Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
http://twomancake.com

Overview

General Information

Sample URL:http://twomancake.com
Analysis ID:1447260
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Stores files to the Windows start menu directory

Classification

  • System is w10x64
  • chrome.exe (PID: 6672 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
    • chrome.exe (PID: 2932 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 --field-trial-handle=2168,i,8641132215159082791,12555900835733439550,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
  • chrome.exe (PID: 4196 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://twomancake.com" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://twomancake.comAvira URL Cloud: detection malicious, Label: malware
Source: http://twomancake.com/HTTP Parser: No favicon
Source: unknownHTTPS traffic detected: 2.19.244.127:443 -> 192.168.2.10:49714 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.19.244.127:443 -> 192.168.2.10:49715 version: TLS 1.2
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.55
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.55
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.85
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.85
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.85
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.55
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.55
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.85
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.85
Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.85
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.85
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: twomancake.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficDNS traffic detected: DNS query: twomancake.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 24 May 2024 15:41:06 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveX-Powered-By: ExpressAccess-Control-Allow-Origin: *Content-Security-Policy: default-src 'none'X-Content-Type-Options: nosniffCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9NZVRDebILBnleGFDEvrwKKgmCxWzK8nLOfXTlxtBeoHct%2FOFG9AoilCQGlUtQY5BBUW7I8Q2u1HaQA6nRLKs83WSQX3rQuEZwQtgv%2FYO%2B%2FOMD7yGSMcUL%2Bwjjyha3Ep9w%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 888e63501a0e0fa8-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400Data Raw: 37 66 0d 0a 1f 8b 08 00 00 00 00 00 00 03 2c 8d b1 0e c2 30 0c 44 77 7f 85 c9 8e bc 32 b8 5e 4a c4 08 43 97 8e 86 1a 8a 94 26 28 98 a1 7f 8f 02 9d 4e f7 9e 4e c7 bb e3 b9 1f c6 4b c4 d9 97 24 c0 2d 30 69 7e 74 c1 72 68 c0 74 12 e0 c5 5c f1 36 6b 7d 9b 77 e1 e3 f7 fd a1 59 7f 7a 32 89 b5 96 ca f4 2f c0 b4 6d ae 65 5a 05 f8 55 4d 7a cd b9 38 9e e2 80 c4 d4 08 30 6d 9e 7e d7 5f 00 00 00 ff ff 0d 0a 62 0d 0a e3 02 00 e6 4f 23 54 8b 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 7f,0Dw2^JC&(NNK$-0i~trht\6k}wYz2/meZUMz80m~_bO#T0
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49677 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownHTTPS traffic detected: 2.19.244.127:443 -> 192.168.2.10:49714 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.19.244.127:443 -> 192.168.2.10:49715 version: TLS 1.2
Source: classification engineClassification label: mal48.win@16/8@4/4
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 --field-trial-handle=2168,i,8641132215159082791,12555900835733439550,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://twomancake.com"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 --field-trial-handle=2168,i,8641132215159082791,12555900835733439550,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Google Drive.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media3
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive4
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture3
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
http://twomancake.com100%Avira URL Cloudmalware
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.214.172
truefalse
    unknown
    www.google.com
    216.58.206.68
    truefalse
      unknown
      twomancake.com
      188.114.97.3
      truefalse
        unknown
        NameMaliciousAntivirus DetectionReputation
        http://twomancake.com/false
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          239.255.255.250
          unknownReserved
          unknownunknownfalse
          188.114.97.3
          twomancake.comEuropean Union
          13335CLOUDFLARENETUSfalse
          216.58.206.68
          www.google.comUnited States
          15169GOOGLEUSfalse
          IP
          192.168.2.10
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1447260
          Start date and time:2024-05-24 17:40:17 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 3m 13s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:browseurl.jbs
          Sample URL:http://twomancake.com
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:15
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal48.win@16/8@4/4
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, Sgrmuserer.exe, conhost.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 142.250.185.99, 142.250.185.174, 64.233.184.84, 34.104.35.123, 20.114.59.183, 88.221.110.106, 20.242.39.171, 93.184.221.240, 13.95.31.18, 142.250.185.131
          • Excluded domains from analysis (whitelisted): fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, clientservices.googleapis.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu.azureedge.net, download.windowsupdate.com.edgesuite.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, glb.cws.prod.dcat.dsp.trafficmanager.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, update.googleapis.com, clients.l.google.com, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtSetInformationFile calls found.
          • VT rate limit hit for: http://twomancake.com
          No simulations
          No context
          No context
          No context
          No context
          No context
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri May 24 14:41:05 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2673
          Entropy (8bit):3.9936944983355436
          Encrypted:false
          SSDEEP:48:8ftbdtT0OHpidAKZdA1uehwiZUklqehGy+3:8f5Yrty
          MD5:CC99758B7A91D9E3ED9BC14C5E0A3A50
          SHA1:2F00306D2A2C103F01F8121036FA22A6FA905FEE
          SHA-256:823F3601D1511BCF136C1EE026F011324712BDE1DC077C3EA38D21A9677D121D
          SHA-512:ADD019CAEBFC563BA4F9920BEBFE40B742BAE9EAF50DA85A7B48259133FE6E33EC3028EEC8C84B3E63FD85C22DC2F03ADCD345B92EA42BEE16205FBA225B5B37
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,....=..........y... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW$O..PROGRA~1..t......O.I.X!}....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X!}....L.....................p+j.G.o.o.g.l.e.....T.1.....EW.L..Chrome..>......CW.V.X!}....M......................k..C.h.r.o.m.e.....`.1.....EW.L..APPLIC~1..H......CW.V.X!}...........................k..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V.X#}....N.......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri May 24 14:41:05 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2675
          Entropy (8bit):4.009904006684992
          Encrypted:false
          SSDEEP:48:8atbdtT0OHpidAKZdA1Heh/iZUkAQkqehdy+2:8a5Yl9Qgy
          MD5:2D4CB852C09D7EFDDA91EEB09AF3837D
          SHA1:4DC03DC8560BB2E17766CCC1A557D103DD008413
          SHA-256:05075EB855E6E04932F4FDC650EF307587EA939AB0AACB1009A9F8A1B3B8DCD2
          SHA-512:0FE37315C5708BFA3A6AAE1C9296AA1E376F98DEABF7D7AF32FF746BDC4E1BDE78A665903799370EDF8BF24E2CE481DC3565BE7961648FE56EDAF988347580E0
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,...............y... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW$O..PROGRA~1..t......O.I.X!}....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X!}....L.....................p+j.G.o.o.g.l.e.....T.1.....EW.L..Chrome..>......CW.V.X!}....M......................k..C.h.r.o.m.e.....`.1.....EW.L..APPLIC~1..H......CW.V.X!}...........................k..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V.X#}....N.......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 08:59:33 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2689
          Entropy (8bit):4.015285717975794
          Encrypted:false
          SSDEEP:48:8FtbdtT0bHpidAKZdA149eh7sFiZUkmgqeh7sXy+BX:8F5Y2nJy
          MD5:3D44215038B74D66D4DD54F2EA4017E5
          SHA1:EEE8622BDB4E66CC9D61F1339207125811EC335B
          SHA-256:F9E95D12A77D6EDF2797CB0BB23E6B19CF2F2C83C44D0DA1E84174C252015993
          SHA-512:9AA0A1E4C597C09791CFB404CBF90BBCEC30282948197C21C246B476EE6DD2C18C574837A5041BEE031F6251879AB592534D92A4EFD1CE0569064EBC71EC16FA
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,....K..r.......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW$O..PROGRA~1..t......O.I.X!}....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X!}....L.....................p+j.G.o.o.g.l.e.....T.1.....EW.L..Chrome..>......CW.V.X!}....M......................k..C.h.r.o.m.e.....`.1.....EW.L..APPLIC~1..H......CW.V.X!}...........................k..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VEW.L....N.......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri May 24 14:41:05 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2677
          Entropy (8bit):4.004490571704533
          Encrypted:false
          SSDEEP:48:83tbdtT0OHpidAKZdA14ehDiZUkwqehhy+R:835Y2Py
          MD5:42F5922705AF38703C7E8B71EB90E487
          SHA1:D7889B3598D4B8F39CB2275686DECD977BC843D5
          SHA-256:F9F2A25C668639E9B990E90B1CC757CA1CE895F8975816414147BD0F0339A03F
          SHA-512:C2B2182F799427DB274E0503FAFA86FB5143A4F35B8741A570B0861847FE5FAEB02A382E45AB7B803FA9C5C6CB270FE88A18D9E396838B16D4F9BD97A869CFCD
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,....qd.........y... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW$O..PROGRA~1..t......O.I.X!}....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X!}....L.....................p+j.G.o.o.g.l.e.....T.1.....EW.L..Chrome..>......CW.V.X!}....M......................k..C.h.r.o.m.e.....`.1.....EW.L..APPLIC~1..H......CW.V.X!}...........................k..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V.X#}....N.......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri May 24 14:41:05 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2677
          Entropy (8bit):3.9951858432974205
          Encrypted:false
          SSDEEP:48:8NtbdtT0OHpidAKZdA1mehBiZUk1W1qehzy+C:8N5YG9Ty
          MD5:2D764253D7794904062FD97A17A92039
          SHA1:A5B8FFD30322CCB1D4E572EC107C6217D1625094
          SHA-256:6336683DB18E1430305B67CE4A4B2DC21F9E62A985F3615278E70AE976216D4D
          SHA-512:B7F4B729CAB279F8B7732B760F30FB47AFF85BF0B55EA97BA82E7133109FBD5112C9F4DB3A48F11250226F92F57AF643CD2289F6C81E61541A09CE20128E5595
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,...............y... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW$O..PROGRA~1..t......O.I.X!}....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X!}....L.....................p+j.G.o.o.g.l.e.....T.1.....EW.L..Chrome..>......CW.V.X!}....M......................k..C.h.r.o.m.e.....`.1.....EW.L..APPLIC~1..H......CW.V.X!}...........................k..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V.X#}....N.......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri May 24 14:41:05 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2679
          Entropy (8bit):4.008401462392728
          Encrypted:false
          SSDEEP:48:8FtbdtT0OHpidAKZdA1duT1ehOuTbbiZUk5OjqehOuTbJy+yT+:8F5YNTyTbxWOvTbJy7T
          MD5:7A54BD44BCB84EB522FC6376E1CF2C07
          SHA1:9FB973D65E5E38F20858F5A77EC8CFAB8E1E8624
          SHA-256:6C780939784D77D03F83147650663EB71DDE2FC2527F803949DC00ADC74EF5C1
          SHA-512:92A731AA04CB3C3243EF907B1D4CEBECD582D3D45C1FDA7BF03A942FBF0BF2F7D057B643234F689164B193326092D802A24EA98ACFBE57D127756283104EE924
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,....$..........y... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW$O..PROGRA~1..t......O.I.X!}....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X!}....L.....................p+j.G.o.o.g.l.e.....T.1.....EW.L..Chrome..>......CW.V.X!}....M......................k..C.h.r.o.m.e.....`.1.....EW.L..APPLIC~1..H......CW.V.X!}...........................k..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V.X#}....N.......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:gzip compressed data, from Unix, original size modulo 2^32 139
          Category:downloaded
          Size (bytes):138
          Entropy (8bit):6.286858305684119
          Encrypted:false
          SSDEEP:3:FttQ9VpbXFk6iIjm1kdD7tEG0mEn5CxlO2mq/:XtQ3pLliIVdDaNncin6
          MD5:94FB98BE8BDD4DBEE04466394AAAEADF
          SHA1:9491C61EE46AF33BE0FEB8168B1101219DF044EE
          SHA-256:1EE2F7A9E4FEAADE11E46B95DBA2701B8E2EF59A9C01F60D92C6BD82ABF02F21
          SHA-512:F03965618A244991BDC06CD8B73993DDD209AE717214134C73CE89632A8813454A6FB8F5C002EFFEA7B7792402C5158C34E1DE86D532C2F522E824E941E675EF
          Malicious:false
          Reputation:low
          URL:http://twomancake.com/
          Preview:..........,....0.Dw....2.^J..C......&(......N..N....K..$.-0i~t.rh.t...\.6k}.w.....Y.z2...../..m.eZ..UMz.8.....0m.~._.........O#T....
          No static file info
          TimestampSource PortDest PortSource IPDest IP
          May 24, 2024 17:41:00.676331043 CEST49674443192.168.2.10173.222.162.55
          May 24, 2024 17:41:00.676429987 CEST49675443192.168.2.10173.222.162.55
          May 24, 2024 17:41:00.719525099 CEST49671443192.168.2.10204.79.197.203
          May 24, 2024 17:41:01.020049095 CEST49671443192.168.2.10204.79.197.203
          May 24, 2024 17:41:01.629429102 CEST49671443192.168.2.10204.79.197.203
          May 24, 2024 17:41:02.832675934 CEST49671443192.168.2.10204.79.197.203
          May 24, 2024 17:41:05.351299047 CEST49671443192.168.2.10204.79.197.203
          May 24, 2024 17:41:05.508109093 CEST4970980192.168.2.10188.114.97.3
          May 24, 2024 17:41:05.508578062 CEST4971080192.168.2.10188.114.97.3
          May 24, 2024 17:41:05.513259888 CEST8049709188.114.97.3192.168.2.10
          May 24, 2024 17:41:05.513336897 CEST4970980192.168.2.10188.114.97.3
          May 24, 2024 17:41:05.513495922 CEST4970980192.168.2.10188.114.97.3
          May 24, 2024 17:41:05.518182993 CEST8049710188.114.97.3192.168.2.10
          May 24, 2024 17:41:05.518245935 CEST4971080192.168.2.10188.114.97.3
          May 24, 2024 17:41:05.523129940 CEST8049709188.114.97.3192.168.2.10
          May 24, 2024 17:41:06.071635008 CEST8049709188.114.97.3192.168.2.10
          May 24, 2024 17:41:06.119342089 CEST4970980192.168.2.10188.114.97.3
          May 24, 2024 17:41:08.127446890 CEST49713443192.168.2.10216.58.206.68
          May 24, 2024 17:41:08.127479076 CEST44349713216.58.206.68192.168.2.10
          May 24, 2024 17:41:08.127624035 CEST49713443192.168.2.10216.58.206.68
          May 24, 2024 17:41:08.128046036 CEST49713443192.168.2.10216.58.206.68
          May 24, 2024 17:41:08.128060102 CEST44349713216.58.206.68192.168.2.10
          May 24, 2024 17:41:08.768194914 CEST44349713216.58.206.68192.168.2.10
          May 24, 2024 17:41:08.768836021 CEST49713443192.168.2.10216.58.206.68
          May 24, 2024 17:41:08.768851995 CEST44349713216.58.206.68192.168.2.10
          May 24, 2024 17:41:08.769840956 CEST44349713216.58.206.68192.168.2.10
          May 24, 2024 17:41:08.769922972 CEST49713443192.168.2.10216.58.206.68
          May 24, 2024 17:41:08.771343946 CEST49713443192.168.2.10216.58.206.68
          May 24, 2024 17:41:08.771418095 CEST44349713216.58.206.68192.168.2.10
          May 24, 2024 17:41:08.816029072 CEST49713443192.168.2.10216.58.206.68
          May 24, 2024 17:41:08.816039085 CEST44349713216.58.206.68192.168.2.10
          May 24, 2024 17:41:08.863018036 CEST49713443192.168.2.10216.58.206.68
          May 24, 2024 17:41:08.926182985 CEST49677443192.168.2.1020.42.65.85
          May 24, 2024 17:41:09.093893051 CEST49714443192.168.2.102.19.244.127
          May 24, 2024 17:41:09.093935013 CEST443497142.19.244.127192.168.2.10
          May 24, 2024 17:41:09.094187975 CEST49714443192.168.2.102.19.244.127
          May 24, 2024 17:41:09.096280098 CEST49714443192.168.2.102.19.244.127
          May 24, 2024 17:41:09.096292973 CEST443497142.19.244.127192.168.2.10
          May 24, 2024 17:41:09.237893105 CEST49677443192.168.2.1020.42.65.85
          May 24, 2024 17:41:09.763696909 CEST443497142.19.244.127192.168.2.10
          May 24, 2024 17:41:09.763758898 CEST49714443192.168.2.102.19.244.127
          May 24, 2024 17:41:09.767730951 CEST49714443192.168.2.102.19.244.127
          May 24, 2024 17:41:09.767741919 CEST443497142.19.244.127192.168.2.10
          May 24, 2024 17:41:09.768006086 CEST443497142.19.244.127192.168.2.10
          May 24, 2024 17:41:09.816036940 CEST49714443192.168.2.102.19.244.127
          May 24, 2024 17:41:09.835498095 CEST49714443192.168.2.102.19.244.127
          May 24, 2024 17:41:09.847279072 CEST49677443192.168.2.1020.42.65.85
          May 24, 2024 17:41:09.878532887 CEST443497142.19.244.127192.168.2.10
          May 24, 2024 17:41:10.067482948 CEST443497142.19.244.127192.168.2.10
          May 24, 2024 17:41:10.067543030 CEST443497142.19.244.127192.168.2.10
          May 24, 2024 17:41:10.067594051 CEST49714443192.168.2.102.19.244.127
          May 24, 2024 17:41:10.067694902 CEST49714443192.168.2.102.19.244.127
          May 24, 2024 17:41:10.067723036 CEST443497142.19.244.127192.168.2.10
          May 24, 2024 17:41:10.067733049 CEST49714443192.168.2.102.19.244.127
          May 24, 2024 17:41:10.067739010 CEST443497142.19.244.127192.168.2.10
          May 24, 2024 17:41:10.102348089 CEST49715443192.168.2.102.19.244.127
          May 24, 2024 17:41:10.102380991 CEST443497152.19.244.127192.168.2.10
          May 24, 2024 17:41:10.102461100 CEST49715443192.168.2.102.19.244.127
          May 24, 2024 17:41:10.102838993 CEST49715443192.168.2.102.19.244.127
          May 24, 2024 17:41:10.102847099 CEST443497152.19.244.127192.168.2.10
          May 24, 2024 17:41:10.153106928 CEST49671443192.168.2.10204.79.197.203
          May 24, 2024 17:41:10.286608934 CEST49674443192.168.2.10173.222.162.55
          May 24, 2024 17:41:10.286679983 CEST49675443192.168.2.10173.222.162.55
          May 24, 2024 17:41:10.852416992 CEST443497152.19.244.127192.168.2.10
          May 24, 2024 17:41:10.852591038 CEST49715443192.168.2.102.19.244.127
          May 24, 2024 17:41:10.855011940 CEST49715443192.168.2.102.19.244.127
          May 24, 2024 17:41:10.855031013 CEST443497152.19.244.127192.168.2.10
          May 24, 2024 17:41:10.855276108 CEST443497152.19.244.127192.168.2.10
          May 24, 2024 17:41:10.857039928 CEST49715443192.168.2.102.19.244.127
          May 24, 2024 17:41:10.902504921 CEST443497152.19.244.127192.168.2.10
          May 24, 2024 17:41:11.052704096 CEST49677443192.168.2.1020.42.65.85
          May 24, 2024 17:41:11.170367956 CEST443497152.19.244.127192.168.2.10
          May 24, 2024 17:41:11.170433044 CEST443497152.19.244.127192.168.2.10
          May 24, 2024 17:41:11.170497894 CEST49715443192.168.2.102.19.244.127
          May 24, 2024 17:41:11.171233892 CEST49715443192.168.2.102.19.244.127
          May 24, 2024 17:41:11.171233892 CEST49715443192.168.2.102.19.244.127
          May 24, 2024 17:41:11.171251059 CEST443497152.19.244.127192.168.2.10
          May 24, 2024 17:41:11.171260118 CEST443497152.19.244.127192.168.2.10
          May 24, 2024 17:41:13.458568096 CEST49677443192.168.2.1020.42.65.85
          May 24, 2024 17:41:18.269145012 CEST49677443192.168.2.1020.42.65.85
          May 24, 2024 17:41:18.677637100 CEST44349713216.58.206.68192.168.2.10
          May 24, 2024 17:41:18.677720070 CEST44349713216.58.206.68192.168.2.10
          May 24, 2024 17:41:18.677933931 CEST49713443192.168.2.10216.58.206.68
          May 24, 2024 17:41:19.753526926 CEST49671443192.168.2.10204.79.197.203
          May 24, 2024 17:41:20.714970112 CEST49713443192.168.2.10216.58.206.68
          May 24, 2024 17:41:20.714993954 CEST44349713216.58.206.68192.168.2.10
          May 24, 2024 17:41:20.892393112 CEST8049710188.114.97.3192.168.2.10
          May 24, 2024 17:41:20.894418955 CEST4971080192.168.2.10188.114.97.3
          May 24, 2024 17:41:22.505081892 CEST4971080192.168.2.10188.114.97.3
          May 24, 2024 17:41:22.548754930 CEST8049710188.114.97.3192.168.2.10
          May 24, 2024 17:41:27.878535032 CEST49677443192.168.2.1020.42.65.85
          May 24, 2024 17:41:51.082098961 CEST4970980192.168.2.10188.114.97.3
          May 24, 2024 17:41:51.087080002 CEST8049709188.114.97.3192.168.2.10
          May 24, 2024 17:42:08.161211014 CEST49722443192.168.2.10216.58.206.68
          May 24, 2024 17:42:08.161268950 CEST44349722216.58.206.68192.168.2.10
          May 24, 2024 17:42:08.161535025 CEST49722443192.168.2.10216.58.206.68
          May 24, 2024 17:42:08.161887884 CEST49722443192.168.2.10216.58.206.68
          May 24, 2024 17:42:08.161900043 CEST44349722216.58.206.68192.168.2.10
          May 24, 2024 17:42:08.810993910 CEST44349722216.58.206.68192.168.2.10
          May 24, 2024 17:42:08.811300993 CEST49722443192.168.2.10216.58.206.68
          May 24, 2024 17:42:08.811337948 CEST44349722216.58.206.68192.168.2.10
          May 24, 2024 17:42:08.811872005 CEST44349722216.58.206.68192.168.2.10
          May 24, 2024 17:42:08.812237024 CEST49722443192.168.2.10216.58.206.68
          May 24, 2024 17:42:08.812351942 CEST44349722216.58.206.68192.168.2.10
          May 24, 2024 17:42:08.863903046 CEST49722443192.168.2.10216.58.206.68
          May 24, 2024 17:42:18.707101107 CEST44349722216.58.206.68192.168.2.10
          May 24, 2024 17:42:18.707170010 CEST44349722216.58.206.68192.168.2.10
          May 24, 2024 17:42:18.707233906 CEST49722443192.168.2.10216.58.206.68
          May 24, 2024 17:42:20.506462097 CEST49722443192.168.2.10216.58.206.68
          May 24, 2024 17:42:20.506525993 CEST44349722216.58.206.68192.168.2.10
          TimestampSource PortDest PortSource IPDest IP
          May 24, 2024 17:41:04.027107000 CEST53555251.1.1.1192.168.2.10
          May 24, 2024 17:41:04.068471909 CEST53550981.1.1.1192.168.2.10
          May 24, 2024 17:41:05.274235964 CEST53510411.1.1.1192.168.2.10
          May 24, 2024 17:41:05.475945950 CEST5182153192.168.2.101.1.1.1
          May 24, 2024 17:41:05.475945950 CEST6443453192.168.2.101.1.1.1
          May 24, 2024 17:41:05.494463921 CEST53518211.1.1.1192.168.2.10
          May 24, 2024 17:41:05.528249979 CEST53644341.1.1.1192.168.2.10
          May 24, 2024 17:41:08.110763073 CEST5360653192.168.2.101.1.1.1
          May 24, 2024 17:41:08.110968113 CEST6489453192.168.2.101.1.1.1
          May 24, 2024 17:41:08.118452072 CEST53536061.1.1.1192.168.2.10
          May 24, 2024 17:41:08.126128912 CEST53648941.1.1.1192.168.2.10
          May 24, 2024 17:41:22.691555977 CEST53653711.1.1.1192.168.2.10
          May 24, 2024 17:41:41.424614906 CEST53653021.1.1.1192.168.2.10
          May 24, 2024 17:42:03.800565958 CEST53507571.1.1.1192.168.2.10
          May 24, 2024 17:42:04.083504915 CEST53502411.1.1.1192.168.2.10
          May 24, 2024 17:42:08.029881001 CEST138138192.168.2.10192.168.2.255
          TimestampSource IPDest IPChecksumCodeType
          May 24, 2024 17:41:05.528469086 CEST192.168.2.101.1.1.1c233(Port unreachable)Destination Unreachable
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          May 24, 2024 17:41:05.475945950 CEST192.168.2.101.1.1.10xf839Standard query (0)twomancake.comA (IP address)IN (0x0001)false
          May 24, 2024 17:41:05.475945950 CEST192.168.2.101.1.1.10x7bd0Standard query (0)twomancake.com65IN (0x0001)false
          May 24, 2024 17:41:08.110763073 CEST192.168.2.101.1.1.10x78ceStandard query (0)www.google.comA (IP address)IN (0x0001)false
          May 24, 2024 17:41:08.110968113 CEST192.168.2.101.1.1.10x4daStandard query (0)www.google.com65IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          May 24, 2024 17:41:05.494463921 CEST1.1.1.1192.168.2.100xf839No error (0)twomancake.com188.114.97.3A (IP address)IN (0x0001)false
          May 24, 2024 17:41:05.494463921 CEST1.1.1.1192.168.2.100xf839No error (0)twomancake.com188.114.96.3A (IP address)IN (0x0001)false
          May 24, 2024 17:41:05.528249979 CEST1.1.1.1192.168.2.100x7bd0No error (0)twomancake.com65IN (0x0001)false
          May 24, 2024 17:41:08.118452072 CEST1.1.1.1192.168.2.100x78ceNo error (0)www.google.com216.58.206.68A (IP address)IN (0x0001)false
          May 24, 2024 17:41:08.126128912 CEST1.1.1.1192.168.2.100x4daNo error (0)www.google.com65IN (0x0001)false
          May 24, 2024 17:41:56.496697903 CEST1.1.1.1192.168.2.100x99fNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
          May 24, 2024 17:41:56.496697903 CEST1.1.1.1192.168.2.100x99fNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
          • fs.microsoft.com
          • twomancake.com
          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          0192.168.2.1049709188.114.97.3802932C:\Program Files\Google\Chrome\Application\chrome.exe
          TimestampBytes transferredDirectionData
          May 24, 2024 17:41:05.513495922 CEST429OUTGET / HTTP/1.1
          Host: twomancake.com
          Connection: keep-alive
          Upgrade-Insecure-Requests: 1
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
          Accept-Encoding: gzip, deflate
          Accept-Language: en-US,en;q=0.9
          May 24, 2024 17:41:06.071635008 CEST903INHTTP/1.1 404 Not Found
          Date: Fri, 24 May 2024 15:41:06 GMT
          Content-Type: text/html; charset=utf-8
          Transfer-Encoding: chunked
          Connection: keep-alive
          X-Powered-By: Express
          Access-Control-Allow-Origin: *
          Content-Security-Policy: default-src 'none'
          X-Content-Type-Options: nosniff
          CF-Cache-Status: DYNAMIC
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9NZVRDebILBnleGFDEvrwKKgmCxWzK8nLOfXTlxtBeoHct%2FOFG9AoilCQGlUtQY5BBUW7I8Q2u1HaQA6nRLKs83WSQX3rQuEZwQtgv%2FYO%2B%2FOMD7yGSMcUL%2Bwjjyha3Ep9w%3D%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 888e63501a0e0fa8-EWR
          Content-Encoding: gzip
          alt-svc: h3=":443"; ma=86400
          Data Raw: 37 66 0d 0a 1f 8b 08 00 00 00 00 00 00 03 2c 8d b1 0e c2 30 0c 44 77 7f 85 c9 8e bc 32 b8 5e 4a c4 08 43 97 8e 86 1a 8a 94 26 28 98 a1 7f 8f 02 9d 4e f7 9e 4e c7 bb e3 b9 1f c6 4b c4 d9 97 24 c0 2d 30 69 7e 74 c1 72 68 c0 74 12 e0 c5 5c f1 36 6b 7d 9b 77 e1 e3 f7 fd a1 59 7f 7a 32 89 b5 96 ca f4 2f c0 b4 6d ae 65 5a 05 f8 55 4d 7a cd b9 38 9e e2 80 c4 d4 08 30 6d 9e 7e d7 5f 00 00 00 ff ff 0d 0a 62 0d 0a e3 02 00 e6 4f 23 54 8b 00 00 00 0d 0a 30 0d 0a 0d 0a
          Data Ascii: 7f,0Dw2^JC&(NNK$-0i~trht\6k}wYz2/meZUMz80m~_bO#T0
          May 24, 2024 17:41:51.082098961 CEST6OUTData Raw: 00
          Data Ascii:


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          0192.168.2.10497142.19.244.127443
          TimestampBytes transferredDirectionData
          2024-05-24 15:41:09 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          Accept-Encoding: identity
          User-Agent: Microsoft BITS/7.8
          Host: fs.microsoft.com
          2024-05-24 15:41:10 UTC467INHTTP/1.1 200 OK
          Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
          Content-Type: application/octet-stream
          ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
          Last-Modified: Tue, 16 May 2017 22:58:00 GMT
          Server: ECAcc (lpl/EF06)
          X-CID: 11
          X-Ms-ApiVersion: Distribute 1.2
          X-Ms-Region: prod-eus-z1
          Cache-Control: public, max-age=174465
          Date: Fri, 24 May 2024 15:41:09 GMT
          Connection: close
          X-CID: 2


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          1192.168.2.10497152.19.244.127443
          TimestampBytes transferredDirectionData
          2024-05-24 15:41:10 UTC239OUTGET /fs/windows/config.json HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          Accept-Encoding: identity
          If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
          Range: bytes=0-2147483646
          User-Agent: Microsoft BITS/7.8
          Host: fs.microsoft.com
          2024-05-24 15:41:11 UTC535INHTTP/1.1 200 OK
          Content-Type: application/octet-stream
          Last-Modified: Tue, 16 May 2017 22:58:00 GMT
          ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
          ApiVersion: Distribute 1.1
          Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
          X-Azure-Ref: 0WwMRYwAAAABe7whxSEuqSJRuLqzPsqCaTE9OMjFFREdFMTcxNQBjZWZjMjU4My1hOWIyLTQ0YTctOTc1NS1iNzZkMTdlMDVmN2Y=
          Cache-Control: public, max-age=174509
          Date: Fri, 24 May 2024 15:41:11 GMT
          Content-Length: 55
          Connection: close
          X-CID: 2
          2024-05-24 15:41:11 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
          Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


          Click to jump to process

          Click to jump to process

          Click to jump to process

          Target ID:1
          Start time:11:41:00
          Start date:24/05/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
          Imagebase:0x7ff6c5c30000
          File size:3'242'272 bytes
          MD5 hash:83395EAB5B03DEA9720F8D7AC0D15CAA
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:3
          Start time:11:41:01
          Start date:24/05/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 --field-trial-handle=2168,i,8641132215159082791,12555900835733439550,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
          Imagebase:0x7ff6c5c30000
          File size:3'242'272 bytes
          MD5 hash:83395EAB5B03DEA9720F8D7AC0D15CAA
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:4
          Start time:11:41:04
          Start date:24/05/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://twomancake.com"
          Imagebase:0x7ff6c5c30000
          File size:3'242'272 bytes
          MD5 hash:83395EAB5B03DEA9720F8D7AC0D15CAA
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          No disassembly