:24:17.829713106 CET | 54983 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 00:24:17.829840899 CET | 49939 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 00:24:17.839406967 CET | 53 | 49939 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 00:24:17.839894056 CET | 53 | 54983 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 00:24:19.428041935 CET | 63401 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 00:24:19.428169012 CET | 57170 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 00:24:19.444058895 CET | 53 | 57170 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 00:24:19.444570065 CET | 53 | 63401 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 00:24:19.445255041 CET | 49968 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 00:24:19.461962938 CET | 53 | 49968 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 00:24:19.539196968 CET | 54299 | 53 | 192.168.2.5 | 8.8.8.8 |
Jan 15, 2025 00:24:19.539577961 CET | 51197 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 00:24:19.548223972 CET | 53 | 51197 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 00:24:19.550247908 CET | 53 | 54299 | 8.8.8.8 | 192.168.2.5 |
Jan 15, 2025 00:24:20.559340954 CET | 60002 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 00:24:20.559607029 CET | 63984 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 00:24:20.576330900 CET | 53 | 60002 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 00:24:20.576483965 CET | 53 | 63984 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 00:24:25.599807978 CET | 63715 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 00:24:25.599958897 CET | 58688 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 00:24:25.616785049 CET | 53 | 58688 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 00:24:25.719746113 CET | 53 | 63715 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 00:24:25.720546961 CET | 52673 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 00:24:25.751867056 CET | 53 | 52673 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 00:24:31.556618929 CET | 53 | 49987 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 00:24:33.966728926 CET | 55428 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 00:24:33.967128038 CET | 60591 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 00:24:33.982983112 CET | 53 | 55428 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 00:24:33.983236074 CET | 53 | 60591 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 00:24:33.985019922 CET | 56832 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 00:24:34.002026081 CET | 53 | 56832 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 00:24:34.018261909 CET | 63052 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 00:24:34.018591881 CET | 50712 | 53 | 192.168.2.5 | 8.8.8.8 |
Jan 15, 2025 00:24:34.027116060 CET | 53 | 63052 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 00:24:34.029084921 CET | 53 | 50712 | 8.8.8.8 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 15, 2025 00:24:17.829713106 CET | 192.168.2.5 | 1.1.1.1 | 0x887d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 00:24:17.829840899 CET | 192.168.2.5 | 1.1.1.1 | 0xf737 | Standard query (0) | 65 | IN (0x0001) | false | |
Jan 15, 2025 00:24:19.428041935 CET | 192.168.2.5 | 1.1.1.1 | 0x5611 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 00:24:19.428169012 CET | 192.168.2.5 | 1.1.1.1 | 0xe479 | Standard query (0) | 65 | IN (0x0001) | false | |
Jan 15, 2025 00:24:19.445255041 CET | 192.168.2.5 | 1.1.1.1 | 0x9037 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 00:24:19.539196968 CET | 192.168.2.5 | 8.8.8.8 | 0x3a9c | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 00:24:19.539577961 CET | 192.168.2.5 | 1.1.1.1 | 0x9c4f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 00:24:20.559340954 CET | 192.168.2.5 | 1.1.1.1 | 0x1e6e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 00:24:20.559607029 CET | 192.168.2.5 | 1.1.1.1 | 0x43c4 | Standard query (0) | 65 | IN (0x0001) | false | |
Jan 15, 2025 00:24:25.599807978 CET | 192.168.2.5 | 1.1.1.1 | 0x6aeb | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 00:24:25.599958897 CET | 192.168.2.5 | 1.1.1.1 | 0x9025 | Standard query (0) | 65 | IN (0x0001) | false | |
Jan 15, 2025 00:24:25.720546961 CET | 192.168.2.5 | 1.1.1.1 | 0xfc3 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 00:24:33.966728926 CET | 192.168.2.5 | 1.1.1.1 | 0xe080 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 00:24:33.967128038 CET | 192.168.2.5 | 1.1.1.1 | 0xf586 | Standard query (0) | 65 | IN (0x0001) | false | |
Jan 15, 2025 00:24:33.985019922 CET | 192.168.2.5 | 1.1.1.1 | 0xd62f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 00:24:34.018261909 CET | 192.168.2.5 | 1.1.1.1 | 0x5771 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 00:24:34.018591881 CET | 192.168.2.5 | 8.8.8.8 | 0x5c5f | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 15, 2025 00:24:17.839406967 CET | 1.1.1.1 | 192.168.2.5 | 0xf737 | No error (0) | 65 | IN (0x0001) | false | |||
Jan 15, 2025 00:24:17.839894056 CET | 1.1.1.1 | 192.168.2.5 | 0x887d | No error (0) | 216.58.206.36 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 00:24:19.444058895 CET | 1.1.1.1 | 192.168.2.5 | 0xe479 | Name error (3) | none | none | 65 | IN (0x0001) | false | |
Jan 15, 2025 00:24:19.444570065 CET | 1.1.1.1 | 192.168.2.5 | 0x5611 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 00:24:19.461962938 CET | 1.1.1.1 | 192.168.2.5 | 0x9037 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 00:24:19.548223972 CET | 1.1.1.1 | 192.168.2.5 | 0x9c4f | No error (0) | 142.250.186.78 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 00:24:19.550247908 CET | 8.8.8.8 | 192.168.2.5 | 0x3a9c | No error (0) | 142.250.75.238 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 00:24:20.576330900 CET | 1.1.1.1 | 192.168.2.5 | 0x1e6e | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 00:24:20.576483965 CET | 1.1.1.1 | 192.168.2.5 | 0x43c4 | Name error (3) | none | none | 65 | IN (0x0001) | false | |
Jan 15, 2025 00:24:25.616785049 CET | 1.1.1.1 | 192.168.2.5 | 0x9025 | Name error (3) | none | none | 65 | IN (0x0001) | false | |
Jan 15, 2025 00:24:25.719746113 CET | 1.1.1.1 | 192.168.2.5 | 0x6aeb | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 00:24:25.751867056 CET | 1.1.1.1 | 192.168.2.5 | 0xfc3 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 00:24:33.982983112 CET | 1.1.1.1 | 192.168.2.5 | 0xe080 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 00:24:33.983236074 CET | 1.1.1.1 | 192.168.2.5 | 0xf586 | Name error (3) | none | none | 65 | IN (0x0001) | false | |
Jan 15, 2025 00:24:34.002026081 CET | 1.1.1.1 | 192.168.2.5 | 0xd62f | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 00:24:34.027116060 CET | 1.1.1.1 | 192.168.2.5 | 0x5771 | No error (0) | 142.250.185.78 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 00:24:34.029084921 CET | 8.8.8.8 | 192.168.2.5 | 0x5c5f | No error (0) | 142.250.75.238 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 18:24:09 |
Start date: | 14/01/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 2 |
Start time: | 18:24:11 |
Start date: | 14/01/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 3 |
Start time: | 18:24:18 |
Start date: | 14/01/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |