Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
http://analytics.tiktok.com

Overview

General Information

Sample URL:http://analytics.tiktok.com
Analysis ID:1447777
Infos:

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Stores files to the Windows start menu directory
Uses insecure TLS / SSL version for HTTPS connection

Classification

  • System is w10x64
  • chrome.exe (PID: 5640 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 2020 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2060 --field-trial-handle=1996,i,8452511488635350626,13301291152159012578,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 1100 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://analytics.tiktok.com" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: http://analytics.tiktok.com/HTTP Parser: No favicon
Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49721 version: TLS 1.0
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.5:49714 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.5:49715 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49721 version: TLS 1.0
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
Source: global trafficDNS traffic detected: DNS query: analytics.tiktok.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.5:49714 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.5:49715 version: TLS 1.2
Source: classification engineClassification label: clean1.win@16/6@4/3
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2060 --field-trial-handle=1996,i,8452511488635350626,13301291152159012578,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://analytics.tiktok.com"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2060 --field-trial-handle=1996,i,8452511488635350626,13301291152159012578,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Google Drive.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
http://analytics.tiktok.com0%VirustotalBrowse
http://analytics.tiktok.com0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
www.google.com0%VirustotalBrowse
analytics.tiktok.com0%VirustotalBrowse
fp2e7a.wpc.phicdn.net0%VirustotalBrowse
bg.microsoft.map.fastly.net0%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.214.172
truefalseunknown
www.google.com
142.250.186.68
truefalseunknown
fp2e7a.wpc.phicdn.net
192.229.221.95
truefalseunknown
analytics.tiktok.com
unknown
unknownfalseunknown
NameMaliciousAntivirus DetectionReputation
http://analytics.tiktok.com/false
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    142.250.186.68
    www.google.comUnited States
    15169GOOGLEUSfalse
    239.255.255.250
    unknownReserved
    unknownunknownfalse
    IP
    192.168.2.5
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1447777
    Start date and time:2024-05-27 02:22:41 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 3m 10s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:browseurl.jbs
    Sample URL:http://analytics.tiktok.com
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:7
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:CLEAN
    Classification:clean1.win@16/6@4/3
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 142.250.185.195, 216.58.206.78, 74.125.206.84, 34.104.35.123, 2.18.64.15, 2.18.64.26, 20.114.59.183, 199.232.214.172, 192.229.221.95, 20.3.187.198, 142.250.184.195, 88.221.110.91, 2.16.100.168
    • Excluded domains from analysis (whitelisted): fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, e35058.a.akamaiedge.net, clientservices.googleapis.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net, fe3.delivery.mp.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, ocsp.digicert.com, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, update.googleapis.com, analytics.tiktok.com.edgekey.net, clients.l.google.com, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtSetInformationFile calls found.
    No simulations
    No context
    No context
    No context
    No context
    No context
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun May 26 23:23:33 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
    Category:dropped
    Size (bytes):2677
    Entropy (8bit):3.9863377025975084
    Encrypted:false
    SSDEEP:48:8qdwT089HMidAKZdA19ehwiZUklqehHy+3:8hP4oy
    MD5:F05E1450E9CBAA4F75F1E134185DA838
    SHA1:41AD3846B494DCD16E1506E6EE8A013B73359404
    SHA-256:41A8A8C4FC0E1D0D25A32081AF62676D8AD3CD268CAA5A971E685FEAB1D4EC6E
    SHA-512:4E6660BEC15AC09F0338B82424E1512E1B8DF14318D655DCDBF7A5BE96833945F731031DAC0CB6073D367B562F4AFE8AAFCFCA9F73B60BF3F099068CA0834313
    Malicious:false
    Reputation:low
    Preview:L..................F.@.. ...$+.,...........N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............F.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun May 26 23:23:33 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
    Category:dropped
    Size (bytes):2679
    Entropy (8bit):3.9991343677987294
    Encrypted:false
    SSDEEP:48:8xdwT089HMidAKZdA1weh/iZUkAQkqehYy+2:8kPS9QBy
    MD5:41C029EFC2617AFB6D72CB7ED8FBEE44
    SHA1:BDC6EAE9C0121FDFCCA835C30A25E9FCE47814D3
    SHA-256:84B75D4B66237F050CB0CB935ABBFF52484DA1CF7AF729270F0D61A605356E04
    SHA-512:4E3AF0504F18B1DC42199C845E84912E0818AEA5B7A6CFCC66BD8A58A15DDF25D5A6232F5D7BF253DDF8D774C082BDCD1AEFD9DA60F3EB9DC42ED226259F3497
    Malicious:false
    Reputation:low
    Preview:L..................F.@.. ...$+.,.....H.....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............F.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
    Category:dropped
    Size (bytes):2693
    Entropy (8bit):4.007443877902211
    Encrypted:false
    SSDEEP:48:8xFdwT08sHMidAKZdA14tseh7sFiZUkmgqeh7sqy+BX:8xYP9n0y
    MD5:34858F64CB844A78DC6B0E656CE66A7D
    SHA1:EAD1575587F8A2ED144B2DCD3F40FBB32E063D99
    SHA-256:1BE0C9F1A5D7882FAC6FD311470BB46DEB9D9B4C2486B80F514BD437CBFDC28F
    SHA-512:3AFB1ACB1814C88C6A634836F9A98F3911F4E7ADDAD7118EEB4EA095B83510AFA1AD2D85D1C4B0135CD0C9572B2FC03D1738CD684B57B2040F2CD649F0486FA9
    Malicious:false
    Reputation:low
    Preview:L..................F.@.. ...$+.,......e>....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VDW.n...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............F.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun May 26 23:23:33 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
    Category:dropped
    Size (bytes):2681
    Entropy (8bit):3.996963403712797
    Encrypted:false
    SSDEEP:48:8wdwT089HMidAKZdA1vehDiZUkwqeh8y+R:8fP5yy
    MD5:441F607ECF323EFA403FA84D6E4237C1
    SHA1:99EE90EE9EE68DC7E37A529EB09E66FE8A87FA06
    SHA-256:5D930B49049D30A9BDA9A2CFD7B5AD8714D0722ED9F53D91454DE6F9A3AF39E9
    SHA-512:744FA10D528C308275F46CE43BE37253C3473359D1B674CAF7155217F4E084B700E96C1ED4812A90DD50621E3C936D2DF41BC576FC48F677122107C7B77D30BA
    Malicious:false
    Reputation:low
    Preview:L..................F.@.. ...$+.,.....g.....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............F.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun May 26 23:23:33 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
    Category:dropped
    Size (bytes):2681
    Entropy (8bit):3.9846044785251333
    Encrypted:false
    SSDEEP:48:81dwT089HMidAKZdA1hehBiZUk1W1qehWy+C:8oPJ92y
    MD5:CEEDECF01BC28622DD375E99EF298E51
    SHA1:E5BD00AF16E3B1995E991E1B089A2118C2E48F81
    SHA-256:5881F368EAC457AB92B8D4BD478273BA91620B479DFDA9D705932421319E8F28
    SHA-512:40DDF41FC3495F59724DA96F40BB9C5696EF538FF36F6B5A052A0F6B43C9FD98E86014E3FD3EC04F3C68AFF62CF62502AA7147368F9F15F6FFFD75D651BDC9EB
    Malicious:false
    Reputation:low
    Preview:L..................F.@.. ...$+.,....s......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............F.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun May 26 23:23:33 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
    Category:dropped
    Size (bytes):2683
    Entropy (8bit):3.9984600560995935
    Encrypted:false
    SSDEEP:48:8AdwT089HMidAKZdA1duT+ehOuTbbiZUk5OjqehOuTb0y+yT+:8PPVT/TbxWOvTb0y7T
    MD5:CFC28259ABD192C89336F8FD4DE193B1
    SHA1:51E0ED1B0F7E01C2517F2D5D0FA634ABEBB9204D
    SHA-256:A8284413C120ED439B5CFAA4AC8D348AD9F564957A434FC938E3DB57568B2D44
    SHA-512:D4DD877C47D89C8F94A937AE333698724F2CCF62A2B381ACDC82E102CC5C19EEAD978931BEC3B3D0F64C84EC0FA3F57B518AB7C7EBD5A05F5E7DA99C0087CE5C
    Malicious:false
    Reputation:low
    Preview:L..................F.@.. ...$+.,...........N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............F.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
    No static file info
    TimestampSource PortDest PortSource IPDest IP
    May 27, 2024 02:23:27.970597982 CEST49675443192.168.2.523.1.237.91
    May 27, 2024 02:23:27.970597982 CEST49674443192.168.2.523.1.237.91
    May 27, 2024 02:23:28.095738888 CEST49673443192.168.2.523.1.237.91
    May 27, 2024 02:23:36.596761942 CEST49713443192.168.2.5142.250.186.68
    May 27, 2024 02:23:36.596795082 CEST44349713142.250.186.68192.168.2.5
    May 27, 2024 02:23:36.596863031 CEST49713443192.168.2.5142.250.186.68
    May 27, 2024 02:23:36.607897997 CEST49713443192.168.2.5142.250.186.68
    May 27, 2024 02:23:36.607917070 CEST44349713142.250.186.68192.168.2.5
    May 27, 2024 02:23:37.040390015 CEST49714443192.168.2.5184.28.90.27
    May 27, 2024 02:23:37.040484905 CEST44349714184.28.90.27192.168.2.5
    May 27, 2024 02:23:37.040586948 CEST49714443192.168.2.5184.28.90.27
    May 27, 2024 02:23:37.042778015 CEST49714443192.168.2.5184.28.90.27
    May 27, 2024 02:23:37.042808056 CEST44349714184.28.90.27192.168.2.5
    May 27, 2024 02:23:37.275835037 CEST44349713142.250.186.68192.168.2.5
    May 27, 2024 02:23:37.276320934 CEST49713443192.168.2.5142.250.186.68
    May 27, 2024 02:23:37.276375055 CEST44349713142.250.186.68192.168.2.5
    May 27, 2024 02:23:37.277812958 CEST44349713142.250.186.68192.168.2.5
    May 27, 2024 02:23:37.277888060 CEST49713443192.168.2.5142.250.186.68
    May 27, 2024 02:23:37.279413939 CEST49713443192.168.2.5142.250.186.68
    May 27, 2024 02:23:37.279512882 CEST44349713142.250.186.68192.168.2.5
    May 27, 2024 02:23:37.329545021 CEST49713443192.168.2.5142.250.186.68
    May 27, 2024 02:23:37.329566956 CEST44349713142.250.186.68192.168.2.5
    May 27, 2024 02:23:37.376431942 CEST49713443192.168.2.5142.250.186.68
    May 27, 2024 02:23:37.579535007 CEST49675443192.168.2.523.1.237.91
    May 27, 2024 02:23:37.579535007 CEST49674443192.168.2.523.1.237.91
    May 27, 2024 02:23:37.695588112 CEST49673443192.168.2.523.1.237.91
    May 27, 2024 02:23:37.749779940 CEST44349714184.28.90.27192.168.2.5
    May 27, 2024 02:23:37.749952078 CEST49714443192.168.2.5184.28.90.27
    May 27, 2024 02:23:37.753629923 CEST49714443192.168.2.5184.28.90.27
    May 27, 2024 02:23:37.753658056 CEST44349714184.28.90.27192.168.2.5
    May 27, 2024 02:23:37.753933907 CEST44349714184.28.90.27192.168.2.5
    May 27, 2024 02:23:37.798381090 CEST49714443192.168.2.5184.28.90.27
    May 27, 2024 02:23:37.817286015 CEST49714443192.168.2.5184.28.90.27
    May 27, 2024 02:23:37.858500957 CEST44349714184.28.90.27192.168.2.5
    May 27, 2024 02:23:38.040726900 CEST44349714184.28.90.27192.168.2.5
    May 27, 2024 02:23:38.040797949 CEST44349714184.28.90.27192.168.2.5
    May 27, 2024 02:23:38.040863037 CEST49714443192.168.2.5184.28.90.27
    May 27, 2024 02:23:38.041066885 CEST49714443192.168.2.5184.28.90.27
    May 27, 2024 02:23:38.041114092 CEST44349714184.28.90.27192.168.2.5
    May 27, 2024 02:23:38.041147947 CEST49714443192.168.2.5184.28.90.27
    May 27, 2024 02:23:38.041162968 CEST44349714184.28.90.27192.168.2.5
    May 27, 2024 02:23:38.089576960 CEST49715443192.168.2.5184.28.90.27
    May 27, 2024 02:23:38.089612007 CEST44349715184.28.90.27192.168.2.5
    May 27, 2024 02:23:38.089674950 CEST49715443192.168.2.5184.28.90.27
    May 27, 2024 02:23:38.090225935 CEST49715443192.168.2.5184.28.90.27
    May 27, 2024 02:23:38.090241909 CEST44349715184.28.90.27192.168.2.5
    May 27, 2024 02:23:38.758696079 CEST44349715184.28.90.27192.168.2.5
    May 27, 2024 02:23:38.758795023 CEST49715443192.168.2.5184.28.90.27
    May 27, 2024 02:23:38.760093927 CEST49715443192.168.2.5184.28.90.27
    May 27, 2024 02:23:38.760113001 CEST44349715184.28.90.27192.168.2.5
    May 27, 2024 02:23:38.760931015 CEST44349715184.28.90.27192.168.2.5
    May 27, 2024 02:23:38.762129068 CEST49715443192.168.2.5184.28.90.27
    May 27, 2024 02:23:38.802536964 CEST44349715184.28.90.27192.168.2.5
    May 27, 2024 02:23:39.059784889 CEST44349715184.28.90.27192.168.2.5
    May 27, 2024 02:23:39.059909105 CEST44349715184.28.90.27192.168.2.5
    May 27, 2024 02:23:39.060180902 CEST49715443192.168.2.5184.28.90.27
    May 27, 2024 02:23:39.060859919 CEST49715443192.168.2.5184.28.90.27
    May 27, 2024 02:23:39.060900927 CEST44349715184.28.90.27192.168.2.5
    May 27, 2024 02:23:39.060941935 CEST49715443192.168.2.5184.28.90.27
    May 27, 2024 02:23:39.060957909 CEST44349715184.28.90.27192.168.2.5
    May 27, 2024 02:23:39.379354000 CEST4434970323.1.237.91192.168.2.5
    May 27, 2024 02:23:39.382829905 CEST49703443192.168.2.523.1.237.91
    May 27, 2024 02:23:47.172548056 CEST44349713142.250.186.68192.168.2.5
    May 27, 2024 02:23:47.172676086 CEST44349713142.250.186.68192.168.2.5
    May 27, 2024 02:23:47.172748089 CEST49713443192.168.2.5142.250.186.68
    May 27, 2024 02:23:48.410586119 CEST49713443192.168.2.5142.250.186.68
    May 27, 2024 02:23:48.410654068 CEST44349713142.250.186.68192.168.2.5
    May 27, 2024 02:23:49.920413971 CEST49703443192.168.2.523.1.237.91
    May 27, 2024 02:23:49.920413971 CEST49703443192.168.2.523.1.237.91
    May 27, 2024 02:23:49.921036959 CEST49721443192.168.2.523.1.237.91
    May 27, 2024 02:23:49.921084881 CEST4434972123.1.237.91192.168.2.5
    May 27, 2024 02:23:49.924840927 CEST49721443192.168.2.523.1.237.91
    May 27, 2024 02:23:49.925302982 CEST4434970323.1.237.91192.168.2.5
    May 27, 2024 02:23:49.925328970 CEST49721443192.168.2.523.1.237.91
    May 27, 2024 02:23:49.925364971 CEST4434972123.1.237.91192.168.2.5
    May 27, 2024 02:23:49.933176994 CEST4434970323.1.237.91192.168.2.5
    May 27, 2024 02:23:50.547970057 CEST4434972123.1.237.91192.168.2.5
    May 27, 2024 02:23:50.548247099 CEST49721443192.168.2.523.1.237.91
    May 27, 2024 02:24:09.738450050 CEST4434972123.1.237.91192.168.2.5
    May 27, 2024 02:24:09.738543987 CEST49721443192.168.2.523.1.237.91
    May 27, 2024 02:24:37.026998997 CEST49726443192.168.2.5142.250.186.68
    May 27, 2024 02:24:37.027048111 CEST44349726142.250.186.68192.168.2.5
    May 27, 2024 02:24:37.027132988 CEST49726443192.168.2.5142.250.186.68
    May 27, 2024 02:24:37.028315067 CEST49726443192.168.2.5142.250.186.68
    May 27, 2024 02:24:37.028352022 CEST44349726142.250.186.68192.168.2.5
    May 27, 2024 02:24:37.690365076 CEST44349726142.250.186.68192.168.2.5
    May 27, 2024 02:24:37.690814018 CEST49726443192.168.2.5142.250.186.68
    May 27, 2024 02:24:37.690879107 CEST44349726142.250.186.68192.168.2.5
    May 27, 2024 02:24:37.691198111 CEST44349726142.250.186.68192.168.2.5
    May 27, 2024 02:24:37.691828012 CEST49726443192.168.2.5142.250.186.68
    May 27, 2024 02:24:37.691895008 CEST44349726142.250.186.68192.168.2.5
    May 27, 2024 02:24:37.736336946 CEST49726443192.168.2.5142.250.186.68
    May 27, 2024 02:24:47.662909031 CEST44349726142.250.186.68192.168.2.5
    May 27, 2024 02:24:47.663053989 CEST44349726142.250.186.68192.168.2.5
    May 27, 2024 02:24:47.663263083 CEST49726443192.168.2.5142.250.186.68
    May 27, 2024 02:24:48.410135984 CEST49726443192.168.2.5142.250.186.68
    May 27, 2024 02:24:48.410217047 CEST44349726142.250.186.68192.168.2.5
    TimestampSource PortDest PortSource IPDest IP
    May 27, 2024 02:23:32.213177919 CEST53506301.1.1.1192.168.2.5
    May 27, 2024 02:23:32.271358013 CEST53588391.1.1.1192.168.2.5
    May 27, 2024 02:23:33.318568945 CEST53576291.1.1.1192.168.2.5
    May 27, 2024 02:23:33.915738106 CEST5886353192.168.2.51.1.1.1
    May 27, 2024 02:23:33.915883064 CEST6509153192.168.2.51.1.1.1
    May 27, 2024 02:23:36.569227934 CEST6114553192.168.2.51.1.1.1
    May 27, 2024 02:23:36.569843054 CEST5775353192.168.2.51.1.1.1
    May 27, 2024 02:23:36.578927994 CEST53611451.1.1.1192.168.2.5
    May 27, 2024 02:23:36.613360882 CEST53577531.1.1.1192.168.2.5
    May 27, 2024 02:23:50.345377922 CEST53513041.1.1.1192.168.2.5
    May 27, 2024 02:24:09.274585962 CEST53585401.1.1.1192.168.2.5
    May 27, 2024 02:24:31.971312046 CEST53568911.1.1.1192.168.2.5
    May 27, 2024 02:24:32.135360956 CEST53641671.1.1.1192.168.2.5
    TimestampSource IPDest IPChecksumCodeType
    May 27, 2024 02:23:36.613415003 CEST192.168.2.51.1.1.1c1fe(Port unreachable)Destination Unreachable
    May 27, 2024 02:24:31.971381903 CEST192.168.2.51.1.1.1c225(Port unreachable)Destination Unreachable
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    May 27, 2024 02:23:33.915738106 CEST192.168.2.51.1.1.10x79c6Standard query (0)analytics.tiktok.comA (IP address)IN (0x0001)false
    May 27, 2024 02:23:33.915883064 CEST192.168.2.51.1.1.10xfbe8Standard query (0)analytics.tiktok.com65IN (0x0001)false
    May 27, 2024 02:23:36.569227934 CEST192.168.2.51.1.1.10x9db2Standard query (0)www.google.comA (IP address)IN (0x0001)false
    May 27, 2024 02:23:36.569843054 CEST192.168.2.51.1.1.10x5bcdStandard query (0)www.google.com65IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    May 27, 2024 02:23:33.923103094 CEST1.1.1.1192.168.2.50x79c6No error (0)analytics.tiktok.comanalytics.tiktok.com.ttdns2.comCNAME (Canonical name)IN (0x0001)false
    May 27, 2024 02:23:33.923103094 CEST1.1.1.1192.168.2.50x79c6No error (0)analytics.tiktok.com.ttdns2.comanalytics.tiktok.com.edgekey.netCNAME (Canonical name)IN (0x0001)false
    May 27, 2024 02:23:33.930227995 CEST1.1.1.1192.168.2.50xfbe8No error (0)analytics.tiktok.comanalytics.tiktok.com.ttdns2.comCNAME (Canonical name)IN (0x0001)false
    May 27, 2024 02:23:33.930227995 CEST1.1.1.1192.168.2.50xfbe8No error (0)analytics.tiktok.com.ttdns2.comanalytics.tiktok.com.edgekey.netCNAME (Canonical name)IN (0x0001)false
    May 27, 2024 02:23:36.578927994 CEST1.1.1.1192.168.2.50x9db2No error (0)www.google.com142.250.186.68A (IP address)IN (0x0001)false
    May 27, 2024 02:23:36.613360882 CEST1.1.1.1192.168.2.50x5bcdNo error (0)www.google.com65IN (0x0001)false
    May 27, 2024 02:23:48.673685074 CEST1.1.1.1192.168.2.50x39f8No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
    May 27, 2024 02:23:48.673685074 CEST1.1.1.1192.168.2.50x39f8No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
    May 27, 2024 02:23:49.222441912 CEST1.1.1.1192.168.2.50x325cNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
    May 27, 2024 02:23:49.222441912 CEST1.1.1.1192.168.2.50x325cNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
    May 27, 2024 02:24:02.652220011 CEST1.1.1.1192.168.2.50x4638No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
    May 27, 2024 02:24:02.652220011 CEST1.1.1.1192.168.2.50x4638No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
    May 27, 2024 02:24:24.384118080 CEST1.1.1.1192.168.2.50xf933No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
    May 27, 2024 02:24:24.384118080 CEST1.1.1.1192.168.2.50xf933No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
    May 27, 2024 02:24:45.150965929 CEST1.1.1.1192.168.2.50xa852No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
    May 27, 2024 02:24:45.150965929 CEST1.1.1.1192.168.2.50xa852No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
    • fs.microsoft.com
    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    0192.168.2.549714184.28.90.27443
    TimestampBytes transferredDirectionData
    2024-05-27 00:23:37 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    Accept-Encoding: identity
    User-Agent: Microsoft BITS/7.8
    Host: fs.microsoft.com
    2024-05-27 00:23:38 UTC467INHTTP/1.1 200 OK
    Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
    Content-Type: application/octet-stream
    ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
    Last-Modified: Tue, 16 May 2017 22:58:00 GMT
    Server: ECAcc (lpl/EF06)
    X-CID: 11
    X-Ms-ApiVersion: Distribute 1.2
    X-Ms-Region: prod-weu-z1
    Cache-Control: public, max-age=229537
    Date: Mon, 27 May 2024 00:23:37 GMT
    Connection: close
    X-CID: 2


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    1192.168.2.549715184.28.90.27443
    TimestampBytes transferredDirectionData
    2024-05-27 00:23:38 UTC239OUTGET /fs/windows/config.json HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    Accept-Encoding: identity
    If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
    Range: bytes=0-2147483646
    User-Agent: Microsoft BITS/7.8
    Host: fs.microsoft.com
    2024-05-27 00:23:39 UTC515INHTTP/1.1 200 OK
    ApiVersion: Distribute 1.1
    Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
    Content-Type: application/octet-stream
    ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
    Last-Modified: Tue, 16 May 2017 22:58:00 GMT
    Server: ECAcc (lpl/EF06)
    X-CID: 11
    X-Ms-ApiVersion: Distribute 1.2
    X-Ms-Region: prod-weu-z1
    Cache-Control: public, max-age=229619
    Date: Mon, 27 May 2024 00:23:38 GMT
    Content-Length: 55
    Connection: close
    X-CID: 2
    2024-05-27 00:23:39 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
    Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


    Click to jump to process

    Click to jump to process

    Click to jump to process

    Target ID:0
    Start time:20:23:28
    Start date:26/05/2024
    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
    Imagebase:0x7ff715980000
    File size:3'242'272 bytes
    MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    Target ID:2
    Start time:20:23:30
    Start date:26/05/2024
    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2060 --field-trial-handle=1996,i,8452511488635350626,13301291152159012578,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
    Imagebase:0x7ff715980000
    File size:3'242'272 bytes
    MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    Target ID:3
    Start time:20:23:33
    Start date:26/05/2024
    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://analytics.tiktok.com"
    Imagebase:0x7ff715980000
    File size:3'242'272 bytes
    MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    No disassembly