Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
oD2XngYscZ.ps1

Overview

General Information

Sample name:oD2XngYscZ.ps1
renamed because original name is a hash value
Original sample name:094436a8a6e5120a8978461a04256bbffbb429b630474efa3113edeeeb055e34.ps1
Analysis ID:1592088
MD5:d8026cb6087af29e380303d939ee8966
SHA1:5213f52e9084b1f4e17f945d1e4bfb52f4be8d2a
SHA256:094436a8a6e5120a8978461a04256bbffbb429b630474efa3113edeeeb055e34
Tags:185-147-124-40ps1user-JAMESWT_MHT
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
IP address seen in connection with other malware

Classification

  • System is w10x64
  • chrome.exe (PID: 432 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "C:\Users\user\Desktop\oD2XngYscZ.ps1" MD5: 5BBFA6CBDF4C254EB368D534F9E23C92)
    • chrome.exe (PID: 4548 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 --field-trial-handle=2220,i,3556486975470947455,17428567657091146547,262144 /prefetch:8 MD5: 5BBFA6CBDF4C254EB368D534F9E23C92)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: oD2XngYscZ.ps1Virustotal: Detection: 14%Perma Link
Source: oD2XngYscZ.ps1ReversingLabs: Detection: 34%
Source: Joe Sandbox ViewIP Address: 239.255.255.250 239.255.255.250
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
Source: unknownUDP traffic detected without corresponding DNS query: 104.40.149.189
Source: unknownUDP traffic detected without corresponding DNS query: 104.40.149.189
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: oD2XngYscZ.ps1, a1c73f1b-f6eb-4e09-8833-fd773e866729.tmp.0.drString found in binary or memory: http://www.protware.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49677 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49987 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49987
Source: classification engineClassification label: mal48.winPS1@26/2@2/5
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\Downloads\a1c73f1b-f6eb-4e09-8833-fd773e866729.tmpJump to behavior
Source: oD2XngYscZ.ps1Virustotal: Detection: 14%
Source: oD2XngYscZ.ps1ReversingLabs: Detection: 34%
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "C:\Users\user\Desktop\oD2XngYscZ.ps1"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 --field-trial-handle=2220,i,3556486975470947455,17428567657091146547,262144 /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 --field-trial-handle=2220,i,3556486975470947455,17428567657091146547,262144 /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath Interception1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
oD2XngYscZ.ps115%VirustotalBrowse
oD2XngYscZ.ps134%ReversingLabsDocument-HTML.Trojan.Cryxos
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
www.google.com
216.58.206.36
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.protware.comoD2XngYscZ.ps1, a1c73f1b-f6eb-4e09-8833-fd773e866729.tmp.0.drfalse
      high
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      239.255.255.250
      unknownReserved
      unknownunknownfalse
      216.58.206.36
      www.google.comUnited States
      15169GOOGLEUSfalse
      IP
      192.168.2.10
      192.168.2.8
      192.168.2.7
      Joe Sandbox version:42.0.0 Malachite
      Analysis ID:1592088
      Start date and time:2025-01-15 18:28:49 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 56s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:defaultwindowshtmlcookbook.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:16
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:oD2XngYscZ.ps1
      renamed because original name is a hash value
      Original Sample Name:094436a8a6e5120a8978461a04256bbffbb429b630474efa3113edeeeb055e34.ps1
      Detection:MAL
      Classification:mal48.winPS1@26/2@2/5
      EGA Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .ps1
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 142.250.186.163, 142.250.185.174, 64.233.184.84, 142.250.184.238, 142.250.185.238, 142.250.186.46, 142.250.185.234, 216.58.206.42, 172.217.18.10, 142.250.181.234, 142.250.184.202, 142.250.185.106, 142.250.185.202, 142.250.186.106, 142.250.186.170, 142.250.185.170, 142.250.186.138, 172.217.16.202, 172.217.23.106, 142.250.74.202, 172.217.16.138, 142.250.186.74, 217.20.57.19, 142.250.181.238, 142.250.186.78, 216.58.206.67, 142.250.185.206, 172.217.18.14, 216.58.206.78, 13.107.246.45, 2.23.242.162, 20.12.23.50
      • Excluded domains from analysis (whitelisted): clients1.google.com, fs.microsoft.com, accounts.google.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, clientservices.googleapis.com, time.windows.com, fe3cr.delivery.mp.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, redirector.gvt1.com, update.googleapis.com, clients.l.google.com, optimizationguide-pa.googleapis.com
      • Not all processes where analyzed, report is missing behavior information
      No simulations
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      239.255.255.250https://login.ecoleterradeasltd.xyz/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638725581254870614.NzQzNDkzODMtOTc3Ni00MTk4LWEyOTgtNzcxOTE2NjUxYzRiMGVmZDU5N2MtN2U3NC00YjUwLTkxMzUtNTE5MGUwYzg1ZmQ2&ui_locales=en-US&mkt=en-US&client-request-id=36d4a1f6-7cba-45d1-a3ed-df92000d1eff&state=HfQ7BQGkYjqSuhdp0uw1pmK7OnWuMWuL6CrtRUQFTAqayUvi4HK2WHpRg3qXyBpviEzEkkPrHxRuxUPhbVJ6VT_z1Q4rknsdO1I1G8I0vvmCJKY1Jj17UvvXfl7rwwbByhZiSjZv4e0zjm8vBEwSjLmzdF29N_NteyY8M7drEpkBEAgCB0EoFXswqlG9707goDIQqjTpA0BHvdohyO5aj-tJFO1J-Wz2owkKr6bkCNZlxKE53oI2XKYpyD1GEC2x5jHgmT1f4Yrr9BPkhEeMCw&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0Get hashmaliciousUnknownBrowse
        DEEZI80S.pdfGet hashmaliciousUnknownBrowse
          https://docs.google.com/drawings/d/1Fix-5JDCTM2QJpjq3c_NOGTxMuhYRiEX3wdVSCqQc9w/preview?FwaxQGet hashmaliciousUnknownBrowse
            firstontario.docxGet hashmaliciousUnknownBrowse
              https://solve.lzmb.org/awjsx.captcha?u=a85c9e46-f1ff-475f-b74c-c23cf236a082Get hashmaliciousUnknownBrowse
                https://solve.xfzz.org/awjsx.captcha?u=c56ed68e-fc67-4e24-b8ac-6adc700e0877%20#%20%E2%9C%85%20''I%20am%20not%20a%20robot%20-%20reCAPTCHA%20Verification%20ID:%203467''Get hashmaliciousUnknownBrowse
                  ACH REMITTANCE DOCUMENT 15.01.25.xlsbGet hashmaliciousUnknownBrowse
                    https://tinyurl.com/AmconconstructionGet hashmaliciousUnknownBrowse
                      Zohobooks Voip CaIIer left (4) voice message from +1 (___) ___-__92 [MSG ID-zNeaDpAKAIgeQjKGl].emlGet hashmaliciousHTMLPhisherBrowse
                        https://bluefiles.com/fr/reader/document/2c33782e98658214c7dff875dd234fc3b9b9a60915ac1685fe35abcc657c139dGet hashmaliciousUnknownBrowse
                          No context
                          No context
                          No context
                          No context
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):10574
                          Entropy (8bit):6.118977879902132
                          Encrypted:false
                          SSDEEP:192:+YgCO9mIZi27nqugiUjtN9ctngScWU8Z/TzmRaCZuXPCrtfOgKCPLQ6JvzzIykjV:+YdO9mvc0ietktgSbU6GaCZu6r7Egtg3
                          MD5:D8026CB6087AF29E380303D939EE8966
                          SHA1:5213F52E9084B1F4E17F945D1E4BFB52F4BE8D2A
                          SHA-256:094436A8A6E5120A8978461A04256BBFFBB429B630474EFA3113EDEEEB055E34
                          SHA-512:1FEC2082C255F8E9D7FD82025A26FCEFB45EECAD5CA63B1DB0B846253943E0EF605F80D7A689EB9199079531D7AC53F6DFD121A8D5885C22D048273E751FC81C
                          Malicious:false
                          Reputation:low
                          Preview:<html><head><meta http-equiv='x-ua-compatible' content='EmulateIE9'><META NAME='GENERATOR' Content='The source code of this page is encrypted with HTML Guardian, the world's standart for website protection. Visit http://www.protware.com for details'><meta http-equiv='expires' content=''><script>l1l=document.documentMode||document.all;var c6efa=true;ll1=document.layers;lll=window.sidebar;c6efa=(!(l1l&&ll1)&&!(!l1l&&!ll1&&!lll));l_ll=location+'';l11=navigator.userAgent.toLowerCase();function lI1(l1I){return l11.indexOf(l1I)>0?true:false};lII=lI1('kht')|lI1('per');c6efa|=lII;zLP=location.protocol+'0FD';uqVl1cnhIUm='m5J371xfBifu';</script><script>qiaFYEB=new Array();qiaFYEB[0]='oE\143%36\163R%33\166M%6B\102%31';tRFM1c4=new Array();tRFM1c4[0]='.<.!.D.O.C.T.Y.P.E. .h.t.m.l. .P.U.B.L.I.C. .".-././.W.3.C~..D.T.D. .X.H.T.M.L. .1...0. .T.r.a.n.s.i.t.i.o.n.a.l~..E.N."~.~\n.t.p.:~..w~B...w.3...o.r.g./.T.R./.x~\n~..1./~..D~N~P.l.1.-.t~-~/~1~3~5.l...d.t.d.".>.\r.\n.<~W. .x~.~/.=."~=~?~A~C~E~G~I./.1
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):10574
                          Entropy (8bit):6.118977879902132
                          Encrypted:false
                          SSDEEP:192:+YgCO9mIZi27nqugiUjtN9ctngScWU8Z/TzmRaCZuXPCrtfOgKCPLQ6JvzzIykjV:+YdO9mvc0ietktgSbU6GaCZu6r7Egtg3
                          MD5:D8026CB6087AF29E380303D939EE8966
                          SHA1:5213F52E9084B1F4E17F945D1E4BFB52F4BE8D2A
                          SHA-256:094436A8A6E5120A8978461A04256BBFFBB429B630474EFA3113EDEEEB055E34
                          SHA-512:1FEC2082C255F8E9D7FD82025A26FCEFB45EECAD5CA63B1DB0B846253943E0EF605F80D7A689EB9199079531D7AC53F6DFD121A8D5885C22D048273E751FC81C
                          Malicious:false
                          Reputation:low
                          Preview:<html><head><meta http-equiv='x-ua-compatible' content='EmulateIE9'><META NAME='GENERATOR' Content='The source code of this page is encrypted with HTML Guardian, the world's standart for website protection. Visit http://www.protware.com for details'><meta http-equiv='expires' content=''><script>l1l=document.documentMode||document.all;var c6efa=true;ll1=document.layers;lll=window.sidebar;c6efa=(!(l1l&&ll1)&&!(!l1l&&!ll1&&!lll));l_ll=location+'';l11=navigator.userAgent.toLowerCase();function lI1(l1I){return l11.indexOf(l1I)>0?true:false};lII=lI1('kht')|lI1('per');c6efa|=lII;zLP=location.protocol+'0FD';uqVl1cnhIUm='m5J371xfBifu';</script><script>qiaFYEB=new Array();qiaFYEB[0]='oE\143%36\163R%33\166M%6B\102%31';tRFM1c4=new Array();tRFM1c4[0]='.<.!.D.O.C.T.Y.P.E. .h.t.m.l. .P.U.B.L.I.C. .".-././.W.3.C~..D.T.D. .X.H.T.M.L. .1...0. .T.r.a.n.s.i.t.i.o.n.a.l~..E.N."~.~\n.t.p.:~..w~B...w.3...o.r.g./.T.R./.x~\n~..1./~..D~N~P.l.1.-.t~-~/~1~3~5.l...d.t.d.".>.\r.\n.<~W. .x~.~/.=."~=~?~A~C~E~G~I./.1
                          File type:data
                          Entropy (8bit):6.118977879902132
                          TrID:
                          • HyperText Markup Language (12001/1) 29.26%
                          • HyperText Markup Language (12001/1) 29.26%
                          • HyperText Markup Language (11001/1) 26.83%
                          • HyperText Markup Language (6006/1) 14.65%
                          File name:oD2XngYscZ.ps1
                          File size:10'574 bytes
                          MD5:d8026cb6087af29e380303d939ee8966
                          SHA1:5213f52e9084b1f4e17f945d1e4bfb52f4be8d2a
                          SHA256:094436a8a6e5120a8978461a04256bbffbb429b630474efa3113edeeeb055e34
                          SHA512:1fec2082c255f8e9d7fd82025a26fcefb45eecad5ca63b1db0b846253943e0ef605f80d7a689eb9199079531d7ac53f6dfd121a8d5885c22d048273e751fc81c
                          SSDEEP:192:+YgCO9mIZi27nqugiUjtN9ctngScWU8Z/TzmRaCZuXPCrtfOgKCPLQ6JvzzIykjV:+YdO9mvc0ietktgSbU6GaCZu6r7Egtg3
                          TLSH:04226D5A725B94699A4320F7D77E6F0F9221CEC1CEFF8154D048A68638BCB9B9B005A4
                          File Content Preview:<html><head><meta http-equiv='x-ua-compatible' content='EmulateIE9'><META NAME='GENERATOR' Content='The source code of this page is encrypted with HTML Guardian, the world's standart for website protection. Visit http://www.protware.com for details'><met
                          TimestampSource PortDest PortSource IPDest IP
                          Jan 15, 2025 18:29:39.504724979 CET49671443192.168.2.7204.79.197.203
                          Jan 15, 2025 18:29:41.582726002 CET49675443192.168.2.7104.98.116.138
                          Jan 15, 2025 18:29:41.583255053 CET49674443192.168.2.7104.98.116.138
                          Jan 15, 2025 18:29:41.754693985 CET49672443192.168.2.7104.98.116.138
                          Jan 15, 2025 18:29:41.910902977 CET49671443192.168.2.7204.79.197.203
                          Jan 15, 2025 18:29:46.241533995 CET49677443192.168.2.720.50.201.200
                          Jan 15, 2025 18:29:46.629591942 CET49677443192.168.2.720.50.201.200
                          Jan 15, 2025 18:29:46.832726002 CET49671443192.168.2.7204.79.197.203
                          Jan 15, 2025 18:29:47.426584959 CET49677443192.168.2.720.50.201.200
                          Jan 15, 2025 18:29:48.926471949 CET49677443192.168.2.720.50.201.200
                          Jan 15, 2025 18:29:51.219521999 CET49674443192.168.2.7104.98.116.138
                          Jan 15, 2025 18:29:51.220235109 CET49675443192.168.2.7104.98.116.138
                          Jan 15, 2025 18:29:51.520883083 CET49672443192.168.2.7104.98.116.138
                          Jan 15, 2025 18:29:51.917725086 CET49677443192.168.2.720.50.201.200
                          Jan 15, 2025 18:29:53.814147949 CET44349698104.98.116.138192.168.2.7
                          Jan 15, 2025 18:29:53.814249039 CET49698443192.168.2.7104.98.116.138
                          Jan 15, 2025 18:29:54.779122114 CET49707443192.168.2.7216.58.206.36
                          Jan 15, 2025 18:29:54.779155970 CET44349707216.58.206.36192.168.2.7
                          Jan 15, 2025 18:29:54.779227018 CET49707443192.168.2.7216.58.206.36
                          Jan 15, 2025 18:29:54.780241966 CET49707443192.168.2.7216.58.206.36
                          Jan 15, 2025 18:29:54.780251980 CET44349707216.58.206.36192.168.2.7
                          Jan 15, 2025 18:29:55.426605940 CET44349707216.58.206.36192.168.2.7
                          Jan 15, 2025 18:29:55.427079916 CET49707443192.168.2.7216.58.206.36
                          Jan 15, 2025 18:29:55.427103043 CET44349707216.58.206.36192.168.2.7
                          Jan 15, 2025 18:29:55.428138971 CET44349707216.58.206.36192.168.2.7
                          Jan 15, 2025 18:29:55.428208113 CET49707443192.168.2.7216.58.206.36
                          Jan 15, 2025 18:29:55.437830925 CET49707443192.168.2.7216.58.206.36
                          Jan 15, 2025 18:29:55.437998056 CET44349707216.58.206.36192.168.2.7
                          Jan 15, 2025 18:29:55.488604069 CET49707443192.168.2.7216.58.206.36
                          Jan 15, 2025 18:29:55.488620996 CET44349707216.58.206.36192.168.2.7
                          Jan 15, 2025 18:29:55.535438061 CET49707443192.168.2.7216.58.206.36
                          Jan 15, 2025 18:29:56.445339918 CET49671443192.168.2.7204.79.197.203
                          Jan 15, 2025 18:29:57.881711006 CET49677443192.168.2.720.50.201.200
                          Jan 15, 2025 18:30:02.230480909 CET49698443192.168.2.7104.98.116.138
                          Jan 15, 2025 18:30:02.231345892 CET49755443192.168.2.7104.98.116.138
                          Jan 15, 2025 18:30:02.231380939 CET44349755104.98.116.138192.168.2.7
                          Jan 15, 2025 18:30:02.231599092 CET49755443192.168.2.7104.98.116.138
                          Jan 15, 2025 18:30:02.232062101 CET49755443192.168.2.7104.98.116.138
                          Jan 15, 2025 18:30:02.232079983 CET44349755104.98.116.138192.168.2.7
                          Jan 15, 2025 18:30:02.235336065 CET44349698104.98.116.138192.168.2.7
                          Jan 15, 2025 18:30:05.327667952 CET44349707216.58.206.36192.168.2.7
                          Jan 15, 2025 18:30:05.327733994 CET44349707216.58.206.36192.168.2.7
                          Jan 15, 2025 18:30:05.327850103 CET49707443192.168.2.7216.58.206.36
                          Jan 15, 2025 18:30:05.663012028 CET49707443192.168.2.7216.58.206.36
                          Jan 15, 2025 18:30:05.663055897 CET44349707216.58.206.36192.168.2.7
                          Jan 15, 2025 18:30:09.786231041 CET49677443192.168.2.720.50.201.200
                          Jan 15, 2025 18:30:44.967932940 CET44349755104.98.116.138192.168.2.7
                          Jan 15, 2025 18:30:44.968074083 CET49755443192.168.2.7104.98.116.138
                          Jan 15, 2025 18:30:54.849982023 CET49987443192.168.2.7216.58.206.36
                          Jan 15, 2025 18:30:54.850030899 CET44349987216.58.206.36192.168.2.7
                          Jan 15, 2025 18:30:54.850099087 CET49987443192.168.2.7216.58.206.36
                          Jan 15, 2025 18:30:54.850354910 CET49987443192.168.2.7216.58.206.36
                          Jan 15, 2025 18:30:54.850369930 CET44349987216.58.206.36192.168.2.7
                          Jan 15, 2025 18:30:55.499277115 CET44349987216.58.206.36192.168.2.7
                          Jan 15, 2025 18:30:55.503360987 CET49987443192.168.2.7216.58.206.36
                          Jan 15, 2025 18:30:55.503375053 CET44349987216.58.206.36192.168.2.7
                          Jan 15, 2025 18:30:55.503731966 CET44349987216.58.206.36192.168.2.7
                          Jan 15, 2025 18:30:55.506954908 CET49987443192.168.2.7216.58.206.36
                          Jan 15, 2025 18:30:55.507040024 CET44349987216.58.206.36192.168.2.7
                          Jan 15, 2025 18:30:55.551168919 CET49987443192.168.2.7216.58.206.36
                          Jan 15, 2025 18:31:05.406543016 CET44349987216.58.206.36192.168.2.7
                          Jan 15, 2025 18:31:05.406622887 CET44349987216.58.206.36192.168.2.7
                          Jan 15, 2025 18:31:05.406702995 CET49987443192.168.2.7216.58.206.36
                          Jan 15, 2025 18:31:05.665044069 CET49987443192.168.2.7216.58.206.36
                          Jan 15, 2025 18:31:05.665071011 CET44349987216.58.206.36192.168.2.7
                          TimestampSource PortDest PortSource IPDest IP
                          Jan 15, 2025 18:29:50.622065067 CET53495911.1.1.1192.168.2.7
                          Jan 15, 2025 18:29:50.702019930 CET53592471.1.1.1192.168.2.7
                          Jan 15, 2025 18:29:51.273104906 CET123123192.168.2.7104.40.149.189
                          Jan 15, 2025 18:29:51.742033005 CET53652031.1.1.1192.168.2.7
                          Jan 15, 2025 18:29:51.843772888 CET123123104.40.149.189192.168.2.7
                          Jan 15, 2025 18:29:52.819421053 CET123123192.168.2.7104.40.149.189
                          Jan 15, 2025 18:29:53.004535913 CET123123104.40.149.189192.168.2.7
                          Jan 15, 2025 18:29:54.771193027 CET6031653192.168.2.71.1.1.1
                          Jan 15, 2025 18:29:54.771193027 CET5073153192.168.2.71.1.1.1
                          Jan 15, 2025 18:29:54.778008938 CET53603161.1.1.1192.168.2.7
                          Jan 15, 2025 18:29:54.778023005 CET53507311.1.1.1192.168.2.7
                          Jan 15, 2025 18:30:02.139147043 CET53600991.1.1.1192.168.2.7
                          Jan 15, 2025 18:30:08.794161081 CET53507231.1.1.1192.168.2.7
                          Jan 15, 2025 18:30:27.672080994 CET53580631.1.1.1192.168.2.7
                          Jan 15, 2025 18:30:46.416189909 CET138138192.168.2.7192.168.2.255
                          Jan 15, 2025 18:30:50.119900942 CET53574781.1.1.1192.168.2.7
                          Jan 15, 2025 18:30:50.419337988 CET53526501.1.1.1192.168.2.7
                          Jan 15, 2025 18:31:20.998898983 CET53512651.1.1.1192.168.2.7
                          Jan 15, 2025 18:32:05.095105886 CET53631391.1.1.1192.168.2.7
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Jan 15, 2025 18:29:54.771193027 CET192.168.2.71.1.1.10x1362Standard query (0)www.google.comA (IP address)IN (0x0001)false
                          Jan 15, 2025 18:29:54.771193027 CET192.168.2.71.1.1.10xb412Standard query (0)www.google.com65IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Jan 15, 2025 18:29:54.778008938 CET1.1.1.1192.168.2.70x1362No error (0)www.google.com216.58.206.36A (IP address)IN (0x0001)false
                          Jan 15, 2025 18:29:54.778023005 CET1.1.1.1192.168.2.70xb412No error (0)www.google.com65IN (0x0001)false

                          Click to jump to process

                          Click to jump to process

                          Click to jump to process

                          Target ID:0
                          Start time:12:29:42
                          Start date:15/01/2025
                          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "C:\Users\user\Desktop\oD2XngYscZ.ps1"
                          Imagebase:0x7ff6c4390000
                          File size:3'242'272 bytes
                          MD5 hash:5BBFA6CBDF4C254EB368D534F9E23C92
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:false

                          Target ID:4
                          Start time:12:29:48
                          Start date:15/01/2025
                          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 --field-trial-handle=2220,i,3556486975470947455,17428567657091146547,262144 /prefetch:8
                          Imagebase:0x7ff6c4390000
                          File size:3'242'272 bytes
                          MD5 hash:5BBFA6CBDF4C254EB368D534F9E23C92
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:false

                          No disassembly