Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://www.paypalobjects.com/digitalassets/c/system-triggered-email/n/layout/fonts/SupremeLL/SupremeLLTestSubWeb-Medium.woff2

Overview

General Information

Sample URL:https://www.paypalobjects.com/digitalassets/c/system-triggered-email/n/layout/fonts/SupremeLL/SupremeLLTestSubWeb-Medium.woff2
Analysis ID:1591994
Infos:
Errors
  • URL not reachable

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Detected non-DNS traffic on DNS port

Classification

  • System is w10x64
  • chrome.exe (PID: 4852 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 5768 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 --field-trial-handle=2168,i,15104771224958868918,13712037630410875883,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6576 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.paypalobjects.com/digitalassets/c/system-triggered-email/n/layout/fonts/SupremeLL/SupremeLLTestSubWeb-Medium.woff2" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • OpenWith.exe (PID: 4548 cmdline: C:\Windows\system32\OpenWith.exe -Embedding MD5: E4A834784FA08C17D47A1E72429C5109)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: global trafficTCP traffic: 192.168.2.4:50512 -> 162.159.36.2:53
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 2.22.50.144
Source: unknownTCP traffic detected without corresponding DNS query: 2.22.50.144
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /digitalassets/c/system-triggered-email/n/layout/fonts/SupremeLL/SupremeLLTestSubWeb-Medium.woff2 HTTP/1.1Host: www.paypalobjects.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: www.paypalobjects.com
Source: global trafficDNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50595
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50595 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: classification engineClassification label: unknown0.win@18/5@6/6
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\Downloads\47f21400-ebff-4d18-8b1d-0c9c1a89d420.tmpJump to behavior
Source: C:\Windows\System32\OpenWith.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 --field-trial-handle=2168,i,15104771224958868918,13712037630410875883,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.paypalobjects.com/digitalassets/c/system-triggered-email/n/layout/fonts/SupremeLL/SupremeLLTestSubWeb-Medium.woff2"
Source: unknownProcess created: C:\Windows\System32\OpenWith.exe C:\Windows\system32\OpenWith.exe -Embedding
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 --field-trial-handle=2168,i,15104771224958868918,13712037630410875883,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Windows\System32\OpenWith.exe C:\Windows\system32\OpenWith.exe -EmbeddingJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
System Information Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://www.paypalobjects.com/digitalassets/c/system-triggered-email/n/layout/fonts/SupremeLL/SupremeLLTestSubWeb-Medium.woff20%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
paypal-dynamic-cdn.map.fastly.net
151.101.195.1
truefalse
    high
    www.google.com
    142.250.186.100
    truefalse
      high
      198.187.3.20.in-addr.arpa
      unknown
      unknownfalse
        high
        www.paypalobjects.com
        unknown
        unknownfalse
          high
          NameMaliciousAntivirus DetectionReputation
          https://www.paypalobjects.com/digitalassets/c/system-triggered-email/n/layout/fonts/SupremeLL/SupremeLLTestSubWeb-Medium.woff2false
            high
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            151.101.195.1
            paypal-dynamic-cdn.map.fastly.netUnited States
            54113FASTLYUSfalse
            239.255.255.250
            unknownReserved
            unknownunknownfalse
            142.250.186.100
            www.google.comUnited States
            15169GOOGLEUSfalse
            142.250.185.100
            unknownUnited States
            15169GOOGLEUSfalse
            IP
            192.168.2.23
            192.168.2.4
            Joe Sandbox version:42.0.0 Malachite
            Analysis ID:1591994
            Start date and time:2025-01-15 16:23:38 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 3m 7s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:browseurl.jbs
            Sample URL:https://www.paypalobjects.com/digitalassets/c/system-triggered-email/n/layout/fonts/SupremeLL/SupremeLLTestSubWeb-Medium.woff2
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:9
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:UNKNOWN
            Classification:unknown0.win@18/5@6/6
            • URL not reachable
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
            • Excluded IPs from analysis (whitelisted): 142.250.185.163, 172.217.18.14, 173.194.76.84, 172.217.16.206, 142.250.186.78, 199.232.214.172, 2.23.77.188, 142.250.186.174, 142.250.181.238, 142.250.185.174, 142.250.185.131, 184.28.90.27, 4.245.163.56, 20.3.187.198, 20.109.210.53, 13.107.246.45
            • Excluded domains from analysis (whitelisted): fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, clientservices.googleapis.com, fe3cr.delivery.mp.microsoft.com, clients2.google.com, ocsp.digicert.com, edgedl.me.gvt1.com, redirector.gvt1.com, update.googleapis.com, clients.l.google.com
            • Not all processes where analyzed, report is missing behavior information
            • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
            • VT rate limit hit for: https://www.paypalobjects.com/digitalassets/c/system-triggered-email/n/layout/fonts/SupremeLL/SupremeLLTestSubWeb-Medium.woff2
            TimeTypeDescription
            10:25:54API Interceptor1x Sleep call for process: OpenWith.exe modified
            No context
            No context
            No context
            No context
            No context
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:Web Open Font Format (Version 2), TrueType, length 28319, version 3.66
            Category:dropped
            Size (bytes):15158
            Entropy (8bit):7.982513142512984
            Encrypted:false
            SSDEEP:384:oSCQlHL1+DzRGeHC2AIncReDxr4Wydmn63pOieAn:zCQlHR+H7izRgMWywn63pOFQ
            MD5:4EF7C7641D8DCB0DE86E3D58E2DCAA36
            SHA1:592B05E13116A44B8D15466D79904599BFA77BEB
            SHA-256:EAC6DA96E69B4791BDA12E8B1123F305D39D2A9FF138DBA3A3A3D36AD2F8AE1C
            SHA-512:467446EA730E2E158E0D87A909BB76E7D019DF7EEE6E8AA9662FD7B6DD8802FEF82A55868421196EEEF354A59E0FF79A69B472D080C4934B4E76C87354FACDED
            Malicious:false
            Reputation:low
            Preview:wOF2......n........`..k]...B..k....................2....`..4.....4..a.6.$..t..|.. ..2..:.....)Ps..T.X.U....M...e.r..sK<J#....a....M.......IC....Z..xxF..2......B|.} ....du..z..PW(.0}4.L..a..>...v.%..:...q.Bc..IT.S...jN.,4.J.`f.. ..]:..q..#.X..5g.Au.X5......[..{. &..J..;.(3d...t.}....qn.Z...;W...9$.E9...9Y....1q..l;.....mDs.h..;.A....]..+.x%......u.QF.d...o).YA:9.....+.l.L..}Y?..*..N."._V..!.........d,.....a`N]?.F5.].t....JD..N..<_W......"...b...j"G\.fV.RX.....y....V.ZY.#.s=...)...J..W.... ..{..u...h<.........M....-R.d..CT,DAT.g.U.".n.U\.E..\\..m....z.nF..Hl....,..):.@.....w....L ...P..Y^N:@......,U.q..m....j.2)J.'......T.4.._..).b..{....Rv.......a+.l."..hF4......=D..2.E...1.#...&.....,.B..L..tD.>....a...:+..{..|s...3.. ....].....[.DF.p..H..[..,.3.L...3$..P06|...].....y,5..B.;z.c........'@....@V..Wq..|.9.M.|.Nl...f..,.H._.UI..=)...$......$^.....I;p.@....9..1'c.U.......@...~.ow.}.6........F..B.r..v..T...&vWk.k.&.)..%.. .SP..oU..T.>L........d...sA.,.
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:Web Open Font Format (Version 2), TrueType, length 28319, version 3.66
            Category:dropped
            Size (bytes):28319
            Entropy (8bit):7.991990546290019
            Encrypted:true
            SSDEEP:768:zCQlHR+H7izRgMWywn63pOFxvCfcAwt54kb/REe2:/9LWMWTn63MykAw54je2
            MD5:8DAF482582843F7CA345BA0CDE3AB05C
            SHA1:1A13955A2ABB995DBFD0FFDD3514F86605760035
            SHA-256:5748A1A9BA7B559CE962A024F0317112CC3E32B3570A53526AD255B825809232
            SHA-512:0A4635B587C92F277446B8FFBA61738181257CD830C3C647AE34F3F5A7DD0DE5DC7B1EB1F2CF2CE36BF9B8C055691548360348E46775899B6545DBF4742E94CA
            Malicious:false
            Reputation:low
            Preview:wOF2......n........`..k]...B..k....................2....`..4.....4..a.6.$..t..|.. ..2..:.....)Ps..T.X.U....M...e.r..sK<J#....a....M.......IC....Z..xxF..2......B|.} ....du..z..PW(.0}4.L..a..>...v.%..:...q.Bc..IT.S...jN.,4.J.`f.. ..]:..q..#.X..5g.Au.X5......[..{. &..J..;.(3d...t.}....qn.Z...;W...9$.E9...9Y....1q..l;.....mDs.h..;.A....]..+.x%......u.QF.d...o).YA:9.....+.l.L..}Y?..*..N."._V..!.........d,.....a`N]?.F5.].t....JD..N..<_W......"...b...j"G\.fV.RX.....y....V.ZY.#.s=...)...J..W.... ..{..u...h<.........M....-R.d..CT,DAT.g.U.".n.U\.E..\\..m....z.nF..Hl....,..):.@.....w....L ...P..Y^N:@......,U.q..m....j.2)J.'......T.4.._..).b..{....Rv.......a+.l."..hF4......=D..2.E...1.#...&.....,.B..L..tD.>....a...:+..{..|s...3.. ....].....[.DF.p..H..[..,.3.L...3$..P06|...].....y,5..B.;z.c........'@....@V..Wq..|.9.M.|.Nl...f..,.H._.UI..=)...$......$^.....I;p.@....9..1'c.U.......@...~.ow.}.6........F..B.r..v..T...&vWk.k.&.)..%.. .SP..oU..T.>L........d...sA.,.
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:Web Open Font Format (Version 2), TrueType, length 28319, version 3.66
            Category:dropped
            Size (bytes):28319
            Entropy (8bit):7.991990546290019
            Encrypted:true
            SSDEEP:768:zCQlHR+H7izRgMWywn63pOFxvCfcAwt54kb/REe2:/9LWMWTn63MykAw54je2
            MD5:8DAF482582843F7CA345BA0CDE3AB05C
            SHA1:1A13955A2ABB995DBFD0FFDD3514F86605760035
            SHA-256:5748A1A9BA7B559CE962A024F0317112CC3E32B3570A53526AD255B825809232
            SHA-512:0A4635B587C92F277446B8FFBA61738181257CD830C3C647AE34F3F5A7DD0DE5DC7B1EB1F2CF2CE36BF9B8C055691548360348E46775899B6545DBF4742E94CA
            Malicious:false
            Reputation:low
            Preview:wOF2......n........`..k]...B..k....................2....`..4.....4..a.6.$..t..|.. ..2..:.....)Ps..T.X.U....M...e.r..sK<J#....a....M.......IC....Z..xxF..2......B|.} ....du..z..PW(.0}4.L..a..>...v.%..:...q.Bc..IT.S...jN.,4.J.`f.. ..]:..q..#.X..5g.Au.X5......[..{. &..J..;.(3d...t.}....qn.Z...;W...9$.E9...9Y....1q..l;.....mDs.h..;.A....]..+.x%......u.QF.d...o).YA:9.....+.l.L..}Y?..*..N."._V..!.........d,.....a`N]?.F5.].t....JD..N..<_W......"...b...j"G\.fV.RX.....y....V.ZY.#.s=...)...J..W.... ..{..u...h<.........M....-R.d..CT,DAT.g.U.".n.U\.E..\\..m....z.nF..Hl....,..):.@.....w....L ...P..Y^N:@......,U.q..m....j.2)J.'......T.4.._..).b..{....Rv.......a+.l."..hF4......=D..2.E...1.#...&.....,.B..L..tD.>....a...:+..{..|s...3.. ....].....[.DF.p..H..[..,.3.L...3$..P06|...].....y,5..B.;z.c........'@....@V..Wq..|.9.M.|.Nl...f..,.H._.UI..=)...$......$^.....I;p.@....9..1'c.U.......@...~.ow.}.6........F..B.r..v..T...&vWk.k.&.)..%.. .SP..oU..T.>L........d...sA.,.
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:Web Open Font Format (Version 2), TrueType, length 28319, version 3.66
            Category:downloaded
            Size (bytes):28319
            Entropy (8bit):7.991990546290019
            Encrypted:true
            SSDEEP:768:zCQlHR+H7izRgMWywn63pOFxvCfcAwt54kb/REe2:/9LWMWTn63MykAw54je2
            MD5:8DAF482582843F7CA345BA0CDE3AB05C
            SHA1:1A13955A2ABB995DBFD0FFDD3514F86605760035
            SHA-256:5748A1A9BA7B559CE962A024F0317112CC3E32B3570A53526AD255B825809232
            SHA-512:0A4635B587C92F277446B8FFBA61738181257CD830C3C647AE34F3F5A7DD0DE5DC7B1EB1F2CF2CE36BF9B8C055691548360348E46775899B6545DBF4742E94CA
            Malicious:false
            Reputation:low
            URL:https://www.paypalobjects.com/digitalassets/c/system-triggered-email/n/layout/fonts/SupremeLL/SupremeLLTestSubWeb-Medium.woff2
            Preview:wOF2......n........`..k]...B..k....................2....`..4.....4..a.6.$..t..|.. ..2..:.....)Ps..T.X.U....M...e.r..sK<J#....a....M.......IC....Z..xxF..2......B|.} ....du..z..PW(.0}4.L..a..>...v.%..:...q.Bc..IT.S...jN.,4.J.`f.. ..]:..q..#.X..5g.Au.X5......[..{. &..J..;.(3d...t.}....qn.Z...;W...9$.E9...9Y....1q..l;.....mDs.h..;.A....]..+.x%......u.QF.d...o).YA:9.....+.l.L..}Y?..*..N."._V..!.........d,.....a`N]?.F5.].t....JD..N..<_W......"...b...j"G\.fV.RX.....y....V.ZY.#.s=...)...J..W.... ..{..u...h<.........M....-R.d..CT,DAT.g.U.".n.U\.E..\\..m....z.nF..Hl....,..):.@.....w....L ...P..Y^N:@......,U.q..m....j.2)J.'......T.4.._..).b..{....Rv.......a+.l."..hF4......=D..2.E...1.#...&.....,.B..L..tD.>....a...:+..{..|s...3.. ....].....[.DF.p..H..[..,.3.L...3$..P06|...].....y,5..B.;z.c........'@....@V..Wq..|.9.M.|.Nl...f..,.H._.UI..=)...$......$^.....I;p.@....9..1'c.U.......@...~.ow.}.6........F..B.r..v..T...&vWk.k.&.)..%.. .SP..oU..T.>L........d...sA.,.
            No static file info
            Icon Hash:b29a8a8e86868381
            TimestampSource PortDest PortSource IPDest IP
            Jan 15, 2025 16:24:28.684185982 CET49675443192.168.2.4173.222.162.32
            Jan 15, 2025 16:24:38.307526112 CET49675443192.168.2.4173.222.162.32
            Jan 15, 2025 16:24:40.960061073 CET49737443192.168.2.4142.250.186.100
            Jan 15, 2025 16:24:40.960078955 CET44349737142.250.186.100192.168.2.4
            Jan 15, 2025 16:24:40.960191011 CET49737443192.168.2.4142.250.186.100
            Jan 15, 2025 16:24:40.960566998 CET49737443192.168.2.4142.250.186.100
            Jan 15, 2025 16:24:40.960576057 CET44349737142.250.186.100192.168.2.4
            Jan 15, 2025 16:24:41.592768908 CET44349737142.250.186.100192.168.2.4
            Jan 15, 2025 16:24:41.593089104 CET49737443192.168.2.4142.250.186.100
            Jan 15, 2025 16:24:41.593118906 CET44349737142.250.186.100192.168.2.4
            Jan 15, 2025 16:24:41.594165087 CET44349737142.250.186.100192.168.2.4
            Jan 15, 2025 16:24:41.594234943 CET49737443192.168.2.4142.250.186.100
            Jan 15, 2025 16:24:41.595535040 CET49737443192.168.2.4142.250.186.100
            Jan 15, 2025 16:24:41.595606089 CET44349737142.250.186.100192.168.2.4
            Jan 15, 2025 16:24:41.637940884 CET49737443192.168.2.4142.250.186.100
            Jan 15, 2025 16:24:41.637960911 CET44349737142.250.186.100192.168.2.4
            Jan 15, 2025 16:24:41.684829950 CET49737443192.168.2.4142.250.186.100
            Jan 15, 2025 16:24:42.570003033 CET49739443192.168.2.4151.101.195.1
            Jan 15, 2025 16:24:42.570023060 CET44349739151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:42.570290089 CET49740443192.168.2.4151.101.195.1
            Jan 15, 2025 16:24:42.570312023 CET44349740151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:42.570359945 CET49740443192.168.2.4151.101.195.1
            Jan 15, 2025 16:24:42.570425987 CET49739443192.168.2.4151.101.195.1
            Jan 15, 2025 16:24:42.570631981 CET49740443192.168.2.4151.101.195.1
            Jan 15, 2025 16:24:42.570641994 CET44349740151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:42.570810080 CET49739443192.168.2.4151.101.195.1
            Jan 15, 2025 16:24:42.570823908 CET44349739151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.028426886 CET44349739151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.028721094 CET49739443192.168.2.4151.101.195.1
            Jan 15, 2025 16:24:43.028731108 CET44349739151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.029814005 CET44349739151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.029999971 CET49739443192.168.2.4151.101.195.1
            Jan 15, 2025 16:24:43.034693003 CET49739443192.168.2.4151.101.195.1
            Jan 15, 2025 16:24:43.034693003 CET49739443192.168.2.4151.101.195.1
            Jan 15, 2025 16:24:43.034703016 CET44349739151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.036087036 CET44349739151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.042833090 CET44349740151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.043030977 CET49740443192.168.2.4151.101.195.1
            Jan 15, 2025 16:24:43.043041945 CET44349740151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.044501066 CET44349740151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.044565916 CET49740443192.168.2.4151.101.195.1
            Jan 15, 2025 16:24:43.044864893 CET49740443192.168.2.4151.101.195.1
            Jan 15, 2025 16:24:43.044945002 CET44349740151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.078550100 CET49739443192.168.2.4151.101.195.1
            Jan 15, 2025 16:24:43.078560114 CET44349739151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.093472958 CET49740443192.168.2.4151.101.195.1
            Jan 15, 2025 16:24:43.093487024 CET44349740151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.124124050 CET49739443192.168.2.4151.101.195.1
            Jan 15, 2025 16:24:43.130814075 CET44349739151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.130908012 CET44349739151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.130944967 CET44349739151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.130985022 CET44349739151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.131026983 CET49739443192.168.2.4151.101.195.1
            Jan 15, 2025 16:24:43.131026983 CET49739443192.168.2.4151.101.195.1
            Jan 15, 2025 16:24:43.131036043 CET44349739151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.131345034 CET44349739151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.131402016 CET49739443192.168.2.4151.101.195.1
            Jan 15, 2025 16:24:43.131407976 CET44349739151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.134902954 CET44349739151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.134943962 CET44349739151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.134984016 CET44349739151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.135133982 CET49739443192.168.2.4151.101.195.1
            Jan 15, 2025 16:24:43.135140896 CET44349739151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.135163069 CET49739443192.168.2.4151.101.195.1
            Jan 15, 2025 16:24:43.135580063 CET44349739151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.135629892 CET49739443192.168.2.4151.101.195.1
            Jan 15, 2025 16:24:43.135634899 CET44349739151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.138535976 CET49740443192.168.2.4151.101.195.1
            Jan 15, 2025 16:24:43.185616970 CET49739443192.168.2.4151.101.195.1
            Jan 15, 2025 16:24:43.217576981 CET44349739151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.217715025 CET44349739151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.217751026 CET44349739151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.217787981 CET44349739151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.217803955 CET49739443192.168.2.4151.101.195.1
            Jan 15, 2025 16:24:43.217816114 CET44349739151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.217850924 CET44349739151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.217895031 CET49739443192.168.2.4151.101.195.1
            Jan 15, 2025 16:24:43.217895031 CET49739443192.168.2.4151.101.195.1
            Jan 15, 2025 16:24:43.217901945 CET44349739151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.218751907 CET44349739151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.218810081 CET49739443192.168.2.4151.101.195.1
            Jan 15, 2025 16:24:43.218817949 CET44349739151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.218836069 CET44349739151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:43.218915939 CET49739443192.168.2.4151.101.195.1
            Jan 15, 2025 16:24:43.224837065 CET49739443192.168.2.4151.101.195.1
            Jan 15, 2025 16:24:43.224848986 CET44349739151.101.195.1192.168.2.4
            Jan 15, 2025 16:24:51.492331028 CET44349737142.250.186.100192.168.2.4
            Jan 15, 2025 16:24:51.492388964 CET44349737142.250.186.100192.168.2.4
            Jan 15, 2025 16:24:51.492542028 CET49737443192.168.2.4142.250.186.100
            Jan 15, 2025 16:24:51.659471989 CET49737443192.168.2.4142.250.186.100
            Jan 15, 2025 16:24:51.659512997 CET44349737142.250.186.100192.168.2.4
            Jan 15, 2025 16:25:08.143686056 CET5051253192.168.2.4162.159.36.2
            Jan 15, 2025 16:25:08.148509026 CET5350512162.159.36.2192.168.2.4
            Jan 15, 2025 16:25:08.148677111 CET5051253192.168.2.4162.159.36.2
            Jan 15, 2025 16:25:08.153569937 CET5350512162.159.36.2192.168.2.4
            Jan 15, 2025 16:25:08.600848913 CET5051253192.168.2.4162.159.36.2
            Jan 15, 2025 16:25:08.605885983 CET5350512162.159.36.2192.168.2.4
            Jan 15, 2025 16:25:08.606000900 CET5051253192.168.2.4162.159.36.2
            Jan 15, 2025 16:25:28.105205059 CET49740443192.168.2.4151.101.195.1
            Jan 15, 2025 16:25:28.105266094 CET44349740151.101.195.1192.168.2.4
            Jan 15, 2025 16:25:40.214740992 CET4972480192.168.2.42.22.50.144
            Jan 15, 2025 16:25:40.219918966 CET80497242.22.50.144192.168.2.4
            Jan 15, 2025 16:25:40.220082998 CET4972480192.168.2.42.22.50.144
            Jan 15, 2025 16:25:41.022119999 CET50595443192.168.2.4142.250.185.100
            Jan 15, 2025 16:25:41.022217035 CET44350595142.250.185.100192.168.2.4
            Jan 15, 2025 16:25:41.022326946 CET50595443192.168.2.4142.250.185.100
            Jan 15, 2025 16:25:41.022572041 CET50595443192.168.2.4142.250.185.100
            Jan 15, 2025 16:25:41.022599936 CET44350595142.250.185.100192.168.2.4
            Jan 15, 2025 16:25:41.665586948 CET44350595142.250.185.100192.168.2.4
            Jan 15, 2025 16:25:41.666121960 CET50595443192.168.2.4142.250.185.100
            Jan 15, 2025 16:25:41.666189909 CET44350595142.250.185.100192.168.2.4
            Jan 15, 2025 16:25:41.666686058 CET44350595142.250.185.100192.168.2.4
            Jan 15, 2025 16:25:41.667141914 CET50595443192.168.2.4142.250.185.100
            Jan 15, 2025 16:25:41.667233944 CET44350595142.250.185.100192.168.2.4
            Jan 15, 2025 16:25:41.715101004 CET50595443192.168.2.4142.250.185.100
            Jan 15, 2025 16:25:43.670030117 CET49740443192.168.2.4151.101.195.1
            Jan 15, 2025 16:25:43.670139074 CET44349740151.101.195.1192.168.2.4
            Jan 15, 2025 16:25:43.670203924 CET49740443192.168.2.4151.101.195.1
            Jan 15, 2025 16:25:51.565221071 CET44350595142.250.185.100192.168.2.4
            Jan 15, 2025 16:25:51.565304995 CET44350595142.250.185.100192.168.2.4
            Jan 15, 2025 16:25:51.565426111 CET50595443192.168.2.4142.250.185.100
            Jan 15, 2025 16:25:51.670348883 CET50595443192.168.2.4142.250.185.100
            Jan 15, 2025 16:25:51.670382977 CET44350595142.250.185.100192.168.2.4
            TimestampSource PortDest PortSource IPDest IP
            Jan 15, 2025 16:24:37.429001093 CET53521771.1.1.1192.168.2.4
            Jan 15, 2025 16:24:38.455439091 CET53590961.1.1.1192.168.2.4
            Jan 15, 2025 16:24:40.950757027 CET6055453192.168.2.41.1.1.1
            Jan 15, 2025 16:24:40.950917006 CET5252553192.168.2.41.1.1.1
            Jan 15, 2025 16:24:40.958092928 CET53605541.1.1.1192.168.2.4
            Jan 15, 2025 16:24:40.958467960 CET53525251.1.1.1192.168.2.4
            Jan 15, 2025 16:24:42.558545113 CET6116053192.168.2.41.1.1.1
            Jan 15, 2025 16:24:42.558732986 CET6101053192.168.2.41.1.1.1
            Jan 15, 2025 16:24:42.565949917 CET53611601.1.1.1192.168.2.4
            Jan 15, 2025 16:24:42.566211939 CET53610101.1.1.1192.168.2.4
            Jan 15, 2025 16:24:51.798096895 CET138138192.168.2.4192.168.2.255
            Jan 15, 2025 16:24:55.380707026 CET53599651.1.1.1192.168.2.4
            Jan 15, 2025 16:25:08.143021107 CET5364806162.159.36.2192.168.2.4
            Jan 15, 2025 16:25:08.614346027 CET6096553192.168.2.41.1.1.1
            Jan 15, 2025 16:25:08.621407032 CET53609651.1.1.1192.168.2.4
            Jan 15, 2025 16:25:41.013571024 CET5124353192.168.2.41.1.1.1
            Jan 15, 2025 16:25:41.020992041 CET53512431.1.1.1192.168.2.4
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Jan 15, 2025 16:24:40.950757027 CET192.168.2.41.1.1.10xf928Standard query (0)www.google.comA (IP address)IN (0x0001)false
            Jan 15, 2025 16:24:40.950917006 CET192.168.2.41.1.1.10xb85eStandard query (0)www.google.com65IN (0x0001)false
            Jan 15, 2025 16:24:42.558545113 CET192.168.2.41.1.1.10xc8a7Standard query (0)www.paypalobjects.comA (IP address)IN (0x0001)false
            Jan 15, 2025 16:24:42.558732986 CET192.168.2.41.1.1.10xdb2Standard query (0)www.paypalobjects.com65IN (0x0001)false
            Jan 15, 2025 16:25:08.614346027 CET192.168.2.41.1.1.10xb58bStandard query (0)198.187.3.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
            Jan 15, 2025 16:25:41.013571024 CET192.168.2.41.1.1.10xb3edStandard query (0)www.google.comA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Jan 15, 2025 16:24:40.958092928 CET1.1.1.1192.168.2.40xf928No error (0)www.google.com142.250.186.100A (IP address)IN (0x0001)false
            Jan 15, 2025 16:24:40.958467960 CET1.1.1.1192.168.2.40xb85eNo error (0)www.google.com65IN (0x0001)false
            Jan 15, 2025 16:24:42.565949917 CET1.1.1.1192.168.2.40xc8a7No error (0)www.paypalobjects.comppo.glb.paypal.comCNAME (Canonical name)IN (0x0001)false
            Jan 15, 2025 16:24:42.565949917 CET1.1.1.1192.168.2.40xc8a7No error (0)ppo.glb.paypal.compaypal-dynamic-cdn.map.fastly.netCNAME (Canonical name)IN (0x0001)false
            Jan 15, 2025 16:24:42.565949917 CET1.1.1.1192.168.2.40xc8a7No error (0)paypal-dynamic-cdn.map.fastly.net151.101.195.1A (IP address)IN (0x0001)false
            Jan 15, 2025 16:24:42.565949917 CET1.1.1.1192.168.2.40xc8a7No error (0)paypal-dynamic-cdn.map.fastly.net151.101.3.1A (IP address)IN (0x0001)false
            Jan 15, 2025 16:24:42.565949917 CET1.1.1.1192.168.2.40xc8a7No error (0)paypal-dynamic-cdn.map.fastly.net151.101.131.1A (IP address)IN (0x0001)false
            Jan 15, 2025 16:24:42.565949917 CET1.1.1.1192.168.2.40xc8a7No error (0)paypal-dynamic-cdn.map.fastly.net151.101.67.1A (IP address)IN (0x0001)false
            Jan 15, 2025 16:24:42.566211939 CET1.1.1.1192.168.2.40xdb2No error (0)www.paypalobjects.comppo.glb.paypal.comCNAME (Canonical name)IN (0x0001)false
            Jan 15, 2025 16:24:42.566211939 CET1.1.1.1192.168.2.40xdb2No error (0)ppo.glb.paypal.compaypal-dynamic-cdn.map.fastly.netCNAME (Canonical name)IN (0x0001)false
            Jan 15, 2025 16:25:08.621407032 CET1.1.1.1192.168.2.40xb58bName error (3)198.187.3.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
            Jan 15, 2025 16:25:41.020992041 CET1.1.1.1192.168.2.40xb3edNo error (0)www.google.com142.250.185.100A (IP address)IN (0x0001)false
            • www.paypalobjects.com
            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            0192.168.2.449739151.101.195.14435768C:\Program Files\Google\Chrome\Application\chrome.exe
            TimestampBytes transferredDirectionData
            2025-01-15 15:24:43 UTC760OUTGET /digitalassets/c/system-triggered-email/n/layout/fonts/SupremeLL/SupremeLLTestSubWeb-Medium.woff2 HTTP/1.1
            Host: www.paypalobjects.com
            Connection: keep-alive
            sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
            sec-ch-ua-mobile: ?0
            sec-ch-ua-platform: "Windows"
            Upgrade-Insecure-Requests: 1
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
            Sec-Fetch-Site: none
            Sec-Fetch-Mode: navigate
            Sec-Fetch-User: ?1
            Sec-Fetch-Dest: document
            Accept-Encoding: gzip, deflate, br
            Accept-Language: en-US,en;q=0.9
            2025-01-15 15:24:43 UTC823INHTTP/1.1 200 OK
            Connection: close
            Content-Length: 28319
            Cache-Control: s-maxage=31536000, public,max-age=3600
            Etag: "66ce19da-6e9f"
            Last-Modified: Tue, 27 Aug 2024 18:24:26 GMT
            Paypal-Debug-Id: 95df54a95b559
            Timing-Allow-Origin: https://www.paypal.com,https://www.sandbox.paypal.com
            Traceparent: 00-000000000000000000095df54a95b559-9dadd9ae7cf5577e-01
            DC: ccg11-origin-www-1.paypal.com
            Via: 1.1 varnish, 1.1 varnish
            Accept-Ranges: bytes
            Date: Wed, 15 Jan 2025 15:24:43 GMT
            X-Served-By: cache-dfw-kdal2120103-DFW, cache-nyc-kteb1890082-NYC
            X-Cache: HIT, HIT
            X-Cache-Hits: 157, 101
            X-Timer: S1736954683.087957,VS0,VE0
            Vary: Accept-Encoding, Accept-Encoding
            X-Content-Type-Options: nosniff
            ACCESS-CONTROL-ALLOW-ORIGIN: *
            CONTENT-TYPE: application/font-woff2
            Strict-Transport-Security: max-age=31557600
            2025-01-15 15:24:43 UTC1378INData Raw: 77 4f 46 32 00 01 00 00 00 00 6e 9f 00 0e 00 00 00 01 15 60 00 00 6b 5d 00 03 00 42 00 00 6b b8 00 00 02 e7 00 00 07 d8 00 00 00 00 00 00 00 00 1b 82 8b 32 1c 81 0a 06 60 00 84 34 11 08 0a 81 cb 34 81 a3 61 01 36 02 24 03 8f 74 0b 87 7c 00 04 20 05 99 32 07 99 3a 0c 07 1b 99 fc 29 50 73 ec 0f 54 f7 58 b1 55 ba c9 00 e0 4d 9d a2 eb 96 65 89 72 db a5 d0 73 4b 3c 4a 23 e1 14 1d a1 61 e3 00 e0 1b 4d 8d fe ff ff ff ff 05 49 43 e4 ca a5 e4 ae ed 5a db b6 01 78 78 46 1e 10 32 8a a9 c6 07 aa 86 42 7c f7 7d 20 11 de 02 ce 64 75 90 a7 7a c0 11 50 57 28 a4 30 7d 34 0a 4c 9d ce 61 16 eb 95 8d 3e c1 b3 c9 76 b5 25 c1 a9 3a d5 d6 e9 71 a0 42 63 c5 d9 49 54 10 53 15 1f ec 6a 4e e4 2c 34 a7 4a b8 60 66 9e da 20 ba da ab 5d 3a bd 9d 71 90 f5 23 95 58 bb d3 35 67 e6 41 75
            Data Ascii: wOF2n`k]Bk2`44a6$t| 2:)PsTXUMersK<J#aMICZxxF2B|} duzPW(0}4La>v%:qBcITSjN,4J`f ]:q#X5gAu
            2025-01-15 15:24:43 UTC1378INData Raw: 74 57 f5 5a 29 b5 94 d1 22 11 2a 00 3f 83 17 e6 2e 17 13 72 88 c8 c8 e6 86 71 04 d8 70 43 35 8b ca 8d 2c ae e7 33 0b 6e 92 23 11 42 88 a2 1e e6 6f 6c 4e f4 fb 6e 94 2d fd 67 09 8b 09 c1 18 61 84 11 42 08 61 42 ae bd 6b c5 ef fc fe 4b fa 32 fd 35 af 47 1b d1 22 22 4a 94 52 ca 51 4a cf ec 6e c4 42 39 0d c3 17 48 9d e6 8b 2f ca e7 0b 23 82 11 42 0c 8b 10 c2 be 8c 69 7f 2f 01 71 b7 25 f5 22 46 45 ea 1f 63 1c b6 69 dd 83 58 4c 0e a8 3d f7 b5 84 b2 63 b8 f5 cc ae 67 a9 bd a0 1d 71 20 b3 81 80 a2 20 48 29 7b 82 ef 34 91 26 c0 e0 df 1f 5b 21 60 dc a2 f5 30 91 20 48 a9 2b e3 df d9 13 ff 01 59 5c 40 16 f5 1a 05 6b 2d b3 1f 70 a6 fc d9 31 06 d0 00 12 4f 18 e2 e1 e1 44 05 f6 ca a4 35 a3 07 93 15 c7 52 13 17 a0 2c 93 18 cc 3c b6 fb c3 03 86 79 47 bc 47 75 23 ff 8b 3e
            Data Ascii: tWZ)"*?.rqpC5,3n#BolNn-gaBaBkK25G""JRQJnB9H/#Bi/q%"FEciXL=cgq H){4&[!`0 H+Y\@k-p1OD5R,<yGGu#>
            2025-01-15 15:24:43 UTC1378INData Raw: 54 3a e1 4e 02 4f 1c 2d bb 79 93 29 b2 cf 7c 6e 85 29 69 66 4b 0e f3 e8 05 e0 28 64 17 c3 25 60 a9 b5 0c 77 ac 33 d4 01 10 c2 5a e3 3d 7d cd 1f a5 4f 98 c8 7a 85 11 6c 42 42 5d f8 aa f8 68 27 8c ca 07 f1 a9 75 70 05 55 55 20 5f 41 4f dc b6 46 86 b1 23 da 63 21 3c a9 30 0b 14 bc 7e e8 49 91 a8 24 3d 85 ca 1c 95 af ad 05 d7 1c bf ec a8 6d 2a 75 d1 fa 58 97 1d 34 c4 96 0e af 54 5d 24 97 84 ec f8 ac 4c b7 dc ac 94 24 db ee e9 bb 45 35 51 91 16 73 82 16 71 34 0a f5 13 5c 19 33 5c fb fc 46 05 57 35 8d ce 60 b2 9c ce 6d 60 44 79 32 47 69 be a3 78 4a c8 95 f2 19 e2 e1 c4 b2 13 47 49 87 20 12 ee 81 55 6f 7a 89 f9 a5 d4 67 c2 80 11 1a 5a 6a 71 64 f3 e6 2c 70 6b 46 d6 66 d6 5c 5e 00 46 07 15 69 15 1a 9d c1 64 39 6d 74 4e 82 5c b6 51 23 aa 63 c0 e4 7a 94 66 20 1b b1
            Data Ascii: T:NO-y)|n)ifK(d%`w3Z=}OzlBB]h'upUU _AOF#c!<0~I$=m*uX4T]$L$E5Qsq4\3\FW5`m`Dy2GixJGI UozgZjqd,pkFf\^Fid9mtN\Q#czf
            2025-01-15 15:24:43 UTC1378INData Raw: e3 9f a0 8e 7a 0b 09 ab 6c 99 6e 0f 6c f3 ab 68 dc 06 fa ed 27 c8 62 ea 44 d3 b4 31 e4 27 83 9d 85 04 0a dd a8 5f c1 9e 03 db 6a a1 f7 30 55 20 99 bb 88 7c 9e 7b 94 26 6a 8f c1 12 88 36 07 50 90 b8 af 18 ac c7 fd 0c 42 ab 09 59 6e 2e 9a 3b cb 7a 90 e8 a3 3c dc df 38 1f 98 4f e5 df d1 7b 9e 98 6c 22 1c cf 4a 4a 50 76 82 29 11 9d a1 0c 6e 92 6c 3b 6d 13 42 44 20 df ad 83 f8 60 2c 65 8b 8b 34 87 7c 5e 87 72 5f 1c 41 7e fa 22 0a 73 5c 3d c2 6f a9 a3 e0 fe 6d 17 3c 1f fd 82 84 c5 18 f5 0a 4a 12 15 d7 c9 7a 9c 35 68 ae 0f 25 87 b8 8f 7f 82 9d 25 88 62 c8 ec 24 de 27 bd ee 6a d8 82 ea ca ea e9 41 de b7 2a df 6a d4 f7 6c 22 fc e9 17 65 12 d0 00 34 89 c6 e0 dd 16 1c 80 1e 33 17 91 53 e0 ab a9 47 35 40 41 e8 31 74 22 76 0e 14 26 c5 72 30 46 0a 21 c4 9b 44 15 4f 6b
            Data Ascii: zlnlh'bD1'_j0U |{&j6PBYn.;z<8O{l"JJPv)nl;mBD `,e4|^r_A~"s\=om<Jz5h%%b$'jA*jl"e43SG5@A1t"v&r0F!DOk
            2025-01-15 15:24:43 UTC1378INData Raw: 49 cc 83 f4 7b d6 ea 7a e4 9f b4 57 66 b7 30 ee 7c 6d 6b a3 52 16 9a b4 4d 3b b4 94 d5 c3 d0 63 96 63 5a 37 79 a1 a7 86 68 87 fc cb 75 b4 93 6b ac d5 fb 6d a3 24 3e 26 ad 4c 97 19 5b b8 57 cf c6 e4 f0 5a 6c ae cc 32 aa e2 d3 b7 b9 cb ac 35 d5 58 54 f5 2a 7b b2 b1 7a af a1 e8 54 18 5e c3 03 3d 8a 64 dd 7a 92 23 3d 2e 14 f1 35 18 2b f5 94 c8 92 46 96 a4 29 7a 84 78 19 53 99 ba 84 fa 4d 66 45 c6 97 37 df aa e0 4a d4 e9 90 27 dc 41 d5 d6 f5 24 3b 50 2c cd 0e f8 27 08 fb 7a a1 49 7b 88 04 99 f9 36 cb 42 25 0b 60 6c 15 c4 28 e0 2c ed b7 16 88 da 02 ce 47 28 81 ee 43 3b a4 b9 12 b8 1e 8a 25 15 6d 64 17 60 de f4 d5 43 54 0a 9c 65 43 5f 76 d6 58 64 e2 88 ec 5b 3e 59 2e 0d 1c ee 7e c4 33 4d 81 dd 8b 1d 48 73 9a ac f1 0e 5d bc 71 fc ee 6b 8f 9e 53 0a 5d 6e 23 1d dc
            Data Ascii: I{zWf0|mkRM;ccZ7yhukm$>&L[WZl25XT*{zT^=dz#=.5+F)zxSMfE7J'A$;P,'zI{6B%`l(,G(C;%md`CTeC_vXd[>Y.~3MHs]qkS]n#
            2025-01-15 15:24:43 UTC1378INData Raw: 88 2e 63 90 5e ce cc b1 04 87 50 c2 65 b5 fe 2e 03 5d 8c 19 5d 28 b4 80 2a 27 84 1d 60 d8 8d 78 5b 5c 08 10 3d 50 2c 20 70 c4 dc 01 71 05 8c cf 9a e9 04 5e 98 16 db d1 25 38 04 7d ba d8 04 5d 2d c3 28 b3 81 68 61 6b e4 a9 1d 04 38 5d 54 72 09 45 68 c9 98 d1 cc bc 0b ec 09 19 26 0d 18 34 d0 c1 00 02 36 38 90 04 17 52 c4 13 c6 b5 90 75 82 02 00 06 17 71 05 be c8 be 88 02 0d 12 1d 52 bd 01 10 14 44 33 57 9b 2c 2c ea 19 76 48 07 c4 fc 83 c2 2a 82 e3 8e 79 c0 18 2c c6 0e 2d 98 1b d9 f7 df 60 db 48 90 58 42 71 14 2b 0a 56 e0 21 cd 4d d9 02 13 54 b0 39 cb fa 02 db 1f 1b 90 e4 54 f2 8c 34 8f 6f bf 28 7b 4c dc 64 67 b3 c0 bc c1 58 f1 41 40 3a 68 0d 69 25 37 d7 92 7c b6 5b 62 4f 76 cf d5 d0 20 12 22 0c e0 8a 61 c5 40 db 77 f1 a9 eb 20 83 c2 1c 22 f2 d8 22 1c 61 9e
            Data Ascii: .c^Pe.]](*'`x[\=P, pq^%8}]-(hak8]TrEh&468RuqRD3W,,vH*y,-`HXBq+V!MT9T4o({LdgXA@:hi%7|[bOv "a@w ""a
            2025-01-15 15:24:43 UTC1378INData Raw: 9b 10 31 d9 a6 8c 9a f6 c9 10 1b a1 89 d0 19 ed aa 51 f3 ac 53 a2 3f e0 8f 48 72 a5 78 ed ae 51 0f ba 47 eb a1 e5 b7 8b 6c 2c 7f 93 c8 4b b6 59 ba 39 c1 39 aa 64 f5 ff 2f 26 36 ca ff 47 e0 df e9 52 8c 22 60 3b 68 3b a4 4a b2 44 51 2a 8e 6d 50 aa 71 a9 26 60 4c c2 98 92 6a 5a aa 04 8e 4f 70 c3 1e db 4b 90 ee 26 83 a0 ab b8 cd e3 66 c1 f8 91 20 9b 20 87 a0 24 0c 17 46 0a 86 07 e3 ae 54 0f a4 7a 24 b5 1d 72 ed ca c5 31 4c 63 62 4d 5c 6a 46 ac b9 4b 4a 01 8d 5e 8b 50 0e d6 0a 68 13 b5 d6 d6 9e ad 23 00 3c 29 b0 01 ba 06 f2 7c f6 05 06 01 28 6f 14 68 43 5b 6b 87 37 2b 0a 24 df ff 7e 72 90 63 f5 1b 42 b0 86 17 84 c1 ae a1 8f e0 c3 80 b7 c5 0f 81 6e 7d d5 2a ad 1d 6a 8f d1 91 a4 ab 5d 83 18 e3 f4 91 29 d3 66 cc 5a 64 49 8e 75 7c e2 84 ab e6 59 ee ba e7 c1 d1 23
            Data Ascii: 1QS?HrxQGl,KY99d/&6GR"`;h;JDQ*mPq&`LjZOpK&f $FTz$r1LcbM\jFKJ^Ph#<)|(ohC[k7+$~rcBn}*j])fZdIu|Y#
            2025-01-15 15:24:43 UTC1378INData Raw: 5d 1a 02 7c 27 e5 90 85 12 3a af a0 01 a6 75 d2 da c4 30 c1 ee 43 9c 04 1e 41 18 be 48 44 03 bd 73 97 42 ca 57 94 84 4f 6a 32 72 0a 4a aa a6 96 d3 d0 d2 d1 33 18 18 8e 22 02 7c 21 91 16 93 4b 48 c9 28 2a ab aa 0f 9b 42 e3 9d cb e9 19 99 db 95 cc 8d 3b 0f 0d 15 c3 91 89 de 2b 8e 48 22 25 23 d7 18 3e 56 31 e5 4e aa 33 f5 34 49 7b 4f 57 e9 3b 43 0e a7 1a 5f 6b 9b 72 e6 1a c7 d5 22 cb 5b 3e 48 7d 02 fa ae 9b 1f ec 57 bf b7 0d 88 a8 2d 81 48 22 53 a8 9d f6 20 ef 77 33 71 16 ac 6f 4b 47 fe 3c 4f 0b 00 12 28 b9 36 b3 da 21 18 5b b0 4e e0 a8 f0 86 10 b2 36 16 bf 07 68 b3 70 15 fe b9 04 12 c2 53 44 75 22 16 a8 dd d3 77 6c 61 e5 b1 b9 31 89 44 22 91 48 46 b7 41 c8 90 61 23 c3 51 43 d6 20 1b 2d 20 11 12 59 6e ca 4c 0e 35 0b 93 c2 83 40 a2 ca 09 71 c3 cb 2f 28 bc 1c
            Data Ascii: ]|':u0CAHDsBWOj2rJ3"|!KH(*B;+H"%#>V1N34I{OW;C_kr"[>H}W-H"S w3qoKG<O(6![N6hpSDu"wla1D"HFAa#QC - YnL5@q/(
            2025-01-15 15:24:43 UTC1378INData Raw: 75 cf 2b 71 6d f4 e1 79 67 df 44 44 47 12 42 30 c6 8b 35 c6 18 43 80 dd 1d 1b 83 90 70 a4 db 9e 53 d6 09 16 f2 ba 33 5f 06 83 c1 3d 3d a7 94 ba bd 22 22 a2 5e 77 66 5a 32 33 3d 4b cf 02 03 9b 15 c5 5d f4 9f 61 7e f2 73 ef 99 23 56 f2 25 11 28 8f 73 a3 0c 54 e5 39 a0 e4 24 05 d2 75 5e 03 3a 01 19 be 88 46 34 8c 8c 82 8a de 7a 95 f4 85 b1 62 86 25 ec 21 c7 38 ae 1a de 32 df 34 81 05 22 73 de bc d7 07 80 4f 6b f8 95 15 12 25 52 32 72 0a 4a aa a6 a6 d0 d0 d2 d1 33 18 18 8e 93 4d 18 36 c9 c8 c4 cc 52 56 b3 6c 8a 1d 0e 4e ae 77 22 37 cf 0f 9b 57 e2 56 3c e2 e5 e3 b7 d8 96 8c 5b b6 62 b5 ad 99 b3 91 c0 44 30 21 09 8b 88 b6 18 45 5c 42 52 4a 5a 46 36 5b 64 07 39 79 fb 0e 15 52 44 49 59 45 55 2d 75 34 de 89 80 bd 69 e0 55 2e 2b 49 d8 ec af 39 34 fb 1e 3b 71 36 3f
            Data Ascii: u+qmygDDGB05CpS3_==""^wfZ23=K]a~s#V%(sT9$u^:F4zb%!824"sOk%R2rJ3M6RVlNw"7WV<[bD0!E\BRJZF6[d9yRDIYEU-u4iU.+I94;q6?
            2025-01-15 15:24:43 UTC1378INData Raw: cd 04 38 3c 10 12 56 24 13 93 14 44 de 75 d7 d1 61 43 68 eb 39 00 08 21 04 8c 6a 0e be 06 dd ba 87 cc 51 4f 60 38 78 10 8d 34 85 da 3b 29 da bb dc f0 f0 f2 f1 0b 08 0a 09 8b 7c bd a8 97 62 68 71 3d ac 3f 52 69 be ac e5 87 34 05 23 c5 56 01 56 e4 b4 84 b0 d2 10 ab 81 ea 9e ec 39 cd e9 d4 2a b9 c2 4b 91 b6 97 3a 68 dd d2 d3 37 38 1d ea 61 7d 1c 6e 84 48 22 53 a8 5d c4 67 a3 26 df 66 d1 28 7d d9 22 2c 4c 4d 42 aa 5c 45 01 56 5b 05 de 58 1d 1f 1a 57 b7 88 01 06 04 23 ca 11 3d a5 9a c4 33 7c a4 9e 57 47 e6 65 0d e4 5e d1 28 c7 6b c2 14 4b cb ad 7b d5 a8 4c e1 1e 72 5a 80 79 b4 4a fa 36 f9 c8 c4 41 0d 9c ab 5f 9c 27 57 ca 95 71 e5 5c 05 57 09 1b ec 3f 6d f4 a7 60 a2 de de a2 b3 ed 1d ee 5d ee 3d ee fd d4 0f 73 74 b0 3f 1c 31 77 ff 73 7d 5c 3f 37 91 3c 59 a0 ab
            Data Ascii: 8<V$DuaCh9!jQO`8x4;)|bhq=?Ri4#VV9*K:h78a}nH"S]g&f(}",LMB\EV[XW#=3|WGe^(kK{LrZyJ6A_'Wq\W?m`]=st?1ws}\?7<Y


            Click to jump to process

            Click to jump to process

            Click to jump to process

            Target ID:0
            Start time:10:24:32
            Start date:15/01/2025
            Path:C:\Program Files\Google\Chrome\Application\chrome.exe
            Wow64 process (32bit):false
            Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
            Imagebase:0x7ff76e190000
            File size:3'242'272 bytes
            MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:false

            Target ID:2
            Start time:10:24:35
            Start date:15/01/2025
            Path:C:\Program Files\Google\Chrome\Application\chrome.exe
            Wow64 process (32bit):false
            Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 --field-trial-handle=2168,i,15104771224958868918,13712037630410875883,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
            Imagebase:0x7ff76e190000
            File size:3'242'272 bytes
            MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:false

            Target ID:3
            Start time:10:24:41
            Start date:15/01/2025
            Path:C:\Program Files\Google\Chrome\Application\chrome.exe
            Wow64 process (32bit):false
            Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.paypalobjects.com/digitalassets/c/system-triggered-email/n/layout/fonts/SupremeLL/SupremeLLTestSubWeb-Medium.woff2"
            Imagebase:0x7ff76e190000
            File size:3'242'272 bytes
            MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            Target ID:8
            Start time:10:25:54
            Start date:15/01/2025
            Path:C:\Windows\System32\OpenWith.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\OpenWith.exe -Embedding
            Imagebase:0x7ff7dac10000
            File size:123'984 bytes
            MD5 hash:E4A834784FA08C17D47A1E72429C5109
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            No disassembly