Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
T8534770935.html

Overview

General Information

Sample name:T8534770935.html
Analysis ID:1447083
MD5:6407743aed74a35f8e281f61364fd936
SHA1:919f554b0137d797b0a6f84ac011fb4f7c5e0ae5
SHA256:b299b83838c9c0bef99499fca8e5024dbc8cfafdd4d859a10de859dd5678dea2
Tags:html
Infos:

Detection

CVE-2024-21412
Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected CVE-2024-21412
HTML document with suspicious title
Detected non-DNS traffic on DNS port
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Stores files to the Windows start menu directory

Classification

  • System is w10x64
  • chrome.exe (PID: 6480 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "C:\Users\user\Desktop\T8534770935.html" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 2296 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=1992,i,14220054034880501362,1055437224518799667,262144 /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
T8534770935.htmlJoeSecurity_CVE_2024_21412Yara detected CVE-2024-21412Joe Security
    SourceRuleDescriptionAuthorStrings
    0.0.pages.csvJoeSecurity_CVE_2024_21412Yara detected CVE-2024-21412Joe Security
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      Phishing

      barindex
      Source: file:///C:/Users/user/Desktop/T8534770935.htmlTab title: SCANNED RVEBSAKSA
      Source: T8534770935.htmlHTTP Parser: No favicon
      Source: file:///C:/Users/user/Desktop/T8534770935.htmlHTTP Parser: No favicon
      Source: unknownHTTPS traffic detected: 23.43.61.160:443 -> 192.168.2.5:49714 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 23.43.61.160:443 -> 192.168.2.5:49715 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.5:49721 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.5:61283 version: TLS 1.2

      Software Vulnerabilities

      barindex
      Source: Yara matchFile source: T8534770935.html, type: SAMPLE
      Source: Yara matchFile source: 0.0.pages.csv, type: HTML
      Source: global trafficTCP traffic: 192.168.2.5:61281 -> 1.1.1.1:53
      Source: Joe Sandbox ViewIP Address: 239.255.255.250 239.255.255.250
      Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
      Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
      Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
      Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
      Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
      Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
      Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
      Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
      Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
      Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
      Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
      Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
      Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
      Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
      Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
      Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
      Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
      Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
      Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
      Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
      Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
      Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
      Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
      Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
      Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
      Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
      Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
      Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
      Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
      Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
      Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
      Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
      Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
      Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
      Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
      Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
      Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
      Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
      Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
      Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
      Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
      Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
      Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
      Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
      Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
      Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
      Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
      Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=dfkv93peUGhaFzB&MD=ZvaSYwlo HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
      Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=dfkv93peUGhaFzB&MD=ZvaSYwlo HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
      Source: global trafficDNS traffic detected: DNS query: www.google.com
      Source: T8534770935.htmlString found in binary or memory: https://winaero.com/blog/wp-content/uploads/2016/05/build-10158.png
      Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
      Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61283
      Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 61285 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 61287 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 61283 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61285
      Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61287
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
      Source: unknownHTTPS traffic detected: 23.43.61.160:443 -> 192.168.2.5:49714 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 23.43.61.160:443 -> 192.168.2.5:49715 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.5:49721 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.5:61283 version: TLS 1.2
      Source: classification engineClassification label: mal52.phis.expl.winHTML@34/6@2/3
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
      Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "C:\Users\user\Desktop\T8534770935.html"
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=1992,i,14220054034880501362,1055437224518799667,262144 /prefetch:8
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=1992,i,14220054034880501362,1055437224518799667,262144 /prefetch:8Jump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: Google Drive.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
      Source: YouTube.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
      Source: Sheets.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
      Source: Gmail.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
      Source: Slides.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
      Source: Docs.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
      Registry Run Keys / Startup Folder
      1
      Process Injection
      1
      Masquerading
      OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      Registry Run Keys / Startup Folder
      1
      Process Injection
      LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
      Ingress Tool Transfer
      Traffic DuplicationData Destruction
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      T8534770935.html0%ReversingLabs
      T8534770935.html3%VirustotalBrowse
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      www.google.com0%VirustotalBrowse
      SourceDetectionScannerLabelLink
      file:///C:/Users/user/Desktop/T8534770935.html0%Avira URL Cloudsafe
      https://winaero.com/blog/wp-content/uploads/2016/05/build-10158.png0%Avira URL Cloudsafe
      https://winaero.com/blog/wp-content/uploads/2016/05/build-10158.png0%VirustotalBrowse
      NameIPActiveMaliciousAntivirus DetectionReputation
      www.google.com
      142.250.185.132
      truefalseunknown
      NameMaliciousAntivirus DetectionReputation
      file:///C:/Users/user/Desktop/T8534770935.htmltrue
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://winaero.com/blog/wp-content/uploads/2016/05/build-10158.pngT8534770935.htmlfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      239.255.255.250
      unknownReserved
      unknownunknownfalse
      142.250.185.132
      www.google.comUnited States
      15169GOOGLEUSfalse
      IP
      192.168.2.5
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1447083
      Start date and time:2024-05-24 11:01:12 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 5m 8s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:defaultwindowshtmlcookbook.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:7
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:T8534770935.html
      Detection:MAL
      Classification:mal52.phis.expl.winHTML@34/6@2/3
      EGA Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .html
      • Browse: search:query=SCANNEDrumb=location:\\invoicetrycloudflare.com@9983\DavWWWRoot&displayname=Downloads
      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 142.250.186.131, 142.250.181.238, 64.233.184.84, 34.104.35.123, 142.250.186.42, 142.250.185.170, 142.250.186.74, 172.217.23.106, 142.250.185.74, 142.250.185.106, 142.250.181.234, 216.58.206.42, 142.250.185.202, 142.250.186.138, 142.250.184.202, 172.217.18.106, 142.250.185.138, 142.250.184.234, 142.250.186.170, 142.250.185.234, 93.184.221.240, 192.229.221.95, 142.250.184.195, 142.250.186.174
      • Excluded domains from analysis (whitelisted): clients1.google.com, fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, clientservices.googleapis.com, fe3cr.delivery.mp.microsoft.com, clients2.google.com, ocsp.digicert.com, edgedl.me.gvt1.com, update.googleapis.com, clients.l.google.com, optimizationguide-pa.googleapis.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtSetInformationFile calls found.
      No simulations
      InputOutput
      URL: file:///C:/Users/user/Desktop/T8534770935.html Model: Perplexity: mixtral-8x7b-instruct
      {
      "loginform": false,
      "reasons": [
      "The text does not contain any elements typically found in a login form, such as input fields for a username and password, a submit button, or labels for those elements.",
      "The text specifically mentions that the page should redirect automatically, which is not something that a login form typically does.",
      "The text instructs the user to CLICK HERE, which suggests that it is not part of a login form, but rather a link to a login form."
      ]
      }
      Please CLICK HERE if the page does not redirect automatically 
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      239.255.255.250https://degroofpetercam.sharefile.eu/f/foeaa098-ab4a-4383-832f-352520075f87?a=adfc24f975fb17a5Get hashmaliciousUnknownBrowse
        Webex.exeGet hashmaliciousUnknownBrowse
          http://photographcrushingsouvenirs.comGet hashmaliciousUnknownBrowse
            http://18.158.249.75Get hashmaliciousUnknownBrowse
              BI6oo9z4In.exeGet hashmaliciousCryptOne, Djvu, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                https://auth-logservicekmfjnslepiuruamnbvoaprjlpwrjworsds.tropicalsce.com/Get hashmaliciousUnknownBrowse
                  https://topnewsz66.com/super-bowl-includes-ads-about-jesus-as-part-of-multi-million-dollar-he-gets-us-campaign/Get hashmaliciousUnknownBrowse
                    https://deref-mail.com/mail/client/j_iGygdK9BI/dereferrer/?redirectUrl=Get hashmaliciousUnknownBrowse
                      sample.htmlGet hashmaliciousHTMLPhisherBrowse
                        https://perspectivefunnel.co/664fc385b6e1a200142f71ee/664fc45e205ea60014803d49/Get hashmaliciousUnknownBrowse
                          No context
                          No context
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          28a2c9bd18a11de089ef85a160da29e4Webex.exeGet hashmaliciousUnknownBrowse
                          • 52.165.165.26
                          • 23.43.61.160
                          https://deref-mail.com/mail/client/j_iGygdK9BI/dereferrer/?redirectUrl=Get hashmaliciousUnknownBrowse
                          • 52.165.165.26
                          • 23.43.61.160
                          sample.htmlGet hashmaliciousHTMLPhisherBrowse
                          • 52.165.165.26
                          • 23.43.61.160
                          https://perspectivefunnel.co/664fc385b6e1a200142f71ee/664fc45e205ea60014803d49/Get hashmaliciousUnknownBrowse
                          • 52.165.165.26
                          • 23.43.61.160
                          https://pub-a2527e0fc1774b399011ecd14755d452.r2.dev/0nlinedoc.htmlGet hashmaliciousHTMLPhisherBrowse
                          • 52.165.165.26
                          • 23.43.61.160
                          http://qyt8pi.krestologs.comGet hashmaliciousUnknownBrowse
                          • 52.165.165.26
                          • 23.43.61.160
                          http://birchflarechurch.comGet hashmaliciousUnknownBrowse
                          • 52.165.165.26
                          • 23.43.61.160
                          attach_request_478000006439785.zipGet hashmaliciousUnknownBrowse
                          • 52.165.165.26
                          • 23.43.61.160
                          https://www.unsubv1.site/Get hashmaliciousUnknownBrowse
                          • 52.165.165.26
                          • 23.43.61.160
                          https://filetransfer.io/data-package/sikJT8Pb/downloadGet hashmaliciousHTMLPhisherBrowse
                          • 52.165.165.26
                          • 23.43.61.160
                          No context
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri May 24 08:02:00 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                          Category:dropped
                          Size (bytes):2677
                          Entropy (8bit):3.9757359539720896
                          Encrypted:false
                          SSDEEP:48:8IxdHTf/aHuidAKZdA19ehwiZUklqehHy+3:8ODLAy
                          MD5:30E06D18228FA0FEF4BDE76014F2254C
                          SHA1:C87229771DBA90AD9854C5739FD06CA258C3B694
                          SHA-256:15B1DC233CF9964EE6350D2C93AA4EFBAEB46CDC945CE60E3924DE12FC420B90
                          SHA-512:B015C6DC5306608A851CF7C8AA265B98BB4C365F06388384624D8989B93D55DC2F8122EA5E951F1E4E93150A1A03DEDC3F29F1EC0A7F95146A71AAC103D7EB11
                          Malicious:false
                          Reputation:low
                          Preview:L..................F.@.. ...$+.,....H*......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X@H....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X@H....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X@H....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X@H..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.XAH...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........i.(......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri May 24 08:02:00 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                          Category:dropped
                          Size (bytes):2679
                          Entropy (8bit):3.9912374010374014
                          Encrypted:false
                          SSDEEP:48:8kdHTf/aHuidAKZdA1weh/iZUkAQkqehwy+2:8gD59QFy
                          MD5:D60DCD401B093A50D2682501273F12CD
                          SHA1:C322F12C5AFB0D12234937AC7C78D74E44364A4D
                          SHA-256:E135B44CE0B089FDA39D8146D23259ED73F220802A9586335F532506C4A38BF9
                          SHA-512:F3B8DD832C570A9D1503F9C26876B84C844510512DEFC42DE5513DB579E922791B2803444790D89671CF96707C6758C3487A8A2812521B5360CB2FDDD6357DD5
                          Malicious:false
                          Reputation:low
                          Preview:L..................F.@.. ...$+.,............N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X@H....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X@H....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X@H....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X@H..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.XAH...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........i.(......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                          Category:dropped
                          Size (bytes):2693
                          Entropy (8bit):4.003009972539481
                          Encrypted:false
                          SSDEEP:48:8xQdHTf/sHuidAKZdA14tseh7sFiZUkmgqeh7sOy+BX:8xsDfnEy
                          MD5:17D450173F0C55A632C7DCA4F64394C1
                          SHA1:7A929A8A88CE87EBBFE1F398E3608AFC88DE265C
                          SHA-256:187FBCC1F1F9FB41971753E105DADADD7FB2FE4B312B92C8461FD6BD908E088B
                          SHA-512:B2FC5ADC0364BA0582EFE9FF889B713722AAFFBA1CC5B488D94B89D08C1C039A87A27C04136A8E6FDB070DEBA39982E031F8383A72406629C6EE06D278ED2B9B
                          Malicious:false
                          Reputation:low
                          Preview:L..................F.@.. ...$+.,......e>....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X@H....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X@H....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X@H....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X@H..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VDW.n...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........i.(......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri May 24 08:02:00 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                          Category:dropped
                          Size (bytes):2681
                          Entropy (8bit):3.9902130489122722
                          Encrypted:false
                          SSDEEP:48:8xdHTf/aHuidAKZdA1vehDiZUkwqehMy+R:8bDa2y
                          MD5:A3579A995630D300E4C297E956A70B4D
                          SHA1:9F05C8E17D563909C50EBFB309A3D6174CA8C7C1
                          SHA-256:AED0365522305334D74AA46F592519B86443FC35DEE7FA0A299DC3581ABC5CCF
                          SHA-512:BAF477FC1F542FD9A008AF987E3F481886240DC4C5C249EB6105CAE80799297778F9BCB8EB8D80A5C72C715701071F8403F5F0210736B5F642DD7E3419970DD5
                          Malicious:false
                          Reputation:low
                          Preview:L..................F.@.. ...$+.,............N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X@H....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X@H....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X@H....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X@H..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.XAH...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........i.(......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri May 24 08:02:00 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                          Category:dropped
                          Size (bytes):2681
                          Entropy (8bit):3.9797974247053545
                          Encrypted:false
                          SSDEEP:48:88dHTf/aHuidAKZdA1hehBiZUk1W1qehiy+C:8YDa9Cy
                          MD5:AF562A3EA204D84D3E037D65474F0F5E
                          SHA1:1436D99F067C37F4029D88F2F29756B4BE8B5BDF
                          SHA-256:386576E40FAA4BE2E101F753FF9D428492A67AB1D3622B0666BDB675E4E2A623
                          SHA-512:87E38A516997F0F0BF24B9AA94C03649C421001BF1444EF06521EFE3D836A3D3A5E26E360197D0780A2690E5D9DBC66510493A63D49346658C2B1845DFFB67F1
                          Malicious:false
                          Reputation:low
                          Preview:L..................F.@.. ...$+.,............N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X@H....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X@H....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X@H....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X@H..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.XAH...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........i.(......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri May 24 08:02:00 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                          Category:dropped
                          Size (bytes):2683
                          Entropy (8bit):3.989547995769703
                          Encrypted:false
                          SSDEEP:48:8ydHTf/aHuidAKZdA1duT+ehOuTbbiZUk5OjqehOuTbEy+yT+:8+DkT/TbxWOvTbEy7T
                          MD5:20ACC212FC46FF021BC8193016DF5CA4
                          SHA1:4076A2AC61D071BE434D342BC7FD3B9A73FCA8FB
                          SHA-256:46EDBD26C94DFC58BCA946EBC939DD3EC3802F43FEA61F20BBB27981BCF1BA86
                          SHA-512:F0EF011D9C5A38049C9D301ECC60335EA70986E2B73CFCDCEF9BF63251E69DA9F4BF00A6EC89EF7EDDB7D9D14D7A28D3807515C95C99961610607D065BD25FA1
                          Malicious:false
                          Reputation:low
                          Preview:L..................F.@.. ...$+.,............N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X@H....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X@H....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X@H....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X@H..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.XAH...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........i.(......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                          File type:HTML document, ASCII text, with CRLF line terminators
                          Entropy (8bit):5.359404021844316
                          TrID:
                          • HyperText Markup Language (11501/1) 28.75%
                          • HyperText Markup Language (11501/1) 28.75%
                          • HyperText Markup Language (11001/1) 27.50%
                          • HyperText Markup Language (6006/1) 15.01%
                          File name:T8534770935.html
                          File size:827 bytes
                          MD5:6407743aed74a35f8e281f61364fd936
                          SHA1:919f554b0137d797b0a6f84ac011fb4f7c5e0ae5
                          SHA256:b299b83838c9c0bef99499fca8e5024dbc8cfafdd4d859a10de859dd5678dea2
                          SHA512:310d0ae2a887db48da9fc7776c57f6a4046c48d936ea57d8adb446c981b03f00059cb0dcabfdec4eef3d85c26257b3ff738f1a5e8336072b8e0f2c8d1bf06d50
                          SSDEEP:12:TO0PoA1c0ASp6Qclfo21pDgqunpDv9MxikNVk2/hYGWtqBu2/hYF6HOs/1:bFsPbg791MxikNVk2/Gqw2/aW/1
                          TLSH:8B01F1A72046A8050631972499F472CCD691C80AE088BC54F35862DF9FF6769CC87455
                          File Content Preview:<html>..<head> </head>..<body> ..<div id="in-page-channel-node-id" data-channel-name="in_page_channel_cnXeD0"> </div><meta http-equiv="Content-Type" content="text/html; charset=UTF-8">..<link rel="icon" href="https://winaero.com/blog/wp-content/uploads/20
                          TimestampSource PortDest PortSource IPDest IP
                          May 24, 2024 11:01:57.633490086 CEST49675443192.168.2.523.1.237.91
                          May 24, 2024 11:01:57.639022112 CEST49674443192.168.2.523.1.237.91
                          May 24, 2024 11:01:57.750508070 CEST49673443192.168.2.523.1.237.91
                          May 24, 2024 11:02:06.396908045 CEST49713443192.168.2.5142.250.185.132
                          May 24, 2024 11:02:06.396951914 CEST44349713142.250.185.132192.168.2.5
                          May 24, 2024 11:02:06.397020102 CEST49713443192.168.2.5142.250.185.132
                          May 24, 2024 11:02:06.397587061 CEST49713443192.168.2.5142.250.185.132
                          May 24, 2024 11:02:06.397603035 CEST44349713142.250.185.132192.168.2.5
                          May 24, 2024 11:02:06.767749071 CEST49714443192.168.2.523.43.61.160
                          May 24, 2024 11:02:06.767781019 CEST4434971423.43.61.160192.168.2.5
                          May 24, 2024 11:02:06.767848969 CEST49714443192.168.2.523.43.61.160
                          May 24, 2024 11:02:06.769896030 CEST49714443192.168.2.523.43.61.160
                          May 24, 2024 11:02:06.769913912 CEST4434971423.43.61.160192.168.2.5
                          May 24, 2024 11:02:07.063127041 CEST44349713142.250.185.132192.168.2.5
                          May 24, 2024 11:02:07.063411951 CEST49713443192.168.2.5142.250.185.132
                          May 24, 2024 11:02:07.063440084 CEST44349713142.250.185.132192.168.2.5
                          May 24, 2024 11:02:07.064846039 CEST44349713142.250.185.132192.168.2.5
                          May 24, 2024 11:02:07.064924955 CEST49713443192.168.2.5142.250.185.132
                          May 24, 2024 11:02:07.066148996 CEST49713443192.168.2.5142.250.185.132
                          May 24, 2024 11:02:07.066215992 CEST44349713142.250.185.132192.168.2.5
                          May 24, 2024 11:02:07.114957094 CEST49713443192.168.2.5142.250.185.132
                          May 24, 2024 11:02:07.114986897 CEST44349713142.250.185.132192.168.2.5
                          May 24, 2024 11:02:07.161803961 CEST49713443192.168.2.5142.250.185.132
                          May 24, 2024 11:02:07.239938021 CEST49675443192.168.2.523.1.237.91
                          May 24, 2024 11:02:07.239938021 CEST49674443192.168.2.523.1.237.91
                          May 24, 2024 11:02:07.349356890 CEST49673443192.168.2.523.1.237.91
                          May 24, 2024 11:02:07.419207096 CEST4434971423.43.61.160192.168.2.5
                          May 24, 2024 11:02:07.419286966 CEST49714443192.168.2.523.43.61.160
                          May 24, 2024 11:02:07.423157930 CEST49714443192.168.2.523.43.61.160
                          May 24, 2024 11:02:07.423171997 CEST4434971423.43.61.160192.168.2.5
                          May 24, 2024 11:02:07.423547983 CEST4434971423.43.61.160192.168.2.5
                          May 24, 2024 11:02:07.471832037 CEST49714443192.168.2.523.43.61.160
                          May 24, 2024 11:02:07.518501997 CEST4434971423.43.61.160192.168.2.5
                          May 24, 2024 11:02:07.683510065 CEST4434971423.43.61.160192.168.2.5
                          May 24, 2024 11:02:07.683569908 CEST4434971423.43.61.160192.168.2.5
                          May 24, 2024 11:02:07.683737993 CEST49714443192.168.2.523.43.61.160
                          May 24, 2024 11:02:07.683764935 CEST4434971423.43.61.160192.168.2.5
                          May 24, 2024 11:02:07.683779955 CEST49714443192.168.2.523.43.61.160
                          May 24, 2024 11:02:07.683787107 CEST4434971423.43.61.160192.168.2.5
                          May 24, 2024 11:02:07.722026110 CEST49715443192.168.2.523.43.61.160
                          May 24, 2024 11:02:07.722059011 CEST4434971523.43.61.160192.168.2.5
                          May 24, 2024 11:02:07.722122908 CEST49715443192.168.2.523.43.61.160
                          May 24, 2024 11:02:07.722503901 CEST49715443192.168.2.523.43.61.160
                          May 24, 2024 11:02:07.722510099 CEST4434971523.43.61.160192.168.2.5
                          May 24, 2024 11:02:08.350878954 CEST4434971523.43.61.160192.168.2.5
                          May 24, 2024 11:02:08.350969076 CEST49715443192.168.2.523.43.61.160
                          May 24, 2024 11:02:08.352294922 CEST49715443192.168.2.523.43.61.160
                          May 24, 2024 11:02:08.352303982 CEST4434971523.43.61.160192.168.2.5
                          May 24, 2024 11:02:08.352591991 CEST4434971523.43.61.160192.168.2.5
                          May 24, 2024 11:02:08.353770971 CEST49715443192.168.2.523.43.61.160
                          May 24, 2024 11:02:08.394505978 CEST4434971523.43.61.160192.168.2.5
                          May 24, 2024 11:02:08.681327105 CEST4434971523.43.61.160192.168.2.5
                          May 24, 2024 11:02:08.681401014 CEST4434971523.43.61.160192.168.2.5
                          May 24, 2024 11:02:08.681463957 CEST49715443192.168.2.523.43.61.160
                          May 24, 2024 11:02:08.682224989 CEST49715443192.168.2.523.43.61.160
                          May 24, 2024 11:02:08.682239056 CEST4434971523.43.61.160192.168.2.5
                          May 24, 2024 11:02:08.682252884 CEST49715443192.168.2.523.43.61.160
                          May 24, 2024 11:02:08.682256937 CEST4434971523.43.61.160192.168.2.5
                          May 24, 2024 11:02:09.013961077 CEST4434970323.1.237.91192.168.2.5
                          May 24, 2024 11:02:09.014062881 CEST49703443192.168.2.523.1.237.91
                          May 24, 2024 11:02:16.974389076 CEST44349713142.250.185.132192.168.2.5
                          May 24, 2024 11:02:16.974575043 CEST44349713142.250.185.132192.168.2.5
                          May 24, 2024 11:02:16.974638939 CEST49713443192.168.2.5142.250.185.132
                          May 24, 2024 11:02:17.356878042 CEST49713443192.168.2.5142.250.185.132
                          May 24, 2024 11:02:17.356899977 CEST44349713142.250.185.132192.168.2.5
                          May 24, 2024 11:02:17.771137953 CEST49721443192.168.2.552.165.165.26
                          May 24, 2024 11:02:17.771184921 CEST4434972152.165.165.26192.168.2.5
                          May 24, 2024 11:02:17.771258116 CEST49721443192.168.2.552.165.165.26
                          May 24, 2024 11:02:17.775743008 CEST49721443192.168.2.552.165.165.26
                          May 24, 2024 11:02:17.775757074 CEST4434972152.165.165.26192.168.2.5
                          May 24, 2024 11:02:18.475961924 CEST4434972152.165.165.26192.168.2.5
                          May 24, 2024 11:02:18.476402044 CEST49721443192.168.2.552.165.165.26
                          May 24, 2024 11:02:18.478276968 CEST49721443192.168.2.552.165.165.26
                          May 24, 2024 11:02:18.478290081 CEST4434972152.165.165.26192.168.2.5
                          May 24, 2024 11:02:18.478631973 CEST4434972152.165.165.26192.168.2.5
                          May 24, 2024 11:02:18.522939920 CEST49721443192.168.2.552.165.165.26
                          May 24, 2024 11:02:19.329725981 CEST49721443192.168.2.552.165.165.26
                          May 24, 2024 11:02:19.370529890 CEST4434972152.165.165.26192.168.2.5
                          May 24, 2024 11:02:19.701925993 CEST4434972152.165.165.26192.168.2.5
                          May 24, 2024 11:02:19.701992035 CEST4434972152.165.165.26192.168.2.5
                          May 24, 2024 11:02:19.702013016 CEST4434972152.165.165.26192.168.2.5
                          May 24, 2024 11:02:19.702044964 CEST49721443192.168.2.552.165.165.26
                          May 24, 2024 11:02:19.702065945 CEST4434972152.165.165.26192.168.2.5
                          May 24, 2024 11:02:19.702090979 CEST49721443192.168.2.552.165.165.26
                          May 24, 2024 11:02:19.702107906 CEST4434972152.165.165.26192.168.2.5
                          May 24, 2024 11:02:19.702126026 CEST4434972152.165.165.26192.168.2.5
                          May 24, 2024 11:02:19.702142954 CEST49721443192.168.2.552.165.165.26
                          May 24, 2024 11:02:19.702178001 CEST49721443192.168.2.552.165.165.26
                          May 24, 2024 11:02:19.714106083 CEST4434972152.165.165.26192.168.2.5
                          May 24, 2024 11:02:19.714195013 CEST49721443192.168.2.552.165.165.26
                          May 24, 2024 11:02:19.714210987 CEST4434972152.165.165.26192.168.2.5
                          May 24, 2024 11:02:19.714304924 CEST4434972152.165.165.26192.168.2.5
                          May 24, 2024 11:02:19.714359999 CEST49721443192.168.2.552.165.165.26
                          May 24, 2024 11:02:20.468072891 CEST49721443192.168.2.552.165.165.26
                          May 24, 2024 11:02:20.468102932 CEST4434972152.165.165.26192.168.2.5
                          May 24, 2024 11:02:20.468281031 CEST49721443192.168.2.552.165.165.26
                          May 24, 2024 11:02:20.468290091 CEST4434972152.165.165.26192.168.2.5
                          May 24, 2024 11:02:43.779228926 CEST6128153192.168.2.51.1.1.1
                          May 24, 2024 11:02:43.784837961 CEST53612811.1.1.1192.168.2.5
                          May 24, 2024 11:02:43.784938097 CEST6128153192.168.2.51.1.1.1
                          May 24, 2024 11:02:43.784981966 CEST6128153192.168.2.51.1.1.1
                          May 24, 2024 11:02:43.842586994 CEST53612811.1.1.1192.168.2.5
                          May 24, 2024 11:02:44.252453089 CEST53612811.1.1.1192.168.2.5
                          May 24, 2024 11:02:44.253076077 CEST6128153192.168.2.51.1.1.1
                          May 24, 2024 11:02:44.258563042 CEST53612811.1.1.1192.168.2.5
                          May 24, 2024 11:02:44.258635044 CEST6128153192.168.2.51.1.1.1
                          May 24, 2024 11:02:57.094191074 CEST61283443192.168.2.552.165.165.26
                          May 24, 2024 11:02:57.094238997 CEST4436128352.165.165.26192.168.2.5
                          May 24, 2024 11:02:57.094785929 CEST61283443192.168.2.552.165.165.26
                          May 24, 2024 11:02:57.094785929 CEST61283443192.168.2.552.165.165.26
                          May 24, 2024 11:02:57.094818115 CEST4436128352.165.165.26192.168.2.5
                          May 24, 2024 11:02:57.786257029 CEST4436128352.165.165.26192.168.2.5
                          May 24, 2024 11:02:57.786339998 CEST61283443192.168.2.552.165.165.26
                          May 24, 2024 11:02:57.790218115 CEST61283443192.168.2.552.165.165.26
                          May 24, 2024 11:02:57.790239096 CEST4436128352.165.165.26192.168.2.5
                          May 24, 2024 11:02:57.790591955 CEST4436128352.165.165.26192.168.2.5
                          May 24, 2024 11:02:57.800860882 CEST61283443192.168.2.552.165.165.26
                          May 24, 2024 11:02:57.846496105 CEST4436128352.165.165.26192.168.2.5
                          May 24, 2024 11:02:58.093997955 CEST4436128352.165.165.26192.168.2.5
                          May 24, 2024 11:02:58.094028950 CEST4436128352.165.165.26192.168.2.5
                          May 24, 2024 11:02:58.094046116 CEST4436128352.165.165.26192.168.2.5
                          May 24, 2024 11:02:58.094085932 CEST61283443192.168.2.552.165.165.26
                          May 24, 2024 11:02:58.094108105 CEST4436128352.165.165.26192.168.2.5
                          May 24, 2024 11:02:58.094134092 CEST61283443192.168.2.552.165.165.26
                          May 24, 2024 11:02:58.094156981 CEST61283443192.168.2.552.165.165.26
                          May 24, 2024 11:02:58.108619928 CEST4436128352.165.165.26192.168.2.5
                          May 24, 2024 11:02:58.108664036 CEST4436128352.165.165.26192.168.2.5
                          May 24, 2024 11:02:58.108694077 CEST61283443192.168.2.552.165.165.26
                          May 24, 2024 11:02:58.108701944 CEST4436128352.165.165.26192.168.2.5
                          May 24, 2024 11:02:58.108727932 CEST4436128352.165.165.26192.168.2.5
                          May 24, 2024 11:02:58.108747005 CEST61283443192.168.2.552.165.165.26
                          May 24, 2024 11:02:58.108768940 CEST61283443192.168.2.552.165.165.26
                          May 24, 2024 11:02:58.109112024 CEST61283443192.168.2.552.165.165.26
                          May 24, 2024 11:02:58.109124899 CEST4436128352.165.165.26192.168.2.5
                          May 24, 2024 11:02:58.109136105 CEST61283443192.168.2.552.165.165.26
                          May 24, 2024 11:02:58.109139919 CEST4436128352.165.165.26192.168.2.5
                          May 24, 2024 11:03:06.420926094 CEST61285443192.168.2.5142.250.185.132
                          May 24, 2024 11:03:06.420969009 CEST44361285142.250.185.132192.168.2.5
                          May 24, 2024 11:03:06.421320915 CEST61285443192.168.2.5142.250.185.132
                          May 24, 2024 11:03:06.421509981 CEST61285443192.168.2.5142.250.185.132
                          May 24, 2024 11:03:06.421528101 CEST44361285142.250.185.132192.168.2.5
                          May 24, 2024 11:03:07.059566975 CEST44361285142.250.185.132192.168.2.5
                          May 24, 2024 11:03:07.060209036 CEST61285443192.168.2.5142.250.185.132
                          May 24, 2024 11:03:07.060233116 CEST44361285142.250.185.132192.168.2.5
                          May 24, 2024 11:03:07.060592890 CEST44361285142.250.185.132192.168.2.5
                          May 24, 2024 11:03:07.060972929 CEST61285443192.168.2.5142.250.185.132
                          May 24, 2024 11:03:07.061049938 CEST44361285142.250.185.132192.168.2.5
                          May 24, 2024 11:03:07.114376068 CEST61285443192.168.2.5142.250.185.132
                          May 24, 2024 11:03:16.971905947 CEST44361285142.250.185.132192.168.2.5
                          May 24, 2024 11:03:16.972050905 CEST44361285142.250.185.132192.168.2.5
                          May 24, 2024 11:03:16.972273111 CEST61285443192.168.2.5142.250.185.132
                          May 24, 2024 11:03:18.413259983 CEST61285443192.168.2.5142.250.185.132
                          May 24, 2024 11:03:18.413289070 CEST44361285142.250.185.132192.168.2.5
                          May 24, 2024 11:04:06.474720001 CEST61287443192.168.2.5142.250.185.132
                          May 24, 2024 11:04:06.474771976 CEST44361287142.250.185.132192.168.2.5
                          May 24, 2024 11:04:06.474843025 CEST61287443192.168.2.5142.250.185.132
                          May 24, 2024 11:04:06.475070000 CEST61287443192.168.2.5142.250.185.132
                          May 24, 2024 11:04:06.475084066 CEST44361287142.250.185.132192.168.2.5
                          May 24, 2024 11:04:07.120623112 CEST44361287142.250.185.132192.168.2.5
                          May 24, 2024 11:04:07.120980024 CEST61287443192.168.2.5142.250.185.132
                          May 24, 2024 11:04:07.121002913 CEST44361287142.250.185.132192.168.2.5
                          May 24, 2024 11:04:07.121258020 CEST44361287142.250.185.132192.168.2.5
                          May 24, 2024 11:04:07.121665001 CEST61287443192.168.2.5142.250.185.132
                          May 24, 2024 11:04:07.121721029 CEST44361287142.250.185.132192.168.2.5
                          May 24, 2024 11:04:07.176577091 CEST61287443192.168.2.5142.250.185.132
                          May 24, 2024 11:04:17.020401001 CEST44361287142.250.185.132192.168.2.5
                          May 24, 2024 11:04:17.020464897 CEST44361287142.250.185.132192.168.2.5
                          May 24, 2024 11:04:17.020596027 CEST61287443192.168.2.5142.250.185.132
                          May 24, 2024 11:04:18.412736893 CEST61287443192.168.2.5142.250.185.132
                          May 24, 2024 11:04:18.412775993 CEST44361287142.250.185.132192.168.2.5
                          TimestampSource PortDest PortSource IPDest IP
                          May 24, 2024 11:02:02.015485048 CEST53558781.1.1.1192.168.2.5
                          May 24, 2024 11:02:02.015552998 CEST53606021.1.1.1192.168.2.5
                          May 24, 2024 11:02:03.132308960 CEST53643171.1.1.1192.168.2.5
                          May 24, 2024 11:02:04.730165958 CEST53554521.1.1.1192.168.2.5
                          May 24, 2024 11:02:06.366262913 CEST6204353192.168.2.51.1.1.1
                          May 24, 2024 11:02:06.366408110 CEST5839553192.168.2.51.1.1.1
                          May 24, 2024 11:02:06.381851912 CEST53583951.1.1.1192.168.2.5
                          May 24, 2024 11:02:06.381861925 CEST53620431.1.1.1192.168.2.5
                          May 24, 2024 11:02:20.748459101 CEST53522971.1.1.1192.168.2.5
                          May 24, 2024 11:02:39.741393089 CEST53618401.1.1.1192.168.2.5
                          May 24, 2024 11:02:43.778745890 CEST53637631.1.1.1192.168.2.5
                          May 24, 2024 11:03:01.615375042 CEST53506051.1.1.1192.168.2.5
                          TimestampSource IPDest IPChecksumCodeType
                          May 24, 2024 11:02:04.733437061 CEST192.168.2.51.1.1.1c233(Port unreachable)Destination Unreachable
                          May 24, 2024 11:03:01.615453959 CEST192.168.2.51.1.1.1c225(Port unreachable)Destination Unreachable
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          May 24, 2024 11:02:06.366262913 CEST192.168.2.51.1.1.10x9cbStandard query (0)www.google.comA (IP address)IN (0x0001)false
                          May 24, 2024 11:02:06.366408110 CEST192.168.2.51.1.1.10x55b6Standard query (0)www.google.com65IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          May 24, 2024 11:02:06.381851912 CEST1.1.1.1192.168.2.50x55b6No error (0)www.google.com65IN (0x0001)false
                          May 24, 2024 11:02:06.381861925 CEST1.1.1.1192.168.2.50x9cbNo error (0)www.google.com142.250.185.132A (IP address)IN (0x0001)false
                          • fs.microsoft.com
                          • slscr.update.microsoft.com
                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          0192.168.2.54971423.43.61.160443
                          TimestampBytes transferredDirectionData
                          2024-05-24 09:02:07 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
                          Connection: Keep-Alive
                          Accept: */*
                          Accept-Encoding: identity
                          User-Agent: Microsoft BITS/7.8
                          Host: fs.microsoft.com
                          2024-05-24 09:02:07 UTC467INHTTP/1.1 200 OK
                          Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                          Content-Type: application/octet-stream
                          ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                          Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                          Server: ECAcc (lpl/EF06)
                          X-CID: 11
                          X-Ms-ApiVersion: Distribute 1.2
                          X-Ms-Region: prod-eus-z1
                          Cache-Control: public, max-age=198517
                          Date: Fri, 24 May 2024 09:02:07 GMT
                          Connection: close
                          X-CID: 2


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          1192.168.2.54971523.43.61.160443
                          TimestampBytes transferredDirectionData
                          2024-05-24 09:02:08 UTC239OUTGET /fs/windows/config.json HTTP/1.1
                          Connection: Keep-Alive
                          Accept: */*
                          Accept-Encoding: identity
                          If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
                          Range: bytes=0-2147483646
                          User-Agent: Microsoft BITS/7.8
                          Host: fs.microsoft.com
                          2024-05-24 09:02:08 UTC535INHTTP/1.1 200 OK
                          Content-Type: application/octet-stream
                          Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                          ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                          ApiVersion: Distribute 1.1
                          Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                          X-Azure-Ref: 0WwMRYwAAAABe7whxSEuqSJRuLqzPsqCaTE9OMjFFREdFMTcxNQBjZWZjMjU4My1hOWIyLTQ0YTctOTc1NS1iNzZkMTdlMDVmN2Y=
                          Cache-Control: public, max-age=198358
                          Date: Fri, 24 May 2024 09:02:08 GMT
                          Content-Length: 55
                          Connection: close
                          X-CID: 2
                          2024-05-24 09:02:08 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
                          Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          2192.168.2.54972152.165.165.26443
                          TimestampBytes transferredDirectionData
                          2024-05-24 09:02:19 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=dfkv93peUGhaFzB&MD=ZvaSYwlo HTTP/1.1
                          Connection: Keep-Alive
                          Accept: */*
                          User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                          Host: slscr.update.microsoft.com
                          2024-05-24 09:02:19 UTC560INHTTP/1.1 200 OK
                          Cache-Control: no-cache
                          Pragma: no-cache
                          Content-Type: application/octet-stream
                          Expires: -1
                          Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                          ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
                          MS-CorrelationId: 28e60830-8156-4963-a0ff-b844b3bf6372
                          MS-RequestId: 0f5f057a-a38d-4943-ac91-539b0300f59e
                          MS-CV: d2lcHe//8UOEQgnh.0
                          X-Microsoft-SLSClientCache: 2880
                          Content-Disposition: attachment; filename=environment.cab
                          X-Content-Type-Options: nosniff
                          Date: Fri, 24 May 2024 09:02:18 GMT
                          Connection: close
                          Content-Length: 24490
                          2024-05-24 09:02:19 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
                          Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
                          2024-05-24 09:02:19 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
                          Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          3192.168.2.56128352.165.165.26443
                          TimestampBytes transferredDirectionData
                          2024-05-24 09:02:57 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=dfkv93peUGhaFzB&MD=ZvaSYwlo HTTP/1.1
                          Connection: Keep-Alive
                          Accept: */*
                          User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                          Host: slscr.update.microsoft.com
                          2024-05-24 09:02:58 UTC560INHTTP/1.1 200 OK
                          Cache-Control: no-cache
                          Pragma: no-cache
                          Content-Type: application/octet-stream
                          Expires: -1
                          Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                          ETag: "Mx1RoJH/qEwpWfKllx7sbsl28AuERz5IYdcsvtTJcgM=_1440"
                          MS-CorrelationId: 7cf426a8-f9b0-4092-8c96-0b2a3e0cb93c
                          MS-RequestId: bc79cd01-2dae-44ca-bc8e-9de6163c8747
                          MS-CV: UVI2iS/9eEOlg7mw.0
                          X-Microsoft-SLSClientCache: 1440
                          Content-Disposition: attachment; filename=environment.cab
                          X-Content-Type-Options: nosniff
                          Date: Fri, 24 May 2024 09:02:56 GMT
                          Connection: close
                          Content-Length: 25457
                          2024-05-24 09:02:58 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 51 22 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 db 8e 00 00 14 00 00 00 00 00 10 00 51 22 00 00 20 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 f3 43 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 0d 92 6f db e5 21 f3 43 43 4b ed 5a 09 38 55 5b df 3f 93 99 90 29 99 e7 29 ec 73 cc 4a 66 32 cf 84 32 64 c8 31 c7 11 52 38 87 90 42 66 09 99 87 32 0f 19 0a 09 51 a6 a8 08 29 53 86 4a 52 84 50 df 46 83 ba dd 7b df fb 7e ef 7d ee 7d bf ef 9e e7 d9 67 ef 35 ee b5 fe eb 3f ff b6 96 81 a2 0a 04 fc 31 40 21 5b 3f a5 ed 1b 04 0e 85 42 a0 10 04 64 12 6c a5 de aa a1 d8 ea f3 58 01 f2 f5 67 0b 5e 9b bd e8 a0 90 1d bf 40 88 9d eb 49 b4 87 9b ab 8b 9d 2b 46 c8 c7 c5 19 92
                          Data Ascii: MSCFQ"DQ" AdCenvironment.cabo!CCKZ8U[?))sJf22d1R8Bf2Q)SJRPF{~}}g5?1@![?BdlXg^@I+F
                          2024-05-24 09:02:58 UTC9633INData Raw: 21 6f b3 eb a6 cc f5 31 be cf 05 e2 a9 fe fa 57 6d 19 30 b3 c2 c5 66 c9 6a df f5 e7 f0 78 bd c7 a8 9e 25 e3 f9 bc ed 6b 54 57 08 2b 51 82 44 12 fb b9 53 8c cc f4 60 12 8a 76 cc 40 40 41 9b dc 5c 17 ff 5c f9 5e 17 35 98 24 56 4b 74 ef 42 10 c8 af bf 7f c6 7f f2 37 7d 5a 3f 1c f2 99 79 4a 91 52 00 af 38 0f 17 f5 2f 79 81 65 d9 a9 b5 6b e4 c7 ce f6 ca 7a 00 6f 4b 30 44 24 22 3c cf ed 03 a5 96 8f 59 29 bc b6 fd 04 e1 70 9f 32 4a 27 fd 55 af 2f fe b6 e5 8e 33 bb 62 5f 9a db 57 40 e9 f1 ce 99 66 90 8c ff 6a 62 7f dd c5 4a 0b 91 26 e2 39 ec 19 4a 71 63 9d 7b 21 6d c3 9c a3 a2 3c fa 7f 7d 96 6a 90 78 a6 6d d2 e1 9c f9 1d fc 38 d8 94 f4 c6 a5 0a 96 86 a4 bd 9e 1a ae 04 42 83 b8 b5 80 9b 22 38 20 b5 25 e5 64 ec f7 f4 bf 7e 63 59 25 0f 7a 2e 39 57 76 a2 71 aa 06 8a
                          Data Ascii: !o1Wm0fjx%kTW+QDS`v@@A\\^5$VKtB7}Z?yJR8/yekzoK0D$"<Y)p2J'U/3b_W@fjbJ&9Jqc{!m<}jxm8B"8 %d~cY%z.9Wvq


                          Click to jump to process

                          Click to jump to process

                          Click to jump to process

                          Target ID:0
                          Start time:05:01:57
                          Start date:24/05/2024
                          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "C:\Users\user\Desktop\T8534770935.html"
                          Imagebase:0x7ff715980000
                          File size:3'242'272 bytes
                          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:false

                          Target ID:2
                          Start time:05:02:00
                          Start date:24/05/2024
                          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=1992,i,14220054034880501362,1055437224518799667,262144 /prefetch:8
                          Imagebase:0x7ff715980000
                          File size:3'242'272 bytes
                          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:false

                          No disassembly