Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
http://12.1.1.132:8080/ERM/&umid=250cd637-9b29-4254-afe4-d271d64a5279&auth=5338b7f5b1456be47f38fc62c8ec2ba14775859e-b1b0e9a63fc8ba1024b7b7160cfadc2aebfbe7bc

Overview

General Information

Sample URL:http://12.1.1.132:8080/ERM/&umid=250cd637-9b29-4254-afe4-d271d64a5279&auth=5338b7f5b1456be47f38fc62c8ec2ba14775859e-b1b0e9a63fc8ba1024b7b7160cfadc2aebfbe7bc
Analysis ID:1466690
Infos:
Errors
  • URL not reachable

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Stores files to the Windows start menu directory
Uses insecure TLS / SSL version for HTTPS connection

Classification

  • System is w10x64
  • chrome.exe (PID: 6396 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 1492 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2464 --field-trial-handle=2436,i,1119308434348428777,17045180884471634896,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 1772 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://12.1.1.132:8080/ERM/&umid=250cd637-9b29-4254-afe4-d271d64a5279&auth=5338b7f5b1456be47f38fc62c8ec2ba14775859e-b1b0e9a63fc8ba1024b7b7160cfadc2aebfbe7bc" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49722 version: TLS 1.0
Source: unknownHTTPS traffic detected: 2.18.97.153:443 -> 192.168.2.5:49714 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.18.97.153:443 -> 192.168.2.5:49715 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49722 version: TLS 1.0
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 12.1.1.132
Source: unknownTCP traffic detected without corresponding DNS query: 12.1.1.132
Source: unknownTCP traffic detected without corresponding DNS query: 12.1.1.132
Source: unknownTCP traffic detected without corresponding DNS query: 12.1.1.132
Source: unknownTCP traffic detected without corresponding DNS query: 12.1.1.132
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 12.1.1.132
Source: unknownTCP traffic detected without corresponding DNS query: 12.1.1.132
Source: unknownTCP traffic detected without corresponding DNS query: 12.1.1.132
Source: unknownTCP traffic detected without corresponding DNS query: 12.1.1.132
Source: unknownTCP traffic detected without corresponding DNS query: 12.1.1.132
Source: unknownTCP traffic detected without corresponding DNS query: 12.1.1.132
Source: unknownTCP traffic detected without corresponding DNS query: 12.1.1.132
Source: unknownTCP traffic detected without corresponding DNS query: 12.1.1.132
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 12.1.1.132
Source: unknownTCP traffic detected without corresponding DNS query: 12.1.1.132
Source: unknownTCP traffic detected without corresponding DNS query: 12.1.1.132
Source: unknownTCP traffic detected without corresponding DNS query: 12.1.1.132
Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
Source: global trafficHTTP traffic detected: GET /ERM/&umid=250cd637-9b29-4254-afe4-d271d64a5279&auth=5338b7f5b1456be47f38fc62c8ec2ba14775859e-b1b0e9a63fc8ba1024b7b7160cfadc2aebfbe7bc HTTP/1.1Host: 12.1.1.132:8080Connection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /ERM/&umid=250cd637-9b29-4254-afe4-d271d64a5279&auth=5338b7f5b1456be47f38fc62c8ec2ba14775859e-b1b0e9a63fc8ba1024b7b7160cfadc2aebfbe7bc HTTP/1.1Host: 12.1.1.132:8080Connection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /ERM/&umid=250cd637-9b29-4254-afe4-d271d64a5279&auth=5338b7f5b1456be47f38fc62c8ec2ba14775859e-b1b0e9a63fc8ba1024b7b7160cfadc2aebfbe7bc HTTP/1.1Host: 12.1.1.132:8080Connection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /ERM/&umid=250cd637-9b29-4254-afe4-d271d64a5279&auth=5338b7f5b1456be47f38fc62c8ec2ba14775859e-b1b0e9a63fc8ba1024b7b7160cfadc2aebfbe7bc HTTP/1.1Host: 12.1.1.132:8080Connection: keep-aliveCache-Control: max-age=0Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownHTTPS traffic detected: 2.18.97.153:443 -> 192.168.2.5:49714 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.18.97.153:443 -> 192.168.2.5:49715 version: TLS 1.2
Source: classification engineClassification label: unknown1.win@18/6@2/4
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2464 --field-trial-handle=2436,i,1119308434348428777,17045180884471634896,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://12.1.1.132:8080/ERM/&umid=250cd637-9b29-4254-afe4-d271d64a5279&auth=5338b7f5b1456be47f38fc62c8ec2ba14775859e-b1b0e9a63fc8ba1024b7b7160cfadc2aebfbe7bc"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2464 --field-trial-handle=2436,i,1119308434348428777,17045180884471634896,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Google Drive.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
http://12.1.1.132:8080/ERM/&umid=250cd637-9b29-4254-afe4-d271d64a5279&auth=5338b7f5b1456be47f38fc62c8ec2ba14775859e-b1b0e9a63fc8ba1024b7b7160cfadc2aebfbe7bc0%Avira URL Cloudsafe
http://12.1.1.132:8080/ERM/&umid=250cd637-9b29-4254-afe4-d271d64a5279&auth=5338b7f5b1456be47f38fc62c8ec2ba14775859e-b1b0e9a63fc8ba1024b7b7160cfadc2aebfbe7bc0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
fp2e7a.wpc.phicdn.net0%VirustotalBrowse
www.google.com0%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
www.google.com
142.250.186.132
truefalseunknown
fp2e7a.wpc.phicdn.net
192.229.221.95
truefalseunknown
NameMaliciousAntivirus DetectionReputation
http://12.1.1.132:8080/ERM/&umid=250cd637-9b29-4254-afe4-d271d64a5279&auth=5338b7f5b1456be47f38fc62c8ec2ba14775859e-b1b0e9a63fc8ba1024b7b7160cfadc2aebfbe7bcfalse
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    12.1.1.132
    unknownUnited States
    7018ATT-INTERNET4USfalse
    239.255.255.250
    unknownReserved
    unknownunknownfalse
    142.250.186.132
    www.google.comUnited States
    15169GOOGLEUSfalse
    IP
    192.168.2.5
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1466690
    Start date and time:2024-07-03 09:32:19 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 2m 30s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:browseurl.jbs
    Sample URL:http://12.1.1.132:8080/ERM/&umid=250cd637-9b29-4254-afe4-d271d64a5279&auth=5338b7f5b1456be47f38fc62c8ec2ba14775859e-b1b0e9a63fc8ba1024b7b7160cfadc2aebfbe7bc
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:8
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:UNKNOWN
    Classification:unknown1.win@18/6@2/4
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • URL browsing timeout or error
    • URL not reachable
    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 142.250.185.227, 142.250.186.78, 108.177.15.84, 34.104.35.123, 20.114.59.183, 93.184.221.240, 192.229.221.95, 13.95.31.18, 20.3.187.198
    • Excluded domains from analysis (whitelisted): fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, clientservices.googleapis.com, ctldl.windowsupdate.com, wu.azureedge.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, ocsp.digicert.com, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, clients.l.google.com, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtSetInformationFile calls found.
    No simulations
    No context
    No context
    No context
    No context
    No context
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 3 06:33:14 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
    Category:dropped
    Size (bytes):2677
    Entropy (8bit):3.9848963893590863
    Encrypted:false
    SSDEEP:48:8nndmTCesH8idAKZdA19ehwiZUklqehekJy+3:8nMj7/Yy
    MD5:B8109293DBB29A9952557ED8D69DFF11
    SHA1:237498719B5DF4320866630ED3E8848CCD3AD2BD
    SHA-256:8A0A580480D7A51A38F9AB19702DFDAC0EB838B92BD5977742F3E97FFB260E21
    SHA-512:EF264FED9FDF55A83DE52CD01AAD828E25C5DC74BB376A1EFC8E7C2D37E1BD360503BF6489F9AC7C8F4D23584DDEF7C8186B82984FAB41288599DD1AFA351D91
    Malicious:false
    Reputation:low
    Preview:L..................F.@.. ...$+.,......C....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X$<....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X$<....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X$<....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X$<..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X(<...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........n..k.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 3 06:33:14 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
    Category:dropped
    Size (bytes):2679
    Entropy (8bit):3.9988336500243236
    Encrypted:false
    SSDEEP:48:8tdmTCesH8idAKZdA1weh/iZUkAQkqehvkJy+2:8GjJ9Q0Yy
    MD5:B580DEB44921BE5B090DE0B6E2CB90F4
    SHA1:D1DD2E3AA7E7087E767150F78915C5967B3C20A3
    SHA-256:5956DA8A9A531F98A2E3572D53477EA229C1B1D00FD6B77FB1A7D8A42FAA018B
    SHA-512:5C68B72DF21C9DD93DD755C5F8181DC2CF4B19017E0EF56B7C39D57B07F17F522DFBECAC76A2CDFB20B1AE89DCCE74BE578207A97DE30D0841AE9C71DACDB7DF
    Malicious:false
    Reputation:low
    Preview:L..................F.@.. ...$+.,......C....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X$<....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X$<....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X$<....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X$<..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X(<...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........n..k.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
    Category:dropped
    Size (bytes):2693
    Entropy (8bit):4.008619400942308
    Encrypted:false
    SSDEEP:48:8xndmTCesH8idAKZdA14tseh7sFiZUkmgqeh7s9kJy+BX:8xMj5njYy
    MD5:707B8E6B5805C2C4A61FE2F40FA4719B
    SHA1:202E7FBE3D7322AEA0BE4D04A1B79CD4FB043D48
    SHA-256:F18C815CE8F09A3FED4B6BEC3F53978F845D035790C271EFBE49F7D176EB7103
    SHA-512:98304E5D5393CBF07C2F9465EB4B72CC7ECA8FB979A9C64AA5D83504ED9D09C6584FBB9F8A756ED00C90049C874463D4CF990835E757BB08D08528ED4ABF31EC
    Malicious:false
    Reputation:low
    Preview:L..................F.@.. ...$+.,......e>....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X$<....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X$<....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X$<....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X$<..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VDW.n...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........n..k.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 3 06:33:14 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
    Category:dropped
    Size (bytes):2681
    Entropy (8bit):3.9962133004588467
    Encrypted:false
    SSDEEP:48:8admTCesH8idAKZdA1vehDiZUkwqehLkJy+R:8HjKlYy
    MD5:79EF21746B2FCF7A004217051CF191DD
    SHA1:349391458F9C9CB8BA943C5B58C214EC38473006
    SHA-256:12AFB11C49BFCAC7F547D855F19B8A3E7461A5A30B69DBC79E3CA8855B8691AD
    SHA-512:4C24EFB37B531A292D6DA254D4FA7B432EC56C399EA2ED042D314825F2526AE7C3034278596CD23A84AA3902E163CADCF9EFD317E7EFFECE3F47063CA5DE7141
    Malicious:false
    Reputation:low
    Preview:L..................F.@.. ...$+.,....R.C....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X$<....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X$<....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X$<....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X$<..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X(<...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........n..k.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 3 06:33:14 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
    Category:dropped
    Size (bytes):2681
    Entropy (8bit):3.986813401308415
    Encrypted:false
    SSDEEP:48:8fdmTCesH8idAKZdA1hehBiZUk1W1qehRkJy+C:8Ujq9xYy
    MD5:4CEA25AB6AF603C49FC910FF158AC958
    SHA1:29D23DB6275DD6E5716C3A337F47CDDEDCF8AECB
    SHA-256:063BD7E268D5A37FF3D0D4728E75DACCE136400819DE0ED90181D7C4CADBD03F
    SHA-512:7AA32A72923A3CBCFCB1177EDDFC572E3796372D369881ACE984DEC0EDFFD4198BE3770FB8FD184F8EB4CEF357128A00D668C531D44D3FA5DDFBC25FFF669432
    Malicious:false
    Reputation:low
    Preview:L..................F.@.. ...$+.,....7..C....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X$<....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X$<....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X$<....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X$<..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X(<...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........n..k.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 3 06:33:14 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
    Category:dropped
    Size (bytes):2683
    Entropy (8bit):3.9980666870004837
    Encrypted:false
    SSDEEP:48:8CdmTCesH8idAKZdA1duT+ehOuTbbiZUk5OjqehOuTbjkJy+yT+:8fj0T/TbxWOvTbjYy7T
    MD5:C489970EBDAE27BEFC07CFBD3ED35772
    SHA1:25964975F3779B1A513C03EA4AFFF617DED3E687
    SHA-256:75F6D5CCB2B1C3841D388AE901AC0407A44F62D4E5C94DC0FEA3F62F5E687037
    SHA-512:71C3D12798051DBF00DDE0CF86AB69F31A9C5248CA3EE10604A06F78669FE47558D272A8EDDAEADD0128D0AEA03C361E0319F3E0D7EEE7899051FABD7A1DE940
    Malicious:false
    Reputation:low
    Preview:L..................F.@.. ...$+.,......~C....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X$<....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X$<....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X$<....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X$<..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X(<...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........n..k.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
    No static file info
    TimestampSource PortDest PortSource IPDest IP
    Jul 3, 2024 09:33:04.744646072 CEST49674443192.168.2.523.1.237.91
    Jul 3, 2024 09:33:04.744657993 CEST49675443192.168.2.523.1.237.91
    Jul 3, 2024 09:33:04.853992939 CEST49673443192.168.2.523.1.237.91
    Jul 3, 2024 09:33:14.226455927 CEST497098080192.168.2.512.1.1.132
    Jul 3, 2024 09:33:14.226707935 CEST497108080192.168.2.512.1.1.132
    Jul 3, 2024 09:33:14.231507063 CEST80804970912.1.1.132192.168.2.5
    Jul 3, 2024 09:33:14.231584072 CEST80804971012.1.1.132192.168.2.5
    Jul 3, 2024 09:33:14.231610060 CEST497098080192.168.2.512.1.1.132
    Jul 3, 2024 09:33:14.231648922 CEST497108080192.168.2.512.1.1.132
    Jul 3, 2024 09:33:14.234683037 CEST497108080192.168.2.512.1.1.132
    Jul 3, 2024 09:33:14.239797115 CEST80804971012.1.1.132192.168.2.5
    Jul 3, 2024 09:33:14.350025892 CEST49674443192.168.2.523.1.237.91
    Jul 3, 2024 09:33:14.350029945 CEST49675443192.168.2.523.1.237.91
    Jul 3, 2024 09:33:14.459207058 CEST49673443192.168.2.523.1.237.91
    Jul 3, 2024 09:33:16.118164062 CEST4434970323.1.237.91192.168.2.5
    Jul 3, 2024 09:33:16.120022058 CEST49703443192.168.2.523.1.237.91
    Jul 3, 2024 09:33:16.828486919 CEST49713443192.168.2.5142.250.186.132
    Jul 3, 2024 09:33:16.828532934 CEST44349713142.250.186.132192.168.2.5
    Jul 3, 2024 09:33:16.828679085 CEST49713443192.168.2.5142.250.186.132
    Jul 3, 2024 09:33:16.830209970 CEST49713443192.168.2.5142.250.186.132
    Jul 3, 2024 09:33:16.830228090 CEST44349713142.250.186.132192.168.2.5
    Jul 3, 2024 09:33:17.164011002 CEST49714443192.168.2.52.18.97.153
    Jul 3, 2024 09:33:17.164052010 CEST443497142.18.97.153192.168.2.5
    Jul 3, 2024 09:33:17.164112091 CEST49714443192.168.2.52.18.97.153
    Jul 3, 2024 09:33:17.165894985 CEST49714443192.168.2.52.18.97.153
    Jul 3, 2024 09:33:17.165910959 CEST443497142.18.97.153192.168.2.5
    Jul 3, 2024 09:33:17.463875055 CEST44349713142.250.186.132192.168.2.5
    Jul 3, 2024 09:33:17.464143991 CEST49713443192.168.2.5142.250.186.132
    Jul 3, 2024 09:33:17.464205980 CEST44349713142.250.186.132192.168.2.5
    Jul 3, 2024 09:33:17.465193033 CEST44349713142.250.186.132192.168.2.5
    Jul 3, 2024 09:33:17.465246916 CEST49713443192.168.2.5142.250.186.132
    Jul 3, 2024 09:33:17.580879927 CEST49713443192.168.2.5142.250.186.132
    Jul 3, 2024 09:33:17.581068039 CEST44349713142.250.186.132192.168.2.5
    Jul 3, 2024 09:33:17.624886990 CEST49713443192.168.2.5142.250.186.132
    Jul 3, 2024 09:33:17.624903917 CEST44349713142.250.186.132192.168.2.5
    Jul 3, 2024 09:33:17.675888062 CEST49713443192.168.2.5142.250.186.132
    Jul 3, 2024 09:33:17.794425964 CEST443497142.18.97.153192.168.2.5
    Jul 3, 2024 09:33:17.794497013 CEST49714443192.168.2.52.18.97.153
    Jul 3, 2024 09:33:17.807954073 CEST49714443192.168.2.52.18.97.153
    Jul 3, 2024 09:33:17.807971954 CEST443497142.18.97.153192.168.2.5
    Jul 3, 2024 09:33:17.808176994 CEST443497142.18.97.153192.168.2.5
    Jul 3, 2024 09:33:17.847774982 CEST49714443192.168.2.52.18.97.153
    Jul 3, 2024 09:33:18.121232033 CEST49714443192.168.2.52.18.97.153
    Jul 3, 2024 09:33:18.168509960 CEST443497142.18.97.153192.168.2.5
    Jul 3, 2024 09:33:18.301963091 CEST443497142.18.97.153192.168.2.5
    Jul 3, 2024 09:33:18.302032948 CEST443497142.18.97.153192.168.2.5
    Jul 3, 2024 09:33:18.302105904 CEST49714443192.168.2.52.18.97.153
    Jul 3, 2024 09:33:18.302350044 CEST49714443192.168.2.52.18.97.153
    Jul 3, 2024 09:33:18.302350044 CEST49714443192.168.2.52.18.97.153
    Jul 3, 2024 09:33:18.302370071 CEST443497142.18.97.153192.168.2.5
    Jul 3, 2024 09:33:18.302380085 CEST443497142.18.97.153192.168.2.5
    Jul 3, 2024 09:33:18.340626001 CEST49715443192.168.2.52.18.97.153
    Jul 3, 2024 09:33:18.340657949 CEST443497152.18.97.153192.168.2.5
    Jul 3, 2024 09:33:18.340773106 CEST49715443192.168.2.52.18.97.153
    Jul 3, 2024 09:33:18.342130899 CEST49715443192.168.2.52.18.97.153
    Jul 3, 2024 09:33:18.342144012 CEST443497152.18.97.153192.168.2.5
    Jul 3, 2024 09:33:18.976743937 CEST443497152.18.97.153192.168.2.5
    Jul 3, 2024 09:33:18.976880074 CEST49715443192.168.2.52.18.97.153
    Jul 3, 2024 09:33:18.978375912 CEST49715443192.168.2.52.18.97.153
    Jul 3, 2024 09:33:18.978384972 CEST443497152.18.97.153192.168.2.5
    Jul 3, 2024 09:33:18.978606939 CEST443497152.18.97.153192.168.2.5
    Jul 3, 2024 09:33:18.979825974 CEST49715443192.168.2.52.18.97.153
    Jul 3, 2024 09:33:19.024501085 CEST443497152.18.97.153192.168.2.5
    Jul 3, 2024 09:33:19.245457888 CEST443497152.18.97.153192.168.2.5
    Jul 3, 2024 09:33:19.245517015 CEST443497152.18.97.153192.168.2.5
    Jul 3, 2024 09:33:19.245572090 CEST49715443192.168.2.52.18.97.153
    Jul 3, 2024 09:33:19.266005039 CEST49715443192.168.2.52.18.97.153
    Jul 3, 2024 09:33:19.266026974 CEST443497152.18.97.153192.168.2.5
    Jul 3, 2024 09:33:19.266036987 CEST49715443192.168.2.52.18.97.153
    Jul 3, 2024 09:33:19.266042948 CEST443497152.18.97.153192.168.2.5
    Jul 3, 2024 09:33:27.147608995 CEST49703443192.168.2.523.1.237.91
    Jul 3, 2024 09:33:27.147710085 CEST49703443192.168.2.523.1.237.91
    Jul 3, 2024 09:33:27.152024031 CEST49722443192.168.2.523.1.237.91
    Jul 3, 2024 09:33:27.152045012 CEST4434972223.1.237.91192.168.2.5
    Jul 3, 2024 09:33:27.152124882 CEST49722443192.168.2.523.1.237.91
    Jul 3, 2024 09:33:27.152652025 CEST4434970323.1.237.91192.168.2.5
    Jul 3, 2024 09:33:27.152686119 CEST4434970323.1.237.91192.168.2.5
    Jul 3, 2024 09:33:27.153678894 CEST49722443192.168.2.523.1.237.91
    Jul 3, 2024 09:33:27.153691053 CEST4434972223.1.237.91192.168.2.5
    Jul 3, 2024 09:33:27.368614912 CEST44349713142.250.186.132192.168.2.5
    Jul 3, 2024 09:33:27.368679047 CEST44349713142.250.186.132192.168.2.5
    Jul 3, 2024 09:33:27.368787050 CEST49713443192.168.2.5142.250.186.132
    Jul 3, 2024 09:33:27.737792015 CEST4434972223.1.237.91192.168.2.5
    Jul 3, 2024 09:33:27.737884998 CEST49722443192.168.2.523.1.237.91
    Jul 3, 2024 09:33:28.767472029 CEST49713443192.168.2.5142.250.186.132
    Jul 3, 2024 09:33:28.767545938 CEST44349713142.250.186.132192.168.2.5
    Jul 3, 2024 09:33:35.596079111 CEST80804971012.1.1.132192.168.2.5
    Jul 3, 2024 09:33:35.596191883 CEST497108080192.168.2.512.1.1.132
    Jul 3, 2024 09:33:35.596497059 CEST497108080192.168.2.512.1.1.132
    Jul 3, 2024 09:33:35.597126961 CEST497098080192.168.2.512.1.1.132
    Jul 3, 2024 09:33:35.601356030 CEST80804971012.1.1.132192.168.2.5
    Jul 3, 2024 09:33:35.601933956 CEST80804970912.1.1.132192.168.2.5
    Jul 3, 2024 09:33:35.632289886 CEST80804970912.1.1.132192.168.2.5
    Jul 3, 2024 09:33:35.632395983 CEST497098080192.168.2.512.1.1.132
    Jul 3, 2024 09:33:35.632524014 CEST497098080192.168.2.512.1.1.132
    Jul 3, 2024 09:33:35.633433104 CEST497248080192.168.2.512.1.1.132
    Jul 3, 2024 09:33:35.637300968 CEST80804970912.1.1.132192.168.2.5
    Jul 3, 2024 09:33:35.638252974 CEST80804972412.1.1.132192.168.2.5
    Jul 3, 2024 09:33:35.638335943 CEST497248080192.168.2.512.1.1.132
    Jul 3, 2024 09:33:35.638575077 CEST497248080192.168.2.512.1.1.132
    Jul 3, 2024 09:33:35.645236015 CEST80804972412.1.1.132192.168.2.5
    Jul 3, 2024 09:33:46.888686895 CEST4434972223.1.237.91192.168.2.5
    Jul 3, 2024 09:33:46.888748884 CEST49722443192.168.2.523.1.237.91
    Jul 3, 2024 09:33:57.002096891 CEST80804972412.1.1.132192.168.2.5
    Jul 3, 2024 09:33:57.002463102 CEST497248080192.168.2.512.1.1.132
    Jul 3, 2024 09:33:57.002615929 CEST497248080192.168.2.512.1.1.132
    Jul 3, 2024 09:33:57.007930040 CEST80804972412.1.1.132192.168.2.5
    Jul 3, 2024 09:33:58.087639093 CEST497258080192.168.2.512.1.1.132
    Jul 3, 2024 09:33:58.094362974 CEST80804972512.1.1.132192.168.2.5
    Jul 3, 2024 09:33:58.094461918 CEST497258080192.168.2.512.1.1.132
    Jul 3, 2024 09:33:58.095401049 CEST497268080192.168.2.512.1.1.132
    Jul 3, 2024 09:33:58.096498013 CEST497258080192.168.2.512.1.1.132
    Jul 3, 2024 09:33:58.102013111 CEST80804972612.1.1.132192.168.2.5
    Jul 3, 2024 09:33:58.102078915 CEST497268080192.168.2.512.1.1.132
    Jul 3, 2024 09:33:58.103071928 CEST80804972512.1.1.132192.168.2.5
    TimestampSource PortDest PortSource IPDest IP
    Jul 3, 2024 09:33:12.479681015 CEST53575951.1.1.1192.168.2.5
    Jul 3, 2024 09:33:12.490185022 CEST53502791.1.1.1192.168.2.5
    Jul 3, 2024 09:33:13.470890999 CEST53644271.1.1.1192.168.2.5
    Jul 3, 2024 09:33:16.818128109 CEST4962153192.168.2.51.1.1.1
    Jul 3, 2024 09:33:16.819854975 CEST5939453192.168.2.51.1.1.1
    Jul 3, 2024 09:33:16.825169086 CEST53496211.1.1.1192.168.2.5
    Jul 3, 2024 09:33:16.827434063 CEST53593941.1.1.1192.168.2.5
    Jul 3, 2024 09:33:30.549396992 CEST53584671.1.1.1192.168.2.5
    Jul 3, 2024 09:33:49.499222994 CEST53648111.1.1.1192.168.2.5
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Jul 3, 2024 09:33:16.818128109 CEST192.168.2.51.1.1.10x10aaStandard query (0)www.google.comA (IP address)IN (0x0001)false
    Jul 3, 2024 09:33:16.819854975 CEST192.168.2.51.1.1.10x3296Standard query (0)www.google.com65IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Jul 3, 2024 09:33:16.825169086 CEST1.1.1.1192.168.2.50x10aaNo error (0)www.google.com142.250.186.132A (IP address)IN (0x0001)false
    Jul 3, 2024 09:33:16.827434063 CEST1.1.1.1192.168.2.50x3296No error (0)www.google.com65IN (0x0001)false
    Jul 3, 2024 09:33:26.501840115 CEST1.1.1.1192.168.2.50xa823No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
    Jul 3, 2024 09:33:26.501840115 CEST1.1.1.1192.168.2.50xa823No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
    Jul 3, 2024 09:33:39.844800949 CEST1.1.1.1192.168.2.50xa057No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
    Jul 3, 2024 09:33:39.844800949 CEST1.1.1.1192.168.2.50xa057No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
    Jul 3, 2024 09:34:04.643966913 CEST1.1.1.1192.168.2.50x4a5dNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
    Jul 3, 2024 09:34:04.643966913 CEST1.1.1.1192.168.2.50x4a5dNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
    • fs.microsoft.com
    • 12.1.1.132:8080
    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    0192.168.2.54971012.1.1.13280801492C:\Program Files\Google\Chrome\Application\chrome.exe
    TimestampBytes transferredDirectionData
    Jul 3, 2024 09:33:14.234683037 CEST563OUTGET /ERM/&umid=250cd637-9b29-4254-afe4-d271d64a5279&auth=5338b7f5b1456be47f38fc62c8ec2ba14775859e-b1b0e9a63fc8ba1024b7b7160cfadc2aebfbe7bc HTTP/1.1
    Host: 12.1.1.132:8080
    Connection: keep-alive
    Upgrade-Insecure-Requests: 1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
    Accept-Encoding: gzip, deflate
    Accept-Language: en-US,en;q=0.9


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    1192.168.2.54970912.1.1.13280801492C:\Program Files\Google\Chrome\Application\chrome.exe
    TimestampBytes transferredDirectionData
    Jul 3, 2024 09:33:35.597126961 CEST563OUTGET /ERM/&umid=250cd637-9b29-4254-afe4-d271d64a5279&auth=5338b7f5b1456be47f38fc62c8ec2ba14775859e-b1b0e9a63fc8ba1024b7b7160cfadc2aebfbe7bc HTTP/1.1
    Host: 12.1.1.132:8080
    Connection: keep-alive
    Upgrade-Insecure-Requests: 1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
    Accept-Encoding: gzip, deflate
    Accept-Language: en-US,en;q=0.9


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    2192.168.2.54972412.1.1.13280801492C:\Program Files\Google\Chrome\Application\chrome.exe
    TimestampBytes transferredDirectionData
    Jul 3, 2024 09:33:35.638575077 CEST563OUTGET /ERM/&umid=250cd637-9b29-4254-afe4-d271d64a5279&auth=5338b7f5b1456be47f38fc62c8ec2ba14775859e-b1b0e9a63fc8ba1024b7b7160cfadc2aebfbe7bc HTTP/1.1
    Host: 12.1.1.132:8080
    Connection: keep-alive
    Upgrade-Insecure-Requests: 1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
    Accept-Encoding: gzip, deflate
    Accept-Language: en-US,en;q=0.9


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    3192.168.2.54972512.1.1.13280801492C:\Program Files\Google\Chrome\Application\chrome.exe
    TimestampBytes transferredDirectionData
    Jul 3, 2024 09:33:58.096498013 CEST589OUTGET /ERM/&umid=250cd637-9b29-4254-afe4-d271d64a5279&auth=5338b7f5b1456be47f38fc62c8ec2ba14775859e-b1b0e9a63fc8ba1024b7b7160cfadc2aebfbe7bc HTTP/1.1
    Host: 12.1.1.132:8080
    Connection: keep-alive
    Cache-Control: max-age=0
    Upgrade-Insecure-Requests: 1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
    Accept-Encoding: gzip, deflate
    Accept-Language: en-US,en;q=0.9


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    0192.168.2.5497142.18.97.153443
    TimestampBytes transferredDirectionData
    2024-07-03 07:33:18 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    Accept-Encoding: identity
    User-Agent: Microsoft BITS/7.8
    Host: fs.microsoft.com
    2024-07-03 07:33:18 UTC467INHTTP/1.1 200 OK
    Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
    Content-Type: application/octet-stream
    ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
    Last-Modified: Tue, 16 May 2017 22:58:00 GMT
    Server: ECAcc (lpl/EF06)
    X-CID: 11
    X-Ms-ApiVersion: Distribute 1.2
    X-Ms-Region: prod-neu-z1
    Cache-Control: public, max-age=117399
    Date: Wed, 03 Jul 2024 07:33:18 GMT
    Connection: close
    X-CID: 2


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    1192.168.2.5497152.18.97.153443
    TimestampBytes transferredDirectionData
    2024-07-03 07:33:18 UTC239OUTGET /fs/windows/config.json HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    Accept-Encoding: identity
    If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
    Range: bytes=0-2147483646
    User-Agent: Microsoft BITS/7.8
    Host: fs.microsoft.com
    2024-07-03 07:33:19 UTC535INHTTP/1.1 200 OK
    Content-Type: application/octet-stream
    Last-Modified: Tue, 16 May 2017 22:58:00 GMT
    ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
    ApiVersion: Distribute 1.1
    Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
    X-Azure-Ref: 0WwMRYwAAAABe7whxSEuqSJRuLqzPsqCaTE9OMjFFREdFMTcxNQBjZWZjMjU4My1hOWIyLTQ0YTctOTc1NS1iNzZkMTdlMDVmN2Y=
    Cache-Control: public, max-age=117319
    Date: Wed, 03 Jul 2024 07:33:19 GMT
    Content-Length: 55
    Connection: close
    X-CID: 2
    2024-07-03 07:33:19 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
    Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


    Click to jump to process

    Click to jump to process

    Click to jump to process

    Target ID:0
    Start time:03:33:04
    Start date:03/07/2024
    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
    Imagebase:0x7ff715980000
    File size:3'242'272 bytes
    MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    Target ID:2
    Start time:03:33:11
    Start date:03/07/2024
    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2464 --field-trial-handle=2436,i,1119308434348428777,17045180884471634896,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
    Imagebase:0x7ff715980000
    File size:3'242'272 bytes
    MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    Target ID:3
    Start time:03:33:13
    Start date:03/07/2024
    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://12.1.1.132:8080/ERM/&umid=250cd637-9b29-4254-afe4-d271d64a5279&auth=5338b7f5b1456be47f38fc62c8ec2ba14775859e-b1b0e9a63fc8ba1024b7b7160cfadc2aebfbe7bc"
    Imagebase:0x7ff715980000
    File size:3'242'272 bytes
    MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    No disassembly