Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://mail.support-xfinity.152-42-227-61.cprapid.com/Billing_Pay_Online.html?Review-VerificationMyAccount

Overview

General Information

Sample URL:https://mail.support-xfinity.152-42-227-61.cprapid.com/Billing_Pay_Online.html?Review-VerificationMyAccount
Analysis ID:1467898
Infos:
Errors
  • URL not reachable

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Stores files to the Windows start menu directory
Uses insecure TLS / SSL version for HTTPS connection

Classification

  • System is w10x64
  • chrome.exe (PID: 5740 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 1268 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 --field-trial-handle=1988,i,17563467065714065432,1339589824147666664,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6104 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://mail.support-xfinity.152-42-227-61.cprapid.com/Billing_Pay_Online.html?Review-VerificationMyAccount" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: https://mail.support-xfinity.152-42-227-61.cprapid.com/Billing_Pay_Online.html?Review-VerificationMyAccountAvira URL Cloud: detection malicious, Label: phishing
Source: https://mail.support-xfinity.152-42-227-61.cprapid.com/Billing_Pay_Online.html?Review-VerificationMyAccountSlashNext: detection malicious, Label: Credential Stealing type: Phishing & Social Engineering
Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49721 version: TLS 1.0
Source: unknownHTTPS traffic detected: 23.211.4.90:443 -> 192.168.2.5:49714 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.211.4.90:443 -> 192.168.2.5:49715 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49721 version: TLS 1.0
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.211.4.90
Source: unknownTCP traffic detected without corresponding DNS query: 23.211.4.90
Source: unknownTCP traffic detected without corresponding DNS query: 23.211.4.90
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.211.4.90
Source: unknownTCP traffic detected without corresponding DNS query: 23.211.4.90
Source: unknownTCP traffic detected without corresponding DNS query: 23.211.4.90
Source: unknownTCP traffic detected without corresponding DNS query: 23.211.4.90
Source: unknownTCP traffic detected without corresponding DNS query: 23.211.4.90
Source: unknownTCP traffic detected without corresponding DNS query: 23.211.4.90
Source: unknownTCP traffic detected without corresponding DNS query: 23.211.4.90
Source: unknownTCP traffic detected without corresponding DNS query: 23.211.4.90
Source: unknownTCP traffic detected without corresponding DNS query: 23.211.4.90
Source: unknownTCP traffic detected without corresponding DNS query: 23.211.4.90
Source: unknownTCP traffic detected without corresponding DNS query: 23.211.4.90
Source: unknownTCP traffic detected without corresponding DNS query: 23.211.4.90
Source: unknownTCP traffic detected without corresponding DNS query: 23.211.4.90
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.211.4.90
Source: unknownTCP traffic detected without corresponding DNS query: 23.211.4.90
Source: unknownTCP traffic detected without corresponding DNS query: 23.211.4.90
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
Source: global trafficDNS traffic detected: DNS query: mail.support-xfinity.152-42-227-61.cprapid.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownHTTPS traffic detected: 23.211.4.90:443 -> 192.168.2.5:49714 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.211.4.90:443 -> 192.168.2.5:49715 version: TLS 1.2
Source: classification engineClassification label: mal48.win@18/6@4/4
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 --field-trial-handle=1988,i,17563467065714065432,1339589824147666664,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://mail.support-xfinity.152-42-227-61.cprapid.com/Billing_Pay_Online.html?Review-VerificationMyAccount"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 --field-trial-handle=1988,i,17563467065714065432,1339589824147666664,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Google Drive.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://mail.support-xfinity.152-42-227-61.cprapid.com/Billing_Pay_Online.html?Review-VerificationMyAccount100%Avira URL Cloudphishing
https://mail.support-xfinity.152-42-227-61.cprapid.com/Billing_Pay_Online.html?Review-VerificationMyAccount100%SlashNextCredential Stealing type: Phishing & Social Engineering
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.214.172
truefalse
    unknown
    mail.support-xfinity.152-42-227-61.cprapid.com
    152.42.227.61
    truefalse
      unknown
      www.google.com
      172.217.18.4
      truefalse
        unknown
        fp2e7a.wpc.phicdn.net
        192.229.221.95
        truefalse
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          239.255.255.250
          unknownReserved
          unknownunknownfalse
          152.42.227.61
          mail.support-xfinity.152-42-227-61.cprapid.comUnited States
          81NCRENUSfalse
          172.217.18.4
          www.google.comUnited States
          15169GOOGLEUSfalse
          IP
          192.168.2.5
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1467898
          Start date and time:2024-07-05 00:42:36 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 2m 11s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:browseurl.jbs
          Sample URL:https://mail.support-xfinity.152-42-227-61.cprapid.com/Billing_Pay_Online.html?Review-VerificationMyAccount
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:6
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal48.win@18/6@4/4
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • URL browsing timeout or error
          • URL not reachable
          • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 172.217.18.99, 216.58.206.46, 74.125.133.84, 34.104.35.123, 20.114.59.183, 199.232.214.172, 192.229.221.95, 20.3.187.198, 20.166.126.56, 142.250.184.227
          • Excluded domains from analysis (whitelisted): fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, clientservices.googleapis.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, ocsp.digicert.com, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, clients.l.google.com, www.gstatic.com, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtSetInformationFile calls found.
          • VT rate limit hit for: https://mail.support-xfinity.152-42-227-61.cprapid.com/Billing_Pay_Online.html?Review-VerificationMyAccount
          No simulations
          No context
          No context
          No context
          No context
          No context
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jul 4 21:43:28 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2677
          Entropy (8bit):3.9718571800320865
          Encrypted:false
          SSDEEP:48:8nd1TdRZHxidAKZdA19ehwiZUklqehYy+3:8/PJHy
          MD5:AA995A5607327DDF3613FFADA2D2829F
          SHA1:1C6C0E4DDCE85C3E6AF822B18DA2A7FA51169A90
          SHA-256:D84B86949A4D5154F445860851AC65F55B83A82E6C1D99AB1CB460FAF635E2FA
          SHA-512:2ED41B2B6A6A8F8991BD2BE0338A3E61572195C4C8B574B27944346E35B8E398D9352BA3CA5C11AAFB847F9E366E2AF41A80CDFAF11A6C0244BF5DBACEBB712A
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,.....8..c...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.Xm.....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xm.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xm.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xm............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Xo............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............a@y.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jul 4 21:43:28 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2679
          Entropy (8bit):3.9865993181576065
          Encrypted:false
          SSDEEP:48:8ud1TdRZHxidAKZdA1weh/iZUkAQkqeh3y+2:8UPb9QWy
          MD5:62537C3A2EE1DF17316D34782D14BDCE
          SHA1:505D2B4DB3FAC2B565896E1310064583574A3928
          SHA-256:9482A574A9707D89D2B7C7727BBCAF78ED9402E7E04CA8166B690BE30CE0F132
          SHA-512:53DD4934430B516F1E169F8E19784BD3AE1F5DA1F0E46CDF9FF62FD626501C1993909CE00211CE66A7E5E8F8B14C0A4830574FB3E37C3EB084375C6BBB6E53CD
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,......c...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.Xm.....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xm.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xm.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xm............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Xo............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............a@y.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2693
          Entropy (8bit):4.001809354718707
          Encrypted:false
          SSDEEP:48:8xSd1TdRsHxidAKZdA14tseh7sFiZUkmgqeh7s1y+BX:8xgPAnDy
          MD5:3F175D4390606EE23C66C0865AD0086B
          SHA1:A064FB6C1712D754706ED68E09408127F6B40037
          SHA-256:56853E63E7FE4D1348CCE3BBF8AC304157D7102DA7C0E04E72E844B3196CC96F
          SHA-512:E7D150647CD34AFAF76BF9B5C56CB6197D3F1728C16ABFD87A979E91C0C3A39E12E31B36486E3679E9DB8344E606A9DE3F336937BD34EB964A462D3AAD9BDA69
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,......e>....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.Xm.....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xm.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xm.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xm............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VDW.n...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............a@y.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jul 4 21:43:28 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2681
          Entropy (8bit):3.986458449834689
          Encrypted:false
          SSDEEP:48:8ld1TdRZHxidAKZdA1vehDiZUkwqeh7y+R:89P4Ny
          MD5:546AC4E9D84DDA103FFBC83D4441987E
          SHA1:0D9BA3509BDE44F00EE8FAD05FEFCFE5EF436912
          SHA-256:39973DEBA78B77B59661A2B0BBFD421C762FF90FC8AC1C04D249C41944C34F57
          SHA-512:02D2213FE402A3E01095D095EEDCCEC622F2071D2D6E7DFEF890375A402CCEAB32596151A75D66F34705AC1EA6F860D50D62E56016922DE30D3BE6F5E2400238
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,.....n..c...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.Xm.....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xm.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xm.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xm............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Xo............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............a@y.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jul 4 21:43:28 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2681
          Entropy (8bit):3.977001549790059
          Encrypted:false
          SSDEEP:48:8cd1TdRZHxidAKZdA1hehBiZUk1W1qehxy+C:8SPo9Ry
          MD5:696A4CCBBC0489315D0E8E987D26B058
          SHA1:4B5A7005425AFC3A63888AF42F38C0B0BE6DB9B3
          SHA-256:34FEB9787C08E9C71A335FA4A58FAEA5C368FE2375733ABEB4CD7377F2402EAC
          SHA-512:E09C5143B50992F4C2B0B75F1DAB18605CE8BB2F6905324C5AEAEF8489A7C4CFC9E9DAAA3D6E3967F0158EF6C2831A4C8CB334F9B848D8D526D1ED0173CFAF69
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,....<...c...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.Xm.....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xm.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xm.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xm............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Xo............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............a@y.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jul 4 21:43:28 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2683
          Entropy (8bit):3.9850707309776023
          Encrypted:false
          SSDEEP:48:8/8hd1TdRZHxidAKZdA1duT+ehOuTbbiZUk5OjqehOuTbDy+yT+:8/8RPGT/TbxWOvTbDy7T
          MD5:2EC8C7BC074576CE69B04F759FC0468D
          SHA1:D9EB79EEF53CA8A877C414F6659285893F9D5181
          SHA-256:6BA8A63068430C716C1AFDA156723436277EC7BD0D603318A4D80486F50D8C98
          SHA-512:A9716A82841F63978ED4B323FCD71DFAE03151C4CDE6F2CE46AABDAE94527388B3010F171FED7BE42DE56BA0576402D3212C4D6A10B0EBEAA99239D332371AA3
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,.....s~.c...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.Xm.....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xm.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xm.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xm............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Xo............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............a@y.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          No static file info
          TimestampSource PortDest PortSource IPDest IP
          Jul 5, 2024 00:43:21.851780891 CEST49675443192.168.2.523.1.237.91
          Jul 5, 2024 00:43:21.852627993 CEST49674443192.168.2.523.1.237.91
          Jul 5, 2024 00:43:21.962025881 CEST49673443192.168.2.523.1.237.91
          Jul 5, 2024 00:43:28.178606987 CEST49709443192.168.2.5152.42.227.61
          Jul 5, 2024 00:43:28.178658962 CEST44349709152.42.227.61192.168.2.5
          Jul 5, 2024 00:43:28.178721905 CEST49709443192.168.2.5152.42.227.61
          Jul 5, 2024 00:43:28.179155111 CEST49710443192.168.2.5152.42.227.61
          Jul 5, 2024 00:43:28.179163933 CEST44349710152.42.227.61192.168.2.5
          Jul 5, 2024 00:43:28.179389954 CEST49709443192.168.2.5152.42.227.61
          Jul 5, 2024 00:43:28.179404020 CEST44349709152.42.227.61192.168.2.5
          Jul 5, 2024 00:43:28.179424047 CEST49710443192.168.2.5152.42.227.61
          Jul 5, 2024 00:43:28.179565907 CEST49710443192.168.2.5152.42.227.61
          Jul 5, 2024 00:43:28.179575920 CEST44349710152.42.227.61192.168.2.5
          Jul 5, 2024 00:43:31.127803087 CEST49713443192.168.2.5172.217.18.4
          Jul 5, 2024 00:43:31.127834082 CEST44349713172.217.18.4192.168.2.5
          Jul 5, 2024 00:43:31.128000021 CEST49713443192.168.2.5172.217.18.4
          Jul 5, 2024 00:43:31.129489899 CEST49713443192.168.2.5172.217.18.4
          Jul 5, 2024 00:43:31.129502058 CEST44349713172.217.18.4192.168.2.5
          Jul 5, 2024 00:43:31.350007057 CEST49714443192.168.2.523.211.4.90
          Jul 5, 2024 00:43:31.350102901 CEST4434971423.211.4.90192.168.2.5
          Jul 5, 2024 00:43:31.350362062 CEST49714443192.168.2.523.211.4.90
          Jul 5, 2024 00:43:31.353039980 CEST49714443192.168.2.523.211.4.90
          Jul 5, 2024 00:43:31.353079081 CEST4434971423.211.4.90192.168.2.5
          Jul 5, 2024 00:43:31.457499027 CEST49674443192.168.2.523.1.237.91
          Jul 5, 2024 00:43:31.457499981 CEST49675443192.168.2.523.1.237.91
          Jul 5, 2024 00:43:31.565901995 CEST49673443192.168.2.523.1.237.91
          Jul 5, 2024 00:43:31.791440964 CEST44349713172.217.18.4192.168.2.5
          Jul 5, 2024 00:43:31.792098045 CEST49713443192.168.2.5172.217.18.4
          Jul 5, 2024 00:43:31.792113066 CEST44349713172.217.18.4192.168.2.5
          Jul 5, 2024 00:43:31.793004990 CEST44349713172.217.18.4192.168.2.5
          Jul 5, 2024 00:43:31.793128014 CEST49713443192.168.2.5172.217.18.4
          Jul 5, 2024 00:43:31.794922113 CEST49713443192.168.2.5172.217.18.4
          Jul 5, 2024 00:43:31.794980049 CEST44349713172.217.18.4192.168.2.5
          Jul 5, 2024 00:43:31.834732056 CEST49713443192.168.2.5172.217.18.4
          Jul 5, 2024 00:43:31.834739923 CEST44349713172.217.18.4192.168.2.5
          Jul 5, 2024 00:43:31.878995895 CEST49713443192.168.2.5172.217.18.4
          Jul 5, 2024 00:43:32.007901907 CEST4434971423.211.4.90192.168.2.5
          Jul 5, 2024 00:43:32.008008003 CEST49714443192.168.2.523.211.4.90
          Jul 5, 2024 00:43:32.142560959 CEST49714443192.168.2.523.211.4.90
          Jul 5, 2024 00:43:32.142637014 CEST4434971423.211.4.90192.168.2.5
          Jul 5, 2024 00:43:32.142931938 CEST4434971423.211.4.90192.168.2.5
          Jul 5, 2024 00:43:32.185760021 CEST49714443192.168.2.523.211.4.90
          Jul 5, 2024 00:43:32.317998886 CEST49714443192.168.2.523.211.4.90
          Jul 5, 2024 00:43:32.360507011 CEST4434971423.211.4.90192.168.2.5
          Jul 5, 2024 00:43:32.507266998 CEST4434971423.211.4.90192.168.2.5
          Jul 5, 2024 00:43:32.507333994 CEST4434971423.211.4.90192.168.2.5
          Jul 5, 2024 00:43:32.507396936 CEST49714443192.168.2.523.211.4.90
          Jul 5, 2024 00:43:32.507508993 CEST49714443192.168.2.523.211.4.90
          Jul 5, 2024 00:43:32.507554054 CEST4434971423.211.4.90192.168.2.5
          Jul 5, 2024 00:43:32.507582903 CEST49714443192.168.2.523.211.4.90
          Jul 5, 2024 00:43:32.507600069 CEST4434971423.211.4.90192.168.2.5
          Jul 5, 2024 00:43:32.549113035 CEST49715443192.168.2.523.211.4.90
          Jul 5, 2024 00:43:32.549140930 CEST4434971523.211.4.90192.168.2.5
          Jul 5, 2024 00:43:32.549216986 CEST49715443192.168.2.523.211.4.90
          Jul 5, 2024 00:43:32.549560070 CEST49715443192.168.2.523.211.4.90
          Jul 5, 2024 00:43:32.549571991 CEST4434971523.211.4.90192.168.2.5
          Jul 5, 2024 00:43:33.232686996 CEST4434971523.211.4.90192.168.2.5
          Jul 5, 2024 00:43:33.232835054 CEST49715443192.168.2.523.211.4.90
          Jul 5, 2024 00:43:33.234733105 CEST49715443192.168.2.523.211.4.90
          Jul 5, 2024 00:43:33.234740019 CEST4434971523.211.4.90192.168.2.5
          Jul 5, 2024 00:43:33.234971046 CEST4434971523.211.4.90192.168.2.5
          Jul 5, 2024 00:43:33.236377001 CEST49715443192.168.2.523.211.4.90
          Jul 5, 2024 00:43:33.276498079 CEST4434971523.211.4.90192.168.2.5
          Jul 5, 2024 00:43:33.295228004 CEST4434970323.1.237.91192.168.2.5
          Jul 5, 2024 00:43:33.295397997 CEST49703443192.168.2.523.1.237.91
          Jul 5, 2024 00:43:33.520629883 CEST4434971523.211.4.90192.168.2.5
          Jul 5, 2024 00:43:33.520687103 CEST4434971523.211.4.90192.168.2.5
          Jul 5, 2024 00:43:33.524153948 CEST49715443192.168.2.523.211.4.90
          Jul 5, 2024 00:43:33.524154902 CEST49715443192.168.2.523.211.4.90
          Jul 5, 2024 00:43:33.524389029 CEST49715443192.168.2.523.211.4.90
          Jul 5, 2024 00:43:33.524399042 CEST4434971523.211.4.90192.168.2.5
          Jul 5, 2024 00:43:41.680146933 CEST44349713172.217.18.4192.168.2.5
          Jul 5, 2024 00:43:41.680294037 CEST44349713172.217.18.4192.168.2.5
          Jul 5, 2024 00:43:41.680402040 CEST49713443192.168.2.5172.217.18.4
          Jul 5, 2024 00:43:42.953609943 CEST49713443192.168.2.5172.217.18.4
          Jul 5, 2024 00:43:42.953634977 CEST44349713172.217.18.4192.168.2.5
          Jul 5, 2024 00:43:44.194705963 CEST49703443192.168.2.523.1.237.91
          Jul 5, 2024 00:43:44.194830894 CEST49703443192.168.2.523.1.237.91
          Jul 5, 2024 00:43:44.195379019 CEST49721443192.168.2.523.1.237.91
          Jul 5, 2024 00:43:44.195422888 CEST4434972123.1.237.91192.168.2.5
          Jul 5, 2024 00:43:44.195482016 CEST49721443192.168.2.523.1.237.91
          Jul 5, 2024 00:43:44.195696115 CEST49721443192.168.2.523.1.237.91
          Jul 5, 2024 00:43:44.195707083 CEST4434972123.1.237.91192.168.2.5
          Jul 5, 2024 00:43:44.199577093 CEST4434970323.1.237.91192.168.2.5
          Jul 5, 2024 00:43:44.199603081 CEST4434970323.1.237.91192.168.2.5
          Jul 5, 2024 00:43:44.797801971 CEST4434972123.1.237.91192.168.2.5
          Jul 5, 2024 00:43:44.797878027 CEST49721443192.168.2.523.1.237.91
          Jul 5, 2024 00:43:58.192293882 CEST49709443192.168.2.5152.42.227.61
          Jul 5, 2024 00:43:58.192497015 CEST44349709152.42.227.61192.168.2.5
          Jul 5, 2024 00:43:58.192643881 CEST49710443192.168.2.5152.42.227.61
          Jul 5, 2024 00:43:58.192780018 CEST44349710152.42.227.61192.168.2.5
          Jul 5, 2024 00:43:58.192809105 CEST49709443192.168.2.5152.42.227.61
          Jul 5, 2024 00:43:58.193037033 CEST49710443192.168.2.5152.42.227.61
          Jul 5, 2024 00:43:59.239670992 CEST49725443192.168.2.5152.42.227.61
          Jul 5, 2024 00:43:59.239737988 CEST44349725152.42.227.61192.168.2.5
          Jul 5, 2024 00:43:59.239845037 CEST49725443192.168.2.5152.42.227.61
          Jul 5, 2024 00:43:59.245141983 CEST49726443192.168.2.5152.42.227.61
          Jul 5, 2024 00:43:59.245177031 CEST44349726152.42.227.61192.168.2.5
          Jul 5, 2024 00:43:59.245230913 CEST49726443192.168.2.5152.42.227.61
          Jul 5, 2024 00:43:59.246370077 CEST49725443192.168.2.5152.42.227.61
          Jul 5, 2024 00:43:59.246388912 CEST44349725152.42.227.61192.168.2.5
          Jul 5, 2024 00:43:59.246867895 CEST49726443192.168.2.5152.42.227.61
          Jul 5, 2024 00:43:59.246885061 CEST44349726152.42.227.61192.168.2.5
          Jul 5, 2024 00:44:03.953521013 CEST4434972123.1.237.91192.168.2.5
          Jul 5, 2024 00:44:03.953600883 CEST49721443192.168.2.523.1.237.91
          TimestampSource PortDest PortSource IPDest IP
          Jul 5, 2024 00:43:26.660617113 CEST53543381.1.1.1192.168.2.5
          Jul 5, 2024 00:43:27.654243946 CEST53593551.1.1.1192.168.2.5
          Jul 5, 2024 00:43:28.042505026 CEST5967453192.168.2.51.1.1.1
          Jul 5, 2024 00:43:28.043025970 CEST6286653192.168.2.51.1.1.1
          Jul 5, 2024 00:43:28.145876884 CEST53596741.1.1.1192.168.2.5
          Jul 5, 2024 00:43:28.284198046 CEST53628661.1.1.1192.168.2.5
          Jul 5, 2024 00:43:31.112168074 CEST5704053192.168.2.51.1.1.1
          Jul 5, 2024 00:43:31.112168074 CEST5030153192.168.2.51.1.1.1
          Jul 5, 2024 00:43:31.120440006 CEST53503011.1.1.1192.168.2.5
          Jul 5, 2024 00:43:31.120455027 CEST53570401.1.1.1192.168.2.5
          Jul 5, 2024 00:43:44.922235966 CEST53600521.1.1.1192.168.2.5
          Jul 5, 2024 00:43:58.054601908 CEST53523621.1.1.1192.168.2.5
          Jul 5, 2024 00:44:04.266907930 CEST53604811.1.1.1192.168.2.5
          TimestampSource IPDest IPChecksumCodeType
          Jul 5, 2024 00:43:28.284343958 CEST192.168.2.51.1.1.1c247(Port unreachable)Destination Unreachable
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Jul 5, 2024 00:43:28.042505026 CEST192.168.2.51.1.1.10x4ca1Standard query (0)mail.support-xfinity.152-42-227-61.cprapid.comA (IP address)IN (0x0001)false
          Jul 5, 2024 00:43:28.043025970 CEST192.168.2.51.1.1.10x5e21Standard query (0)mail.support-xfinity.152-42-227-61.cprapid.com65IN (0x0001)false
          Jul 5, 2024 00:43:31.112168074 CEST192.168.2.51.1.1.10x5d89Standard query (0)www.google.comA (IP address)IN (0x0001)false
          Jul 5, 2024 00:43:31.112168074 CEST192.168.2.51.1.1.10x973dStandard query (0)www.google.com65IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Jul 5, 2024 00:43:28.145876884 CEST1.1.1.1192.168.2.50x4ca1No error (0)mail.support-xfinity.152-42-227-61.cprapid.com152.42.227.61A (IP address)IN (0x0001)false
          Jul 5, 2024 00:43:31.120440006 CEST1.1.1.1192.168.2.50x973dNo error (0)www.google.com65IN (0x0001)false
          Jul 5, 2024 00:43:31.120455027 CEST1.1.1.1192.168.2.50x5d89No error (0)www.google.com172.217.18.4A (IP address)IN (0x0001)false
          Jul 5, 2024 00:43:42.733692884 CEST1.1.1.1192.168.2.50x4df6No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
          Jul 5, 2024 00:43:42.733692884 CEST1.1.1.1192.168.2.50x4df6No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
          Jul 5, 2024 00:43:43.329250097 CEST1.1.1.1192.168.2.50x7414No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
          Jul 5, 2024 00:43:43.329250097 CEST1.1.1.1192.168.2.50x7414No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
          Jul 5, 2024 00:43:57.288263083 CEST1.1.1.1192.168.2.50xfd50No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
          Jul 5, 2024 00:43:57.288263083 CEST1.1.1.1192.168.2.50xfd50No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
          • fs.microsoft.com
          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          0192.168.2.54971423.211.4.90443
          TimestampBytes transferredDirectionData
          2024-07-04 22:43:32 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          Accept-Encoding: identity
          User-Agent: Microsoft BITS/7.8
          Host: fs.microsoft.com
          2024-07-04 22:43:32 UTC467INHTTP/1.1 200 OK
          Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
          Content-Type: application/octet-stream
          ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
          Last-Modified: Tue, 16 May 2017 22:58:00 GMT
          Server: ECAcc (lpl/EF06)
          X-CID: 11
          X-Ms-ApiVersion: Distribute 1.2
          X-Ms-Region: prod-weu-z1
          Cache-Control: public, max-age=235525
          Date: Thu, 04 Jul 2024 22:43:32 GMT
          Connection: close
          X-CID: 2


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          1192.168.2.54971523.211.4.90443
          TimestampBytes transferredDirectionData
          2024-07-04 22:43:33 UTC239OUTGET /fs/windows/config.json HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          Accept-Encoding: identity
          If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
          Range: bytes=0-2147483646
          User-Agent: Microsoft BITS/7.8
          Host: fs.microsoft.com
          2024-07-04 22:43:33 UTC535INHTTP/1.1 200 OK
          Last-Modified: Tue, 16 May 2017 22:58:00 GMT
          ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
          Content-Type: application/octet-stream
          ApiVersion: Distribute 1.1
          Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
          X-Azure-Ref: 0WwMRYwAAAABe7whxSEuqSJRuLqzPsqCaTE9OMjFFREdFMTcxNQBjZWZjMjU4My1hOWIyLTQ0YTctOTc1NS1iNzZkMTdlMDVmN2Y=
          Cache-Control: public, max-age=235642
          Date: Thu, 04 Jul 2024 22:43:33 GMT
          Content-Length: 55
          Connection: close
          X-CID: 2
          2024-07-04 22:43:33 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
          Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


          Click to jump to process

          Click to jump to process

          Click to jump to process

          Target ID:0
          Start time:18:43:22
          Start date:04/07/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
          Imagebase:0x7ff715980000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:2
          Start time:18:43:25
          Start date:04/07/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 --field-trial-handle=1988,i,17563467065714065432,1339589824147666664,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
          Imagebase:0x7ff715980000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:3
          Start time:18:43:27
          Start date:04/07/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://mail.support-xfinity.152-42-227-61.cprapid.com/Billing_Pay_Online.html?Review-VerificationMyAccount"
          Imagebase:0x7ff715980000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          No disassembly