Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://beacon-iad3.rubiconproject.com

Overview

General Information

Sample URL:https://beacon-iad3.rubiconproject.com
Analysis ID:1520805
Infos:

Detection

Score:3
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Creates files inside the system directory
Deletes files inside the Windows folder
Detected non-DNS traffic on DNS port
Drops PE files
Drops PE files to the windows directory (C:\Windows)
PE file contains more sections than normal
PE file contains sections with non-standard names

Classification

  • System is w10x64
  • chrome.exe (PID: 1220 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 4180 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1992,i,10057778405521576301,5900187233159190595,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6316 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://beacon-iad3.rubiconproject.com" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: https://beacon-iad3.rubiconproject.com/HTTP Parser: No favicon
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:49741 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:49742 version: TLS 1.2
Source: Binary string: Google.Widevine.CDM.dll.pdb source: Google.Widevine.CDM.dll.0.dr
Source: global trafficTCP traffic: 192.168.2.4:57902 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.4:59350 -> 162.159.36.2:53
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
Source: global trafficDNS traffic detected: DNS query: beacon-iad3.rubiconproject.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: 171.39.242.20.in-addr.arpa
Source: Google.Widevine.CDM.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: Google.Widevine.CDM.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: Google.Widevine.CDM.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: Google.Widevine.CDM.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: Google.Widevine.CDM.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: Google.Widevine.CDM.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: Google.Widevine.CDM.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: Google.Widevine.CDM.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: Google.Widevine.CDM.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: Google.Widevine.CDM.dll.0.drString found in binary or memory: http://ocsp.digicert.com0
Source: Google.Widevine.CDM.dll.0.drString found in binary or memory: http://ocsp.digicert.com0A
Source: Google.Widevine.CDM.dll.0.drString found in binary or memory: http://ocsp.digicert.com0C
Source: Google.Widevine.CDM.dll.0.drString found in binary or memory: http://ocsp.digicert.com0X
Source: Google.Widevine.CDM.dll.0.drString found in binary or memory: http://www.digicert.com/CPS0
Source: unknownNetwork traffic detected: HTTP traffic on port 57906 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57906
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:49741 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:49742 version: TLS 1.2
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1220_1881077906Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1220_1881077906\Google.Widevine.CDM.dllJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1220_1881077906\manifest.jsonJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1220_1881077906\_metadata\Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1220_1881077906\_metadata\verified_contents.jsonJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1220_1881077906\manifest.fingerprintJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile deleted: C:\Windows\SystemTemp\chrome_BITS_1220_1117569695Jump to behavior
Source: Google.Widevine.CDM.dll.0.drStatic PE information: Number of sections : 12 > 10
Source: classification engineClassification label: clean3.win@22/8@6/4
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1992,i,10057778405521576301,5900187233159190595,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://beacon-iad3.rubiconproject.com"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1992,i,10057778405521576301,5900187233159190595,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: Binary string: Google.Widevine.CDM.dll.pdb source: Google.Widevine.CDM.dll.0.dr
Source: Google.Widevine.CDM.dll.0.drStatic PE information: section name: .00cfg
Source: Google.Widevine.CDM.dll.0.drStatic PE information: section name: .gxfg
Source: Google.Widevine.CDM.dll.0.drStatic PE information: section name: .retplne
Source: Google.Widevine.CDM.dll.0.drStatic PE information: section name: .voltbl
Source: Google.Widevine.CDM.dll.0.drStatic PE information: section name: _RDATA
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1220_1881077906\Google.Widevine.CDM.dllJump to dropped file
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1220_1881077906\Google.Widevine.CDM.dllJump to dropped file
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath Interception1
Process Injection
2
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
File Deletion
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
SourceDetectionScannerLabelLink
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1220_1881077906\Google.Widevine.CDM.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
www.google.com
142.250.184.196
truefalse
    unknown
    fp2e7a.wpc.phicdn.net
    192.229.221.95
    truefalse
      unknown
      beacon-iad3.rubiconproject.com
      unknown
      unknownfalse
        unknown
        171.39.242.20.in-addr.arpa
        unknown
        unknownfalse
          unknown
          NameMaliciousAntivirus DetectionReputation
          https://beacon-iad3.rubiconproject.com/false
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            142.250.184.196
            www.google.comUnited States
            15169GOOGLEUSfalse
            239.255.255.250
            unknownReserved
            unknownunknownfalse
            142.250.184.228
            unknownUnited States
            15169GOOGLEUSfalse
            IP
            192.168.2.4
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1520805
            Start date and time:2024-09-27 23:25:14 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 3m 9s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:browseurl.jbs
            Sample URL:https://beacon-iad3.rubiconproject.com
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:8
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:CLEAN
            Classification:clean3.win@22/8@6/4
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
            • Excluded IPs from analysis (whitelisted): 142.250.185.131, 142.250.185.78, 66.102.1.84, 34.104.35.123, 69.173.151.46, 69.173.151.36, 69.173.151.26, 69.173.151.66, 69.173.151.76, 69.173.151.56, 4.245.163.56, 93.184.221.240, 192.229.221.95, 20.3.187.198, 13.95.31.18, 20.242.39.171, 20.114.59.183, 4.175.87.197, 216.58.206.67
            • Excluded domains from analysis (whitelisted): fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, clientservices.googleapis.com, ctldl.windowsupdate.com, wu.azureedge.net, fe3cr.delivery.mp.microsoft.com, beacon-iad3.rubiconproject.net.akadns.net, fe3.delivery.mp.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, ocsp.digicert.com, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, update.googleapis.com, clients.l.google.com, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtSetInformationFile calls found.
            • VT rate limit hit for: https://beacon-iad3.rubiconproject.com
            No simulations
            InputOutput
            URL: https://beacon-iad3.rubiconproject.com/ Model: jbxai
            {
            "brand":[],
            "contains_trigger_text":false,
            "trigger_text":"",
            "prominent_button_name":"unknown",
            "text_input_field_labels":"unknown",
            "pdf_icon_visible":false,
            "has_visible_captcha":false,
            "has_urgent_text":false,
            "has_visible_qrcode":false}
            No context
            No context
            No context
            No context
            No context
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
            Category:dropped
            Size (bytes):2877728
            Entropy (8bit):6.868480682648069
            Encrypted:false
            SSDEEP:49152:GB6BoH5sOI2CHusbKOdskuoHHVjcY94RNETO2WYA4oPToqnQ3dK5zuqvGKGxofFo:M67hlnVjcYGRNETO2WYA4oLoqnJuZI5
            MD5:477C17B6448695110B4D227664AA3C48
            SHA1:949FF1136E0971A0176F6ADEA8ADCC0DD6030F22
            SHA-256:CB190E7D1B002A3050705580DD51EBA895A19EB09620BDD48D63085D5D88031E
            SHA-512:1E267B01A78BE40E7A02612B331B1D9291DA8E4330DEA10BF786ACBC69F25E0BAECE45FB3BAFE1F4389F420EBAA62373E4F035A45E34EADA6F72C7C61D2302ED
            Malicious:false
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 0%
            Reputation:low
            Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d.....fd.........." ......(..........A&.......................................,.......,...`A.........................................V*......V*......`,......`+..p....+. )...p,......D*.8....................C*.(.....(.8...........p\*..............................text.....(.......(................. ..`.rdata..h.....(.......(.............@..@.data....l....*..&....*.............@....pdata...p...`+..r....*.............@..@.00cfg..(.....+......p+.............@..@.gxfg....$....+..&...r+.............@..@.retplnel.... ,.......+..................tls.........0,.......+.............@....voltbl.D....@,.......+................._RDATA.......P,.......+.............@..@.rsrc........`,.......+.............@..@.reloc.......p,.......+.............@..B........................................................................................................................................
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:JSON data
            Category:dropped
            Size (bytes):1778
            Entropy (8bit):6.02086725086136
            Encrypted:false
            SSDEEP:48:p/hCdQAdJjRkakCi0LXjX9mqjW6JmfQkNWQzXXf2gTs:RtQ1aaxXrjW6JuQEWQKas
            MD5:3E839BA4DA1FFCE29A543C5756A19BDF
            SHA1:D8D84AC06C3BA27CCEF221C6F188042B741D2B91
            SHA-256:43DAA4139D3ED90F4B4635BD4D32346EB8E8528D0D5332052FCDA8F7860DB729
            SHA-512:19B085A9CFEC4D6F1B87CC6BBEEB6578F9CBA014704D05C9114CFB0A33B2E7729AC67499048CB33823C884517CBBDC24AA0748A9BB65E9C67714E6116365F1AB
            Malicious:false
            Reputation:low
            Preview:[{"description":"treehash per file","signed_content":{"payload":"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","signatures":[{"header":{"kid":"publisher"},"protected":"eyJhbGciOiJSUzI1NiJ9","signature":"KTPeHzS0ybFaz3_br3ASYWHjb6Ctul92067u2JMwtNYYm-4KxLiSkJZNBIzhm6hNSEW2p5kUEvHD0TjhhFGCZnWm9titj2bqJayCOAGxZb5BO74JJCRfy5Kwr1KSS4nvocsZepnHBmCiG2OV3by-Lyf1h1uU3X3bDfD92O0vJzrA8rwL2LrwIk-BolLo5nlM0I_MZwg8DhZ8SFBu9GGRVB2XrailDrv4SgupFE9gqA1HY6kjRjoyoAHbRRxZdBNNt9IKNdxNyaF9NcNRY8dAedNQ9Tw3YNp5jB7R9lcjO4knn58RdH2h_GiJ4l96StcXA4e7cqbJ77P-c
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:ASCII text, with no line terminators
            Category:dropped
            Size (bytes):66
            Entropy (8bit):3.974403644129192
            Encrypted:false
            SSDEEP:3:SLVV8T+WSq2ykFDJp9qBn:SLVqZS5p0B
            MD5:D30A5BBC00F7334EEDE0795D147B2E80
            SHA1:78F3A6995856854CAD0C524884F74E182F9C3C57
            SHA-256:A08C1BC41DE319392676C7389048D8B1C7424C4B74D2F6466BCF5732B8D86642
            SHA-512:DACF60E959C10A3499D55DC594454858343BF6A309F22D73BDEE86B676D8D0CED10E86AC95ECD78E745E8805237121A25830301680BD12BFC7122A82A885FF4B
            Malicious:false
            Reputation:low
            Preview:1.c900ba9a2d8318263fd43782ee6fd5fb50bad78bf0eb2c972b5922c458af45ed
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:JSON data
            Category:dropped
            Size (bytes):145
            Entropy (8bit):4.595307058143632
            Encrypted:false
            SSDEEP:3:rR6TAulhFphifFooG+HhFFKS18CWjhXLXGPQ3TRpvF/FHddTcplFHddTcVYA:F6VlM5PpKS18hRIA
            MD5:BBC03E9C7C5944E62EFC9C660B7BD2B6
            SHA1:83F161E3F49B64553709994B048D9F597CDE3DC6
            SHA-256:6CCE5AD8D496BC5179FA84AF8AFC568EEBA980D8A75058C6380B64FB42298C28
            SHA-512:FB80F091468A299B5209ACC30EDAF2001D081C22C3B30AAD422CBE6FEA7E5FE36A67A8E000D5DD03A30C60C30391C85FA31F3931E804C351AB0A71E9A978CC0F
            Malicious:false
            Reputation:low
            Preview:{. "manifest_version": 2,. "name": "windows-mf-cdm",. "version": "1.0.2738.0",. "accept_arch": [. "x64",. "x86_64",. "x86_64h". ].}
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:HTML document, Unicode text, UTF-8 text, with very long lines (427), with no line terminators
            Category:downloaded
            Size (bytes):431
            Entropy (8bit):5.347823414833305
            Encrypted:false
            SSDEEP:12:qTEuxVDEeR/gH/sI0llokRt/Jq5e/mvRDEetI:0EuxZR/gkrlllRt/qee9+
            MD5:875927332F52C86065894BA05CABB6C4
            SHA1:EECFFDA9610D7210201786C268A07E9CF6B5CCEB
            SHA-256:270D2FB55AA801662897590A27EC1C152407FA36BE1D6678C27FD8C1859239E4
            SHA-512:CF4CF396621A0A581160A4A1181A55E1E76DAFBE45B81079C008ECB4D139D33AD1FE66540061F83F13CE6F54837E9886ACFBAA8A0A38F0F983701378BA6DB990
            Malicious:false
            Reputation:low
            URL:https://beacon-iad3.rubiconproject.com/favicon.ico
            Preview:<!doctype html><html lang="en"><head><title>HTTP Status 404 . Not Found</title><style type="text/css">body {font-family:Tahoma,Arial,sans-serif;} h1, h2, h3, b {color:white;background-color:#525D76;} h1 {font-size:22px;} h2 {font-size:16px;} h3 {font-size:14px;} p {font-size:12px;} a {color:black;} .line {height:1px;background-color:#525D76;border:none;}</style></head><body><h1>HTTP Status 404 . Not Found</h1></body></html>
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:HTML document, Unicode text, UTF-8 text, with very long lines (427), with no line terminators
            Category:downloaded
            Size (bytes):431
            Entropy (8bit):5.347823414833305
            Encrypted:false
            SSDEEP:12:qTEuxVDEeR/gH/sI0llokRt/Jq5e/mvRDEetI:0EuxZR/gkrlllRt/qee9+
            MD5:875927332F52C86065894BA05CABB6C4
            SHA1:EECFFDA9610D7210201786C268A07E9CF6B5CCEB
            SHA-256:270D2FB55AA801662897590A27EC1C152407FA36BE1D6678C27FD8C1859239E4
            SHA-512:CF4CF396621A0A581160A4A1181A55E1E76DAFBE45B81079C008ECB4D139D33AD1FE66540061F83F13CE6F54837E9886ACFBAA8A0A38F0F983701378BA6DB990
            Malicious:false
            Reputation:low
            URL:https://beacon-iad3.rubiconproject.com/
            Preview:<!doctype html><html lang="en"><head><title>HTTP Status 404 . Not Found</title><style type="text/css">body {font-family:Tahoma,Arial,sans-serif;} h1, h2, h3, b {color:white;background-color:#525D76;} h1 {font-size:22px;} h2 {font-size:16px;} h3 {font-size:14px;} p {font-size:12px;} a {color:black;} .line {height:1px;background-color:#525D76;border:none;}</style></head><body><h1>HTTP Status 404 . Not Found</h1></body></html>
            No static file info
            TimestampSource PortDest PortSource IPDest IP
            Sep 27, 2024 23:25:59.445957899 CEST49675443192.168.2.4173.222.162.32
            Sep 27, 2024 23:26:09.054064989 CEST49675443192.168.2.4173.222.162.32
            Sep 27, 2024 23:26:12.369297981 CEST49740443192.168.2.4142.250.184.196
            Sep 27, 2024 23:26:12.369339943 CEST44349740142.250.184.196192.168.2.4
            Sep 27, 2024 23:26:12.369409084 CEST49740443192.168.2.4142.250.184.196
            Sep 27, 2024 23:26:12.370116949 CEST49740443192.168.2.4142.250.184.196
            Sep 27, 2024 23:26:12.370131969 CEST44349740142.250.184.196192.168.2.4
            Sep 27, 2024 23:26:13.101013899 CEST44349740142.250.184.196192.168.2.4
            Sep 27, 2024 23:26:13.147918940 CEST49740443192.168.2.4142.250.184.196
            Sep 27, 2024 23:26:13.169696093 CEST49740443192.168.2.4142.250.184.196
            Sep 27, 2024 23:26:13.169709921 CEST44349740142.250.184.196192.168.2.4
            Sep 27, 2024 23:26:13.170795918 CEST44349740142.250.184.196192.168.2.4
            Sep 27, 2024 23:26:13.170872927 CEST49740443192.168.2.4142.250.184.196
            Sep 27, 2024 23:26:13.173887014 CEST49740443192.168.2.4142.250.184.196
            Sep 27, 2024 23:26:13.173952103 CEST44349740142.250.184.196192.168.2.4
            Sep 27, 2024 23:26:13.226032019 CEST49740443192.168.2.4142.250.184.196
            Sep 27, 2024 23:26:13.226042986 CEST44349740142.250.184.196192.168.2.4
            Sep 27, 2024 23:26:13.272886992 CEST49740443192.168.2.4142.250.184.196
            Sep 27, 2024 23:26:13.903891087 CEST49741443192.168.2.4184.28.90.27
            Sep 27, 2024 23:26:13.903990030 CEST44349741184.28.90.27192.168.2.4
            Sep 27, 2024 23:26:13.904066086 CEST49741443192.168.2.4184.28.90.27
            Sep 27, 2024 23:26:13.913300991 CEST49741443192.168.2.4184.28.90.27
            Sep 27, 2024 23:26:13.913343906 CEST44349741184.28.90.27192.168.2.4
            Sep 27, 2024 23:26:14.590440989 CEST44349741184.28.90.27192.168.2.4
            Sep 27, 2024 23:26:14.590908051 CEST49741443192.168.2.4184.28.90.27
            Sep 27, 2024 23:26:14.596103907 CEST49741443192.168.2.4184.28.90.27
            Sep 27, 2024 23:26:14.596148968 CEST44349741184.28.90.27192.168.2.4
            Sep 27, 2024 23:26:14.596515894 CEST44349741184.28.90.27192.168.2.4
            Sep 27, 2024 23:26:14.648716927 CEST49741443192.168.2.4184.28.90.27
            Sep 27, 2024 23:26:14.736124992 CEST49741443192.168.2.4184.28.90.27
            Sep 27, 2024 23:26:14.783407927 CEST44349741184.28.90.27192.168.2.4
            Sep 27, 2024 23:26:14.936198950 CEST44349741184.28.90.27192.168.2.4
            Sep 27, 2024 23:26:14.936587095 CEST49741443192.168.2.4184.28.90.27
            Sep 27, 2024 23:26:14.936587095 CEST49741443192.168.2.4184.28.90.27
            Sep 27, 2024 23:26:14.936666012 CEST44349741184.28.90.27192.168.2.4
            Sep 27, 2024 23:26:14.936971903 CEST44349741184.28.90.27192.168.2.4
            Sep 27, 2024 23:26:14.937223911 CEST44349741184.28.90.27192.168.2.4
            Sep 27, 2024 23:26:14.937649012 CEST49741443192.168.2.4184.28.90.27
            Sep 27, 2024 23:26:15.015871048 CEST49742443192.168.2.4184.28.90.27
            Sep 27, 2024 23:26:15.015948057 CEST44349742184.28.90.27192.168.2.4
            Sep 27, 2024 23:26:15.016170025 CEST49742443192.168.2.4184.28.90.27
            Sep 27, 2024 23:26:15.016881943 CEST49742443192.168.2.4184.28.90.27
            Sep 27, 2024 23:26:15.016915083 CEST44349742184.28.90.27192.168.2.4
            Sep 27, 2024 23:26:15.680268049 CEST44349742184.28.90.27192.168.2.4
            Sep 27, 2024 23:26:15.680368900 CEST49742443192.168.2.4184.28.90.27
            Sep 27, 2024 23:26:15.682081938 CEST49742443192.168.2.4184.28.90.27
            Sep 27, 2024 23:26:15.682121992 CEST44349742184.28.90.27192.168.2.4
            Sep 27, 2024 23:26:15.682460070 CEST44349742184.28.90.27192.168.2.4
            Sep 27, 2024 23:26:15.683912039 CEST49742443192.168.2.4184.28.90.27
            Sep 27, 2024 23:26:15.731405973 CEST44349742184.28.90.27192.168.2.4
            Sep 27, 2024 23:26:15.958697081 CEST44349742184.28.90.27192.168.2.4
            Sep 27, 2024 23:26:15.958925009 CEST44349742184.28.90.27192.168.2.4
            Sep 27, 2024 23:26:15.958997965 CEST49742443192.168.2.4184.28.90.27
            Sep 27, 2024 23:26:15.973114967 CEST49742443192.168.2.4184.28.90.27
            Sep 27, 2024 23:26:15.973146915 CEST44349742184.28.90.27192.168.2.4
            Sep 27, 2024 23:26:15.973186016 CEST49742443192.168.2.4184.28.90.27
            Sep 27, 2024 23:26:15.973205090 CEST44349742184.28.90.27192.168.2.4
            Sep 27, 2024 23:26:22.933263063 CEST44349740142.250.184.196192.168.2.4
            Sep 27, 2024 23:26:22.933343887 CEST44349740142.250.184.196192.168.2.4
            Sep 27, 2024 23:26:22.933392048 CEST49740443192.168.2.4142.250.184.196
            Sep 27, 2024 23:26:24.781541109 CEST49740443192.168.2.4142.250.184.196
            Sep 27, 2024 23:26:24.781563044 CEST44349740142.250.184.196192.168.2.4
            Sep 27, 2024 23:26:38.140275002 CEST5935053192.168.2.4162.159.36.2
            Sep 27, 2024 23:26:38.145250082 CEST5359350162.159.36.2192.168.2.4
            Sep 27, 2024 23:26:38.145581007 CEST5935053192.168.2.4162.159.36.2
            Sep 27, 2024 23:26:38.145872116 CEST5935053192.168.2.4162.159.36.2
            Sep 27, 2024 23:26:38.150755882 CEST5359350162.159.36.2192.168.2.4
            Sep 27, 2024 23:26:38.591730118 CEST5359350162.159.36.2192.168.2.4
            Sep 27, 2024 23:26:38.593228102 CEST5935053192.168.2.4162.159.36.2
            Sep 27, 2024 23:26:38.598995924 CEST5359350162.159.36.2192.168.2.4
            Sep 27, 2024 23:26:38.599066019 CEST5935053192.168.2.4162.159.36.2
            Sep 27, 2024 23:27:06.264697075 CEST5790253192.168.2.41.1.1.1
            Sep 27, 2024 23:27:06.269651890 CEST53579021.1.1.1192.168.2.4
            Sep 27, 2024 23:27:06.269896984 CEST5790253192.168.2.41.1.1.1
            Sep 27, 2024 23:27:06.269896984 CEST5790253192.168.2.41.1.1.1
            Sep 27, 2024 23:27:06.274898052 CEST53579021.1.1.1192.168.2.4
            Sep 27, 2024 23:27:06.734797001 CEST53579021.1.1.1192.168.2.4
            Sep 27, 2024 23:27:06.735162020 CEST5790253192.168.2.41.1.1.1
            Sep 27, 2024 23:27:06.740312099 CEST53579021.1.1.1192.168.2.4
            Sep 27, 2024 23:27:06.740395069 CEST5790253192.168.2.41.1.1.1
            Sep 27, 2024 23:27:12.424751997 CEST57906443192.168.2.4142.250.184.228
            Sep 27, 2024 23:27:12.424782991 CEST44357906142.250.184.228192.168.2.4
            Sep 27, 2024 23:27:12.426687002 CEST57906443192.168.2.4142.250.184.228
            Sep 27, 2024 23:27:12.426687002 CEST57906443192.168.2.4142.250.184.228
            Sep 27, 2024 23:27:12.426722050 CEST44357906142.250.184.228192.168.2.4
            Sep 27, 2024 23:27:13.082339048 CEST44357906142.250.184.228192.168.2.4
            Sep 27, 2024 23:27:13.082767010 CEST57906443192.168.2.4142.250.184.228
            Sep 27, 2024 23:27:13.082782984 CEST44357906142.250.184.228192.168.2.4
            Sep 27, 2024 23:27:13.083100080 CEST44357906142.250.184.228192.168.2.4
            Sep 27, 2024 23:27:13.083570957 CEST57906443192.168.2.4142.250.184.228
            Sep 27, 2024 23:27:13.083621025 CEST44357906142.250.184.228192.168.2.4
            Sep 27, 2024 23:27:13.131933928 CEST57906443192.168.2.4142.250.184.228
            Sep 27, 2024 23:27:22.983969927 CEST44357906142.250.184.228192.168.2.4
            Sep 27, 2024 23:27:22.984030962 CEST44357906142.250.184.228192.168.2.4
            Sep 27, 2024 23:27:22.984126091 CEST57906443192.168.2.4142.250.184.228
            Sep 27, 2024 23:27:24.783211946 CEST57906443192.168.2.4142.250.184.228
            Sep 27, 2024 23:27:24.783266068 CEST44357906142.250.184.228192.168.2.4
            TimestampSource PortDest PortSource IPDest IP
            Sep 27, 2024 23:26:08.430811882 CEST53567621.1.1.1192.168.2.4
            Sep 27, 2024 23:26:08.578479052 CEST53505141.1.1.1192.168.2.4
            Sep 27, 2024 23:26:09.685925961 CEST53613971.1.1.1192.168.2.4
            Sep 27, 2024 23:26:09.858937979 CEST4947553192.168.2.41.1.1.1
            Sep 27, 2024 23:26:09.859105110 CEST5814353192.168.2.41.1.1.1
            Sep 27, 2024 23:26:09.882911921 CEST53581431.1.1.1192.168.2.4
            Sep 27, 2024 23:26:12.356168985 CEST5305553192.168.2.41.1.1.1
            Sep 27, 2024 23:26:12.356987953 CEST5012553192.168.2.41.1.1.1
            Sep 27, 2024 23:26:12.365494967 CEST53530551.1.1.1192.168.2.4
            Sep 27, 2024 23:26:12.366210938 CEST53501251.1.1.1192.168.2.4
            Sep 27, 2024 23:26:26.919792891 CEST138138192.168.2.4192.168.2.255
            Sep 27, 2024 23:26:27.110116005 CEST53593681.1.1.1192.168.2.4
            Sep 27, 2024 23:26:38.139415026 CEST5357413162.159.36.2192.168.2.4
            Sep 27, 2024 23:26:38.602487087 CEST5598653192.168.2.41.1.1.1
            Sep 27, 2024 23:26:38.609935999 CEST53559861.1.1.1192.168.2.4
            Sep 27, 2024 23:27:06.264235020 CEST53647591.1.1.1192.168.2.4
            Sep 27, 2024 23:27:12.416387081 CEST4970553192.168.2.41.1.1.1
            Sep 27, 2024 23:27:12.423573017 CEST53497051.1.1.1192.168.2.4
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Sep 27, 2024 23:26:09.858937979 CEST192.168.2.41.1.1.10x8c43Standard query (0)beacon-iad3.rubiconproject.comA (IP address)IN (0x0001)false
            Sep 27, 2024 23:26:09.859105110 CEST192.168.2.41.1.1.10x7142Standard query (0)beacon-iad3.rubiconproject.com65IN (0x0001)false
            Sep 27, 2024 23:26:12.356168985 CEST192.168.2.41.1.1.10xb964Standard query (0)www.google.comA (IP address)IN (0x0001)false
            Sep 27, 2024 23:26:12.356987953 CEST192.168.2.41.1.1.10xcad5Standard query (0)www.google.com65IN (0x0001)false
            Sep 27, 2024 23:26:38.602487087 CEST192.168.2.41.1.1.10xd6f2Standard query (0)171.39.242.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
            Sep 27, 2024 23:27:12.416387081 CEST192.168.2.41.1.1.10x6926Standard query (0)www.google.comA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Sep 27, 2024 23:26:09.882911921 CEST1.1.1.1192.168.2.40x7142No error (0)beacon-iad3.rubiconproject.combeacon-iad3.rubiconproject.net.akadns.netCNAME (Canonical name)IN (0x0001)false
            Sep 27, 2024 23:26:09.882949114 CEST1.1.1.1192.168.2.40x8c43No error (0)beacon-iad3.rubiconproject.combeacon-iad3.rubiconproject.net.akadns.netCNAME (Canonical name)IN (0x0001)false
            Sep 27, 2024 23:26:12.365494967 CEST1.1.1.1192.168.2.40xb964No error (0)www.google.com142.250.184.196A (IP address)IN (0x0001)false
            Sep 27, 2024 23:26:12.366210938 CEST1.1.1.1192.168.2.40xcad5No error (0)www.google.com65IN (0x0001)false
            Sep 27, 2024 23:26:25.041484118 CEST1.1.1.1192.168.2.40xaa93No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
            Sep 27, 2024 23:26:25.041484118 CEST1.1.1.1192.168.2.40xaa93No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
            Sep 27, 2024 23:26:37.140341997 CEST1.1.1.1192.168.2.40x609aNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
            Sep 27, 2024 23:26:37.140341997 CEST1.1.1.1192.168.2.40x609aNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
            Sep 27, 2024 23:26:38.609935999 CEST1.1.1.1192.168.2.40xd6f2Name error (3)171.39.242.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
            Sep 27, 2024 23:27:12.423573017 CEST1.1.1.1192.168.2.40x6926No error (0)www.google.com142.250.184.228A (IP address)IN (0x0001)false
            • fs.microsoft.com
            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            0192.168.2.449741184.28.90.27443
            TimestampBytes transferredDirectionData
            2024-09-27 21:26:14 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
            Connection: Keep-Alive
            Accept: */*
            Accept-Encoding: identity
            User-Agent: Microsoft BITS/7.8
            Host: fs.microsoft.com
            2024-09-27 21:26:14 UTC467INHTTP/1.1 200 OK
            Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
            Content-Type: application/octet-stream
            ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
            Last-Modified: Tue, 16 May 2017 22:58:00 GMT
            Server: ECAcc (lpl/EF67)
            X-CID: 11
            X-Ms-ApiVersion: Distribute 1.2
            X-Ms-Region: prod-neu-z1
            Cache-Control: public, max-age=242328
            Date: Fri, 27 Sep 2024 21:26:14 GMT
            Connection: close
            X-CID: 2


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            1192.168.2.449742184.28.90.27443
            TimestampBytes transferredDirectionData
            2024-09-27 21:26:15 UTC239OUTGET /fs/windows/config.json HTTP/1.1
            Connection: Keep-Alive
            Accept: */*
            Accept-Encoding: identity
            If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
            Range: bytes=0-2147483646
            User-Agent: Microsoft BITS/7.8
            Host: fs.microsoft.com
            2024-09-27 21:26:15 UTC515INHTTP/1.1 200 OK
            ApiVersion: Distribute 1.1
            Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
            Content-Type: application/octet-stream
            ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
            Last-Modified: Tue, 16 May 2017 22:58:00 GMT
            Server: ECAcc (lpl/EF06)
            X-CID: 11
            X-Ms-ApiVersion: Distribute 1.2
            X-Ms-Region: prod-weu-z1
            Cache-Control: public, max-age=242357
            Date: Fri, 27 Sep 2024 21:26:15 GMT
            Content-Length: 55
            Connection: close
            X-CID: 2
            2024-09-27 21:26:15 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
            Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


            Click to jump to process

            Click to jump to process

            Click to jump to process

            Target ID:0
            Start time:17:26:03
            Start date:27/09/2024
            Path:C:\Program Files\Google\Chrome\Application\chrome.exe
            Wow64 process (32bit):false
            Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
            Imagebase:0x7ff76e190000
            File size:3'242'272 bytes
            MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:false

            Target ID:2
            Start time:17:26:06
            Start date:27/09/2024
            Path:C:\Program Files\Google\Chrome\Application\chrome.exe
            Wow64 process (32bit):false
            Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1992,i,10057778405521576301,5900187233159190595,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
            Imagebase:0x7ff76e190000
            File size:3'242'272 bytes
            MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:false

            Target ID:3
            Start time:17:26:09
            Start date:27/09/2024
            Path:C:\Program Files\Google\Chrome\Application\chrome.exe
            Wow64 process (32bit):false
            Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://beacon-iad3.rubiconproject.com"
            Imagebase:0x7ff76e190000
            File size:3'242'272 bytes
            MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            No disassembly