Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://amzaon.co.hzxpel.com/660ebca95ab13

Overview

General Information

Sample URL:https://amzaon.co.hzxpel.com/660ebca95ab13
Analysis ID:1433032
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Stores files to the Windows start menu directory
Uses insecure TLS / SSL version for HTTPS connection

Classification

  • System is w10x64
  • chrome.exe (PID: 5840 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6460 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1200 --field-trial-handle=1864,i,7070079213059840236,10822540049510035426,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 1412 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://amzaon.co.hzxpel.com/660ebca95ab13" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: https://amzaon.co.hzxpel.com/660ebca95ab13Avira URL Cloud: detection malicious, Label: phishing
Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49730 version: TLS 1.0
Source: unknownHTTPS traffic detected: 23.196.50.101:443 -> 192.168.2.5:49718 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.196.50.101:443 -> 192.168.2.5:49724 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49730 version: TLS 1.0
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.196.50.101
Source: unknownTCP traffic detected without corresponding DNS query: 23.196.50.101
Source: unknownTCP traffic detected without corresponding DNS query: 23.196.50.101
Source: unknownTCP traffic detected without corresponding DNS query: 23.196.50.101
Source: unknownTCP traffic detected without corresponding DNS query: 23.196.50.101
Source: unknownTCP traffic detected without corresponding DNS query: 23.196.50.101
Source: unknownTCP traffic detected without corresponding DNS query: 23.196.50.101
Source: unknownTCP traffic detected without corresponding DNS query: 23.196.50.101
Source: unknownTCP traffic detected without corresponding DNS query: 23.196.50.101
Source: unknownTCP traffic detected without corresponding DNS query: 23.196.50.101
Source: unknownTCP traffic detected without corresponding DNS query: 23.196.50.101
Source: unknownTCP traffic detected without corresponding DNS query: 23.196.50.101
Source: unknownTCP traffic detected without corresponding DNS query: 23.196.50.101
Source: unknownTCP traffic detected without corresponding DNS query: 23.196.50.101
Source: unknownTCP traffic detected without corresponding DNS query: 23.196.50.101
Source: unknownTCP traffic detected without corresponding DNS query: 23.196.50.101
Source: unknownTCP traffic detected without corresponding DNS query: 23.196.50.101
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /660ebca95ab13 HTTP/1.1Host: amzaon.co.hzxpel.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
Source: global trafficDNS traffic detected: DNS query: amzaon.co.hzxpel.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownHTTPS traffic detected: 23.196.50.101:443 -> 192.168.2.5:49718 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.196.50.101:443 -> 192.168.2.5:49724 version: TLS 1.2
Source: classification engineClassification label: mal48.win@20/6@4/5
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1200 --field-trial-handle=1864,i,7070079213059840236,10822540049510035426,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://amzaon.co.hzxpel.com/660ebca95ab13"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1200 --field-trial-handle=1864,i,7070079213059840236,10822540049510035426,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Google Drive.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://amzaon.co.hzxpel.com/660ebca95ab13100%Avira URL Cloudphishing
https://amzaon.co.hzxpel.com/660ebca95ab134%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
bg.microsoft.map.fastly.net0%VirustotalBrowse
amzaon.co.hzxpel.com0%VirustotalBrowse
windowsupdatebg.s.llnwi.net0%VirustotalBrowse
edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com0%VirustotalBrowse
fp2e7a.wpc.phicdn.net0%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.210.172
truefalseunknown
edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
217.20.53.34
truefalseunknown
www.google.com
142.250.191.132
truefalse
    high
    amzaon.co.hzxpel.com
    43.130.244.80
    truefalseunknown
    fp2e7a.wpc.phicdn.net
    192.229.211.108
    truefalseunknown
    windowsupdatebg.s.llnwi.net
    208.111.186.128
    truefalseunknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    239.255.255.250
    unknownReserved
    unknownunknownfalse
    43.130.244.80
    amzaon.co.hzxpel.comJapan4249LILLY-ASUSfalse
    142.250.191.132
    www.google.comUnited States
    15169GOOGLEUSfalse
    IP
    127.0.0.1
    192.168.2.5
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1433032
    Start date and time:2024-04-29 01:00:19 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 3m 6s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:browseurl.jbs
    Sample URL:https://amzaon.co.hzxpel.com/660ebca95ab13
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:7
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal48.win@20/6@4/5
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 172.217.1.99, 142.251.4.84, 142.250.190.14, 34.104.35.123, 20.114.59.183, 23.48.99.89, 192.229.211.108, 199.232.210.172, 20.242.39.171, 20.166.126.56, 142.250.190.3, 23.54.78.164, 23.54.78.157
    • Excluded domains from analysis (whitelisted): fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, clientservices.googleapis.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu-bg-shim.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net, fe3.delivery.mp.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, ocsp.digicert.com, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, update.googleapis.com, clients.l.google.com, glb.sls.prod.dcat.dsp.trafficmanager.net
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtSetInformationFile calls found.
    No simulations
    No context
    No context
    No context
    No context
    No context
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Apr 28 22:01:12 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
    Category:dropped
    Size (bytes):2677
    Entropy (8bit):3.9862372217991857
    Encrypted:false
    SSDEEP:48:8vd5Thjt22HiidAKZdA19ehwiZUklqehSy+3:8vPo1y
    MD5:F52D5CD02DCBEB3F6E0AD7C98C8B18C8
    SHA1:E1FC57C7603633D18CF64515BAE80A103AA2B220
    SHA-256:77CABA404B694FB7B3D5EE9F5FEED4D5E2F9EE7F10E9A194606DB2991D697274
    SHA-512:5B470F2145BF11194A60F879F6F6CA912F606EDA46895BCCF42ADBA4A8F6730E3C6448847DD2EE14D8F9A1FAFB2750C439A95DC58EAA2D1A012DF310FA408A1D
    Malicious:false
    Reputation:low
    Preview:L..................F.@.. ...$+.,............N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X".....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X".....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X".....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X"............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X&............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Apr 28 22:01:12 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
    Category:dropped
    Size (bytes):2679
    Entropy (8bit):4.0017539905612125
    Encrypted:false
    SSDEEP:48:8ud5Thjt22HiidAKZdA1weh/iZUkAQkqehly+2:8oPi9Q4y
    MD5:5E3BFD0CA3B39BD664B845E310C61D06
    SHA1:63DB6F84762B5F93B5170E20B042D0965E7E4017
    SHA-256:EE1F076C34B21B3A3DE64535484FDD886B0F2BFFD18548906D5249E1B9153E55
    SHA-512:BD84B0B1920EE07896D1F68A995DC0740A7532D1A99DE7E8930EC94452C443863B510683D057AB785384A2F3CD995B4372AD80FD218B8FD1FEA2E81F59E557FD
    Malicious:false
    Reputation:low
    Preview:L..................F.@.. ...$+.,............N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X".....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X".....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X".....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X"............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X&............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
    Category:dropped
    Size (bytes):2693
    Entropy (8bit):4.010080000611881
    Encrypted:false
    SSDEEP:48:8xad5ThjtsHiidAKZdA14tseh7sFiZUkmgqeh7sry+BX:8xMP7npy
    MD5:34992DE233FF2526758CA33C6CFB7919
    SHA1:DC381BA024457E480E38BECFF7AA57AFE4488204
    SHA-256:32B31D5B27C0C1D74DD3EE2CE743D5896BA6B5564F63789B9A8A2CCBEC15968A
    SHA-512:4A5C644227748497D195CDB4CA1BFBE9351CE607F1996FE8343868E7A3F0F397B99549DFECFB8BF80C90344AFA463B3C9D5480A92DDF6D6901E8C33E930EBE0D
    Malicious:false
    Reputation:low
    Preview:L..................F.@.. ...$+.,......e>....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X".....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X".....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X".....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X"............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VDW.n...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Apr 28 22:01:12 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
    Category:dropped
    Size (bytes):2681
    Entropy (8bit):4.001142041966242
    Encrypted:false
    SSDEEP:48:8sd5Thjt22HiidAKZdA1vehDiZUkwqehRy+R:8aPpTy
    MD5:CFF3353524D4AE6C7109706AA96C776F
    SHA1:CE8FD6B8A2D84B25853AE7B76960C5E230BF9787
    SHA-256:732A0E973BF51424529FD956E42560917BDBEF2D9A8C16D5A9A595A468A3F8BB
    SHA-512:5CD30E02FF4AA04E719F031A8CD5F699283CD0C566D063655AD3CB1A3918E1337AF83B15566CEC0B14029F58B7A764631E79841AC38AD2803C66AB1DD84234D9
    Malicious:false
    Reputation:low
    Preview:L..................F.@.. ...$+.,............N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X".....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X".....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X".....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X"............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X&............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Apr 28 22:01:12 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
    Category:dropped
    Size (bytes):2681
    Entropy (8bit):3.990457948929145
    Encrypted:false
    SSDEEP:48:8Jd5Thjt22HiidAKZdA1hehBiZUk1W1qehfy+C:89PZ9/y
    MD5:71A4BEDF72065087CC2A42AFEC58E12C
    SHA1:32E582210F9C5116C312E9F09BD42D52A1EC4D69
    SHA-256:F2DC80C1171D5E22248B333DA3096DE557C5552613A45FD241EBAE120FBFFC57
    SHA-512:165FF18F175DA811237B2B462C63B28F3481174A7FBE6E600ADE854C3612BB94D0AAF0A2921C9106A1AAE2C4BD345B233352ADE9E96DEE02502F032D0CA76E2A
    Malicious:false
    Reputation:low
    Preview:L..................F.@.. ...$+.,............N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X".....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X".....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X".....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X"............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X&............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Apr 28 22:01:11 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
    Category:dropped
    Size (bytes):2683
    Entropy (8bit):4.0017683900282615
    Encrypted:false
    SSDEEP:48:8jd5Thjt22HiidAKZdA1duT+ehOuTbbiZUk5OjqehOuTbpy+yT+:87PlT/TbxWOvTbpy7T
    MD5:1AE076071A668D8FFEC4183DE91904BC
    SHA1:83A2A2335642D2A36C96479BD1245925B8C7BF5F
    SHA-256:F8E5EA3D0D01165D51BAEF3C72B494A5A3AD0A34BC90C1F97BBAA21894D3FFCC
    SHA-512:4D3233ECDB081BF76E24276F986BFE6AB6347FCD56B70ACA6B7F5F27D55C3F56B9F4E806954D5BD1269D3E9DEB28FC790680B64B9837AD6794E496855931C144
    Malicious:false
    Reputation:low
    Preview:L..................F.@.. ...$+.,...........N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X".....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X".....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X".....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X"............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X&............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
    No static file info
    TimestampSource PortDest PortSource IPDest IP
    Apr 29, 2024 01:01:03.077729940 CEST49674443192.168.2.523.1.237.91
    Apr 29, 2024 01:01:03.077817917 CEST49675443192.168.2.523.1.237.91
    Apr 29, 2024 01:01:03.187134027 CEST49673443192.168.2.523.1.237.91
    Apr 29, 2024 01:01:12.678286076 CEST49674443192.168.2.523.1.237.91
    Apr 29, 2024 01:01:12.697504044 CEST49675443192.168.2.523.1.237.91
    Apr 29, 2024 01:01:12.704708099 CEST49710443192.168.2.543.130.244.80
    Apr 29, 2024 01:01:12.704790115 CEST4434971043.130.244.80192.168.2.5
    Apr 29, 2024 01:01:12.704885960 CEST49710443192.168.2.543.130.244.80
    Apr 29, 2024 01:01:12.705405951 CEST49711443192.168.2.543.130.244.80
    Apr 29, 2024 01:01:12.705456972 CEST4434971143.130.244.80192.168.2.5
    Apr 29, 2024 01:01:12.705519915 CEST49711443192.168.2.543.130.244.80
    Apr 29, 2024 01:01:12.705769062 CEST49710443192.168.2.543.130.244.80
    Apr 29, 2024 01:01:12.705805063 CEST4434971043.130.244.80192.168.2.5
    Apr 29, 2024 01:01:12.706078053 CEST49711443192.168.2.543.130.244.80
    Apr 29, 2024 01:01:12.706096888 CEST4434971143.130.244.80192.168.2.5
    Apr 29, 2024 01:01:12.799916983 CEST49673443192.168.2.523.1.237.91
    Apr 29, 2024 01:01:13.230153084 CEST4434971043.130.244.80192.168.2.5
    Apr 29, 2024 01:01:13.230603933 CEST49710443192.168.2.543.130.244.80
    Apr 29, 2024 01:01:13.230653048 CEST4434971043.130.244.80192.168.2.5
    Apr 29, 2024 01:01:13.231678963 CEST4434971043.130.244.80192.168.2.5
    Apr 29, 2024 01:01:13.231760025 CEST49710443192.168.2.543.130.244.80
    Apr 29, 2024 01:01:13.232899904 CEST49710443192.168.2.543.130.244.80
    Apr 29, 2024 01:01:13.232966900 CEST4434971043.130.244.80192.168.2.5
    Apr 29, 2024 01:01:13.233263969 CEST49710443192.168.2.543.130.244.80
    Apr 29, 2024 01:01:13.233278990 CEST4434971043.130.244.80192.168.2.5
    Apr 29, 2024 01:01:13.242863894 CEST4434971143.130.244.80192.168.2.5
    Apr 29, 2024 01:01:13.243066072 CEST49711443192.168.2.543.130.244.80
    Apr 29, 2024 01:01:13.243103027 CEST4434971143.130.244.80192.168.2.5
    Apr 29, 2024 01:01:13.244661093 CEST4434971143.130.244.80192.168.2.5
    Apr 29, 2024 01:01:13.244755030 CEST49711443192.168.2.543.130.244.80
    Apr 29, 2024 01:01:13.245884895 CEST49711443192.168.2.543.130.244.80
    Apr 29, 2024 01:01:13.245968103 CEST4434971143.130.244.80192.168.2.5
    Apr 29, 2024 01:01:13.287787914 CEST49710443192.168.2.543.130.244.80
    Apr 29, 2024 01:01:13.394248009 CEST49711443192.168.2.543.130.244.80
    Apr 29, 2024 01:01:13.394278049 CEST4434971143.130.244.80192.168.2.5
    Apr 29, 2024 01:01:13.598305941 CEST49711443192.168.2.543.130.244.80
    Apr 29, 2024 01:01:13.869373083 CEST49713443192.168.2.5142.250.191.132
    Apr 29, 2024 01:01:13.869471073 CEST44349713142.250.191.132192.168.2.5
    Apr 29, 2024 01:01:13.869566917 CEST49713443192.168.2.5142.250.191.132
    Apr 29, 2024 01:01:13.869916916 CEST49713443192.168.2.5142.250.191.132
    Apr 29, 2024 01:01:13.869959116 CEST44349713142.250.191.132192.168.2.5
    Apr 29, 2024 01:01:14.001221895 CEST4434971043.130.244.80192.168.2.5
    Apr 29, 2024 01:01:14.001307011 CEST4434971043.130.244.80192.168.2.5
    Apr 29, 2024 01:01:14.001360893 CEST49710443192.168.2.543.130.244.80
    Apr 29, 2024 01:01:14.004405022 CEST49710443192.168.2.543.130.244.80
    Apr 29, 2024 01:01:14.004417896 CEST4434971043.130.244.80192.168.2.5
    Apr 29, 2024 01:01:14.106822014 CEST44349713142.250.191.132192.168.2.5
    Apr 29, 2024 01:01:14.107234001 CEST49713443192.168.2.5142.250.191.132
    Apr 29, 2024 01:01:14.107259035 CEST44349713142.250.191.132192.168.2.5
    Apr 29, 2024 01:01:14.108164072 CEST44349713142.250.191.132192.168.2.5
    Apr 29, 2024 01:01:14.108228922 CEST49713443192.168.2.5142.250.191.132
    Apr 29, 2024 01:01:14.154799938 CEST4434970323.1.237.91192.168.2.5
    Apr 29, 2024 01:01:14.155034065 CEST49703443192.168.2.523.1.237.91
    Apr 29, 2024 01:01:14.519860029 CEST49713443192.168.2.5142.250.191.132
    Apr 29, 2024 01:01:14.520077944 CEST44349713142.250.191.132192.168.2.5
    Apr 29, 2024 01:01:14.691701889 CEST49713443192.168.2.5142.250.191.132
    Apr 29, 2024 01:01:14.691735983 CEST44349713142.250.191.132192.168.2.5
    Apr 29, 2024 01:01:14.801484108 CEST49713443192.168.2.5142.250.191.132
    Apr 29, 2024 01:01:17.629669905 CEST49718443192.168.2.523.196.50.101
    Apr 29, 2024 01:01:17.629702091 CEST4434971823.196.50.101192.168.2.5
    Apr 29, 2024 01:01:17.629760981 CEST49718443192.168.2.523.196.50.101
    Apr 29, 2024 01:01:17.631346941 CEST49718443192.168.2.523.196.50.101
    Apr 29, 2024 01:01:17.631360054 CEST4434971823.196.50.101192.168.2.5
    Apr 29, 2024 01:01:17.862183094 CEST4434971823.196.50.101192.168.2.5
    Apr 29, 2024 01:01:17.862299919 CEST49718443192.168.2.523.196.50.101
    Apr 29, 2024 01:01:17.972481966 CEST49718443192.168.2.523.196.50.101
    Apr 29, 2024 01:01:17.972496986 CEST4434971823.196.50.101192.168.2.5
    Apr 29, 2024 01:01:17.972789049 CEST4434971823.196.50.101192.168.2.5
    Apr 29, 2024 01:01:18.016823053 CEST49718443192.168.2.523.196.50.101
    Apr 29, 2024 01:01:18.064116955 CEST4434971823.196.50.101192.168.2.5
    Apr 29, 2024 01:01:18.128051043 CEST4434971823.196.50.101192.168.2.5
    Apr 29, 2024 01:01:18.128151894 CEST4434971823.196.50.101192.168.2.5
    Apr 29, 2024 01:01:18.128233910 CEST49718443192.168.2.523.196.50.101
    Apr 29, 2024 01:01:21.211172104 CEST49718443192.168.2.523.196.50.101
    Apr 29, 2024 01:01:21.211208105 CEST4434971823.196.50.101192.168.2.5
    Apr 29, 2024 01:01:21.211222887 CEST49718443192.168.2.523.196.50.101
    Apr 29, 2024 01:01:21.211230040 CEST4434971823.196.50.101192.168.2.5
    Apr 29, 2024 01:01:21.639985085 CEST49724443192.168.2.523.196.50.101
    Apr 29, 2024 01:01:21.640075922 CEST4434972423.196.50.101192.168.2.5
    Apr 29, 2024 01:01:21.640227079 CEST49724443192.168.2.523.196.50.101
    Apr 29, 2024 01:01:21.643497944 CEST49724443192.168.2.523.196.50.101
    Apr 29, 2024 01:01:21.643543959 CEST4434972423.196.50.101192.168.2.5
    Apr 29, 2024 01:01:21.876781940 CEST4434972423.196.50.101192.168.2.5
    Apr 29, 2024 01:01:21.876876116 CEST49724443192.168.2.523.196.50.101
    Apr 29, 2024 01:01:21.880590916 CEST49724443192.168.2.523.196.50.101
    Apr 29, 2024 01:01:21.880616903 CEST4434972423.196.50.101192.168.2.5
    Apr 29, 2024 01:01:21.880913973 CEST4434972423.196.50.101192.168.2.5
    Apr 29, 2024 01:01:21.883738995 CEST49724443192.168.2.523.196.50.101
    Apr 29, 2024 01:01:21.924122095 CEST4434972423.196.50.101192.168.2.5
    Apr 29, 2024 01:01:22.095139980 CEST4434972423.196.50.101192.168.2.5
    Apr 29, 2024 01:01:22.095334053 CEST4434972423.196.50.101192.168.2.5
    Apr 29, 2024 01:01:22.095400095 CEST49724443192.168.2.523.196.50.101
    Apr 29, 2024 01:01:22.097321987 CEST49724443192.168.2.523.196.50.101
    Apr 29, 2024 01:01:22.097357035 CEST4434972423.196.50.101192.168.2.5
    Apr 29, 2024 01:01:24.113375902 CEST44349713142.250.191.132192.168.2.5
    Apr 29, 2024 01:01:24.113470078 CEST44349713142.250.191.132192.168.2.5
    Apr 29, 2024 01:01:24.113567114 CEST49713443192.168.2.5142.250.191.132
    Apr 29, 2024 01:01:24.344358921 CEST49703443192.168.2.523.1.237.91
    Apr 29, 2024 01:01:24.344448090 CEST49703443192.168.2.523.1.237.91
    Apr 29, 2024 01:01:24.346935987 CEST49730443192.168.2.523.1.237.91
    Apr 29, 2024 01:01:24.346976995 CEST4434973023.1.237.91192.168.2.5
    Apr 29, 2024 01:01:24.347049952 CEST49730443192.168.2.523.1.237.91
    Apr 29, 2024 01:01:24.356622934 CEST49730443192.168.2.523.1.237.91
    Apr 29, 2024 01:01:24.356638908 CEST4434973023.1.237.91192.168.2.5
    Apr 29, 2024 01:01:24.501389027 CEST4434970323.1.237.91192.168.2.5
    Apr 29, 2024 01:01:24.501458883 CEST4434970323.1.237.91192.168.2.5
    Apr 29, 2024 01:01:24.687975883 CEST4434973023.1.237.91192.168.2.5
    Apr 29, 2024 01:01:24.688049078 CEST49730443192.168.2.523.1.237.91
    Apr 29, 2024 01:01:25.662863970 CEST49713443192.168.2.5142.250.191.132
    Apr 29, 2024 01:01:25.662904024 CEST44349713142.250.191.132192.168.2.5
    Apr 29, 2024 01:01:33.497525930 CEST4434971143.130.244.80192.168.2.5
    Apr 29, 2024 01:01:33.497610092 CEST4434971143.130.244.80192.168.2.5
    Apr 29, 2024 01:01:33.497685909 CEST49711443192.168.2.543.130.244.80
    Apr 29, 2024 01:01:35.438513041 CEST49711443192.168.2.543.130.244.80
    Apr 29, 2024 01:01:35.438549995 CEST4434971143.130.244.80192.168.2.5
    Apr 29, 2024 01:01:43.835408926 CEST4434973023.1.237.91192.168.2.5
    Apr 29, 2024 01:01:43.835479975 CEST49730443192.168.2.523.1.237.91
    Apr 29, 2024 01:02:13.801743984 CEST49748443192.168.2.5142.250.191.132
    Apr 29, 2024 01:02:13.801841974 CEST44349748142.250.191.132192.168.2.5
    Apr 29, 2024 01:02:13.801944971 CEST49748443192.168.2.5142.250.191.132
    Apr 29, 2024 01:02:13.802220106 CEST49748443192.168.2.5142.250.191.132
    Apr 29, 2024 01:02:13.802258015 CEST44349748142.250.191.132192.168.2.5
    Apr 29, 2024 01:02:14.036868095 CEST44349748142.250.191.132192.168.2.5
    Apr 29, 2024 01:02:14.037525892 CEST49748443192.168.2.5142.250.191.132
    Apr 29, 2024 01:02:14.037554979 CEST44349748142.250.191.132192.168.2.5
    Apr 29, 2024 01:02:14.037842035 CEST44349748142.250.191.132192.168.2.5
    Apr 29, 2024 01:02:14.038789988 CEST49748443192.168.2.5142.250.191.132
    Apr 29, 2024 01:02:14.038836956 CEST44349748142.250.191.132192.168.2.5
    Apr 29, 2024 01:02:14.081796885 CEST49748443192.168.2.5142.250.191.132
    Apr 29, 2024 01:02:24.023936033 CEST44349748142.250.191.132192.168.2.5
    Apr 29, 2024 01:02:24.024028063 CEST44349748142.250.191.132192.168.2.5
    Apr 29, 2024 01:02:24.024183989 CEST49748443192.168.2.5142.250.191.132
    Apr 29, 2024 01:02:25.663626909 CEST49748443192.168.2.5142.250.191.132
    Apr 29, 2024 01:02:25.663669109 CEST44349748142.250.191.132192.168.2.5
    TimestampSource PortDest PortSource IPDest IP
    Apr 29, 2024 01:01:09.233421087 CEST53601811.1.1.1192.168.2.5
    Apr 29, 2024 01:01:09.404213905 CEST53600371.1.1.1192.168.2.5
    Apr 29, 2024 01:01:10.096975088 CEST53537631.1.1.1192.168.2.5
    Apr 29, 2024 01:01:12.351644039 CEST5957753192.168.2.51.1.1.1
    Apr 29, 2024 01:01:12.351835966 CEST5263653192.168.2.51.1.1.1
    Apr 29, 2024 01:01:12.473920107 CEST53526361.1.1.1192.168.2.5
    Apr 29, 2024 01:01:12.489411116 CEST53595771.1.1.1192.168.2.5
    Apr 29, 2024 01:01:13.750242949 CEST5742553192.168.2.51.1.1.1
    Apr 29, 2024 01:01:13.750612974 CEST5296953192.168.2.51.1.1.1
    Apr 29, 2024 01:01:13.862065077 CEST53574251.1.1.1192.168.2.5
    Apr 29, 2024 01:01:13.862087011 CEST53529691.1.1.1192.168.2.5
    Apr 29, 2024 01:01:31.158534050 CEST53619191.1.1.1192.168.2.5
    Apr 29, 2024 01:01:51.251986027 CEST53539271.1.1.1192.168.2.5
    Apr 29, 2024 01:02:09.247816086 CEST53628361.1.1.1192.168.2.5
    Apr 29, 2024 01:02:15.855761051 CEST53496031.1.1.1192.168.2.5
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Apr 29, 2024 01:01:12.351644039 CEST192.168.2.51.1.1.10x53aaStandard query (0)amzaon.co.hzxpel.comA (IP address)IN (0x0001)false
    Apr 29, 2024 01:01:12.351835966 CEST192.168.2.51.1.1.10xf430Standard query (0)amzaon.co.hzxpel.com65IN (0x0001)false
    Apr 29, 2024 01:01:13.750242949 CEST192.168.2.51.1.1.10x1004Standard query (0)www.google.comA (IP address)IN (0x0001)false
    Apr 29, 2024 01:01:13.750612974 CEST192.168.2.51.1.1.10x4b7bStandard query (0)www.google.com65IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Apr 29, 2024 01:01:12.489411116 CEST1.1.1.1192.168.2.50x53aaNo error (0)amzaon.co.hzxpel.com43.130.244.80A (IP address)IN (0x0001)false
    Apr 29, 2024 01:01:13.862065077 CEST1.1.1.1192.168.2.50x1004No error (0)www.google.com142.250.191.132A (IP address)IN (0x0001)false
    Apr 29, 2024 01:01:13.862087011 CEST1.1.1.1192.168.2.50x4b7bNo error (0)www.google.com65IN (0x0001)false
    Apr 29, 2024 01:01:24.115145922 CEST1.1.1.1192.168.2.50x1171No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
    Apr 29, 2024 01:01:24.115145922 CEST1.1.1.1192.168.2.50x1171No error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
    Apr 29, 2024 01:01:24.322556019 CEST1.1.1.1192.168.2.50x780No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
    Apr 29, 2024 01:01:24.322556019 CEST1.1.1.1192.168.2.50x780No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
    Apr 29, 2024 01:01:39.484688997 CEST1.1.1.1192.168.2.50xc3deNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
    Apr 29, 2024 01:01:39.484688997 CEST1.1.1.1192.168.2.50xc3deNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
    Apr 29, 2024 01:02:08.100032091 CEST1.1.1.1192.168.2.50x33aNo error (0)windowsupdatebg.s.llnwi.net208.111.186.128A (IP address)IN (0x0001)false
    Apr 29, 2024 01:02:08.100032091 CEST1.1.1.1192.168.2.50x33aNo error (0)windowsupdatebg.s.llnwi.net208.111.186.0A (IP address)IN (0x0001)false
    Apr 29, 2024 01:02:22.454355955 CEST1.1.1.1192.168.2.50x5396No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.53.34A (IP address)IN (0x0001)false
    Apr 29, 2024 01:02:22.454355955 CEST1.1.1.1192.168.2.50x5396No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.55.34A (IP address)IN (0x0001)false
    Apr 29, 2024 01:02:22.454355955 CEST1.1.1.1192.168.2.50x5396No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.50.24A (IP address)IN (0x0001)false
    Apr 29, 2024 01:02:22.454355955 CEST1.1.1.1192.168.2.50x5396No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.63.34A (IP address)IN (0x0001)false
    Apr 29, 2024 01:02:22.454355955 CEST1.1.1.1192.168.2.50x5396No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.50.35A (IP address)IN (0x0001)false
    Apr 29, 2024 01:02:22.454355955 CEST1.1.1.1192.168.2.50x5396No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.50.25A (IP address)IN (0x0001)false
    Apr 29, 2024 01:02:22.454355955 CEST1.1.1.1192.168.2.50x5396No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.55.35A (IP address)IN (0x0001)false
    Apr 29, 2024 01:02:22.454355955 CEST1.1.1.1192.168.2.50x5396No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.51.40A (IP address)IN (0x0001)false
    • amzaon.co.hzxpel.com
    • fs.microsoft.com
    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    0192.168.2.54971043.130.244.804436460C:\Program Files\Google\Chrome\Application\chrome.exe
    TimestampBytes transferredDirectionData
    2024-04-28 23:01:13 UTC676OUTGET /660ebca95ab13 HTTP/1.1
    Host: amzaon.co.hzxpel.com
    Connection: keep-alive
    sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
    sec-ch-ua-mobile: ?0
    sec-ch-ua-platform: "Windows"
    Upgrade-Insecure-Requests: 1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
    Sec-Fetch-Site: none
    Sec-Fetch-Mode: navigate
    Sec-Fetch-User: ?1
    Sec-Fetch-Dest: document
    Accept-Encoding: gzip, deflate, br
    Accept-Language: en-US,en;q=0.9
    2024-04-28 23:01:13 UTC665INHTTP/1.1 302 Found
    Date: Sun, 28 Apr 2024 23:01:13 GMT
    Server: Apache
    Expires: Thu, 19 Nov 1981 08:52:00 GMT
    Cache-Control: no-store, no-cache, must-revalidate
    Pragma: no-cache
    Set-Cookie: PHPSESSID=casopj49deqf1po5d9gg5jdt9n; path=/
    Access-Control-Allow-Origin: *
    Access-Control-Allow-Methods: GET,POST,OPTIONS,PUT,DELETE
    Content-Security-Policy: frame-ancestors 'none'
    X-Content-Type-Options: nosniff
    X-Dns-Prefetch-Control: off
    X-Frame-Options: SAMEORIGIN
    x-xss-protection: 1; mode=block
    Upgrade-Insecure-Requests: 1
    Upgrade: h2
    Connection: Upgrade, close
    Location: http://localhost
    Content-Length: 0
    Content-Type: text/html; charset=UTF-8


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    1192.168.2.54971823.196.50.101443
    TimestampBytes transferredDirectionData
    2024-04-28 23:01:18 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    Accept-Encoding: identity
    User-Agent: Microsoft BITS/7.8
    Host: fs.microsoft.com
    2024-04-28 23:01:18 UTC467INHTTP/1.1 200 OK
    Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
    Content-Type: application/octet-stream
    ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
    Last-Modified: Tue, 16 May 2017 22:58:00 GMT
    Server: ECAcc (chd/0790)
    X-CID: 11
    X-Ms-ApiVersion: Distribute 1.2
    X-Ms-Region: prod-eus-z1
    Cache-Control: public, max-age=115325
    Date: Sun, 28 Apr 2024 23:01:18 GMT
    Connection: close
    X-CID: 2


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    2192.168.2.54972423.196.50.101443
    TimestampBytes transferredDirectionData
    2024-04-28 23:01:21 UTC239OUTGET /fs/windows/config.json HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    Accept-Encoding: identity
    If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
    Range: bytes=0-2147483646
    User-Agent: Microsoft BITS/7.8
    Host: fs.microsoft.com
    2024-04-28 23:01:22 UTC456INHTTP/1.1 200 OK
    ApiVersion: Distribute 1.1
    Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
    Content-Type: application/octet-stream
    ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
    Last-Modified: Tue, 16 May 2017 22:58:00 GMT
    Server: ECAcc (chd/074E)
    X-CID: 11
    Cache-Control: public, max-age=115405
    Date: Sun, 28 Apr 2024 23:01:22 GMT
    Content-Length: 55
    Connection: close
    X-CID: 2
    2024-04-28 23:01:22 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
    Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


    Click to jump to process

    Click to jump to process

    Click to jump to process

    Target ID:0
    Start time:01:01:02
    Start date:29/04/2024
    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
    Imagebase:0x7ff715980000
    File size:3'242'272 bytes
    MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    Target ID:2
    Start time:01:01:07
    Start date:29/04/2024
    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1200 --field-trial-handle=1864,i,7070079213059840236,10822540049510035426,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
    Imagebase:0x7ff715980000
    File size:3'242'272 bytes
    MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    Target ID:3
    Start time:01:01:10
    Start date:29/04/2024
    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://amzaon.co.hzxpel.com/660ebca95ab13"
    Imagebase:0x7ff715980000
    File size:3'242'272 bytes
    MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    No disassembly