Windows
Analysis Report
https://bs.yandex.ru
Overview
Detection
Score: | 0 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
- System is w10x64native
chrome.exe (PID: 3644 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: BB7C48CDDDE076E7EB44022520F40F77) chrome.exe (PID: 7104 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --no-subpr oc-heap-pr ofiling -- field-tria l-handle=2 200,i,7155 1603463895 76464,1377 6737258751 094368,262 144 --disa ble-featur es=Optimiz ationGuide ModelDownl oading,Opt imizationH intsFetchi ng,Optimiz ationTarge tPredictio n --variat ions-seed- version=20 240909-180 142.416000 --mojo-pl atform-cha nnel-handl e=2212 /pr efetch:3 MD5: BB7C48CDDDE076E7EB44022520F40F77)
chrome.exe (PID: 8132 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://bs.ya ndex.ru" MD5: BB7C48CDDDE076E7EB44022520F40F77)
- cleanup
- • Compliance
- • Networking
- • System Summary
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Window detected: |
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Process Injection | 2 Masquerading | OS Credential Dumping | 1 Network Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 3 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 4 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 3 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
bs.yandex.ru | 93.158.134.90 | true | false | high | |
www.google.com | 142.251.167.104 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
93.158.134.90 | bs.yandex.ru | Russian Federation | 13238 | YANDEXRU | false | |
142.251.167.104 | www.google.com | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.11.20 |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1596306 |
Start date and time: | 2025-01-21 23:11:35 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 25s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | https://bs.yandex.ru |
Analysis system description: | Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 128, Firefox 91, Adobe Reader DC 21, Java 8 Update 301 |
Run name: | Potential for more IOCs and behavior |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean0.win@16/0@4/4 |
EGA Information: | Failed |
HCA Information: |
|
- Exclude process from analysis
(whitelisted): dllhost.exe, sv chost.exe - Excluded IPs from analysis (wh
itelisted): 142.251.167.94, 14 2.251.111.113, 142.251.111.100 , 142.251.111.101, 142.251.111 .139, 142.251.111.102, 142.251 .111.138, 142.251.179.84, 142. 251.16.113, 142.251.16.101, 14 2.251.16.138, 142.251.16.139, 142.251.16.102, 142.251.16.100 , 172.253.122.138, 172.253.122 .102, 172.253.122.100, 172.253 .122.139, 172.253.122.113, 172 .253.122.101, 142.251.163.101, 142.251.163.138, 142.251.163. 139, 142.251.163.100, 142.251. 163.102, 142.251.163.113, 142. 251.167.138, 142.251.167.100, 142.251.167.102, 142.251.167.1 01, 142.251.167.139, 142.251.1 67.113, 64.233.180.113, 64.233 .180.101, 64.233.180.102, 64.2 33.180.100, 64.233.180.138, 64 .233.180.139, 172.253.62.100, 172.253.62.101, 172.253.62.139 , 172.253.62.113, 172.253.62.1 02, 172.253.62.138, 142.251.16 .95, 172.253.115.95, 172.253.6 2.95, 172.253.63.95, 142.251.1 63.95, 142.250.31.95, 142.251. 167.95, 64.233.180.95, 142.251 .111.95, 142.251.179.95, 172.2 53.122.95, 199.232.214.172, 14 2.250.31.138, 142.250.31.101, 142.250.31.102, 142.250.31.100 , 14 - Excluded domains from analysis
(whitelisted): clients2.googl e.com, edgedl.me.gvt1.com, acc ounts.google.com, redirector.g vt1.com, update.googleapis.com , ctldl.windowsupdate.com, cli entservices.googleapis.com, cl ients.l.google.com, www.google apis.com, dns.msftncsi.com - Not all processes where analyz
ed, report is missing behavior information - VT rate limit hit for: https:
//bs.yandex.ru
Download Network PCAP: filtered – full
- Total Packets: 53
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 21, 2025 23:13:46.105429888 CET | 49776 | 443 | 192.168.11.20 | 142.251.167.104 |
Jan 21, 2025 23:13:46.105470896 CET | 443 | 49776 | 142.251.167.104 | 192.168.11.20 |
Jan 21, 2025 23:13:46.105647087 CET | 49776 | 443 | 192.168.11.20 | 142.251.167.104 |
Jan 21, 2025 23:13:46.105947018 CET | 49776 | 443 | 192.168.11.20 | 142.251.167.104 |
Jan 21, 2025 23:13:46.105971098 CET | 443 | 49776 | 142.251.167.104 | 192.168.11.20 |
Jan 21, 2025 23:13:46.529584885 CET | 443 | 49776 | 142.251.167.104 | 192.168.11.20 |
Jan 21, 2025 23:13:46.530004978 CET | 49776 | 443 | 192.168.11.20 | 142.251.167.104 |
Jan 21, 2025 23:13:46.530016899 CET | 443 | 49776 | 142.251.167.104 | 192.168.11.20 |
Jan 21, 2025 23:13:46.530931950 CET | 443 | 49776 | 142.251.167.104 | 192.168.11.20 |
Jan 21, 2025 23:13:46.531168938 CET | 49776 | 443 | 192.168.11.20 | 142.251.167.104 |
Jan 21, 2025 23:13:46.531768084 CET | 49776 | 443 | 192.168.11.20 | 142.251.167.104 |
Jan 21, 2025 23:13:46.531846046 CET | 443 | 49776 | 142.251.167.104 | 192.168.11.20 |
Jan 21, 2025 23:13:46.581717968 CET | 49776 | 443 | 192.168.11.20 | 142.251.167.104 |
Jan 21, 2025 23:13:46.581728935 CET | 443 | 49776 | 142.251.167.104 | 192.168.11.20 |
Jan 21, 2025 23:13:46.628470898 CET | 49776 | 443 | 192.168.11.20 | 142.251.167.104 |
Jan 21, 2025 23:13:47.309658051 CET | 49777 | 443 | 192.168.11.20 | 93.158.134.90 |
Jan 21, 2025 23:13:47.309695959 CET | 443 | 49777 | 93.158.134.90 | 192.168.11.20 |
Jan 21, 2025 23:13:47.309880972 CET | 49777 | 443 | 192.168.11.20 | 93.158.134.90 |
Jan 21, 2025 23:13:47.309972048 CET | 49778 | 443 | 192.168.11.20 | 93.158.134.90 |
Jan 21, 2025 23:13:47.310019016 CET | 443 | 49778 | 93.158.134.90 | 192.168.11.20 |
Jan 21, 2025 23:13:47.310173035 CET | 49778 | 443 | 192.168.11.20 | 93.158.134.90 |
Jan 21, 2025 23:13:47.310173035 CET | 49777 | 443 | 192.168.11.20 | 93.158.134.90 |
Jan 21, 2025 23:13:47.310199022 CET | 443 | 49777 | 93.158.134.90 | 192.168.11.20 |
Jan 21, 2025 23:13:47.310503960 CET | 49778 | 443 | 192.168.11.20 | 93.158.134.90 |
Jan 21, 2025 23:13:47.310528994 CET | 443 | 49778 | 93.158.134.90 | 192.168.11.20 |
Jan 21, 2025 23:13:48.009459019 CET | 443 | 49777 | 93.158.134.90 | 192.168.11.20 |
Jan 21, 2025 23:13:48.009850025 CET | 49777 | 443 | 192.168.11.20 | 93.158.134.90 |
Jan 21, 2025 23:13:48.009888887 CET | 443 | 49777 | 93.158.134.90 | 192.168.11.20 |
Jan 21, 2025 23:13:48.012635946 CET | 443 | 49777 | 93.158.134.90 | 192.168.11.20 |
Jan 21, 2025 23:13:48.012980938 CET | 49777 | 443 | 192.168.11.20 | 93.158.134.90 |
Jan 21, 2025 23:13:48.013637066 CET | 49777 | 443 | 192.168.11.20 | 93.158.134.90 |
Jan 21, 2025 23:13:48.013780117 CET | 49777 | 443 | 192.168.11.20 | 93.158.134.90 |
Jan 21, 2025 23:13:48.013911009 CET | 443 | 49777 | 93.158.134.90 | 192.168.11.20 |
Jan 21, 2025 23:13:48.018378019 CET | 443 | 49778 | 93.158.134.90 | 192.168.11.20 |
Jan 21, 2025 23:13:48.018706083 CET | 49778 | 443 | 192.168.11.20 | 93.158.134.90 |
Jan 21, 2025 23:13:48.018738031 CET | 443 | 49778 | 93.158.134.90 | 192.168.11.20 |
Jan 21, 2025 23:13:48.021560907 CET | 443 | 49778 | 93.158.134.90 | 192.168.11.20 |
Jan 21, 2025 23:13:48.021794081 CET | 49778 | 443 | 192.168.11.20 | 93.158.134.90 |
Jan 21, 2025 23:13:48.022053003 CET | 49778 | 443 | 192.168.11.20 | 93.158.134.90 |
Jan 21, 2025 23:13:48.022274971 CET | 443 | 49778 | 93.158.134.90 | 192.168.11.20 |
Jan 21, 2025 23:13:48.064994097 CET | 49777 | 443 | 192.168.11.20 | 93.158.134.90 |
Jan 21, 2025 23:13:48.065032959 CET | 49778 | 443 | 192.168.11.20 | 93.158.134.90 |
Jan 21, 2025 23:13:48.065035105 CET | 443 | 49777 | 93.158.134.90 | 192.168.11.20 |
Jan 21, 2025 23:13:48.065069914 CET | 443 | 49778 | 93.158.134.90 | 192.168.11.20 |
Jan 21, 2025 23:13:48.114269018 CET | 49778 | 443 | 192.168.11.20 | 93.158.134.90 |
Jan 21, 2025 23:13:48.114301920 CET | 49777 | 443 | 192.168.11.20 | 93.158.134.90 |
Jan 21, 2025 23:13:48.477355003 CET | 443 | 49777 | 93.158.134.90 | 192.168.11.20 |
Jan 21, 2025 23:13:48.477554083 CET | 443 | 49777 | 93.158.134.90 | 192.168.11.20 |
Jan 21, 2025 23:13:48.477735043 CET | 49777 | 443 | 192.168.11.20 | 93.158.134.90 |
Jan 21, 2025 23:13:48.478240967 CET | 49777 | 443 | 192.168.11.20 | 93.158.134.90 |
Jan 21, 2025 23:13:48.478283882 CET | 443 | 49777 | 93.158.134.90 | 192.168.11.20 |
Jan 21, 2025 23:13:48.505419016 CET | 49778 | 443 | 192.168.11.20 | 93.158.134.90 |
Jan 21, 2025 23:13:48.546256065 CET | 443 | 49778 | 93.158.134.90 | 192.168.11.20 |
Jan 21, 2025 23:13:48.763717890 CET | 443 | 49778 | 93.158.134.90 | 192.168.11.20 |
Jan 21, 2025 23:13:48.763911009 CET | 443 | 49778 | 93.158.134.90 | 192.168.11.20 |
Jan 21, 2025 23:13:48.764072895 CET | 49778 | 443 | 192.168.11.20 | 93.158.134.90 |
Jan 21, 2025 23:13:48.764265060 CET | 49778 | 443 | 192.168.11.20 | 93.158.134.90 |
Jan 21, 2025 23:13:48.764298916 CET | 443 | 49778 | 93.158.134.90 | 192.168.11.20 |
Jan 21, 2025 23:13:56.562503099 CET | 443 | 49776 | 142.251.167.104 | 192.168.11.20 |
Jan 21, 2025 23:13:56.562567949 CET | 443 | 49776 | 142.251.167.104 | 192.168.11.20 |
Jan 21, 2025 23:13:56.562756062 CET | 49776 | 443 | 192.168.11.20 | 142.251.167.104 |
Jan 21, 2025 23:13:57.441385984 CET | 49776 | 443 | 192.168.11.20 | 142.251.167.104 |
Jan 21, 2025 23:13:57.441415071 CET | 443 | 49776 | 142.251.167.104 | 192.168.11.20 |
Jan 21, 2025 23:14:23.004509926 CET | 49768 | 443 | 192.168.11.20 | 13.107.21.237 |
Jan 21, 2025 23:14:23.174294949 CET | 49769 | 80 | 192.168.11.20 | 142.251.179.94 |
Jan 21, 2025 23:14:23.174294949 CET | 49767 | 80 | 192.168.11.20 | 23.53.11.104 |
Jan 21, 2025 23:14:23.283966064 CET | 80 | 49767 | 23.53.11.104 | 192.168.11.20 |
Jan 21, 2025 23:14:23.283977032 CET | 80 | 49769 | 142.251.179.94 | 192.168.11.20 |
Jan 21, 2025 23:14:23.284128904 CET | 49769 | 80 | 192.168.11.20 | 142.251.179.94 |
Jan 21, 2025 23:14:23.284207106 CET | 49767 | 80 | 192.168.11.20 | 23.53.11.104 |
Jan 21, 2025 23:14:46.050081968 CET | 49786 | 443 | 192.168.11.20 | 142.251.167.104 |
Jan 21, 2025 23:14:46.050112963 CET | 443 | 49786 | 142.251.167.104 | 192.168.11.20 |
Jan 21, 2025 23:14:46.050288916 CET | 49786 | 443 | 192.168.11.20 | 142.251.167.104 |
Jan 21, 2025 23:14:46.050753117 CET | 49786 | 443 | 192.168.11.20 | 142.251.167.104 |
Jan 21, 2025 23:14:46.050767899 CET | 443 | 49786 | 142.251.167.104 | 192.168.11.20 |
Jan 21, 2025 23:14:46.476706982 CET | 443 | 49786 | 142.251.167.104 | 192.168.11.20 |
Jan 21, 2025 23:14:46.477148056 CET | 49786 | 443 | 192.168.11.20 | 142.251.167.104 |
Jan 21, 2025 23:14:46.477201939 CET | 443 | 49786 | 142.251.167.104 | 192.168.11.20 |
Jan 21, 2025 23:14:46.478812933 CET | 443 | 49786 | 142.251.167.104 | 192.168.11.20 |
Jan 21, 2025 23:14:46.479300022 CET | 49786 | 443 | 192.168.11.20 | 142.251.167.104 |
Jan 21, 2025 23:14:46.479669094 CET | 443 | 49786 | 142.251.167.104 | 192.168.11.20 |
Jan 21, 2025 23:14:46.533611059 CET | 49786 | 443 | 192.168.11.20 | 142.251.167.104 |
Jan 21, 2025 23:14:56.480484009 CET | 443 | 49786 | 142.251.167.104 | 192.168.11.20 |
Jan 21, 2025 23:14:56.480642080 CET | 443 | 49786 | 142.251.167.104 | 192.168.11.20 |
Jan 21, 2025 23:14:56.480874062 CET | 49786 | 443 | 192.168.11.20 | 142.251.167.104 |
Jan 21, 2025 23:14:57.441446066 CET | 49786 | 443 | 192.168.11.20 | 142.251.167.104 |
Jan 21, 2025 23:14:57.441493988 CET | 443 | 49786 | 142.251.167.104 | 192.168.11.20 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 21, 2025 23:13:34.009926081 CET | 137 | 137 | 192.168.11.20 | 192.168.11.255 |
Jan 21, 2025 23:13:34.744728088 CET | 137 | 137 | 192.168.11.20 | 192.168.11.255 |
Jan 21, 2025 23:13:35.509829998 CET | 137 | 137 | 192.168.11.20 | 192.168.11.255 |
Jan 21, 2025 23:13:41.287081003 CET | 59642 | 1900 | 192.168.11.20 | 239.255.255.250 |
Jan 21, 2025 23:13:41.319607019 CET | 53 | 56605 | 1.1.1.1 | 192.168.11.20 |
Jan 21, 2025 23:13:41.366626024 CET | 53 | 59641 | 1.1.1.1 | 192.168.11.20 |
Jan 21, 2025 23:13:42.208003998 CET | 53 | 53359 | 1.1.1.1 | 192.168.11.20 |
Jan 21, 2025 23:13:42.288134098 CET | 59642 | 1900 | 192.168.11.20 | 239.255.255.250 |
Jan 21, 2025 23:13:43.299276114 CET | 59642 | 1900 | 192.168.11.20 | 239.255.255.250 |
Jan 21, 2025 23:13:43.780488014 CET | 53 | 49185 | 1.1.1.1 | 192.168.11.20 |
Jan 21, 2025 23:13:44.314677954 CET | 59642 | 1900 | 192.168.11.20 | 239.255.255.250 |
Jan 21, 2025 23:13:44.711016893 CET | 137 | 137 | 192.168.11.20 | 192.168.11.255 |
Jan 21, 2025 23:13:45.456885099 CET | 137 | 137 | 192.168.11.20 | 192.168.11.255 |
Jan 21, 2025 23:13:45.989814997 CET | 61891 | 53 | 192.168.11.20 | 1.1.1.1 |
Jan 21, 2025 23:13:45.989878893 CET | 49624 | 53 | 192.168.11.20 | 1.1.1.1 |
Jan 21, 2025 23:13:46.104732037 CET | 53 | 61891 | 1.1.1.1 | 192.168.11.20 |
Jan 21, 2025 23:13:46.104773045 CET | 53 | 49624 | 1.1.1.1 | 192.168.11.20 |
Jan 21, 2025 23:13:46.222398043 CET | 137 | 137 | 192.168.11.20 | 192.168.11.255 |
Jan 21, 2025 23:13:47.190248966 CET | 62296 | 53 | 192.168.11.20 | 1.1.1.1 |
Jan 21, 2025 23:13:47.190367937 CET | 64053 | 53 | 192.168.11.20 | 1.1.1.1 |
Jan 21, 2025 23:13:47.307532072 CET | 53 | 62296 | 1.1.1.1 | 192.168.11.20 |
Jan 21, 2025 23:13:47.309200048 CET | 53 | 64053 | 1.1.1.1 | 192.168.11.20 |
Jan 21, 2025 23:14:03.897799969 CET | 53 | 57747 | 1.1.1.1 | 192.168.11.20 |
Jan 21, 2025 23:14:11.056092024 CET | 53 | 56378 | 1.1.1.1 | 192.168.11.20 |
Jan 21, 2025 23:14:25.819854975 CET | 53 | 52925 | 1.1.1.1 | 192.168.11.20 |
Jan 21, 2025 23:14:41.359694958 CET | 53 | 53165 | 1.1.1.1 | 192.168.11.20 |
Jan 21, 2025 23:14:51.521059036 CET | 53 | 62839 | 1.1.1.1 | 192.168.11.20 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 21, 2025 23:13:45.989814997 CET | 192.168.11.20 | 1.1.1.1 | 0x85b7 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 21, 2025 23:13:45.989878893 CET | 192.168.11.20 | 1.1.1.1 | 0xeadb | Standard query (0) | 65 | IN (0x0001) | false | |
Jan 21, 2025 23:13:47.190248966 CET | 192.168.11.20 | 1.1.1.1 | 0xa0e7 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 21, 2025 23:13:47.190367937 CET | 192.168.11.20 | 1.1.1.1 | 0x8d38 | Standard query (0) | 65 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 21, 2025 23:13:46.104732037 CET | 1.1.1.1 | 192.168.11.20 | 0x85b7 | No error (0) | 142.251.167.104 | A (IP address) | IN (0x0001) | false | ||
Jan 21, 2025 23:13:46.104732037 CET | 1.1.1.1 | 192.168.11.20 | 0x85b7 | No error (0) | 142.251.167.99 | A (IP address) | IN (0x0001) | false | ||
Jan 21, 2025 23:13:46.104732037 CET | 1.1.1.1 | 192.168.11.20 | 0x85b7 | No error (0) | 142.251.167.147 | A (IP address) | IN (0x0001) | false | ||
Jan 21, 2025 23:13:46.104732037 CET | 1.1.1.1 | 192.168.11.20 | 0x85b7 | No error (0) | 142.251.167.103 | A (IP address) | IN (0x0001) | false | ||
Jan 21, 2025 23:13:46.104732037 CET | 1.1.1.1 | 192.168.11.20 | 0x85b7 | No error (0) | 142.251.167.105 | A (IP address) | IN (0x0001) | false | ||
Jan 21, 2025 23:13:46.104732037 CET | 1.1.1.1 | 192.168.11.20 | 0x85b7 | No error (0) | 142.251.167.106 | A (IP address) | IN (0x0001) | false | ||
Jan 21, 2025 23:13:46.104773045 CET | 1.1.1.1 | 192.168.11.20 | 0xeadb | No error (0) | 65 | IN (0x0001) | false | |||
Jan 21, 2025 23:13:47.307532072 CET | 1.1.1.1 | 192.168.11.20 | 0xa0e7 | No error (0) | 93.158.134.90 | A (IP address) | IN (0x0001) | false | ||
Jan 21, 2025 23:13:47.307532072 CET | 1.1.1.1 | 192.168.11.20 | 0xa0e7 | No error (0) | 87.250.250.90 | A (IP address) | IN (0x0001) | false | ||
Jan 21, 2025 23:13:47.307532072 CET | 1.1.1.1 | 192.168.11.20 | 0xa0e7 | No error (0) | 77.88.21.90 | A (IP address) | IN (0x0001) | false | ||
Jan 21, 2025 23:13:47.307532072 CET | 1.1.1.1 | 192.168.11.20 | 0xa0e7 | No error (0) | 213.180.204.90 | A (IP address) | IN (0x0001) | false | ||
Jan 21, 2025 23:13:47.307532072 CET | 1.1.1.1 | 192.168.11.20 | 0xa0e7 | No error (0) | 213.180.193.90 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.11.20 | 49777 | 93.158.134.90 | 443 | 7104 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-21 22:13:48 UTC | 662 | OUT | |
2025-01-21 22:13:48 UTC | 1170 | IN | |
2025-01-21 22:13:48 UTC | 29 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.11.20 | 49778 | 93.158.134.90 | 443 | 7104 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-21 22:13:48 UTC | 914 | OUT | |
2025-01-21 22:13:48 UTC | 427 | IN | |
2025-01-21 22:13:48 UTC | 29 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 17:13:39 |
Start date: | 21/01/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff794780000 |
File size: | 2'742'376 bytes |
MD5 hash: | BB7C48CDDDE076E7EB44022520F40F77 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 1 |
Start time: | 17:13:40 |
Start date: | 21/01/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff794780000 |
File size: | 2'742'376 bytes |
MD5 hash: | BB7C48CDDDE076E7EB44022520F40F77 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 5 |
Start time: | 17:13:46 |
Start date: | 21/01/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff794780000 |
File size: | 2'742'376 bytes |
MD5 hash: | BB7C48CDDDE076E7EB44022520F40F77 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |