Windows
Analysis Report
http://coaufu.com/xr.php?e=10kms74ZqPpGbF6GeOnb5349fnpoVGpGa0xzT0VWM21jTUZib1VKckdGZDdyc1B1L08rRVdPYzlxRU1BV3ZyZWdBTE9zSFlrckRmbHBpZW0xZnBTbHZOeHJHeGRJZGN2NW5YTERCbDY3bWh3a0RZUWM2WHgzNHZGVTFJa2EzRHZMc05RVkdmT0M3TllTUElCTlRtd1BXaCtrZE5SaTMyZXZlMTlzdW9FdVBPemROankydFc4bkh1bi9YVWw3V1JaTW5VaHJNRzg5SWlaR
Overview
General Information
Detection
Score: | 56 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
chrome.exe (PID: 3244 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --s tart-maxim ized "abou t:blank" MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 1016 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --no-pre-r ead-main-d ll --field -trial-han dle=2144,i ,856305415 5903528755 ,125347155 1842718358 ,262144 -- disable-fe atures=Opt imizationG uideModelD ownloading ,Optimizat ionHints,O ptimizatio nHintsFetc hing,Optim izationTar getPredict ion --vari ations-see d-version= 20250306-1 83004.4290 00 --mojo- platform-c hannel-han dle=2184 / prefetch:3 MD5: E81F54E6C1129887AEA47E7D092680BF)
chrome.exe (PID: 6764 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt p://coaufu .com/xr.ph p?e=10kms7 4ZqPpGbF6G eOnb5349fn poVGpGa0xz T0VWM21jTU Zib1VKckdG ZDdyc1B1L0 8rRVdPYzlx RU1BV3ZyZW dBTE9zSFlr ckRmbHBpZW 0xZnBTbHZO eHJHeGRJZG N2NW5YTERC bDY3bWh3a0 RZUWM2WHgz NHZGVTFJa2 EzRHZMc05R VkdmT0M3Tl lTUElCTlRt d1BXaCtrZE 5SaTMyZXZl MTlzdW9FdV BPemROanky dFc4bkh1bi 9YVWw3V1Ja TW5VaHJNRz g5SWlaRFJ2 bFA1MlhzQW t5UzJ2SkFl TS8wZXF1RT F2QmpQMC80 NFd2a0JyWk pmSUI0eGJu Umx3dlJ6a0 5RaDJuMEpq RDVuQ2JlZT Z6TjRKU0dL N09scVZNRE pyQ3V6TUJj dG9Lem1JZT Uvc2QyNzFB VytLck9CZG VkWVFOWVVt cmtDalY2aX NZYzBJd1d0 YTdCU3lhR3 FYRm5QaFIx K0N1cmgrUj Voc01ZRVFR K1kzZkd0QX M0WmFxNjQr ZGxUMnZyK2 J6R29CYjJR SXRHRlZBNG 94SGJGc1NU MWlNMEZFL1 R5dG9TcmRv ZFh1eTRwMU cyRXVhMHZX dG4zQm5RSl ZzMVpLZkJW ZjRDOExLem 8vL0lXdFVK WHVPVFVLVD JsNWppWURp TnkvTm95UG cxY0xtY0ZF dnlrZXAxTD ZiRjRFaTRI UUhZRVRUTm hCZjdCdDFh VE5ORDBWTk wyYmZNODg2 SmxFN0paMi 9melVIWUov UzlNeDJvRD ZjS3Z3dGE1 WTJuS0FLd2 xzM3FLdThW U0RzRVBPRX dKRmpNZ1ND WDRNUHgrOC 9raGJLcVFW d0puSVk3NT dyeVZzMEw3 UDhCdzV6OF dkWGJ5Nm93 YnVaM3l5bz JkOG9DOEM3 emJ0WmxDb2 N6OUw3eDJG WUVhelBHSC tRNUQ3VkF4 ZmEwN3dpSD I4QS9DdFBo MFlhanBlWG ZxNmNnMStr YlJsdk5qVm 9OVzhSS01u a1czUElRYV RuR0RxNFov TnVzVEw1OD h5cForRGVY NklIYkk4WT IvbUIveGlz eUpJb2lrQT hTTFlTdVVS bzFubEd1YW dEbENGRmk0 NkYyWmtwWC s4eDQ5NWtt YVRkT0FnV2 JvT1JJblVt SU9GNlJ1Nn ptZFdaeHJW K0VDalZ3a0 Y3Y0ZTQ21u L04xNnJ6TX lyTVBnQmlQ R3JsMzFWN2 dQRGRmUENQ Rk9CRXVneT BXTWovK09O SzVQd0Vrbm o3SFViQm9K NjE0ZERSQ2 Fyak9iZkZa ZzVsUk5vN2 81NzFnL1ZZ QVN5ZXYvOX oxZzhEc2Fs cnRrYlpzR1 VVU3M2cVE9 PQ%3D%3D" MD5: E81F54E6C1129887AEA47E7D092680BF)
- cleanup
- • AV Detection
- • Compliance
- • Networking
- • System Summary
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | Avira URL Cloud: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | File created: | Jump to behavior |
Source: | File deleted: | Jump to behavior |
Source: | Classification label: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Window detected: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 File Deletion | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 1 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | phishing |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | phishing |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
coaufu.com | 103.224.182.206 | true | false | unknown | |
www.google.com | 142.251.116.106 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown | |
false | high | ||
false | high | ||
false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
103.224.182.206 | coaufu.com | Australia | 133618 | TRELLIAN-AS-APTrellianPtyLimitedAU | false | |
142.251.116.106 | www.google.com | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.4 |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1658194 |
Start date and time: | 2025-04-07 12:40:02 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 2m 54s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | http://coaufu.com/xr.php?e=10kms74ZqPpGbF6GeOnb5349fnpoVGpGa0xzT0VWM21jTUZib1VKckdGZDdyc1B1L08rRVdPYzlxRU1BV3ZyZWdBTE9zSFlrckRmbHBpZW0xZnBTbHZOeHJHeGRJZGN2NW5YTERCbDY3bWh3a0RZUWM2WHgzNHZGVTFJa2EzRHZMc05RVkdmT0M3TllTUElCTlRtd1BXaCtrZE5SaTMyZXZlMTlzdW9FdVBPemROankydFc4bkh1bi9YVWw3V1JaTW5VaHJNRzg5SWlaRFJ2bFA1MlhzQWt5UzJ2SkFlTS8wZXF1RTF2QmpQMC80NFd2a0JyWkpmSUI0eGJuUmx3dlJ6a05RaDJuMEpqRDVuQ2JlZTZ6TjRKU0dLN09scVZNREpyQ3V6TUJjdG9Lem1JZTUvc2QyNzFBVytLck9CZGVkWVFOWVVtcmtDalY2aXNZYzBJd1d0YTdCU3lhR3FYRm5QaFIxK0N1cmgrUjVoc01ZRVFRK1kzZkd0QXM0WmFxNjQrZGxUMnZyK2J6R29CYjJRSXRHRlZBNG94SGJGc1NUMWlNMEZFL1R5dG9TcmRvZFh1eTRwMUcyRXVhMHZXdG4zQm5RSlZzMVpLZkJWZjRDOExLem8vL0lXdFVKWHVPVFVLVDJsNWppWURpTnkvTm95UGcxY0xtY0ZFdnlrZXAxTDZiRjRFaTRIUUhZRVRUTmhCZjdCdDFhVE5ORDBWTkwyYmZNODg2SmxFN0paMi9melVIWUovUzlNeDJvRDZjS3Z3dGE1WTJuS0FLd2xzM3FLdThWU0RzRVBPRXdKRmpNZ1NDWDRNUHgrOC9raGJLcVFWd0puSVk3NTdyeVZzMEw3UDhCdzV6OFdkWGJ5Nm93YnVaM3l5bzJkOG9DOEM3emJ0WmxDb2N6OUw3eDJGWUVhelBHSCtRNUQ3VkF4ZmEwN3dpSDI4QS9DdFBoMFlhanBlWGZxNmNnMStrYlJsdk5qVm9OVzhSS01ua1czUElRYVRuR0RxNFovTnVzVEw1ODh5cForRGVYNklIYkk4WTIvbUIveGlzeUpJb2lrQThTTFlTdVVSbzFubEd1YWdEbENGRmk0NkYyWmtwWCs4eDQ5NWttYVRkT0FnV2JvT1JJblVtSU9GNlJ1NnptZFdaeHJWK0VDalZ3a0Y3Y0ZTQ21uL04xNnJ6TXlyTVBnQmlQR3JsMzFWN2dQRGRmUENQRk9CRXVneTBXTWovK09OSzVQd0Vrbmo3SFViQm9KNjE0ZERSQ2Fyak9iZkZaZzVsUk5vN281NzFnL1ZZQVN5ZXYvOXoxZzhEc2FscnRrYlpzR1VVU3M2cVE9PQ%3D%3D |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 20 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal56.win@22/2@6/3 |
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, a udiodg.exe, RuntimeBroker.exe, ShellExperienceHost.exe, SIHC lient.exe, SgrmBroker.exe, bac kgroundTaskHost.exe, conhost.e xe, svchost.exe - Excluded IPs from analysis (wh
itelisted): 172.253.115.84, 14 2.250.80.14, 172.217.165.131, 142.250.81.238, 142.251.40.238 , 142.250.64.110, 142.250.80.7 8, 199.232.210.172, 23.203.176 .221, 142.250.65.174, 142.251. 40.142, 142.251.35.174, 142.25 0.65.238, 142.250.72.99, 142.2 51.40.174, 142.250.80.35, 142. 250.80.110, 23.204.23.20, 20.1 09.210.53 - Excluded domains from analysis
(whitelisted): fs.microsoft.c om, accounts.google.com, slscr .update.microsoft.com, ctldl.w indowsupdate.com, clientservic es.googleapis.com, fe3cr.deliv ery.mp.microsoft.com, clients2 .google.com, ocsp.digicert.com , edgedl.me.gvt1.com, redirect or.gvt1.com, update.googleapis .com, clients.l.google.com, c. pki.goog - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtOpenFile calls found . - VT rate limit hit for: http:/
/coaufu.com/xr.php?e=10kms74Zq PpGbF6GeOnb5349fnpoVGpGa0xzT0V WM21jTUZib1VKckdGZDdyc1B1L08rR VdPYzlxRU1BV3ZyZWdBTE9zSFlrckR mbHBpZW0xZnBTbHZOeHJHeGRJZGN2N W5YTERCbDY3bWh3a0RZUWM2WHgzNHZ GVTFJa2EzRHZMc05RVkdmT0M3TllTU ElCTlRtd1BXaCtrZE5SaTMyZXZlMTl zdW9FdVBPemROankydFc4bkh1bi9YV Ww3V1JaTW5VaHJNRzg5SWlaRFJ2bFA 1MlhzQWt5UzJ2SkFlTS8wZXF1RTF2Q mpQMC80NFd2a0JyWkpmSUI0eGJuUmx 3dlJ6a05RaDJuMEpqRDVuQ2JlZTZ6T jRKU0dLN09scVZNREpyQ3V6TUJjdG9 Lem1JZTUvc2QyNzFBVytLck9CZGVkW VFOWVVtcmtDalY2aXNZYzBJd1d0YTd CU3lhR3FYRm5QaFIxK0N1cmgrUjVoc 01ZRVFRK1kzZkd0QXM0WmFxNjQrZGx UMnZyK2J6R29CYjJRSXRHRlZBNG94S GJGc1NUMWlNMEZFL1R5dG9TcmRvZFh 1eTRwMUcyRXVhMHZXdG4zQm5RSlZzM VpLZkJWZjRDOExLem8vL0lXdFVKWHV PVFVLVDJsNWppWURpTnkvTm95UGcxY 0xtY0ZFdnlrZXAxTDZiRjRFaTRIUUh ZRVRUTmhCZjdCdDFhVE5ORDBWTkwyY mZNODg2SmxFN0paMi9melVIWUovUzl NeDJvRDZjS3Z3dGE1WTJuS0FLd2xzM 3FLdThWU0RzRVBPRXdKRmpNZ1NDWDR NUHgrOC9raGJLcVFWd0puSVk3NTdye VZzMEw3UDhCdzV6OFdkWGJ5Nm93YnV aM3l5bzJkOG9DOEM3emJ0WmxDb2N6O Uw3eDJGWUVhelBHSCtRNUQ3VkF4ZmE wN3dpSDI4QS9DdFBoMFlhanBlWGZxN mNnM
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 94 |
Entropy (8bit): | 4.648751656165808 |
Encrypted: | false |
SSDEEP: | 3:qVZqcMsMgs0UL3AE+FoJRx+QVBK3z:qzsgs0HE+2XVBmz |
MD5: | E96DDCEB1C305B9AD21EAAE42522C26F |
SHA1: | AD08AE39A71ED5BA992B8B5DABC450D046354696 |
SHA-256: | 9221CFEDFC5E03790F46C7890BCA21FCC47C5788D89DAB0AA0799C492B6AE78A |
SHA-512: | 1CC850F76467645447E9935F4DE13EDE698727B4FB598C7BD36DE2779596D8B5A85CB94B0CF1FB2259AD1D988F1F199E3F4C310DFDC22FCDD378B8E773F0DBD5 |
Malicious: | false |
Reputation: | low |
URL: | https://coaufu.com/favicon.ico |
Preview: |
Download Network PCAP: filtered – full
- Total Packets: 73
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 7, 2025 12:41:00.671304941 CEST | 49671 | 443 | 192.168.2.4 | 204.79.197.203 |
Apr 7, 2025 12:41:01.079107046 CEST | 49671 | 443 | 192.168.2.4 | 204.79.197.203 |
Apr 7, 2025 12:41:01.857944965 CEST | 49671 | 443 | 192.168.2.4 | 204.79.197.203 |
Apr 7, 2025 12:41:03.061052084 CEST | 49671 | 443 | 192.168.2.4 | 204.79.197.203 |
Apr 7, 2025 12:41:05.054503918 CEST | 49720 | 443 | 192.168.2.4 | 142.251.116.106 |
Apr 7, 2025 12:41:05.054557085 CEST | 443 | 49720 | 142.251.116.106 | 192.168.2.4 |
Apr 7, 2025 12:41:05.054771900 CEST | 49720 | 443 | 192.168.2.4 | 142.251.116.106 |
Apr 7, 2025 12:41:05.054945946 CEST | 49720 | 443 | 192.168.2.4 | 142.251.116.106 |
Apr 7, 2025 12:41:05.054964066 CEST | 443 | 49720 | 142.251.116.106 | 192.168.2.4 |
Apr 7, 2025 12:41:05.328006983 CEST | 443 | 49720 | 142.251.116.106 | 192.168.2.4 |
Apr 7, 2025 12:41:05.328099966 CEST | 49720 | 443 | 192.168.2.4 | 142.251.116.106 |
Apr 7, 2025 12:41:05.329665899 CEST | 49720 | 443 | 192.168.2.4 | 142.251.116.106 |
Apr 7, 2025 12:41:05.329679012 CEST | 443 | 49720 | 142.251.116.106 | 192.168.2.4 |
Apr 7, 2025 12:41:05.330003023 CEST | 443 | 49720 | 142.251.116.106 | 192.168.2.4 |
Apr 7, 2025 12:41:05.373467922 CEST | 49720 | 443 | 192.168.2.4 | 142.251.116.106 |
Apr 7, 2025 12:41:05.467223883 CEST | 49671 | 443 | 192.168.2.4 | 204.79.197.203 |
Apr 7, 2025 12:41:06.366545916 CEST | 49722 | 443 | 192.168.2.4 | 103.224.182.206 |
Apr 7, 2025 12:41:06.366585016 CEST | 443 | 49722 | 103.224.182.206 | 192.168.2.4 |
Apr 7, 2025 12:41:06.366657019 CEST | 49722 | 443 | 192.168.2.4 | 103.224.182.206 |
Apr 7, 2025 12:41:06.369739056 CEST | 49723 | 80 | 192.168.2.4 | 103.224.182.206 |
Apr 7, 2025 12:41:06.369877100 CEST | 49724 | 80 | 192.168.2.4 | 103.224.182.206 |
Apr 7, 2025 12:41:06.375312090 CEST | 49722 | 443 | 192.168.2.4 | 103.224.182.206 |
Apr 7, 2025 12:41:06.375323057 CEST | 443 | 49722 | 103.224.182.206 | 192.168.2.4 |
Apr 7, 2025 12:41:06.525954962 CEST | 80 | 49723 | 103.224.182.206 | 192.168.2.4 |
Apr 7, 2025 12:41:06.526020050 CEST | 80 | 49724 | 103.224.182.206 | 192.168.2.4 |
Apr 7, 2025 12:41:06.526067972 CEST | 49723 | 80 | 192.168.2.4 | 103.224.182.206 |
Apr 7, 2025 12:41:06.530292988 CEST | 49724 | 80 | 192.168.2.4 | 103.224.182.206 |
Apr 7, 2025 12:41:06.720755100 CEST | 443 | 49722 | 103.224.182.206 | 192.168.2.4 |
Apr 7, 2025 12:41:06.720860004 CEST | 49722 | 443 | 192.168.2.4 | 103.224.182.206 |
Apr 7, 2025 12:41:06.721414089 CEST | 443 | 49722 | 103.224.182.206 | 192.168.2.4 |
Apr 7, 2025 12:41:06.721719027 CEST | 49722 | 443 | 192.168.2.4 | 103.224.182.206 |
Apr 7, 2025 12:41:06.866985083 CEST | 49722 | 443 | 192.168.2.4 | 103.224.182.206 |
Apr 7, 2025 12:41:06.867010117 CEST | 443 | 49722 | 103.224.182.206 | 192.168.2.4 |
Apr 7, 2025 12:41:06.867466927 CEST | 443 | 49722 | 103.224.182.206 | 192.168.2.4 |
Apr 7, 2025 12:41:06.869129896 CEST | 49722 | 443 | 192.168.2.4 | 103.224.182.206 |
Apr 7, 2025 12:41:06.869165897 CEST | 443 | 49722 | 103.224.182.206 | 192.168.2.4 |
Apr 7, 2025 12:41:07.073438883 CEST | 443 | 49722 | 103.224.182.206 | 192.168.2.4 |
Apr 7, 2025 12:41:07.073570967 CEST | 443 | 49722 | 103.224.182.206 | 192.168.2.4 |
Apr 7, 2025 12:41:07.073652029 CEST | 49722 | 443 | 192.168.2.4 | 103.224.182.206 |
Apr 7, 2025 12:41:07.136776924 CEST | 49722 | 443 | 192.168.2.4 | 103.224.182.206 |
Apr 7, 2025 12:41:07.136807919 CEST | 443 | 49722 | 103.224.182.206 | 192.168.2.4 |
Apr 7, 2025 12:41:07.194856882 CEST | 49725 | 443 | 192.168.2.4 | 103.224.182.206 |
Apr 7, 2025 12:41:07.194889069 CEST | 443 | 49725 | 103.224.182.206 | 192.168.2.4 |
Apr 7, 2025 12:41:07.195034027 CEST | 49725 | 443 | 192.168.2.4 | 103.224.182.206 |
Apr 7, 2025 12:41:07.195259094 CEST | 49725 | 443 | 192.168.2.4 | 103.224.182.206 |
Apr 7, 2025 12:41:07.195270061 CEST | 443 | 49725 | 103.224.182.206 | 192.168.2.4 |
Apr 7, 2025 12:41:07.534492970 CEST | 443 | 49725 | 103.224.182.206 | 192.168.2.4 |
Apr 7, 2025 12:41:07.534883022 CEST | 49725 | 443 | 192.168.2.4 | 103.224.182.206 |
Apr 7, 2025 12:41:07.534907103 CEST | 443 | 49725 | 103.224.182.206 | 192.168.2.4 |
Apr 7, 2025 12:41:07.535257101 CEST | 49725 | 443 | 192.168.2.4 | 103.224.182.206 |
Apr 7, 2025 12:41:07.535262108 CEST | 443 | 49725 | 103.224.182.206 | 192.168.2.4 |
Apr 7, 2025 12:41:07.862294912 CEST | 443 | 49725 | 103.224.182.206 | 192.168.2.4 |
Apr 7, 2025 12:41:07.862370968 CEST | 443 | 49725 | 103.224.182.206 | 192.168.2.4 |
Apr 7, 2025 12:41:07.862555027 CEST | 49725 | 443 | 192.168.2.4 | 103.224.182.206 |
Apr 7, 2025 12:41:07.865663052 CEST | 49725 | 443 | 192.168.2.4 | 103.224.182.206 |
Apr 7, 2025 12:41:07.865699053 CEST | 443 | 49725 | 103.224.182.206 | 192.168.2.4 |
Apr 7, 2025 12:41:09.390084982 CEST | 49678 | 443 | 192.168.2.4 | 20.189.173.27 |
Apr 7, 2025 12:41:09.702339888 CEST | 49678 | 443 | 192.168.2.4 | 20.189.173.27 |
Apr 7, 2025 12:41:10.280361891 CEST | 49671 | 443 | 192.168.2.4 | 204.79.197.203 |
Apr 7, 2025 12:41:10.311604977 CEST | 49678 | 443 | 192.168.2.4 | 20.189.173.27 |
Apr 7, 2025 12:41:11.515445948 CEST | 49678 | 443 | 192.168.2.4 | 20.189.173.27 |
Apr 7, 2025 12:41:11.694749117 CEST | 80 | 49723 | 103.224.182.206 | 192.168.2.4 |
Apr 7, 2025 12:41:11.695507050 CEST | 80 | 49724 | 103.224.182.206 | 192.168.2.4 |
Apr 7, 2025 12:41:11.695530891 CEST | 80 | 49724 | 103.224.182.206 | 192.168.2.4 |
Apr 7, 2025 12:41:11.695621014 CEST | 49724 | 80 | 192.168.2.4 | 103.224.182.206 |
Apr 7, 2025 12:41:11.749737978 CEST | 49723 | 80 | 192.168.2.4 | 103.224.182.206 |
Apr 7, 2025 12:41:12.412075043 CEST | 80 | 49723 | 103.224.182.206 | 192.168.2.4 |
Apr 7, 2025 12:41:12.414819002 CEST | 49723 | 80 | 192.168.2.4 | 103.224.182.206 |
Apr 7, 2025 12:41:12.415086985 CEST | 49681 | 80 | 192.168.2.4 | 2.17.190.73 |
Apr 7, 2025 12:41:12.716928005 CEST | 49681 | 80 | 192.168.2.4 | 2.17.190.73 |
Apr 7, 2025 12:41:13.329066992 CEST | 49681 | 80 | 192.168.2.4 | 2.17.190.73 |
Apr 7, 2025 12:41:13.922250986 CEST | 49678 | 443 | 192.168.2.4 | 20.189.173.27 |
Apr 7, 2025 12:41:14.530225039 CEST | 49681 | 80 | 192.168.2.4 | 2.17.190.73 |
Apr 7, 2025 12:41:15.011409998 CEST | 49733 | 80 | 192.168.2.4 | 142.251.40.195 |
Apr 7, 2025 12:41:15.106021881 CEST | 80 | 49733 | 142.251.40.195 | 192.168.2.4 |
Apr 7, 2025 12:41:15.106110096 CEST | 49733 | 80 | 192.168.2.4 | 142.251.40.195 |
Apr 7, 2025 12:41:15.106220007 CEST | 49733 | 80 | 192.168.2.4 | 142.251.40.195 |
Apr 7, 2025 12:41:15.200856924 CEST | 80 | 49733 | 142.251.40.195 | 192.168.2.4 |
Apr 7, 2025 12:41:15.201334953 CEST | 80 | 49733 | 142.251.40.195 | 192.168.2.4 |
Apr 7, 2025 12:41:15.207676888 CEST | 49733 | 80 | 192.168.2.4 | 142.251.40.195 |
Apr 7, 2025 12:41:15.303596973 CEST | 80 | 49733 | 142.251.40.195 | 192.168.2.4 |
Apr 7, 2025 12:41:15.358326912 CEST | 49733 | 80 | 192.168.2.4 | 142.251.40.195 |
Apr 7, 2025 12:41:15.376127005 CEST | 443 | 49720 | 142.251.116.106 | 192.168.2.4 |
Apr 7, 2025 12:41:15.376192093 CEST | 443 | 49720 | 142.251.116.106 | 192.168.2.4 |
Apr 7, 2025 12:41:15.376255989 CEST | 49720 | 443 | 192.168.2.4 | 142.251.116.106 |
Apr 7, 2025 12:41:16.937242031 CEST | 49681 | 80 | 192.168.2.4 | 2.17.190.73 |
Apr 7, 2025 12:41:17.157890081 CEST | 49720 | 443 | 192.168.2.4 | 142.251.116.106 |
Apr 7, 2025 12:41:17.157926083 CEST | 443 | 49720 | 142.251.116.106 | 192.168.2.4 |
Apr 7, 2025 12:41:18.734132051 CEST | 49678 | 443 | 192.168.2.4 | 20.189.173.27 |
Apr 7, 2025 12:41:19.889122009 CEST | 49671 | 443 | 192.168.2.4 | 204.79.197.203 |
Apr 7, 2025 12:41:21.755745888 CEST | 49681 | 80 | 192.168.2.4 | 2.17.190.73 |
Apr 7, 2025 12:41:28.347107887 CEST | 49678 | 443 | 192.168.2.4 | 20.189.173.27 |
Apr 7, 2025 12:41:31.366116047 CEST | 49681 | 80 | 192.168.2.4 | 2.17.190.73 |
Apr 7, 2025 12:41:56.702372074 CEST | 49724 | 80 | 192.168.2.4 | 103.224.182.206 |
Apr 7, 2025 12:41:56.857295036 CEST | 80 | 49724 | 103.224.182.206 | 192.168.2.4 |
Apr 7, 2025 12:41:57.421782970 CEST | 49723 | 80 | 192.168.2.4 | 103.224.182.206 |
Apr 7, 2025 12:41:57.578294039 CEST | 80 | 49723 | 103.224.182.206 | 192.168.2.4 |
Apr 7, 2025 12:42:05.017755985 CEST | 49741 | 443 | 192.168.2.4 | 142.251.116.106 |
Apr 7, 2025 12:42:05.017838001 CEST | 443 | 49741 | 142.251.116.106 | 192.168.2.4 |
Apr 7, 2025 12:42:05.017935038 CEST | 49741 | 443 | 192.168.2.4 | 142.251.116.106 |
Apr 7, 2025 12:42:05.018099070 CEST | 49741 | 443 | 192.168.2.4 | 142.251.116.106 |
Apr 7, 2025 12:42:05.018117905 CEST | 443 | 49741 | 142.251.116.106 | 192.168.2.4 |
Apr 7, 2025 12:42:05.286921024 CEST | 443 | 49741 | 142.251.116.106 | 192.168.2.4 |
Apr 7, 2025 12:42:05.287441969 CEST | 49741 | 443 | 192.168.2.4 | 142.251.116.106 |
Apr 7, 2025 12:42:05.287466049 CEST | 443 | 49741 | 142.251.116.106 | 192.168.2.4 |
Apr 7, 2025 12:42:15.297261953 CEST | 443 | 49741 | 142.251.116.106 | 192.168.2.4 |
Apr 7, 2025 12:42:15.297350883 CEST | 443 | 49741 | 142.251.116.106 | 192.168.2.4 |
Apr 7, 2025 12:42:15.297419071 CEST | 49741 | 443 | 192.168.2.4 | 142.251.116.106 |
Apr 7, 2025 12:42:16.796724081 CEST | 49733 | 80 | 192.168.2.4 | 142.251.40.195 |
Apr 7, 2025 12:42:16.892649889 CEST | 80 | 49733 | 142.251.40.195 | 192.168.2.4 |
Apr 7, 2025 12:42:16.892709017 CEST | 49733 | 80 | 192.168.2.4 | 142.251.40.195 |
Apr 7, 2025 12:42:17.156366110 CEST | 49741 | 443 | 192.168.2.4 | 142.251.116.106 |
Apr 7, 2025 12:42:17.156414032 CEST | 443 | 49741 | 142.251.116.106 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 7, 2025 12:41:00.892297029 CEST | 53 | 50146 | 1.1.1.1 | 192.168.2.4 |
Apr 7, 2025 12:41:00.910510063 CEST | 53 | 54574 | 1.1.1.1 | 192.168.2.4 |
Apr 7, 2025 12:41:01.693669081 CEST | 53 | 61302 | 1.1.1.1 | 192.168.2.4 |
Apr 7, 2025 12:41:04.953074932 CEST | 56721 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 7, 2025 12:41:04.953324080 CEST | 61733 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 7, 2025 12:41:05.052822113 CEST | 53 | 61733 | 1.1.1.1 | 192.168.2.4 |
Apr 7, 2025 12:41:05.053483963 CEST | 53 | 56721 | 1.1.1.1 | 192.168.2.4 |
Apr 7, 2025 12:41:06.210540056 CEST | 49334 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 7, 2025 12:41:06.210691929 CEST | 59584 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 7, 2025 12:41:06.226522923 CEST | 61275 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 7, 2025 12:41:06.226670980 CEST | 49204 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 7, 2025 12:41:06.308803082 CEST | 53 | 49334 | 1.1.1.1 | 192.168.2.4 |
Apr 7, 2025 12:41:06.328372002 CEST | 53 | 61275 | 1.1.1.1 | 192.168.2.4 |
Apr 7, 2025 12:41:06.382051945 CEST | 53 | 59584 | 1.1.1.1 | 192.168.2.4 |
Apr 7, 2025 12:41:06.398552895 CEST | 53 | 49204 | 1.1.1.1 | 192.168.2.4 |
Apr 7, 2025 12:41:18.804855108 CEST | 53 | 59976 | 1.1.1.1 | 192.168.2.4 |
Apr 7, 2025 12:41:37.771140099 CEST | 53 | 63890 | 1.1.1.1 | 192.168.2.4 |
Apr 7, 2025 12:42:00.401283026 CEST | 53 | 55849 | 1.1.1.1 | 192.168.2.4 |
Apr 7, 2025 12:42:00.507849932 CEST | 53 | 55009 | 1.1.1.1 | 192.168.2.4 |
Apr 7, 2025 12:42:03.413620949 CEST | 53 | 58228 | 1.1.1.1 | 192.168.2.4 |
Apr 7, 2025 12:42:08.821932077 CEST | 138 | 138 | 192.168.2.4 | 192.168.2.255 |
Timestamp | Source IP | Dest IP | Checksum | Code | Type |
---|---|---|---|---|---|
Apr 7, 2025 12:41:06.382175922 CEST | 192.168.2.4 | 1.1.1.1 | c21c | (Port unreachable) | Destination Unreachable |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Apr 7, 2025 12:41:04.953074932 CEST | 192.168.2.4 | 1.1.1.1 | 0xac0e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 7, 2025 12:41:04.953324080 CEST | 192.168.2.4 | 1.1.1.1 | 0xc7d7 | Standard query (0) | 65 | IN (0x0001) | false | |
Apr 7, 2025 12:41:06.210540056 CEST | 192.168.2.4 | 1.1.1.1 | 0x1bd1 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 7, 2025 12:41:06.210691929 CEST | 192.168.2.4 | 1.1.1.1 | 0x6b29 | Standard query (0) | 65 | IN (0x0001) | false | |
Apr 7, 2025 12:41:06.226522923 CEST | 192.168.2.4 | 1.1.1.1 | 0xb4e4 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 7, 2025 12:41:06.226670980 CEST | 192.168.2.4 | 1.1.1.1 | 0x8aee | Standard query (0) | 65 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Apr 7, 2025 12:41:05.052822113 CEST | 1.1.1.1 | 192.168.2.4 | 0xc7d7 | No error (0) | 65 | IN (0x0001) | false | |||
Apr 7, 2025 12:41:05.053483963 CEST | 1.1.1.1 | 192.168.2.4 | 0xac0e | No error (0) | 142.251.116.106 | A (IP address) | IN (0x0001) | false | ||
Apr 7, 2025 12:41:05.053483963 CEST | 1.1.1.1 | 192.168.2.4 | 0xac0e | No error (0) | 142.251.116.105 | A (IP address) | IN (0x0001) | false | ||
Apr 7, 2025 12:41:05.053483963 CEST | 1.1.1.1 | 192.168.2.4 | 0xac0e | No error (0) | 142.251.116.103 | A (IP address) | IN (0x0001) | false | ||
Apr 7, 2025 12:41:05.053483963 CEST | 1.1.1.1 | 192.168.2.4 | 0xac0e | No error (0) | 142.251.116.99 | A (IP address) | IN (0x0001) | false | ||
Apr 7, 2025 12:41:05.053483963 CEST | 1.1.1.1 | 192.168.2.4 | 0xac0e | No error (0) | 142.251.116.104 | A (IP address) | IN (0x0001) | false | ||
Apr 7, 2025 12:41:05.053483963 CEST | 1.1.1.1 | 192.168.2.4 | 0xac0e | No error (0) | 142.251.116.147 | A (IP address) | IN (0x0001) | false | ||
Apr 7, 2025 12:41:06.308803082 CEST | 1.1.1.1 | 192.168.2.4 | 0x1bd1 | No error (0) | 103.224.182.206 | A (IP address) | IN (0x0001) | false | ||
Apr 7, 2025 12:41:06.328372002 CEST | 1.1.1.1 | 192.168.2.4 | 0xb4e4 | No error (0) | 103.224.182.206 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49723 | 103.224.182.206 | 80 | 1016 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Apr 7, 2025 12:41:11.694749117 CEST | 233 | IN | |
Apr 7, 2025 12:41:57.421782970 CEST | 6 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49724 | 103.224.182.206 | 80 | 1016 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Apr 7, 2025 12:41:11.695507050 CEST | 233 | IN | |
Apr 7, 2025 12:41:56.702372074 CEST | 6 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port |
---|---|---|---|---|
2 | 192.168.2.4 | 49733 | 142.251.40.195 | 80 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Apr 7, 2025 12:41:15.106220007 CEST | 202 | OUT | |
Apr 7, 2025 12:41:15.201334953 CEST | 223 | IN | |
Apr 7, 2025 12:41:15.207676888 CEST | 200 | OUT | |
Apr 7, 2025 12:41:15.303596973 CEST | 1243 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49722 | 103.224.182.206 | 443 | 1016 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-04-07 10:41:06 UTC | 2013 | OUT | |
2025-04-07 10:41:07 UTC | 150 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49725 | 103.224.182.206 | 443 | 1016 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-04-07 10:41:07 UTC | 1936 | OUT | |
2025-04-07 10:41:07 UTC | 76 | IN | |
2025-04-07 10:41:07 UTC | 94 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 1 |
Start time: | 06:40:56 |
Start date: | 07/04/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff786830000 |
File size: | 3'388'000 bytes |
MD5 hash: | E81F54E6C1129887AEA47E7D092680BF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 2 |
Start time: | 06:40:59 |
Start date: | 07/04/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff786830000 |
File size: | 3'388'000 bytes |
MD5 hash: | E81F54E6C1129887AEA47E7D092680BF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 4 |
Start time: | 06:41:05 |
Start date: | 07/04/2025 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff786830000 |
File size: | 3'388'000 bytes |
MD5 hash: | E81F54E6C1129887AEA47E7D092680BF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |