Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
http://cpeciadogfoods.com

Overview

General Information

Sample URL:http://cpeciadogfoods.com
Analysis ID:1564255
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
AI detected suspicious URL
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 4796 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 7004 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1952,i,1912257330799433781,17735720816674837617,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6624 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://cpeciadogfoods.com" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://cpeciadogfoods.comAvira URL Cloud: detection malicious, Label: malware
Source: http://cpeciadogfoods.com/favicon.icoAvira URL Cloud: Label: malware
Source: http://cpeciadogfoods.com/icons/folder.gifAvira URL Cloud: Label: malware
Source: http://cpeciadogfoods.com/icons/blank.gifAvira URL Cloud: Label: malware
Source: http://cpeciadogfoods.com/common/Avira URL Cloud: Label: malware
Source: http://cpeciadogfoods.com/icons/back.gifAvira URL Cloud: Label: malware
Source: http://cpeciadogfoods.com/icons/unknown.gifAvira URL Cloud: Label: malware
Source: cpeciadogfoods.comVirustotal: Detection: 14%Perma Link
Source: http://cpeciadogfoods.comVirustotal: Detection: 14%Perma Link

Phishing

barindex
Source: EmailJoe Sandbox AI: AI detected Brand spoofing attempt in URL: http://cpeciadogfoods.com
Source: EmailJoe Sandbox AI: AI detected Typosquatting in URL: http://cpeciadogfoods.com
Source: EmailJoe Sandbox AI: AI detected Brand spoofing attempt in URL: https://cpeciadogfoods.com
Source: EmailJoe Sandbox AI: AI detected Typosquatting in URL: https://cpeciadogfoods.com
Source: http://cpeciadogfoods.com/HTTP Parser: No favicon
Source: http://cpeciadogfoods.com/common/HTTP Parser: No favicon
Source: http://cpeciadogfoods.com/common/hyivgamne.jsHTTP Parser: No favicon
Source: http://cpeciadogfoods.com/icons/back.gifHTTP Parser: No favicon
Source: https://cpeciadogfoods.com/icons/unknown.gifHTTP Parser: No favicon
Source: unknownHTTPS traffic detected: 172.202.163.200:443 -> 192.168.2.16:49718 version: TLS 1.2
Source: unknownHTTPS traffic detected: 172.202.163.200:443 -> 192.168.2.16:49723 version: TLS 1.2
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.181.4
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.181.4
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.181.4
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.181.4
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.181.4
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.181.4
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.181.4
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.181.4
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 184.30.17.174
Source: unknownTCP traffic detected without corresponding DNS query: 184.30.17.174
Source: unknownTCP traffic detected without corresponding DNS query: 184.30.17.174
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 28 Nov 2024 01:02:43 GMTServer: Apache/2.4.41 (Ubuntu)Vary: Accept-EncodingContent-Encoding: gzipContent-Length: 413Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: text/html;charset=UTF-8Data Raw: 1f 8b 08 00 00 00 00 00 00 03 95 92 51 6f d3 30 10 c7 df f7 29 6e 7e 40 db 43 73 4d 57 34 60 8e d1 48 86 56 a9 6b 2b da 09 21 c4 83 13 3b 89 b5 c4 8e 6c 77 1a 7c 7a dc 24 62 45 da 84 78 f2 d9 f7 bb bf ef 7f 3a 7a 9a ad d3 dd b7 cd 0d dc ee ee 96 b0 b9 ff b4 5c a4 40 26 88 5f 2f 52 c4 6c 97 0d 89 8b 68 06 9f 95 e6 0d e2 cd 8a b0 13 5a fb b6 61 27 40 6b c9 45 38 81 7a e5 1b c9 16 5a c8 27 30 25 20 c5 e1 25 30 38 42 34 37 e2 e7 a1 36 fe 8b 0b d7 5e 80 e7 3d 7e 08 2d a3 be 86 47 de a8 4a 27 c4 9b 8e 30 aa da 0a 9c 2d 12 82 aa 30 da 61 de 70 fd 10 55 aa 24 c0 1b 9f 90 ef 8b 74 fd 23 70 e8 eb 43 35 a3 1c 6a 2b cb 84 7c 4c 93 d5 d5 3a c9 08 5b f1 56 52 e4 2f 33 77 81 b9 26 6c c9 9d 87 d6 08 55 2a 29 5e 85 b7 03 bc 55 bf 5e 17 cc 06 26 93 ae b0 aa f3 ca e8 67 14 83 c5 63 ab 85 69 5c c7 83 d7 b7 c1 41 6d 8f a9 01 11 ff 98 46 69 1a 21 ed f1 38 b2 c5 97 61 1c e2 50 fe dc 59 61 da d6 68 24 6c 0c c6 a6 7a 0a c6 3f ac aa 6a 4f d8 6c 3a 9b 4f a6 97 93 f8 12 e2 f7 1f e2 69 e8 f7 65 10 60 f2 27 c5 de e8 dc 75 57 c3 f5 7f 7c e2 b8 01 94 0b 61 a5 73 ec ba e3 45 2d 71 16 cd a3 79 0c 67 f7 f9 5e fb fd 39 6c a5 7d 94 16 b8 87 a2 93 85 e2 c2 54 a5 31 c2 45 c1 10 6c 8c f5 f0 6e 1a 4c 8d 22 41 b7 5f bb b0 67 fd ca fe 06 18 31 33 14 f2 02 00 00 Data Ascii: Qo0)n~@CsMW4`HVk+!;lw|z$bEx:z\@&_/RlhZa'@kE8zZ'0% %08B476^=~-GJ'0-0apU$t#pC5j+|L:[VR/3w&lU*)^U^&gci\AmFi!8aPYah$lz?jOl:Oie`'uW|asE-qyg^9l}T1ElnL"A_g13
Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 28 Nov 2024 01:02:59 GMTServer: Apache/2.4.41 (Ubuntu)Vary: Accept-EncodingContent-Encoding: gzipContent-Length: 528Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: text/html;charset=UTF-8Data Raw: 1f 8b 08 00 00 00 00 00 00 03 bd 94 61 6f d3 30 10 86 bf ef 57 1c fe 80 e0 43 e3 a6 ed 54 b6 39 46 a5 19 a2 a2 6b ab b5 13 42 08 21 37 76 12 6f 89 1d d9 6e a1 fc 7a dc a6 13 19 b4 0c 04 42 8a 94 d8 79 7c 79 df bb cb 91 27 f1 74 b8 78 3f bb 84 37 8b ab 31 cc 6e 5e 8d 47 43 40 2d 8c df 75 87 18 c7 8b b8 7e d1 0d 3a f0 5a 2a 56 60 7c 39 41 f4 84 e4 ae 2c e8 09 90 5c 30 ee ef 40 9c 74 85 a0 23 c5 c5 17 d0 29 e0 44 97 a5 56 04 d7 fb 9e c4 7b 94 2c 35 df 6c 23 84 07 68 bf b9 0b c6 96 bb 43 db 47 43 89 cb 61 cd 0a 99 a9 08 39 5d 21 4a 64 99 81 35 49 84 b0 4c b4 b2 78 59 30 75 17 64 32 45 c0 0a 17 a1 0f a3 e1 f4 a3 e7 b0 cb b7 a7 29 61 90 1b 91 46 e8 e5 30 9a 5c 4c a3 18 d1 09 2b 05 c1 ec 30 73 e5 99 01 a2 63 66 1d 94 9a cb 54 0a 7e 14 9e d7 f0 5c 7e 3d 1e 30 ae 99 58 d8 c4 c8 ca c9 ad d7 7b 14 7b 8b 4d ab 89 2e 6c c5 bc d7 53 ef 20 37 4d aa 46 f8 63 d9 60 c9 83 64 cc 06 d7 97 93 45 3c ba ae 53 c2 b7 21 be ab c3 88 ce 98 11 ca 41 2c 8d 48 9c 36 9b bd b6 1a 7c aa 96 b6 ba b8 5f c2 fe cb 46 66 b9 43 14 a0 05 07 c9 3f 90 bb 52 77 4a 7f 56 4d c5 3e 1b 07 b5 e6 1b b9 ce 58 a9 44 70 6b 11 6d ae 9a 92 7f d0 d8 69 77 7a ad 76 bf 15 f6 21 3c 3b 6f 9f 01 1c 33 13 f6 df fe ad 99 54 17 5c 98 a6 97 63 79 57 9a 8b 4f be b9 56 85 b0 be 06 0f 96 8f ba 39 f5 17 84 bd f3 4e fb b8 9b ff 5b 9a ca 37 1d cb 44 ab d0 be f9 6e ad 56 88 fe b4 f5 4f 6c 75 c3 5f 14 e9 37 7f 23 bc 1f 30 84 71 6e 84 b5 74 e0 b5 e6 02 77 82 5e d0 0b e1 d9 cd 72 a5 dc ea 39 cc 85 59 0b 03 cc 41 52 89 44 32 ae b3 54 6b 6e 03 3f af 60 a6 8d 83 17 6d 6f 6a 1f c4 c7 dd cd 36 3f c6 76 d3 f1 1b c9 49 c8 ce 5d 05 00 00 Data Ascii: ao0WCT9FkB!7vonzBy|y'tx?71n^GC@-u~:Z*V`|9A,\0@t#)DV{,5l#hCGCa9]!Jd5ILxY0ud2E)aF0\L+0scfT~\~=0X{{M.lS 7MFc`dE<S!A,H6|_FfC?RwJVM>XDpkmiwzv!<;o3T\cyWOV9N[7DnVOlu_7#0qntw^r9YARD2Tkn?`moj6?vI]
Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 28 Nov 2024 01:03:00 GMTServer: Apache/2.4.41 (Ubuntu)Vary: Accept-EncodingContent-Encoding: gzipContent-Length: 413Keep-Alive: timeout=5, max=99Connection: Keep-AliveContent-Type: text/html;charset=UTF-8Data Raw: 1f 8b 08 00 00 00 00 00 00 03 95 92 51 6f d3 30 10 c7 df f7 29 6e 7e 40 db 43 73 4d 57 34 60 8e d1 48 86 56 a9 6b 2b da 09 21 c4 83 13 3b 89 b5 c4 8e 6c 77 1a 7c 7a dc 24 62 45 da 84 78 f2 d9 f7 bb bf ef 7f 3a 7a 9a ad d3 dd b7 cd 0d dc ee ee 96 b0 b9 ff b4 5c a4 40 26 88 5f 2f 52 c4 6c 97 0d 89 8b 68 06 9f 95 e6 0d e2 cd 8a b0 13 5a fb b6 61 27 40 6b c9 45 38 81 7a e5 1b c9 16 5a c8 27 30 25 20 c5 e1 25 30 38 42 34 37 e2 e7 a1 36 fe 8b 0b d7 5e 80 e7 3d 7e 08 2d a3 be 86 47 de a8 4a 27 c4 9b 8e 30 aa da 0a 9c 2d 12 82 aa 30 da 61 de 70 fd 10 55 aa 24 c0 1b 9f 90 ef 8b 74 fd 23 70 e8 eb 43 35 a3 1c 6a 2b cb 84 7c 4c 93 d5 d5 3a c9 08 5b f1 56 52 e4 2f 33 77 81 b9 26 6c c9 9d 87 d6 08 55 2a 29 5e 85 b7 03 bc 55 bf 5e 17 cc 06 26 93 ae b0 aa f3 ca e8 67 14 83 c5 63 ab 85 69 5c c7 83 d7 b7 c1 41 6d 8f a9 01 11 ff 98 46 69 1a 21 ed f1 38 b2 c5 97 61 1c e2 50 fe dc 59 61 da d6 68 24 6c 0c c6 a6 7a 0a c6 3f ac aa 6a 4f d8 6c 3a 9b 4f a6 97 93 f8 12 e2 f7 1f e2 69 e8 f7 65 10 60 f2 27 c5 de e8 dc 75 57 c3 f5 7f 7c e2 b8 01 94 0b 61 a5 73 ec ba e3 45 2d 71 16 cd a3 79 0c 67 f7 f9 5e fb fd 39 6c a5 7d 94 16 b8 87 a2 93 85 e2 c2 54 a5 31 c2 45 c1 10 6c 8c f5 f0 6e 1a 4c 8d 22 41 b7 5f bb b0 67 fd ca fe 06 18 31 33 14 f2 02 00 00 Data Ascii: Qo0)n~@CsMW4`HVk+!;lw|z$bEx:z\@&_/RlhZa'@kE8zZ'0% %08B476^=~-GJ'0-0apU$t#pC5j+|L:[VR/3w&lU*)^U^&gci\AmFi!8aPYah$lz?jOl:Oie`'uW|asE-qyg^9l}T1ElnL"A_g13
Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 28 Nov 2024 01:03:08 GMTServer: Apache/2.4.41 (Ubuntu)Vary: Accept-EncodingContent-Encoding: gzipContent-Length: 528Keep-Alive: timeout=5, max=97Connection: Keep-AliveContent-Type: text/html;charset=UTF-8Data Raw: 1f 8b 08 00 00 00 00 00 00 03 bd 94 61 6f d3 30 10 86 bf ef 57 1c fe 80 e0 43 e3 a6 ed 54 b6 39 46 a5 19 a2 a2 6b ab b5 13 42 08 21 37 76 12 6f 89 1d d9 6e a1 fc 7a dc a6 13 19 b4 0c 04 42 8a 94 d8 79 7c 79 df bb cb 91 27 f1 74 b8 78 3f bb 84 37 8b ab 31 cc 6e 5e 8d 47 43 40 2d 8c df 75 87 18 c7 8b b8 7e d1 0d 3a f0 5a 2a 56 60 7c 39 41 f4 84 e4 ae 2c e8 09 90 5c 30 ee ef 40 9c 74 85 a0 23 c5 c5 17 d0 29 e0 44 97 a5 56 04 d7 fb 9e c4 7b 94 2c 35 df 6c 23 84 07 68 bf b9 0b c6 96 bb 43 db 47 43 89 cb 61 cd 0a 99 a9 08 39 5d 21 4a 64 99 81 35 49 84 b0 4c b4 b2 78 59 30 75 17 64 32 45 c0 0a 17 a1 0f a3 e1 f4 a3 e7 b0 cb b7 a7 29 61 90 1b 91 46 e8 e5 30 9a 5c 4c a3 18 d1 09 2b 05 c1 ec 30 73 e5 99 01 a2 63 66 1d 94 9a cb 54 0a 7e 14 9e d7 f0 5c 7e 3d 1e 30 ae 99 58 d8 c4 c8 ca c9 ad d7 7b 14 7b 8b 4d ab 89 2e 6c c5 bc d7 53 ef 20 37 4d aa 46 f8 63 d9 60 c9 83 64 cc 06 d7 97 93 45 3c ba ae 53 c2 b7 21 be ab c3 88 ce 98 11 ca 41 2c 8d 48 9c 36 9b bd b6 1a 7c aa 96 b6 ba b8 5f c2 fe cb 46 66 b9 43 14 a0 05 07 c9 3f 90 bb 52 77 4a 7f 56 4d c5 3e 1b 07 b5 e6 1b b9 ce 58 a9 44 70 6b 11 6d ae 9a 92 7f d0 d8 69 77 7a ad 76 bf 15 f6 21 3c 3b 6f 9f 01 1c 33 13 f6 df fe ad 99 54 17 5c 98 a6 97 63 79 57 9a 8b 4f be b9 56 85 b0 be 06 0f 96 8f ba 39 f5 17 84 bd f3 4e fb b8 9b ff 5b 9a ca 37 1d cb 44 ab d0 be f9 6e ad 56 88 fe b4 f5 4f 6c 75 c3 5f 14 e9 37 7f 23 bc 1f 30 84 71 6e 84 b5 74 e0 b5 e6 02 77 82 5e d0 0b e1 d9 cd 72 a5 dc ea 39 cc 85 59 0b 03 cc 41 52 89 44 32 ae b3 54 6b 6e 03 3f af 60 a6 8d 83 17 6d 6f 6a 1f c4 c7 dd cd 36 3f c6 76 d3 f1 1b c9 49 c8 ce 5d 05 00 00 Data Ascii: ao0WCT9FkB!7vonzBy|y'tx?71n^GC@-u~:Z*V`|9A,\0@t#)DV{,5l#hCGCa9]!Jd5ILxY0ud2E)aF0\L+0scfT~\~=0X{{M.lS 7MFc`dE<S!A,H6|_FfC?RwJVM>XDpkmiwzv!<;o3T\cyWOV9N[7DnVOlu_7#0qntw^r9YARD2Tkn?`moj6?vI]
Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 28 Nov 2024 01:03:09 GMTServer: Apache/2.4.41 (Ubuntu)Vary: Accept-EncodingContent-Encoding: gzipContent-Length: 413Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: text/html;charset=UTF-8Data Raw: 1f 8b 08 00 00 00 00 00 00 03 95 92 51 6f d3 30 10 c7 df f7 29 6e 7e 40 db 43 73 4d 57 34 60 8e d1 48 86 56 a9 6b 2b da 09 21 c4 83 13 3b 89 b5 c4 8e 6c 77 1a 7c 7a dc 24 62 45 da 84 78 f2 d9 f7 bb bf ef 7f 3a 7a 9a ad d3 dd b7 cd 0d dc ee ee 96 b0 b9 ff b4 5c a4 40 26 88 5f 2f 52 c4 6c 97 0d 89 8b 68 06 9f 95 e6 0d e2 cd 8a b0 13 5a fb b6 61 27 40 6b c9 45 38 81 7a e5 1b c9 16 5a c8 27 30 25 20 c5 e1 25 30 38 42 34 37 e2 e7 a1 36 fe 8b 0b d7 5e 80 e7 3d 7e 08 2d a3 be 86 47 de a8 4a 27 c4 9b 8e 30 aa da 0a 9c 2d 12 82 aa 30 da 61 de 70 fd 10 55 aa 24 c0 1b 9f 90 ef 8b 74 fd 23 70 e8 eb 43 35 a3 1c 6a 2b cb 84 7c 4c 93 d5 d5 3a c9 08 5b f1 56 52 e4 2f 33 77 81 b9 26 6c c9 9d 87 d6 08 55 2a 29 5e 85 b7 03 bc 55 bf 5e 17 cc 06 26 93 ae b0 aa f3 ca e8 67 14 83 c5 63 ab 85 69 5c c7 83 d7 b7 c1 41 6d 8f a9 01 11 ff 98 46 69 1a 21 ed f1 38 b2 c5 97 61 1c e2 50 fe dc 59 61 da d6 68 24 6c 0c c6 a6 7a 0a c6 3f ac aa 6a 4f d8 6c 3a 9b 4f a6 97 93 f8 12 e2 f7 1f e2 69 e8 f7 65 10 60 f2 27 c5 de e8 dc 75 57 c3 f5 7f 7c e2 b8 01 94 0b 61 a5 73 ec ba e3 45 2d 71 16 cd a3 79 0c 67 f7 f9 5e fb fd 39 6c a5 7d 94 16 b8 87 a2 93 85 e2 c2 54 a5 31 c2 45 c1 10 6c 8c f5 f0 6e 1a 4c 8d 22 41 b7 5f bb b0 67 fd ca fe 06 18 31 33 14 f2 02 00 00 Data Ascii: Qo0)n~@CsMW4`HVk+!;lw|z$bEx:z\@&_/RlhZa'@kE8zZ'0% %08B476^=~-GJ'0-0apU$t#pC5j+|L:[VR/3w&lU*)^U^&gci\AmFi!8aPYah$lz?jOl:Oie`'uW|asE-qyg^9l}T1ElnL"A_g13
Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 28 Nov 2024 01:03:10 GMTServer: Apache/2.4.41 (Ubuntu)Vary: Accept-EncodingContent-Encoding: gzipContent-Length: 528Keep-Alive: timeout=5, max=99Connection: Keep-AliveContent-Type: text/html;charset=UTF-8Data Raw: 1f 8b 08 00 00 00 00 00 00 03 bd 94 61 6f d3 30 10 86 bf ef 57 1c fe 80 e0 43 e3 a6 ed 54 b6 39 46 a5 19 a2 a2 6b ab b5 13 42 08 21 37 76 12 6f 89 1d d9 6e a1 fc 7a dc a6 13 19 b4 0c 04 42 8a 94 d8 79 7c 79 df bb cb 91 27 f1 74 b8 78 3f bb 84 37 8b ab 31 cc 6e 5e 8d 47 43 40 2d 8c df 75 87 18 c7 8b b8 7e d1 0d 3a f0 5a 2a 56 60 7c 39 41 f4 84 e4 ae 2c e8 09 90 5c 30 ee ef 40 9c 74 85 a0 23 c5 c5 17 d0 29 e0 44 97 a5 56 04 d7 fb 9e c4 7b 94 2c 35 df 6c 23 84 07 68 bf b9 0b c6 96 bb 43 db 47 43 89 cb 61 cd 0a 99 a9 08 39 5d 21 4a 64 99 81 35 49 84 b0 4c b4 b2 78 59 30 75 17 64 32 45 c0 0a 17 a1 0f a3 e1 f4 a3 e7 b0 cb b7 a7 29 61 90 1b 91 46 e8 e5 30 9a 5c 4c a3 18 d1 09 2b 05 c1 ec 30 73 e5 99 01 a2 63 66 1d 94 9a cb 54 0a 7e 14 9e d7 f0 5c 7e 3d 1e 30 ae 99 58 d8 c4 c8 ca c9 ad d7 7b 14 7b 8b 4d ab 89 2e 6c c5 bc d7 53 ef 20 37 4d aa 46 f8 63 d9 60 c9 83 64 cc 06 d7 97 93 45 3c ba ae 53 c2 b7 21 be ab c3 88 ce 98 11 ca 41 2c 8d 48 9c 36 9b bd b6 1a 7c aa 96 b6 ba b8 5f c2 fe cb 46 66 b9 43 14 a0 05 07 c9 3f 90 bb 52 77 4a 7f 56 4d c5 3e 1b 07 b5 e6 1b b9 ce 58 a9 44 70 6b 11 6d ae 9a 92 7f d0 d8 69 77 7a ad 76 bf 15 f6 21 3c 3b 6f 9f 01 1c 33 13 f6 df fe ad 99 54 17 5c 98 a6 97 63 79 57 9a 8b 4f be b9 56 85 b0 be 06 0f 96 8f ba 39 f5 17 84 bd f3 4e fb b8 9b ff 5b 9a ca 37 1d cb 44 ab d0 be f9 6e ad 56 88 fe b4 f5 4f 6c 75 c3 5f 14 e9 37 7f 23 bc 1f 30 84 71 6e 84 b5 74 e0 b5 e6 02 77 82 5e d0 0b e1 d9 cd 72 a5 dc ea 39 cc 85 59 0b 03 cc 41 52 89 44 32 ae b3 54 6b 6e 03 3f af 60 a6 8d 83 17 6d 6f 6a 1f c4 c7 dd cd 36 3f c6 76 d3 f1 1b c9 49 c8 ce 5d 05 00 00 Data Ascii: ao0WCT9FkB!7vonzBy|y'tx?71n^GC@-u~:Z*V`|9A,\0@t#)DV{,5l#hCGCa9]!Jd5ILxY0ud2E)aF0\L+0scfT~\~=0X{{M.lS 7MFc`dE<S!A,H6|_FfC?RwJVM>XDpkmiwzv!<;o3T\cyWOV9N[7DnVOlu_7#0qntw^r9YARD2Tkn?`moj6?vI]
Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 28 Nov 2024 01:03:15 GMTServer: Apache/2.4.41 (Ubuntu)Last-Modified: Wed, 17 Jul 2024 19:09:00 GMTETag: "4429-61d7631da4b00-gzip"Accept-Ranges: bytesVary: Accept-EncodingContent-Encoding: gzipContent-Length: 5070Keep-Alive: timeout=5, max=98Connection: Keep-AliveContent-Type: application/javascriptData Raw: 1f 8b 08 00 00 00 00 00 00 03 bd 3b 6b 6f 1b 57 76 df 03 e4 3f dc a4 4e 66 e8 a5 47 94 1f 59 5b 5a 59 50 24 aa 66 22 c9 5a 89 4e b6 95 14 69 44 5e 4a e3 90 33 f4 cc d0 92 aa 25 60 c7 dd 6e b6 09 36 68 d1 02 fd d2 6c 17 fd 5c 40 56 e3 c4 8f 48 f9 0b e4 3f ea 39 e7 de 3b 73 e7 45 d1 89 51 02 b6 c8 b9 af f3 7e de 69 78 6e 10 b2 56 c0 66 98 cf 1f f4 1c 9f 9b 46 2b 30 4a d3 6f bf d5 a0 a1 4f f9 ee ba d7 f8 9c 87 fa 8c 03 7d 86 7d e8 78 89 f5 f4 40 9b d0 39 0a 1e b4 f5 09 f4 e0 ea 44 d7 f7 3a 4e c0 b5 99 f7 f6 da 4e eb e8 a3 75 7d 72 8f 9e 5d b9 af ef 78 cc 76 43 cf 2e 33 3b f4 76 59 3f 71 f6 ae bd 9b 98 b8 dc 0b f9 61 6a 4e 70 e4 36 ae 74 70 80 a6 46 70 d2 d4 19 e6 f2 03 b1 cc 14 a3 ad 9e db 08 1d cf 65 bb 76 c0 3f b8 be c0 1b 5e 93 9b 41 e8 97 d8 f1 db 6f 31 f8 f8 3c ec f9 2e 81 43 cf 61 59 3f de 97 07 0d bb cb ef 84 1d 24 82 d9 73 03 bb c5 4b 6c e6 76 6a b5 18 10 8f e8 63 f9 bc db b6 1b dc 9c 78 7f 62 af cc de 7d df ee 74 a7 df 2d e5 ce f8 8d 98 d1 0e 8b 26 dc 16 13 f6 0a 27 bc 2b 26 3c e8 79 85 53 0c 31 e5 6f 2a d7 6e c1 14 85 64 44 9e c0 76 9d d0 f9 07 5e 73 bb bd d0 74 f0 ff 88 42 4e 8b 99 e1 51 97 7b 2d 46 03 ec 9d 99 19 66 00 ad 1c 77 cf 28 29 12 d0 d0 b4 58 21 fe 9f 98 60 83 ff 1e 7c 37 38 19 bc 1a 7e 33 78 36 f8 91 0d 4e 87 8f 07 cf d8 9d fa f2 d2 95 e1 17 f0 e8 7f 07 cf c5 dc 36 08 a9 82 a1 09 a4 a6 dd 34 12 6d 7c 76 7b eb f2 ed d9 89 bd 4e 99 19 c4 f9 e4 39 ff 33 78 39 7c 04 27 9d 0d 9e 0f 1f 0d 9f d0 69 70 d6 4f 83 67 c3 7f 1a 3c 27 10 be 1e 9c 0d bf 82 d3 e1 f1 f3 c1 8f 83 d3 c1 39 3c fc 4a 6c a1 1f 1d b3 dc 8c 1e 67 0f 4c 21 f6 6a f8 e7 c1 53 da 7e 70 3e 7c 0c b8 9d 00 ae 5f c2 41 cf e0 d7 37 0c 20 fa 89 e0 3b c5 25 c3 3f 0f ff 84 43 17 82 12 7d 8f 29 b1 b1 79 58 a9 5c d9 3c 9c 5c dc 3c fc f5 22 7c b9 b5 b8 85 ac 4d 13 45 72 25 da 41 71 fc ed b7 10 fa ff 1c 9c 20 94 00 d2 f9 e0 c5 e0 e5 e0 04 41 39 07 54 be 03 80 ce e0 2f d2 11 c0 7e cc 06 4f 01 ea 1f 70 1a 23 8c cf 90 8a c3 3f 28 fd e8 7a 1e 6a 06 59 05 ab e1 73 3b e4 ab f0 c8 94 a2 b3 ef 05 e1 14 33 7e 7d d3 9a bc 5e b1 26 6f de b2 ae 5e bf 6e 94 c5 60 2f e0 3e 0c 76 bc e0 41 8f fb b6 ed ee f5 da de 91 d7 b6 dd 26 fc 68 c2 66 93 6a 6a d7 0e 82 03 cf 6f c2 74 fe f0 78 a1 72 f3 fa bb 8b 1f ef b9 93 ef 5d 52 33 9a 76 68 a3 8e d3 8c 3d ee 3a 9f 7b 7b b6 eb 5e bb f6 81 9a d1 d8 b7 fd 80 23 38 bd b0 75 b3 b3 1b c1 71 60 3b e1 a2 e7 cf 7b ae cb 49 1b 82 29 16 fa 3d 0e c3 7d dd c6 c0 ff 2d 67 0f b0 95 c8 d9 ed b6 77 c0 9b 77 7d 67 cf 71 83 7b 7e 1b b6 de 0f c3 6e 30 35 31 11 f4 ba dc 6f d8 61 c7 69 b7 8f ac 86 d7 99 68 dc 59 fe 60 e9 e8 d6 9d df 7e b2 b6 f8 bb ca da 6a fd de e2 47 75 e7 c6 fd dd ab 95 87 7f 7f 74 e3 c0 be 33 37 d1 72 da 7c f
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: cpeciadogfoods.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /icons/blank.gif HTTP/1.1Host: cpeciadogfoods.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Referer: http://cpeciadogfoods.com/Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /icons/folder.gif HTTP/1.1Host: cpeciadogfoods.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Referer: http://cpeciadogfoods.com/Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: cpeciadogfoods.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Referer: http://cpeciadogfoods.com/Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /icons/blank.gif HTTP/1.1Host: cpeciadogfoods.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /icons/folder.gif HTTP/1.1Host: cpeciadogfoods.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /common/ HTTP/1.1Host: cpeciadogfoods.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Referer: http://cpeciadogfoods.com/Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /icons/back.gif HTTP/1.1Host: cpeciadogfoods.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Referer: http://cpeciadogfoods.com/common/Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /icons/unknown.gif HTTP/1.1Host: cpeciadogfoods.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Referer: http://cpeciadogfoods.com/common/Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: cpeciadogfoods.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Referer: http://cpeciadogfoods.com/common/Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /icons/unknown.gif HTTP/1.1Host: cpeciadogfoods.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /icons/back.gif HTTP/1.1Host: cpeciadogfoods.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Referer: http://cpeciadogfoods.com/common/Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /icons/back.gif HTTP/1.1Host: cpeciadogfoods.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /common/ HTTP/1.1Host: cpeciadogfoods.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Referer: http://cpeciadogfoods.com/Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: cpeciadogfoods.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Referer: http://cpeciadogfoods.com/common/Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: cpeciadogfoods.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Referer: http://cpeciadogfoods.com/common/Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /common/ HTTP/1.1Host: cpeciadogfoods.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Referer: http://cpeciadogfoods.com/Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /common/hyivgamne.js HTTP/1.1Host: cpeciadogfoods.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Referer: http://cpeciadogfoods.com/common/Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficDNS traffic detected: DNS query: cpeciadogfoods.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: apis.google.com
Source: global trafficDNS traffic detected: DNS query: play.google.com
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 28 Nov 2024 01:02:44 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 280Keep-Alive: timeout=5, max=99Connection: Keep-AliveContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 63 70 65 63 69 61 64 6f 67 66 6f 6f 64 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at cpeciadogfoods.com Port 80</address></body></html>
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownHTTPS traffic detected: 172.202.163.200:443 -> 192.168.2.16:49718 version: TLS 1.2
Source: unknownHTTPS traffic detected: 172.202.163.200:443 -> 192.168.2.16:49723 version: TLS 1.2
Source: classification engineClassification label: mal76.win@24/6@12/118
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1952,i,1912257330799433781,17735720816674837617,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://cpeciadogfoods.com"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1952,i,1912257330799433781,17735720816674837617,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Browser Extensions
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Registry Run Keys / Startup Folder
1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media4
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive5
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture4
Ingress Tool Transfer
Traffic DuplicationData Destruction

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
http://cpeciadogfoods.com100%Avira URL Cloudmalware
http://cpeciadogfoods.com15%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
cpeciadogfoods.com15%VirustotalBrowse
SourceDetectionScannerLabelLink
http://cpeciadogfoods.com/favicon.ico100%Avira URL Cloudmalware
http://cpeciadogfoods.com/icons/folder.gif100%Avira URL Cloudmalware
http://cpeciadogfoods.com/icons/blank.gif100%Avira URL Cloudmalware
http://cpeciadogfoods.com/common/100%Avira URL Cloudmalware
http://cpeciadogfoods.com/icons/back.gif100%Avira URL Cloudmalware
http://cpeciadogfoods.com/icons/unknown.gif100%Avira URL Cloudmalware
NameIPActiveMaliciousAntivirus DetectionReputation
plus.l.google.com
172.217.17.78
truefalse
    high
    play.google.com
    172.217.19.206
    truefalse
      high
      www.google.com
      142.250.181.100
      truefalse
        high
        cpeciadogfoods.com
        72.14.155.139
        truetrueunknown
        apis.google.com
        unknown
        unknownfalse
          high
          NameMaliciousAntivirus DetectionReputation
          http://cpeciadogfoods.com/favicon.icotrue
          • Avira URL Cloud: malware
          unknown
          http://cpeciadogfoods.com/icons/blank.giftrue
          • Avira URL Cloud: malware
          unknown
          http://cpeciadogfoods.com/icons/folder.giftrue
          • Avira URL Cloud: malware
          unknown
          http://cpeciadogfoods.com/icons/unknown.giftrue
          • Avira URL Cloud: malware
          unknown
          http://cpeciadogfoods.com/icons/back.giftrue
          • Avira URL Cloud: malware
          unknown
          http://cpeciadogfoods.com/true
            unknown
            https://cpeciadogfoods.com/icons/unknown.giftrue
              unknown
              http://cpeciadogfoods.com/common/hyivgamne.jstrue
                unknown
                http://cpeciadogfoods.com/common/true
                • Avira URL Cloud: malware
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                172.217.19.206
                play.google.comUnited States
                15169GOOGLEUSfalse
                1.1.1.1
                unknownAustralia
                13335CLOUDFLARENETUSfalse
                172.217.17.78
                plus.l.google.comUnited States
                15169GOOGLEUSfalse
                172.217.17.35
                unknownUnited States
                15169GOOGLEUSfalse
                172.217.17.46
                unknownUnited States
                15169GOOGLEUSfalse
                216.58.208.227
                unknownUnited States
                15169GOOGLEUSfalse
                142.250.181.100
                www.google.comUnited States
                15169GOOGLEUSfalse
                142.250.181.106
                unknownUnited States
                15169GOOGLEUSfalse
                74.125.205.84
                unknownUnited States
                15169GOOGLEUSfalse
                239.255.255.250
                unknownReserved
                unknownunknownfalse
                172.217.21.35
                unknownUnited States
                15169GOOGLEUSfalse
                72.14.155.139
                cpeciadogfoods.comUnited States
                20460MYTHOSTECHUStrue
                IP
                192.168.2.16
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1564255
                Start date and time:2024-11-28 02:02:10 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:defaultwindowsinteractivecookbook.jbs
                Sample URL:http://cpeciadogfoods.com
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:13
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • EGA enabled
                Analysis Mode:stream
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal76.win@24/6@12/118
                • Exclude process from analysis (whitelisted): svchost.exe
                • Excluded IPs from analysis (whitelisted): 216.58.208.227, 74.125.205.84, 172.217.17.46
                • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, clientservices.googleapis.com, clients.l.google.com
                • Not all processes where analyzed, report is missing behavior information
                • VT rate limit hit for: http://cpeciadogfoods.com/icons/blank.gif
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Nov 28 00:02:43 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2673
                Entropy (8bit):3.9855628906682976
                Encrypted:false
                SSDEEP:
                MD5:D0C97917B7706B10900F6D332BA813BC
                SHA1:126312B191DFC48CB3997C7193022D69C81534BC
                SHA-256:57D26D9F29EC3E133F65B4BAFE3AC8F1B8F7E439FC467C9A67F1D1BC16BE9442
                SHA-512:6E1AD89725AF79E837E87632CCD103C95E708D5AF11A670D7AF5B7838C46CCB850117D1A89FE27373C95FC8A9BE5A46897B5026318FE5AE4993027B1174EC2EE
                Malicious:false
                Reputation:unknown
                Preview:L..................F.@.. ...$+.,.......:1A..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I|YL.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V|YU.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V|YU.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V|YU............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V|YV............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........X.P.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Nov 28 00:02:43 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2675
                Entropy (8bit):3.9966405813721018
                Encrypted:false
                SSDEEP:
                MD5:3CAA31F6941DCFD30B94D754BACC2F05
                SHA1:1CDA11B2A0DFBB00E202D354D866D61057D74D39
                SHA-256:553337AD01EE129006F9020DA4DC2C795B102764DD7BABB0D50118A93454978F
                SHA-512:84D2658826F8B7B68DFD8339368084ECC8AA0E5BFC4C39197A7C4B45FE33D6C95E695C3DBECE52DC95A225B5CB46ED848321715C5C409F8904BA7F035A2FA561
                Malicious:false
                Reputation:unknown
                Preview:L..................F.@.. ...$+.,....rW.:1A..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I|YL.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V|YU.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V|YU.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V|YU............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V|YV............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........X.P.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2689
                Entropy (8bit):4.0112454006716876
                Encrypted:false
                SSDEEP:
                MD5:6A5DDC94FF57D03C5E7CEF81D5D4CFA2
                SHA1:7BD7630B66D6FA277F03F37AB05AEAE901855C6D
                SHA-256:5EEFE227B37F5EE29218D598E39AB78C9122D4C55BD74D3369FD7706B361C2CA
                SHA-512:8DD3B313D9194BCBA42D31A9CA327C4D7A1EE2D4D5E83EF9134E598299BACC0DEA6CCC9FDCB22B550F44F036C6EB09C70FDA0658A43BC94F9DABC4909F95CCA0
                Malicious:false
                Reputation:unknown
                Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I|YL.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V|YU.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V|YU.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V|YU............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........X.P.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Nov 28 00:02:43 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2677
                Entropy (8bit):3.997568442792292
                Encrypted:false
                SSDEEP:
                MD5:BE6CEFD0890673C14FF865AEE3C6984C
                SHA1:92F3D593EB31A6768759C55F524E25615124E24D
                SHA-256:FF7D0AE14D10BBC41769F9BB52D35691DA4DAD27107576FA9493F7B2C74AE6C6
                SHA-512:199B597C0F82D0ECB18293401970905101EE10D6A8BADC8A98A74729FBCC0C4A0F7BC594FDC3EFFE11855CB6B6BF3C163C03419965ACD84DC15C60D936E59446
                Malicious:false
                Reputation:unknown
                Preview:L..................F.@.. ...$+.,....qu.:1A..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I|YL.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V|YU.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V|YU.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V|YU............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V|YV............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........X.P.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Nov 28 00:02:43 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2677
                Entropy (8bit):3.989028823135767
                Encrypted:false
                SSDEEP:
                MD5:FDB987691727541FFDF9BB8F27854F6E
                SHA1:9B4F2DC52BA2F06091F2B1E712AD04C4C39BDB79
                SHA-256:4A07D62D2F183842CF01F64713AE7F7B32FA2D3B42EC3C77E7867BC64B85F2C7
                SHA-512:A052AA475373889EC7B66C9FB0ECC062395AE3DAAB95CA231EC4B8CE8FDCBBC10E7B5B918FA93F15D10134394409CC7EE3585E005A70A54252DECD42873E1908
                Malicious:false
                Reputation:unknown
                Preview:L..................F.@.. ...$+.,.......:1A..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I|YL.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V|YU.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V|YU.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V|YU............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V|YV............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........X.P.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Nov 28 00:02:43 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2679
                Entropy (8bit):3.9970777758760785
                Encrypted:false
                SSDEEP:
                MD5:155DCDBF2FA7568387BE6855530BFFAC
                SHA1:8B06A75C8ACB46135925EEB83258A15AC4C61D84
                SHA-256:763E5AB2B31C7BBE86E2482B1FDA4ACC2D95E36C026BCA8FDA4117C48353DB52
                SHA-512:6B88A0E4F5D96F2E0905E6697D60B40D6A25B82F9903F1480ACE8F9E33270AF147106245A601190C7901973948DA2DC9E30B5B7702F9EFE94D60442047FBA911
                Malicious:false
                Reputation:unknown
                Preview:L..................F.@.. ...$+.,.......:1A..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I|YL.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V|YU.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V|YU.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V|YU............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V|YV............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........X.P.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                No static file info