Edit tour

Windows Analysis Report
please-clinton-missed-ing trycloudflare com.vbs

Overview

General Information

Sample name:please-clinton-missed-ing trycloudflare com.vbs
Analysis ID:1671118
MD5:6440e9768884d6d60255ea5491c19399
SHA1:67b2ac1987d2581211c8f72a0d96851758c0b086
SHA256:85022478067948e1b5fac324cfb133c9887e6e531abe854e3a08b62a88e47fda
Tags:193-124-22-113papilutesplease-clinton-missed-ingvbsuser-JAMESWT_WT
Infos:

Detection

Score:56
Range:0 - 100
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Potential malicious VBS script found (suspicious strings)
Potential malicious VBS/JS script found (suspicious encoded strings)
HTML page contains hidden javascript code
Java / VBScript file with very long strings (likely obfuscated code)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • chrome.exe (PID: 524 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: E81F54E6C1129887AEA47E7D092680BF)
    • chrome.exe (PID: 3520 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2180,i,12837888754552695090,6582440179336586364,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2208 /prefetch:3 MD5: E81F54E6C1129887AEA47E7D092680BF)
  • chrome.exe (PID: 6964 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "C:\Users\user\Desktop\please-clinton-missed-ing trycloudflare com.vbs" MD5: E81F54E6C1129887AEA47E7D092680BF)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: please-clinton-missed-ing trycloudflare com.vbsVirustotal: Detection: 13%Perma Link
Source: file:///C:/Users/user/Desktop/please-clinton-missed-ing%20trycloudflare%20com.vbsHTTP Parser: Base64 decoded: dim passedJCb, openingz0Z, interestingRtU, percentf94, producebqG, circuitpA1, hoseud8, soulaeOon error resume nextfunction pureuQL(blueyDK)on error resume nextinterruptujV = crownZNQ(pitchedr1F)showerEJ3 = ""goodnessqYQ = goodnessqYQ + 2...
Source: file:///C:/Users/user/Desktop/please-clinton-missed-ing%20trycloudflare%20com.vbsHTTP Parser: No favicon
Source: unknownHTTPS traffic detected: 142.250.69.4:443 -> 192.168.2.6:49698 version: TLS 1.2
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.91
Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.91
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.91
Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.91
Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.91
Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.91
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.91
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.227.215
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.227.215
Source: unknownTCP traffic detected without corresponding DNS query: 20.191.45.158
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49679 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49680
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 49680 -> 443
Source: unknownHTTPS traffic detected: 142.250.69.4:443 -> 192.168.2.6:49698 version: TLS 1.2

System Summary

barindex
Source: Initial file: dickwDJ.ShellExecute excitingRv8, elementarytx0
Source: please-clinton-missed-ing trycloudflare com.vbsInitial sample: Suspicious string .write LNDYAXRL
Source: please-clinton-missed-ing trycloudflare com.vbsInitial sample: Suspicious string createobject Y3JLYXRLB2JQZWN0
Source: please-clinton-missed-ing trycloudflare com.vbsInitial sample: Strings found which are bigger than 50
Source: classification engineClassification label: mal56.winVBS@24/0@2/2
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "C:\Users\user\Desktop\please-clinton-missed-ing trycloudflare com.vbs"
Source: please-clinton-missed-ing trycloudflare com.vbsVirustotal: Detection: 13%
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2180,i,12837888754552695090,6582440179336586364,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2208 /prefetch:3
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "C:\Users\user\Desktop\please-clinton-missed-ing trycloudflare com.vbs"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2180,i,12837888754552695090,6582440179336586364,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2208 /prefetch:3Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information211
Scripting
Valid AccountsWindows Management Instrumentation211
Scripting
1
Process Injection
1
Process Injection
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Obfuscated Files or Information
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1671118 Sample: please-clinton-missed-ing t... Startdate: 22/04/2025 Architecture: WINDOWS Score: 56 18 Multi AV Scanner detection for submitted file 2->18 20 Potential malicious VBS/JS script found (suspicious encoded strings) 2->20 22 Potential malicious VBS script found (suspicious strings) 2->22 6 chrome.exe 2 2->6         started        9 chrome.exe 2->9         started        process3 dnsIp4 14 192.168.2.6, 138, 443, 49680 unknown unknown 6->14 11 chrome.exe 6->11         started        process5 dnsIp6 16 www.google.com 142.250.69.4, 443, 49698, 49709 GOOGLEUS United States 11->16

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version

windows-stand
SourceDetectionScannerLabelLink
please-clinton-missed-ing trycloudflare com.vbs13%VirustotalBrowse
please-clinton-missed-ing trycloudflare com.vbs8%ReversingLabsScript-WScript.Dropper.Gamaredon
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
file:///C:/Users/user/Desktop/please-clinton-missed-ing%20trycloudflare%20com.vbs0%Avira URL Cloudsafe

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
www.google.com
142.250.69.4
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    file:///C:/Users/user/Desktop/please-clinton-missed-ing%20trycloudflare%20com.vbsfalse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    142.250.69.4
    www.google.comUnited States
    15169GOOGLEUSfalse
    IP
    192.168.2.6
    Joe Sandbox version:42.0.0 Malachite
    Analysis ID:1671118
    Start date and time:2025-04-22 16:52:30 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 5m 11s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:defaultwindowshtmlcookbook.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:16
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:please-clinton-missed-ing trycloudflare com.vbs
    Detection:MAL
    Classification:mal56.winVBS@24/0@2/2
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .vbs
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe, TextInputHost.exe
    • Excluded IPs from analysis (whitelisted): 142.250.68.227, 142.250.69.14, 142.250.141.84, 199.232.214.172, 192.178.49.195, 142.250.69.3, 142.250.68.238, 184.29.183.29, 172.202.163.200
    • Excluded domains from analysis (whitelisted): clients1.google.com, fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, clientservices.googleapis.com, fe3cr.delivery.mp.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, redirector.gvt1.com, update.googleapis.com, clients.l.google.com, c.pki.goog
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtOpenFile calls found.
    No simulations
    No context
    No context
    No context
    No context
    No context
    No created / dropped files found
    File type:HTML document, ASCII text, with very long lines (55891), with CRLF line terminators
    Entropy (8bit):5.892425458235454
    TrID:
    • HyperText Markup Language (15015/1) 37.06%
    • Visual Basic Script (13500/0) 33.32%
    • HyperText Markup Language (12001/1) 29.62%
    File name:please-clinton-missed-ing trycloudflare com.vbs
    File size:81'978 bytes
    MD5:6440e9768884d6d60255ea5491c19399
    SHA1:67b2ac1987d2581211c8f72a0d96851758c0b086
    SHA256:85022478067948e1b5fac324cfb133c9887e6e531abe854e3a08b62a88e47fda
    SHA512:ca7ef7d9bd2f253901a3895e440cbbeb5e8137e00816b12fc83aa49bb81a24f70b5203e80e715c887a7820b2fcea0305be61b9c4d7b5591c203b8c11e92d7621
    SSDEEP:1536:DgcFbrBVvQwTZbyXfAt99HQAZfUQnED6iq6hWMXj1TEHt4PhTChr68qn:DgcFbDvQwpCfAtTHQAZfULY6UMz1Bwhe
    TLSH:0383AF2A5E4B23248AB79747945E3AE96BE13306A1E30CCDF509C0CDD6EF3D452990DE
    File Content Preview:<!DOCTYPE html>..<html>..<head>..<script type="text/vbscript">....Dim quieteMq, musiciang08..on error resume next....Sub luckyj7w..on error resume next.. ..for bothEfi = 1399 to 172..novelqvk = novelqvk + "sAtFfu7QhnHdw7RwXtAQ0oGpWHu0Iuv7hqCwo1w8aNnvDYsdv

    Download Network PCAP: filteredfull

    • Total Packets: 36
    • 443 (HTTPS)
    • 53 (DNS)
    TimestampSource PortDest PortSource IPDest IP
    Apr 22, 2025 16:53:24.158382893 CEST49672443192.168.2.6204.79.197.203
    Apr 22, 2025 16:53:26.564780951 CEST49672443192.168.2.6204.79.197.203
    Apr 22, 2025 16:53:30.837481022 CEST49678443192.168.2.620.42.65.91
    Apr 22, 2025 16:53:31.158406973 CEST49678443192.168.2.620.42.65.91
    Apr 22, 2025 16:53:31.392801046 CEST49672443192.168.2.6204.79.197.203
    Apr 22, 2025 16:53:31.955957890 CEST49678443192.168.2.620.42.65.91
    Apr 22, 2025 16:53:33.252140045 CEST49678443192.168.2.620.42.65.91
    Apr 22, 2025 16:53:35.754111052 CEST49678443192.168.2.620.42.65.91
    Apr 22, 2025 16:53:37.366286039 CEST49698443192.168.2.6142.250.69.4
    Apr 22, 2025 16:53:37.366331100 CEST44349698142.250.69.4192.168.2.6
    Apr 22, 2025 16:53:37.366480112 CEST49698443192.168.2.6142.250.69.4
    Apr 22, 2025 16:53:37.366653919 CEST49698443192.168.2.6142.250.69.4
    Apr 22, 2025 16:53:37.366666079 CEST44349698142.250.69.4192.168.2.6
    Apr 22, 2025 16:53:37.688337088 CEST44349698142.250.69.4192.168.2.6
    Apr 22, 2025 16:53:37.688410044 CEST49698443192.168.2.6142.250.69.4
    Apr 22, 2025 16:53:37.690326929 CEST49698443192.168.2.6142.250.69.4
    Apr 22, 2025 16:53:37.690335989 CEST44349698142.250.69.4192.168.2.6
    Apr 22, 2025 16:53:37.690610886 CEST44349698142.250.69.4192.168.2.6
    Apr 22, 2025 16:53:37.747404099 CEST49698443192.168.2.6142.250.69.4
    Apr 22, 2025 16:53:40.565011024 CEST49678443192.168.2.620.42.65.91
    Apr 22, 2025 16:53:41.002502918 CEST49672443192.168.2.6204.79.197.203
    Apr 22, 2025 16:53:47.677455902 CEST44349698142.250.69.4192.168.2.6
    Apr 22, 2025 16:53:47.677520990 CEST44349698142.250.69.4192.168.2.6
    Apr 22, 2025 16:53:47.677560091 CEST49698443192.168.2.6142.250.69.4
    Apr 22, 2025 16:53:47.885533094 CEST49698443192.168.2.6142.250.69.4
    Apr 22, 2025 16:53:47.885555983 CEST44349698142.250.69.4192.168.2.6
    Apr 22, 2025 16:53:50.171996117 CEST49678443192.168.2.620.42.65.91
    Apr 22, 2025 16:54:37.286163092 CEST49709443192.168.2.6142.250.69.4
    Apr 22, 2025 16:54:37.286247969 CEST44349709142.250.69.4192.168.2.6
    Apr 22, 2025 16:54:37.286392927 CEST49709443192.168.2.6142.250.69.4
    Apr 22, 2025 16:54:37.286678076 CEST49709443192.168.2.6142.250.69.4
    Apr 22, 2025 16:54:37.286714077 CEST44349709142.250.69.4192.168.2.6
    Apr 22, 2025 16:54:37.600687027 CEST44349709142.250.69.4192.168.2.6
    Apr 22, 2025 16:54:37.601068020 CEST49709443192.168.2.6142.250.69.4
    Apr 22, 2025 16:54:37.601093054 CEST44349709142.250.69.4192.168.2.6
    Apr 22, 2025 16:54:43.186940908 CEST443496802.23.227.215192.168.2.6
    Apr 22, 2025 16:54:43.186969995 CEST443496802.23.227.215192.168.2.6
    Apr 22, 2025 16:54:43.187088966 CEST49680443192.168.2.62.23.227.215
    Apr 22, 2025 16:54:43.187119007 CEST49680443192.168.2.62.23.227.215
    Apr 22, 2025 16:54:47.609256029 CEST44349709142.250.69.4192.168.2.6
    Apr 22, 2025 16:54:47.609313965 CEST44349709142.250.69.4192.168.2.6
    Apr 22, 2025 16:54:47.609380007 CEST49709443192.168.2.6142.250.69.4
    Apr 22, 2025 16:54:47.794596910 CEST49709443192.168.2.6142.250.69.4
    Apr 22, 2025 16:54:47.794658899 CEST44349709142.250.69.4192.168.2.6
    Apr 22, 2025 16:55:37.338000059 CEST49719443192.168.2.6142.250.69.4
    Apr 22, 2025 16:55:37.338078976 CEST44349719142.250.69.4192.168.2.6
    Apr 22, 2025 16:55:37.338175058 CEST49719443192.168.2.6142.250.69.4
    Apr 22, 2025 16:55:37.338474989 CEST49719443192.168.2.6142.250.69.4
    Apr 22, 2025 16:55:37.338494062 CEST44349719142.250.69.4192.168.2.6
    Apr 22, 2025 16:55:37.652245045 CEST44349719142.250.69.4192.168.2.6
    Apr 22, 2025 16:55:37.653829098 CEST49719443192.168.2.6142.250.69.4
    Apr 22, 2025 16:55:37.653858900 CEST44349719142.250.69.4192.168.2.6
    Apr 22, 2025 16:55:47.705676079 CEST44349719142.250.69.4192.168.2.6
    Apr 22, 2025 16:55:47.705749035 CEST44349719142.250.69.4192.168.2.6
    Apr 22, 2025 16:55:47.705809116 CEST49719443192.168.2.6142.250.69.4
    Apr 22, 2025 16:55:47.743351936 CEST49719443192.168.2.6142.250.69.4
    Apr 22, 2025 16:55:47.743395090 CEST44349719142.250.69.4192.168.2.6
    Apr 22, 2025 16:56:45.450071096 CEST49679443192.168.2.620.191.45.158
    TimestampSource PortDest PortSource IPDest IP
    Apr 22, 2025 16:53:33.629719019 CEST53627891.1.1.1192.168.2.6
    Apr 22, 2025 16:53:33.652147055 CEST53569951.1.1.1192.168.2.6
    Apr 22, 2025 16:53:35.432686090 CEST53561371.1.1.1192.168.2.6
    Apr 22, 2025 16:53:37.223786116 CEST5631453192.168.2.61.1.1.1
    Apr 22, 2025 16:53:37.224004984 CEST6336353192.168.2.61.1.1.1
    Apr 22, 2025 16:53:37.364607096 CEST53633631.1.1.1192.168.2.6
    Apr 22, 2025 16:53:37.365322113 CEST53563141.1.1.1192.168.2.6
    Apr 22, 2025 16:53:52.470722914 CEST53539611.1.1.1192.168.2.6
    Apr 22, 2025 16:54:11.501740932 CEST53610251.1.1.1192.168.2.6
    Apr 22, 2025 16:54:28.696609020 CEST138138192.168.2.6192.168.2.255
    Apr 22, 2025 16:54:33.134602070 CEST53650361.1.1.1192.168.2.6
    Apr 22, 2025 16:54:34.019473076 CEST53571061.1.1.1192.168.2.6
    Apr 22, 2025 16:54:35.051361084 CEST53610301.1.1.1192.168.2.6
    Apr 22, 2025 16:55:03.748147011 CEST53627131.1.1.1192.168.2.6
    Apr 22, 2025 16:55:47.884448051 CEST53503721.1.1.1192.168.2.6
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Apr 22, 2025 16:53:37.223786116 CEST192.168.2.61.1.1.10x76a0Standard query (0)www.google.comA (IP address)IN (0x0001)false
    Apr 22, 2025 16:53:37.224004984 CEST192.168.2.61.1.1.10x5b1Standard query (0)www.google.com65IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Apr 22, 2025 16:53:37.364607096 CEST1.1.1.1192.168.2.60x5b1No error (0)www.google.com65IN (0x0001)false
    Apr 22, 2025 16:53:37.365322113 CEST1.1.1.1192.168.2.60x76a0No error (0)www.google.com142.250.69.4A (IP address)IN (0x0001)false
    050100150200s020406080100

    Click to jump to process

    050100150200s0.0050100MB

    Click to jump to process

    Target ID:1
    Start time:10:53:27
    Start date:22/04/2025
    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
    Imagebase:0x7ff63b000000
    File size:3'388'000 bytes
    MD5 hash:E81F54E6C1129887AEA47E7D092680BF
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Target ID:4
    Start time:10:53:31
    Start date:22/04/2025
    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2180,i,12837888754552695090,6582440179336586364,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2208 /prefetch:3
    Imagebase:0x7ff63b000000
    File size:3'388'000 bytes
    MD5 hash:E81F54E6C1129887AEA47E7D092680BF
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Target ID:11
    Start time:10:53:37
    Start date:22/04/2025
    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "C:\Users\user\Desktop\please-clinton-missed-ing trycloudflare com.vbs"
    Imagebase:0x7ff63b000000
    File size:3'388'000 bytes
    MD5 hash:E81F54E6C1129887AEA47E7D092680BF
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

    No disassembly