Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
http://https:/e.cdlt.jibjab.com/c2/225:4f16e2ba44501a8a8bf3ed302d09b87f:d240209:65c6bb2428085be667d1bac9:1707522852103/8e54784a?jwtH=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9&jwtP=eyJpYXQiOjE3MDc1MjI5NzQsImNkIjoiLmppYmphYi5jb20iLCJjZSI6ODY0MDAsInRrIjoiamliamFibSIsIm10bElEIjoiNjVjNWRiOTFmNGMwYmEzYjExMGM0Z

Overview

General Information

Sample URL:http://https:/e.cdlt.jibjab.com/c2/225:4f16e2ba44501a8a8bf3ed302d09b87f:d240209:65c6bb2428085be667d1bac9:1707522852103/8e54784a?jwtH=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9&jwtP=eyJpYXQiOjE3MDc1MjI5NzQsI
Analysis ID:1391071
Infos:

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Creates files inside the system directory
Sigma detected: Suspicious Office Token Search Via CLI
Stores files to the Windows start menu directory

Classification

  • System is w10x64
  • chrome.exe (PID: 6556 cmdline: C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 2132 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2568 --field-trial-handle=2532,i,1680531711560861017,17543554451149963471,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 2316 cmdline: C:\Program Files\Google\Chrome\Application\chrome.exe" "http://https:/e.cdlt.jibjab.com/c2/225:4f16e2ba44501a8a8bf3ed302d09b87f:d240209:65c6bb2428085be667d1bac9:1707522852103/8e54784a?jwtH=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9&jwtP=eyJpYXQiOjE3MDc1MjI5NzQsImNkIjoiLmppYmphYi5jb20iLCJjZSI6ODY0MDAsInRrIjoiamliamFibSIsIm10bElEIjoiNjVjNWRiOTFmNGMwYmEzYjExMGM0ZWU4IiwibGlua1VybCI6Imh0dHBzOlwvXC93d3cuamliamFiLmNvbVwvdmlld1wvbWFrZVwvYWRkaWN0ZWRfdG9fbG92ZV9yb2JlcnRfcGFsbWVyX2Fubml2ZXJzYXJ5XC80M2M2NzZkYi0yY2IxLTQ3Y2EtOTA1NS1iMjg0N2VkNTgyNWY_cmVjaXBpZW50X3Rva2VuPTE2ZjNlOTk0LTBkZDgtNDc5Yi1iOTE3LTRhOTJlN2FiMWQxYyZ1dG1fY2FtcGFpZ249dHhfcmVjaXBpZW50X25vdGlmaWNhdGlvbiZ1dG1fdGVybT0mdXRtX3NvdXJjZT1jb3JkaWFsJnV0bV9tZWRpdW09ZW1haWwifQ&jwtS=eOhWS_qON4C7Pn_vFN9iXDtpYuHwzoYSTCcLc-Ce86o__;!!EhqYCQ!cHK5TxT8glt9qsWTQaBnSDPNius5-SdyQMZ78XjuGJ7hEnpIkoW7Wm8RBPEiYsdL79SvidfZc1DWgCTnKDTKz0SxG5Y$%20urldefense.com MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Program Files\Google\Chrome\Application\chrome.exe" "http://https:/e.cdlt.jibjab.com/c2/225:4f16e2ba44501a8a8bf3ed302d09b87f:d240209:65c6bb2428085be667d1bac9:1707522852103/8e54784a?jwtH=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9&jwtP=eyJpYXQiOjE3MDc1MjI5NzQsImNkIjoiLmppYmphYi5jb20iLCJjZSI6ODY0MDAsInRrIjoiamliamFibSIsIm10bElEIjoiNjVjNWRiOTFmNGMwYmEzYjExMGM0ZWU4IiwibGlua1VybCI6Imh0dHBzOlwvXC93d3cuamliamFiLmNvbVwvdmlld1wvbWFrZVwvYWRkaWN0ZWRfdG9fbG92ZV9yb2JlcnRfcGFsbWVyX2Fubml2ZXJzYXJ5XC80M2M2NzZkYi0yY2IxLTQ3Y2EtOTA1NS1iMjg0N2VkNTgyNWY_cmVjaXBpZW50X3Rva2VuPTE2ZjNlOTk0LTBkZDgtNDc5Yi1iOTE3LTRhOTJlN2FiMWQxYyZ1dG1fY2FtcGFpZ249dHhfcmVjaXBpZW50X25vdGlmaWNhdGlvbiZ1dG1fdGVybT0mdXRtX3NvdXJjZT1jb3JkaWFsJnV0bV9tZWRpdW09ZW1haWwifQ&jwtS=eOhWS_qON4C7Pn_vFN9iXDtpYuHwzoYSTCcLc-Ce86o__;!!EhqYCQ!cHK5TxT8glt9qsWTQaBnSDPNius5-SdyQMZ78XjuGJ7hEnpIkoW7Wm8RBPEiYsdL79SvidfZc1DWgCTnKDTKz0SxG5Y$%20urldefense.com, CommandLine: C:\Program Files\Google\Chrome\Application\chrome.exe" "http://https:/e.cdlt.jibjab.com/c2/225:4f16e2ba44501a8a8bf3ed302d09b87f:d240209:65c6bb2428085be667d1bac9:1707522852103/8e54784a?jwtH=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9&jwtP=eyJpYXQiOjE3MDc1MjI5NzQsImNkIjoiLmppYmphYi5jb20iLCJjZSI6ODY0MDAsInRrIjoiamliamFibSIsIm10bElEIjoiNjVjNWRiOTFmNGMwYmEzYjExMGM0ZWU4IiwibGlua1VybCI6Imh0dHBzOlwvXC93d3cuamliamFiLmNvbVwvdmlld1wvbWFrZVwvYWRkaWN0ZWRfdG9fbG92ZV9yb2JlcnRfcGFsbWVyX2Fubml2ZXJzYXJ5XC80M2M2NzZkYi0yY2IxLTQ3Y2EtOTA1NS1iMjg0N2VkNTgyNWY_cmVjaXBpZW50X3Rva2VuPTE2ZjNlOTk0LTBkZDgtNDc5Yi1iOTE3LTRhOTJlN2FiMWQxYyZ1dG1fY2FtcGFpZ249dHhfcmVjaXBpZW50X25vdGlmaWNhdGlvbiZ1dG1fdGVybT0mdXRtX3NvdXJjZT1jb3JkaWFsJnV0bV9tZWRpdW09ZW1haWwifQ&jwtS=eOhWS_qON4C7Pn_vFN9iXDtpYuHwzoYSTCcLc-Ce86o__;!!EhqYCQ!cHK5TxT8glt9qsWTQaBnSDPNius5-SdyQMZ78XjuGJ7hEnpIkoW7Wm8RBPEiYsdL79SvidfZc1DWgCTnKDTKz0SxG5Y$%20urldefense.com, CommandLine|base64offset|contains: , Image: C:\Program Files\Google\Chrome\Application\chrome.exe, NewProcessName: C:\Program Files\Google\Chrome\Application\chrome.exe, OriginalFileName: C:\Program Files\Google\Chrome\Application\chrome.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 6108, ProcessCommandLine: C:\Program Files\Google\Chrome\Application\chrome.exe" "http://https:/e.cdlt.jibjab.com/c2/225:4f16e2ba44501a8a8bf3ed302d09b87f:d240209:65c6bb2428085be667d1bac9:1707522852103/8e54784a?jwtH=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9&jwtP=eyJpYXQiOjE3MDc1MjI5NzQsImNkIjoiLmppYmphYi5jb20iLCJjZSI6ODY0MDAsInRrIjoiamliamFibSIsIm10bElEIjoiNjVjNWRiOTFmNGMwYmEzYjExMGM0ZWU4IiwibGlua1VybCI6Imh0dHBzOlwvXC93d3cuamliamFiLmNvbVwvdmlld1wvbWFrZVwvYWRkaWN0ZWRfdG9fbG92ZV9yb2JlcnRfcGFsbWVyX2Fubml2ZXJzYXJ5XC80M2M2NzZkYi0yY2IxLTQ3Y2EtOTA1NS1iMjg0N2VkNTgyNWY_cmVjaXBpZW50X3Rva2VuPTE2ZjNlOTk0LTBkZDgtNDc5Yi1iOTE3LTRhOTJlN2FiMWQxYyZ1dG1fY2FtcGFpZ249dHhfcmVjaXBpZW50X25vdGlmaWNhdGlvbiZ1dG1fdGVybT0mdXRtX3NvdXJjZT1jb3JkaWFsJnV0bV9tZWRpdW09ZW1haWwifQ&jwtS=eOhWS_qON4C7Pn_vFN9iXDtpYuHwzoYSTCcLc-Ce86o__;!!EhqYCQ!cHK5TxT8glt9qsWTQaBnSDPNius5-SdyQMZ78XjuGJ7hEnpIkoW7Wm8RBPEiYsdL79SvidfZc1DWgCTnKD
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownHTTPS traffic detected: 23.33.136.127:443 -> 192.168.2.5:49716 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.33.136.127:443 -> 192.168.2.5:49717 version: TLS 1.2
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.33.136.127
Source: unknownTCP traffic detected without corresponding DNS query: 23.33.136.127
Source: unknownTCP traffic detected without corresponding DNS query: 23.33.136.127
Source: unknownTCP traffic detected without corresponding DNS query: 23.33.136.127
Source: unknownTCP traffic detected without corresponding DNS query: 23.33.136.127
Source: unknownTCP traffic detected without corresponding DNS query: 23.33.136.127
Source: unknownTCP traffic detected without corresponding DNS query: 23.33.136.127
Source: unknownTCP traffic detected without corresponding DNS query: 23.33.136.127
Source: unknownTCP traffic detected without corresponding DNS query: 23.33.136.127
Source: unknownTCP traffic detected without corresponding DNS query: 23.33.136.127
Source: unknownTCP traffic detected without corresponding DNS query: 23.33.136.127
Source: unknownTCP traffic detected without corresponding DNS query: 23.33.136.127
Source: unknownTCP traffic detected without corresponding DNS query: 23.33.136.127
Source: unknownTCP traffic detected without corresponding DNS query: 23.33.136.127
Source: unknownTCP traffic detected without corresponding DNS query: 23.33.136.127
Source: unknownTCP traffic detected without corresponding DNS query: 23.33.136.127
Source: unknownTCP traffic detected without corresponding DNS query: 23.33.136.127
Source: unknownTCP traffic detected without corresponding DNS query: 23.33.136.127
Source: unknownTCP traffic detected without corresponding DNS query: 23.33.136.127
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=117.0.5938.132&lang=en-US&acceptformat=crx3,puff&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26brand%3DONGR%26ping%3Dr%253D-1%2526e%253D1 HTTP/1.1Host: clients2.google.comConnection: keep-aliveX-Goog-Update-Interactivity: fgX-Goog-Update-AppId: nmmhkkegccagdldgiimedpiccmgmiedaX-Goog-Update-Updater: chromecrx-117.0.5938.132Sec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
Source: global trafficHTTP traffic detected: GET /tools/pso/ping?as=chrome&brand=ONGR&pid=&hl=en&events=C1I,C2I,C7I,C1S,C7S&rep=2&rlz=C1:,C2:,C7:&id=00000000000000000000000000000000000000005EF1BFCF85 HTTP/1.1Host: clients1.google.comConnection: keep-aliveSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, br
Source: unknownDNS traffic detected: queries for: clients2.google.com
Source: unknownHTTP traffic detected: POST /ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard HTTP/1.1Host: accounts.google.comConnection: keep-aliveContent-Length: 1Origin: https://www.google.comContent-Type: application/x-www-form-urlencodedSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: NID=511=Ef5vPFGw-MZYo5hwe-0ThAVslbxbmvdVZwcHnqVzWHAU14v53MN1VvwvQq8baYfg2-IAtqZBV5NOL5rvj2NWIqrz377UhLdHtOgE-tJaBlUBYJEhuGsQdqni3oTJg0brqv1djdiLJyvTSUhdK-c5JWadCSsULPLzhSx-F-6wOg4
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownHTTPS traffic detected: 23.33.136.127:443 -> 192.168.2.5:49716 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.33.136.127:443 -> 192.168.2.5:49717 version: TLS 1.2
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_BITS_6556_52178828Jump to behavior
Source: classification engineClassification label: clean1.win@20/6@10/5
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2568 --field-trial-handle=2532,i,1680531711560861017,17543554451149963471,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe" "http://https:/e.cdlt.jibjab.com/c2/225:4f16e2ba44501a8a8bf3ed302d09b87f:d240209:65c6bb2428085be667d1bac9:1707522852103/8e54784a?jwtH=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9&jwtP=eyJpYXQiOjE3MDc1MjI5NzQsImNkIjoiLmppYmphYi5jb20iLCJjZSI6ODY0MDAsInRrIjoiamliamFibSIsIm10bElEIjoiNjVjNWRiOTFmNGMwYmEzYjExMGM0ZWU4IiwibGlua1VybCI6Imh0dHBzOlwvXC93d3cuamliamFiLmNvbVwvdmlld1wvbWFrZVwvYWRkaWN0ZWRfdG9fbG92ZV9yb2JlcnRfcGFsbWVyX2Fubml2ZXJzYXJ5XC80M2M2NzZkYi0yY2IxLTQ3Y2EtOTA1NS1iMjg0N2VkNTgyNWY_cmVjaXBpZW50X3Rva2VuPTE2ZjNlOTk0LTBkZDgtNDc5Yi1iOTE3LTRhOTJlN2FiMWQxYyZ1dG1fY2FtcGFpZ249dHhfcmVjaXBpZW50X25vdGlmaWNhdGlvbiZ1dG1fdGVybT0mdXRtX3NvdXJjZT1jb3JkaWFsJnV0bV9tZWRpdW09ZW1haWwifQ&jwtS=eOhWS_qON4C7Pn_vFN9iXDtpYuHwzoYSTCcLc-Ce86o__;!!EhqYCQ!cHK5TxT8glt9qsWTQaBnSDPNius5-SdyQMZ78XjuGJ7hEnpIkoW7Wm8RBPEiYsdL79SvidfZc1DWgCTnKDTKz0SxG5Y$%20urldefense.com
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2568 --field-trial-handle=2532,i,1680531711560861017,17543554451149963471,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Google Drive.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
11
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media3
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive4
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
http://https:/e.cdlt.jibjab.com/c2/225:4f16e2ba44501a8a8bf3ed302d09b87f:d240209:65c6bb2428085be667d1bac9:1707522852103/8e54784a?jwtH=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9&jwtP=eyJpYXQiOjE3MDc1MjI5NzQsImNkIjoiLmppYmphYi5jb20iLCJjZSI6ODY0MDAsInRrIjoiamliamFibSIsIm10bElEIjoiNjVjNWRiOTFmNGMwYmEzYjExMGM0ZWU4IiwibGlua1VybCI6Imh0dHBzOlwvXC93d3cuamliamFiLmNvbVwvdmlld1wvbWFrZVwvYWRkaWN0ZWRfdG9fbG92ZV9yb2JlcnRfcGFsbWVyX2Fubml2ZXJzYXJ5XC80M2M2NzZkYi0yY2IxLTQ3Y2EtOTA1NS1iMjg0N2VkNTgyNWY_cmVjaXBpZW50X3Rva2VuPTE2ZjNlOTk0LTBkZDgtNDc5Yi1iOTE3LTRhOTJlN2FiMWQxYyZ1dG1fY2FtcGFpZ249dHhfcmVjaXBpZW50X25vdGlmaWNhdGlvbiZ1dG1fdGVybT0mdXRtX3NvdXJjZT1jb3JkaWFsJnV0bV9tZWRpdW09ZW1haWwifQ&jwtS=eOhWS_qON4C7Pn_vFN9iXDtpYuHwzoYSTCcLc-Ce86o__;!!EhqYCQ!cHK5TxT8glt9qsWTQaBnSDPNius5-SdyQMZ78XjuGJ7hEnpIkoW7Wm8RBPEiYsdL79SvidfZc1DWgCTnKDTKz0SxG5Y$%20urldefense.com0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
google.com
172.253.126.102
truefalse
    high
    accounts.google.com
    142.250.105.84
    truefalse
      high
      www.google.com
      64.233.177.103
      truefalse
        high
        clients.l.google.com
        142.250.105.102
        truefalse
          high
          clients1.google.com
          unknown
          unknownfalse
            high
            clients2.google.com
            unknown
            unknownfalse
              high
              NameMaliciousAntivirus DetectionReputation
              https://clients1.google.com/tools/pso/ping?as=chrome&brand=ONGR&pid=&hl=en&events=C1I,C2I,C7I,C1S,C7S&rep=2&rlz=C1:,C2:,C7:&id=00000000000000000000000000000000000000005EF1BFCF85false
                high
                https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=117.0.5938.132&lang=en-US&acceptformat=crx3,puff&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26brand%3DONGR%26ping%3Dr%253D-1%2526e%253D1false
                  high
                  https://accounts.google.com/ListAccounts?gpsia=1&source=ChromiumBrowser&json=standardfalse
                    high
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    239.255.255.250
                    unknownReserved
                    unknownunknownfalse
                    142.250.105.84
                    accounts.google.comUnited States
                    15169GOOGLEUSfalse
                    64.233.177.103
                    www.google.comUnited States
                    15169GOOGLEUSfalse
                    142.250.105.102
                    clients.l.google.comUnited States
                    15169GOOGLEUSfalse
                    IP
                    192.168.2.5
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1391071
                    Start date and time:2024-02-12 20:18:44 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 3m 10s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:browseurl.jbs
                    Sample URL:http://https:/e.cdlt.jibjab.com/c2/225:4f16e2ba44501a8a8bf3ed302d09b87f:d240209:65c6bb2428085be667d1bac9:1707522852103/8e54784a?jwtH=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9&jwtP=eyJpYXQiOjE3MDc1MjI5NzQsImNkIjoiLmppYmphYi5jb20iLCJjZSI6ODY0MDAsInRrIjoiamliamFibSIsIm10bElEIjoiNjVjNWRiOTFmNGMwYmEzYjExMGM0ZWU4IiwibGlua1VybCI6Imh0dHBzOlwvXC93d3cuamliamFiLmNvbVwvdmlld1wvbWFrZVwvYWRkaWN0ZWRfdG9fbG92ZV9yb2JlcnRfcGFsbWVyX2Fubml2ZXJzYXJ5XC80M2M2NzZkYi0yY2IxLTQ3Y2EtOTA1NS1iMjg0N2VkNTgyNWY_cmVjaXBpZW50X3Rva2VuPTE2ZjNlOTk0LTBkZDgtNDc5Yi1iOTE3LTRhOTJlN2FiMWQxYyZ1dG1fY2FtcGFpZ249dHhfcmVjaXBpZW50X25vdGlmaWNhdGlvbiZ1dG1fdGVybT0mdXRtX3NvdXJjZT1jb3JkaWFsJnV0bV9tZWRpdW09ZW1haWwifQ&jwtS=eOhWS_qON4C7Pn_vFN9iXDtpYuHwzoYSTCcLc-Ce86o__;!!EhqYCQ!cHK5TxT8glt9qsWTQaBnSDPNius5-SdyQMZ78XjuGJ7hEnpIkoW7Wm8RBPEiYsdL79SvidfZc1DWgCTnKDTKz0SxG5Y$%20urldefense.com
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:7
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:CLEAN
                    Classification:clean1.win@20/6@10/5
                    EGA Information:Failed
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 0
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 142.250.9.94, 34.104.35.123, 20.12.23.50, 13.95.31.18, 20.114.59.183, 20.242.39.171, 72.21.81.240, 74.125.138.94
                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, wu.ec.azureedge.net, clientservices.googleapis.com, ctldl.windowsupdate.com, wu-bg-shim.trafficmanager.net, wu.azureedge.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, edgedl.me.gvt1.com, glb.cws.prod.dcat.dsp.trafficmanager.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, update.googleapis.com, glb.sls.prod.dcat.dsp.trafficmanager.net
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtCreateFile calls found.
                    • Report size getting too big, too many NtOpenFile calls found.
                    • Report size getting too big, too many NtSetInformationFile calls found.
                    • VT rate limit hit for: http://https:/e.cdlt.jibjab.com/c2/225:4f16e2ba44501a8a8bf3ed302d09b87f:d240209:65c6bb2428085be667d1bac9:1707522852103/8e54784a?jwtH=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9&jwtP=eyJpYXQiOjE3MDc1MjI5NzQsImNkIjoiLmppYmphYi5jb20iLCJjZSI6ODY0MDAsInRrIjoiamliamFibSIsIm10bElEIjoiNjVjNWRiOTFmNGMwYmEzYjExMGM0ZWU4IiwibGlua1VybCI6Imh0dHBzOlwvXC93d3cuamliamFiLmNvbVwvdmlld1wvbWFrZVwvYWRkaWN0ZWRfdG9fbG92ZV9yb2JlcnRfcGFsbWVyX2Fubml2ZXJzYXJ5XC80M2M2NzZkYi0yY2IxLTQ3Y2EtOTA1NS1iMjg0N2VkNTgyNWY_cmVjaXBpZW50X3Rva2VuPTE2ZjNlOTk0LTBkZDgtNDc5Yi1iOTE3LTRhOTJlN2FiMWQxYyZ1dG1fY2FtcGFpZ249dHhfcmVjaXBpZW50X25vdGlmaWNhdGlvbiZ1dG1fdGVybT0mdXRtX3NvdXJjZT1jb3JkaWFsJnV0bV9tZWRpdW09ZW1haWwifQ&jwtS=eOhWS_qON4C7Pn_vFN9iXDtpYuHwzoYSTCcLc-Ce86o__;!!EhqYCQ!cHK5TxT8glt9qsWTQaBnSDPNius5-SdyQMZ78XjuGJ7hEnpIkoW7Wm8RBPEiYsdL79SvidfZc1DWgCTnKDTKz0SxG5Y$%20urldefense.com
                    No simulations
                    No context
                    No context
                    No context
                    No context
                    No context
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Feb 12 18:19:37 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2677
                    Entropy (8bit):3.9702198143731704
                    Encrypted:false
                    SSDEEP:48:8rPdtjTNBOfHSidAKZdA19ehwiZUklqehDy+3:8rTDzMy
                    MD5:69C76138E4B972ED3174254CF6F4EC2E
                    SHA1:5E8C4EB11CC48A61781241E7F7BE5E9BE91010C2
                    SHA-256:ADDB33A07047110A3B3355D9DBFD370B19F87484D0908D0AC50687996CB2A035
                    SHA-512:A381B1DE22AB10E1A4038929AAF54F54D881ACC8459B01D64419BBCA348320DD2168B5F63F1B6CD462BA083FAC0124361EF07170CE7EC14FEF60B3C7DC647F8D
                    Malicious:false
                    Reputation:low
                    Preview:L..................F.@.. ...$+.,....dX.k.]..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.ILXp.....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VLXp.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VLXp.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VLXp............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VLXs............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............^.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Feb 12 18:19:37 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2679
                    Entropy (8bit):3.9861873691112715
                    Encrypted:false
                    SSDEEP:48:81PdtjTNBOfHSidAKZdA1weh/iZUkAQkqeh8y+2:81TDB9QRy
                    MD5:85F0BE3676E1BE8778F5640D013823A8
                    SHA1:5130587CAB0A035840A067AF01678AC21AA5EE9F
                    SHA-256:8C5F3C85972ED09397436C7FBC5F78C73176EAADF433CE8E376BED0A83CF8493
                    SHA-512:52A7C8F845289D46A9C07E47999BCE8D742649BA5C79106504811FDD50F8C7B6223DDCFFA41BBEF9CEFF829F26079F15232C8520512FCD9F1FBEC8506BBA72A0
                    Malicious:false
                    Reputation:low
                    Preview:L..................F.@.. ...$+.,.....l.k.]..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.ILXp.....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VLXp.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VLXp.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VLXp............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VLXs............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............^.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2693
                    Entropy (8bit):3.9984594798021753
                    Encrypted:false
                    SSDEEP:48:8xSdtjTNBsHSidAKZdA14tseh7sFiZUkmgqeh7sCy+BX:8x8DPn4y
                    MD5:A9BD8190F61EEDE43F5055540FF91583
                    SHA1:6C433731308CFEC1EE87F78CA7370AD4D4ACA0A4
                    SHA-256:4406D7BEAD42FC7A5B47FA4879414BA725036B8241BB1D423E297D98664E81C5
                    SHA-512:25528A573FB90B247B40C50AAE5223CF5E9AA59DE3CBECE8CCD1DD2FC13178D111C92D6BCB221D568CF9705397D148306517E6472E96B52B20B97FFBD6A4DCD6
                    Malicious:false
                    Reputation:low
                    Preview:L..................F.@.. ...$+.,......e>....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.ILXp.....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VLXp.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VLXp.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VLXp............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VDW.n...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............^.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Feb 12 18:19:37 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2681
                    Entropy (8bit):3.985302455437312
                    Encrypted:false
                    SSDEEP:48:8zPdtjTNBOfHSidAKZdA1vehDiZUkwqehAy+R:8zTDiKy
                    MD5:5F6D4528689BBDE657C2BCC65EE407E4
                    SHA1:0502E49D0D0DFC3E2F4675278CF22324B567309F
                    SHA-256:6FAAFCEB429F2A82AA2E555BABF066B802A1C1844B63ECBE2D51CAD59DC88C94
                    SHA-512:4F468961B18168CABC0D9DBD8F3E6A8D5C318C4EF133760FC8FF0BA9DD504F017CE86CB2B40EE3A4E9E7400CDA15639B35ED8C3C9DA4754D184B87266F30E3C9
                    Malicious:false
                    Reputation:low
                    Preview:L..................F.@.. ...$+.,....x.{k.]..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.ILXp.....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VLXp.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VLXp.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VLXp............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VLXs............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............^.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Feb 12 18:19:37 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2681
                    Entropy (8bit):3.973001505528582
                    Encrypted:false
                    SSDEEP:48:84PdtjTNBOfHSidAKZdA1hehBiZUk1W1qeh+y+C:84TDS9ey
                    MD5:12414C96DC983A9F423B52BDDBE88F05
                    SHA1:88EDA76799F009E0FBAFD8395246534D7A15760B
                    SHA-256:625EB5E8E03C7937EB41CD0E1348273F5686CB07AEA57735EF5074E1AF216DA0
                    SHA-512:67AC632F57135D36D465002F7050C1CDC353C14735B9B74069151AD4E06816765C08714B14829A7EC5DD768717C24E6F584B1895C061B2924B38B8D64AEBD913
                    Malicious:false
                    Reputation:low
                    Preview:L..................F.@.. ...$+.,.....d.k.]..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.ILXp.....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VLXp.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VLXp.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VLXp............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VLXs............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............^.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Feb 12 18:19:37 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2683
                    Entropy (8bit):3.9857278698442267
                    Encrypted:false
                    SSDEEP:48:8OPdtjTNBOfHSidAKZdA1duT+ehOuTbbiZUk5OjqehOuTb4y+yT+:8OTDMT/TbxWOvTb4y7T
                    MD5:89B2501D13A3F4CED1A6E4DB7F42265A
                    SHA1:6C5BA4DA6021241FDF16D0537FE67647A050D6BE
                    SHA-256:87543830980260CDC608342CCB0FA5D2DC22AEB3D6097CB21F154C5B4DEE8B36
                    SHA-512:0BC0CDAFA3C9194B6FA541B3B78EA872A6D37813B55853FE6D19D617334A11A1FEB793B9CF0E2E0097BB805E0D495FC529744B134F9D2D65C7CBBBC097C4169B
                    Malicious:false
                    Reputation:low
                    Preview:L..................F.@.. ...$+.,......ak.]..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.ILXp.....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VLXp.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VLXp.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VLXp............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VLXs............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............^.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    No static file info
                    TimestampSource PortDest PortSource IPDest IP
                    Feb 12, 2024 20:19:28.915672064 CET49674443192.168.2.523.1.237.91
                    Feb 12, 2024 20:19:28.915703058 CET49675443192.168.2.523.1.237.91
                    Feb 12, 2024 20:19:29.103148937 CET49673443192.168.2.523.1.237.91
                    Feb 12, 2024 20:19:36.264250994 CET49709443192.168.2.5142.250.105.102
                    Feb 12, 2024 20:19:36.264292955 CET44349709142.250.105.102192.168.2.5
                    Feb 12, 2024 20:19:36.264345884 CET49709443192.168.2.5142.250.105.102
                    Feb 12, 2024 20:19:36.264992952 CET49709443192.168.2.5142.250.105.102
                    Feb 12, 2024 20:19:36.265017033 CET44349709142.250.105.102192.168.2.5
                    Feb 12, 2024 20:19:36.266264915 CET49710443192.168.2.5142.250.105.84
                    Feb 12, 2024 20:19:36.266294956 CET44349710142.250.105.84192.168.2.5
                    Feb 12, 2024 20:19:36.266350985 CET49710443192.168.2.5142.250.105.84
                    Feb 12, 2024 20:19:36.268594027 CET49710443192.168.2.5142.250.105.84
                    Feb 12, 2024 20:19:36.268620968 CET44349710142.250.105.84192.168.2.5
                    Feb 12, 2024 20:19:36.488912106 CET44349710142.250.105.84192.168.2.5
                    Feb 12, 2024 20:19:36.495012045 CET44349709142.250.105.102192.168.2.5
                    Feb 12, 2024 20:19:36.578444958 CET49709443192.168.2.5142.250.105.102
                    Feb 12, 2024 20:19:36.693923950 CET44349710142.250.105.84192.168.2.5
                    Feb 12, 2024 20:19:36.695985079 CET49710443192.168.2.5142.250.105.84
                    Feb 12, 2024 20:19:38.040777922 CET49709443192.168.2.5142.250.105.102
                    Feb 12, 2024 20:19:38.040816069 CET44349709142.250.105.102192.168.2.5
                    Feb 12, 2024 20:19:38.040983915 CET49710443192.168.2.5142.250.105.84
                    Feb 12, 2024 20:19:38.041002035 CET44349710142.250.105.84192.168.2.5
                    Feb 12, 2024 20:19:38.042002916 CET44349709142.250.105.102192.168.2.5
                    Feb 12, 2024 20:19:38.042038918 CET44349709142.250.105.102192.168.2.5
                    Feb 12, 2024 20:19:38.042068005 CET49709443192.168.2.5142.250.105.102
                    Feb 12, 2024 20:19:38.045734882 CET44349709142.250.105.102192.168.2.5
                    Feb 12, 2024 20:19:38.045779943 CET49709443192.168.2.5142.250.105.102
                    Feb 12, 2024 20:19:38.045800924 CET44349709142.250.105.102192.168.2.5
                    Feb 12, 2024 20:19:38.046886921 CET44349710142.250.105.84192.168.2.5
                    Feb 12, 2024 20:19:38.046953917 CET49710443192.168.2.5142.250.105.84
                    Feb 12, 2024 20:19:38.054135084 CET49709443192.168.2.5142.250.105.102
                    Feb 12, 2024 20:19:38.054286003 CET44349709142.250.105.102192.168.2.5
                    Feb 12, 2024 20:19:38.055643082 CET49709443192.168.2.5142.250.105.102
                    Feb 12, 2024 20:19:38.055665970 CET44349709142.250.105.102192.168.2.5
                    Feb 12, 2024 20:19:38.056739092 CET49710443192.168.2.5142.250.105.84
                    Feb 12, 2024 20:19:38.056957006 CET44349710142.250.105.84192.168.2.5
                    Feb 12, 2024 20:19:38.058801889 CET49710443192.168.2.5142.250.105.84
                    Feb 12, 2024 20:19:38.058824062 CET44349710142.250.105.84192.168.2.5
                    Feb 12, 2024 20:19:38.159326077 CET49709443192.168.2.5142.250.105.102
                    Feb 12, 2024 20:19:38.166874886 CET44349709142.250.105.102192.168.2.5
                    Feb 12, 2024 20:19:38.167005062 CET44349709142.250.105.102192.168.2.5
                    Feb 12, 2024 20:19:38.167069912 CET49709443192.168.2.5142.250.105.102
                    Feb 12, 2024 20:19:38.182138920 CET49709443192.168.2.5142.250.105.102
                    Feb 12, 2024 20:19:38.182166100 CET44349709142.250.105.102192.168.2.5
                    Feb 12, 2024 20:19:38.224831104 CET49710443192.168.2.5142.250.105.84
                    Feb 12, 2024 20:19:38.280425072 CET44349710142.250.105.84192.168.2.5
                    Feb 12, 2024 20:19:38.280494928 CET49710443192.168.2.5142.250.105.84
                    Feb 12, 2024 20:19:38.280512094 CET44349710142.250.105.84192.168.2.5
                    Feb 12, 2024 20:19:38.280563116 CET44349710142.250.105.84192.168.2.5
                    Feb 12, 2024 20:19:38.280611038 CET49710443192.168.2.5142.250.105.84
                    Feb 12, 2024 20:19:38.291966915 CET49710443192.168.2.5142.250.105.84
                    Feb 12, 2024 20:19:38.291995049 CET44349710142.250.105.84192.168.2.5
                    Feb 12, 2024 20:19:38.534992933 CET49674443192.168.2.523.1.237.91
                    Feb 12, 2024 20:19:38.672369003 CET49675443192.168.2.523.1.237.91
                    Feb 12, 2024 20:19:38.776005983 CET49673443192.168.2.523.1.237.91
                    Feb 12, 2024 20:19:38.931152105 CET49713443192.168.2.564.233.177.103
                    Feb 12, 2024 20:19:38.931180954 CET4434971364.233.177.103192.168.2.5
                    Feb 12, 2024 20:19:38.931230068 CET49713443192.168.2.564.233.177.103
                    Feb 12, 2024 20:19:38.931688070 CET49713443192.168.2.564.233.177.103
                    Feb 12, 2024 20:19:38.931699038 CET4434971364.233.177.103192.168.2.5
                    Feb 12, 2024 20:19:39.156632900 CET4434971364.233.177.103192.168.2.5
                    Feb 12, 2024 20:19:39.157166004 CET49713443192.168.2.564.233.177.103
                    Feb 12, 2024 20:19:39.157191992 CET4434971364.233.177.103192.168.2.5
                    Feb 12, 2024 20:19:39.158866882 CET4434971364.233.177.103192.168.2.5
                    Feb 12, 2024 20:19:39.159079075 CET49713443192.168.2.564.233.177.103
                    Feb 12, 2024 20:19:39.160660982 CET49713443192.168.2.564.233.177.103
                    Feb 12, 2024 20:19:39.160778999 CET4434971364.233.177.103192.168.2.5
                    Feb 12, 2024 20:19:39.237600088 CET49713443192.168.2.564.233.177.103
                    Feb 12, 2024 20:19:39.237616062 CET4434971364.233.177.103192.168.2.5
                    Feb 12, 2024 20:19:39.424057007 CET49713443192.168.2.564.233.177.103
                    Feb 12, 2024 20:19:43.041941881 CET49716443192.168.2.523.33.136.127
                    Feb 12, 2024 20:19:43.042020082 CET4434971623.33.136.127192.168.2.5
                    Feb 12, 2024 20:19:43.042104959 CET49716443192.168.2.523.33.136.127
                    Feb 12, 2024 20:19:43.047056913 CET49716443192.168.2.523.33.136.127
                    Feb 12, 2024 20:19:43.047075033 CET4434971623.33.136.127192.168.2.5
                    Feb 12, 2024 20:19:43.260848999 CET4434971623.33.136.127192.168.2.5
                    Feb 12, 2024 20:19:43.260965109 CET49716443192.168.2.523.33.136.127
                    Feb 12, 2024 20:19:43.273216963 CET49716443192.168.2.523.33.136.127
                    Feb 12, 2024 20:19:43.273231983 CET4434971623.33.136.127192.168.2.5
                    Feb 12, 2024 20:19:43.273917913 CET4434971623.33.136.127192.168.2.5
                    Feb 12, 2024 20:19:43.314070940 CET49716443192.168.2.523.33.136.127
                    Feb 12, 2024 20:19:43.502629042 CET49716443192.168.2.523.33.136.127
                    Feb 12, 2024 20:19:43.545932055 CET4434971623.33.136.127192.168.2.5
                    Feb 12, 2024 20:19:43.605984926 CET4434971623.33.136.127192.168.2.5
                    Feb 12, 2024 20:19:43.606161118 CET4434971623.33.136.127192.168.2.5
                    Feb 12, 2024 20:19:43.606245041 CET49716443192.168.2.523.33.136.127
                    Feb 12, 2024 20:19:43.606612921 CET49716443192.168.2.523.33.136.127
                    Feb 12, 2024 20:19:43.606661081 CET4434971623.33.136.127192.168.2.5
                    Feb 12, 2024 20:19:43.606690884 CET49716443192.168.2.523.33.136.127
                    Feb 12, 2024 20:19:43.606705904 CET4434971623.33.136.127192.168.2.5
                    Feb 12, 2024 20:19:43.716850996 CET49717443192.168.2.523.33.136.127
                    Feb 12, 2024 20:19:43.716900110 CET4434971723.33.136.127192.168.2.5
                    Feb 12, 2024 20:19:43.716986895 CET49717443192.168.2.523.33.136.127
                    Feb 12, 2024 20:19:43.720633984 CET49717443192.168.2.523.33.136.127
                    Feb 12, 2024 20:19:43.720649958 CET4434971723.33.136.127192.168.2.5
                    Feb 12, 2024 20:19:43.940915108 CET4434971723.33.136.127192.168.2.5
                    Feb 12, 2024 20:19:43.941061020 CET49717443192.168.2.523.33.136.127
                    Feb 12, 2024 20:19:43.943002939 CET49717443192.168.2.523.33.136.127
                    Feb 12, 2024 20:19:43.943013906 CET4434971723.33.136.127192.168.2.5
                    Feb 12, 2024 20:19:43.943303108 CET4434971723.33.136.127192.168.2.5
                    Feb 12, 2024 20:19:43.947439909 CET49717443192.168.2.523.33.136.127
                    Feb 12, 2024 20:19:43.989948988 CET4434971723.33.136.127192.168.2.5
                    Feb 12, 2024 20:19:44.139738083 CET4434971723.33.136.127192.168.2.5
                    Feb 12, 2024 20:19:44.139904976 CET4434971723.33.136.127192.168.2.5
                    Feb 12, 2024 20:19:44.139982939 CET49717443192.168.2.523.33.136.127
                    Feb 12, 2024 20:19:44.142128944 CET49717443192.168.2.523.33.136.127
                    Feb 12, 2024 20:19:44.142153978 CET4434971723.33.136.127192.168.2.5
                    Feb 12, 2024 20:19:44.142163992 CET49717443192.168.2.523.33.136.127
                    Feb 12, 2024 20:19:44.142169952 CET4434971723.33.136.127192.168.2.5
                    Feb 12, 2024 20:19:49.149369955 CET4434971364.233.177.103192.168.2.5
                    Feb 12, 2024 20:19:49.149466991 CET4434971364.233.177.103192.168.2.5
                    Feb 12, 2024 20:19:49.149653912 CET49713443192.168.2.564.233.177.103
                    Feb 12, 2024 20:19:49.756916046 CET49703443192.168.2.523.1.237.91
                    Feb 12, 2024 20:19:49.903422117 CET4434970323.1.237.91192.168.2.5
                    Feb 12, 2024 20:19:49.903450966 CET4434970323.1.237.91192.168.2.5
                    Feb 12, 2024 20:19:49.903477907 CET4434970323.1.237.91192.168.2.5
                    Feb 12, 2024 20:19:49.903505087 CET4434970323.1.237.91192.168.2.5
                    Feb 12, 2024 20:19:49.903515100 CET49703443192.168.2.523.1.237.91
                    Feb 12, 2024 20:19:49.903548956 CET49703443192.168.2.523.1.237.91
                    Feb 12, 2024 20:19:49.903548956 CET49703443192.168.2.523.1.237.91
                    Feb 12, 2024 20:19:50.071628094 CET49703443192.168.2.523.1.237.91
                    Feb 12, 2024 20:19:50.218724966 CET4434970323.1.237.91192.168.2.5
                    Feb 12, 2024 20:19:50.864036083 CET49713443192.168.2.564.233.177.103
                    Feb 12, 2024 20:19:50.864062071 CET4434971364.233.177.103192.168.2.5
                    Feb 12, 2024 20:20:38.863008022 CET49722443192.168.2.564.233.177.103
                    Feb 12, 2024 20:20:38.863095045 CET4434972264.233.177.103192.168.2.5
                    Feb 12, 2024 20:20:38.863181114 CET49722443192.168.2.564.233.177.103
                    Feb 12, 2024 20:20:38.863842010 CET49722443192.168.2.564.233.177.103
                    Feb 12, 2024 20:20:38.863909960 CET4434972264.233.177.103192.168.2.5
                    Feb 12, 2024 20:20:39.081197023 CET4434972264.233.177.103192.168.2.5
                    Feb 12, 2024 20:20:39.081710100 CET49722443192.168.2.564.233.177.103
                    Feb 12, 2024 20:20:39.081758022 CET4434972264.233.177.103192.168.2.5
                    Feb 12, 2024 20:20:39.082319975 CET4434972264.233.177.103192.168.2.5
                    Feb 12, 2024 20:20:39.083638906 CET49722443192.168.2.564.233.177.103
                    Feb 12, 2024 20:20:39.083720922 CET4434972264.233.177.103192.168.2.5
                    Feb 12, 2024 20:20:39.125411987 CET49722443192.168.2.564.233.177.103
                    Feb 12, 2024 20:20:49.083064079 CET4434972264.233.177.103192.168.2.5
                    Feb 12, 2024 20:20:49.083215952 CET4434972264.233.177.103192.168.2.5
                    Feb 12, 2024 20:20:49.083287954 CET49722443192.168.2.564.233.177.103
                    Feb 12, 2024 20:20:50.940874100 CET49722443192.168.2.564.233.177.103
                    Feb 12, 2024 20:20:50.940900087 CET4434972264.233.177.103192.168.2.5
                    Feb 12, 2024 20:21:03.933320045 CET49723443192.168.2.574.125.138.101
                    Feb 12, 2024 20:21:03.933367014 CET4434972374.125.138.101192.168.2.5
                    Feb 12, 2024 20:21:03.934355974 CET49723443192.168.2.574.125.138.101
                    Feb 12, 2024 20:21:03.934613943 CET49723443192.168.2.574.125.138.101
                    Feb 12, 2024 20:21:03.934628010 CET4434972374.125.138.101192.168.2.5
                    Feb 12, 2024 20:21:04.145673037 CET4434972374.125.138.101192.168.2.5
                    Feb 12, 2024 20:21:04.146018028 CET49723443192.168.2.574.125.138.101
                    Feb 12, 2024 20:21:04.146038055 CET4434972374.125.138.101192.168.2.5
                    Feb 12, 2024 20:21:04.146590948 CET4434972374.125.138.101192.168.2.5
                    Feb 12, 2024 20:21:04.146666050 CET49723443192.168.2.574.125.138.101
                    Feb 12, 2024 20:21:04.147597075 CET4434972374.125.138.101192.168.2.5
                    Feb 12, 2024 20:21:04.147691011 CET49723443192.168.2.574.125.138.101
                    Feb 12, 2024 20:21:04.148627996 CET49723443192.168.2.574.125.138.101
                    Feb 12, 2024 20:21:04.148710966 CET4434972374.125.138.101192.168.2.5
                    Feb 12, 2024 20:21:04.148813963 CET49723443192.168.2.574.125.138.101
                    Feb 12, 2024 20:21:04.148823023 CET4434972374.125.138.101192.168.2.5
                    Feb 12, 2024 20:21:04.203043938 CET49723443192.168.2.574.125.138.101
                    Feb 12, 2024 20:21:04.358846903 CET4434972374.125.138.101192.168.2.5
                    Feb 12, 2024 20:21:04.359672070 CET4434972374.125.138.101192.168.2.5
                    Feb 12, 2024 20:21:04.359749079 CET49723443192.168.2.574.125.138.101
                    Feb 12, 2024 20:21:04.359913111 CET49723443192.168.2.574.125.138.101
                    Feb 12, 2024 20:21:04.359951973 CET4434972374.125.138.101192.168.2.5
                    TimestampSource PortDest PortSource IPDest IP
                    Feb 12, 2024 20:19:36.144208908 CET6481253192.168.2.51.1.1.1
                    Feb 12, 2024 20:19:36.144670010 CET6046253192.168.2.51.1.1.1
                    Feb 12, 2024 20:19:36.145682096 CET5027353192.168.2.51.1.1.1
                    Feb 12, 2024 20:19:36.146116018 CET5427253192.168.2.51.1.1.1
                    Feb 12, 2024 20:19:36.193136930 CET53492051.1.1.1192.168.2.5
                    Feb 12, 2024 20:19:36.261770010 CET53648121.1.1.1192.168.2.5
                    Feb 12, 2024 20:19:36.262778044 CET53604621.1.1.1192.168.2.5
                    Feb 12, 2024 20:19:36.263149023 CET53502731.1.1.1192.168.2.5
                    Feb 12, 2024 20:19:36.263586044 CET53542721.1.1.1192.168.2.5
                    Feb 12, 2024 20:19:38.187232018 CET137137192.168.2.5192.168.2.255
                    Feb 12, 2024 20:19:38.657823086 CET53501191.1.1.1192.168.2.5
                    Feb 12, 2024 20:19:38.811938047 CET6212253192.168.2.51.1.1.1
                    Feb 12, 2024 20:19:38.812335014 CET5631153192.168.2.51.1.1.1
                    Feb 12, 2024 20:19:38.929564953 CET53621221.1.1.1192.168.2.5
                    Feb 12, 2024 20:19:38.930068016 CET53563111.1.1.1192.168.2.5
                    Feb 12, 2024 20:19:38.938533068 CET137137192.168.2.5192.168.2.255
                    Feb 12, 2024 20:19:39.689446926 CET137137192.168.2.5192.168.2.255
                    Feb 12, 2024 20:19:40.490209103 CET6203253192.168.2.58.8.8.8
                    Feb 12, 2024 20:19:40.490942955 CET5810253192.168.2.51.1.1.1
                    Feb 12, 2024 20:19:40.592818022 CET53620328.8.8.8192.168.2.5
                    Feb 12, 2024 20:19:40.608261108 CET53581021.1.1.1192.168.2.5
                    Feb 12, 2024 20:19:41.484308004 CET137137192.168.2.5192.168.2.255
                    Feb 12, 2024 20:19:42.235707045 CET137137192.168.2.5192.168.2.255
                    Feb 12, 2024 20:19:42.993729115 CET137137192.168.2.5192.168.2.255
                    Feb 12, 2024 20:19:48.849971056 CET137137192.168.2.5192.168.2.255
                    Feb 12, 2024 20:19:49.610521078 CET137137192.168.2.5192.168.2.255
                    Feb 12, 2024 20:19:50.365760088 CET137137192.168.2.5192.168.2.255
                    Feb 12, 2024 20:19:57.280560970 CET53503891.1.1.1192.168.2.5
                    Feb 12, 2024 20:20:16.093482971 CET53634291.1.1.1192.168.2.5
                    Feb 12, 2024 20:20:21.511854887 CET137137192.168.2.5192.168.2.255
                    Feb 12, 2024 20:20:22.266701937 CET137137192.168.2.5192.168.2.255
                    Feb 12, 2024 20:20:23.023000002 CET137137192.168.2.5192.168.2.255
                    Feb 12, 2024 20:20:34.386868954 CET53652911.1.1.1192.168.2.5
                    Feb 12, 2024 20:20:38.875895023 CET53561071.1.1.1192.168.2.5
                    Feb 12, 2024 20:21:01.995196104 CET53554051.1.1.1192.168.2.5
                    Feb 12, 2024 20:21:03.814848900 CET6486653192.168.2.51.1.1.1
                    Feb 12, 2024 20:21:03.814976931 CET5065353192.168.2.51.1.1.1
                    Feb 12, 2024 20:21:03.932775974 CET53506531.1.1.1192.168.2.5
                    Feb 12, 2024 20:21:03.932797909 CET53648661.1.1.1192.168.2.5
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Feb 12, 2024 20:19:36.144208908 CET192.168.2.51.1.1.10x137fStandard query (0)clients2.google.comA (IP address)IN (0x0001)false
                    Feb 12, 2024 20:19:36.144670010 CET192.168.2.51.1.1.10x1917Standard query (0)clients2.google.com65IN (0x0001)false
                    Feb 12, 2024 20:19:36.145682096 CET192.168.2.51.1.1.10x692eStandard query (0)accounts.google.comA (IP address)IN (0x0001)false
                    Feb 12, 2024 20:19:36.146116018 CET192.168.2.51.1.1.10x1605Standard query (0)accounts.google.com65IN (0x0001)false
                    Feb 12, 2024 20:19:38.811938047 CET192.168.2.51.1.1.10xb099Standard query (0)www.google.comA (IP address)IN (0x0001)false
                    Feb 12, 2024 20:19:38.812335014 CET192.168.2.51.1.1.10x1bf8Standard query (0)www.google.com65IN (0x0001)false
                    Feb 12, 2024 20:19:40.490209103 CET192.168.2.58.8.8.80xeb35Standard query (0)google.comA (IP address)IN (0x0001)false
                    Feb 12, 2024 20:19:40.490942955 CET192.168.2.51.1.1.10xbe01Standard query (0)google.comA (IP address)IN (0x0001)false
                    Feb 12, 2024 20:21:03.814848900 CET192.168.2.51.1.1.10xd88fStandard query (0)clients1.google.comA (IP address)IN (0x0001)false
                    Feb 12, 2024 20:21:03.814976931 CET192.168.2.51.1.1.10xbe4fStandard query (0)clients1.google.com65IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Feb 12, 2024 20:19:36.261770010 CET1.1.1.1192.168.2.50x137fNo error (0)clients2.google.comclients.l.google.comCNAME (Canonical name)IN (0x0001)false
                    Feb 12, 2024 20:19:36.261770010 CET1.1.1.1192.168.2.50x137fNo error (0)clients.l.google.com142.250.105.102A (IP address)IN (0x0001)false
                    Feb 12, 2024 20:19:36.261770010 CET1.1.1.1192.168.2.50x137fNo error (0)clients.l.google.com142.250.105.138A (IP address)IN (0x0001)false
                    Feb 12, 2024 20:19:36.261770010 CET1.1.1.1192.168.2.50x137fNo error (0)clients.l.google.com142.250.105.139A (IP address)IN (0x0001)false
                    Feb 12, 2024 20:19:36.261770010 CET1.1.1.1192.168.2.50x137fNo error (0)clients.l.google.com142.250.105.101A (IP address)IN (0x0001)false
                    Feb 12, 2024 20:19:36.261770010 CET1.1.1.1192.168.2.50x137fNo error (0)clients.l.google.com142.250.105.113A (IP address)IN (0x0001)false
                    Feb 12, 2024 20:19:36.261770010 CET1.1.1.1192.168.2.50x137fNo error (0)clients.l.google.com142.250.105.100A (IP address)IN (0x0001)false
                    Feb 12, 2024 20:19:36.262778044 CET1.1.1.1192.168.2.50x1917No error (0)clients2.google.comclients.l.google.comCNAME (Canonical name)IN (0x0001)false
                    Feb 12, 2024 20:19:36.263149023 CET1.1.1.1192.168.2.50x692eNo error (0)accounts.google.com142.250.105.84A (IP address)IN (0x0001)false
                    Feb 12, 2024 20:19:38.929564953 CET1.1.1.1192.168.2.50xb099No error (0)www.google.com64.233.177.103A (IP address)IN (0x0001)false
                    Feb 12, 2024 20:19:38.929564953 CET1.1.1.1192.168.2.50xb099No error (0)www.google.com64.233.177.147A (IP address)IN (0x0001)false
                    Feb 12, 2024 20:19:38.929564953 CET1.1.1.1192.168.2.50xb099No error (0)www.google.com64.233.177.106A (IP address)IN (0x0001)false
                    Feb 12, 2024 20:19:38.929564953 CET1.1.1.1192.168.2.50xb099No error (0)www.google.com64.233.177.99A (IP address)IN (0x0001)false
                    Feb 12, 2024 20:19:38.929564953 CET1.1.1.1192.168.2.50xb099No error (0)www.google.com64.233.177.105A (IP address)IN (0x0001)false
                    Feb 12, 2024 20:19:38.929564953 CET1.1.1.1192.168.2.50xb099No error (0)www.google.com64.233.177.104A (IP address)IN (0x0001)false
                    Feb 12, 2024 20:19:38.930068016 CET1.1.1.1192.168.2.50x1bf8No error (0)www.google.com65IN (0x0001)false
                    Feb 12, 2024 20:19:40.592818022 CET8.8.8.8192.168.2.50xeb35No error (0)google.com172.253.126.102A (IP address)IN (0x0001)false
                    Feb 12, 2024 20:19:40.592818022 CET8.8.8.8192.168.2.50xeb35No error (0)google.com172.253.126.113A (IP address)IN (0x0001)false
                    Feb 12, 2024 20:19:40.592818022 CET8.8.8.8192.168.2.50xeb35No error (0)google.com172.253.126.139A (IP address)IN (0x0001)false
                    Feb 12, 2024 20:19:40.592818022 CET8.8.8.8192.168.2.50xeb35No error (0)google.com172.253.126.138A (IP address)IN (0x0001)false
                    Feb 12, 2024 20:19:40.592818022 CET8.8.8.8192.168.2.50xeb35No error (0)google.com172.253.126.100A (IP address)IN (0x0001)false
                    Feb 12, 2024 20:19:40.592818022 CET8.8.8.8192.168.2.50xeb35No error (0)google.com172.253.126.101A (IP address)IN (0x0001)false
                    Feb 12, 2024 20:19:40.608261108 CET1.1.1.1192.168.2.50xbe01No error (0)google.com142.250.9.113A (IP address)IN (0x0001)false
                    Feb 12, 2024 20:19:40.608261108 CET1.1.1.1192.168.2.50xbe01No error (0)google.com142.250.9.138A (IP address)IN (0x0001)false
                    Feb 12, 2024 20:19:40.608261108 CET1.1.1.1192.168.2.50xbe01No error (0)google.com142.250.9.139A (IP address)IN (0x0001)false
                    Feb 12, 2024 20:19:40.608261108 CET1.1.1.1192.168.2.50xbe01No error (0)google.com142.250.9.100A (IP address)IN (0x0001)false
                    Feb 12, 2024 20:19:40.608261108 CET1.1.1.1192.168.2.50xbe01No error (0)google.com142.250.9.101A (IP address)IN (0x0001)false
                    Feb 12, 2024 20:19:40.608261108 CET1.1.1.1192.168.2.50xbe01No error (0)google.com142.250.9.102A (IP address)IN (0x0001)false
                    Feb 12, 2024 20:21:03.932775974 CET1.1.1.1192.168.2.50xbe4fNo error (0)clients1.google.comclients.l.google.comCNAME (Canonical name)IN (0x0001)false
                    Feb 12, 2024 20:21:03.932797909 CET1.1.1.1192.168.2.50xd88fNo error (0)clients1.google.comclients.l.google.comCNAME (Canonical name)IN (0x0001)false
                    Feb 12, 2024 20:21:03.932797909 CET1.1.1.1192.168.2.50xd88fNo error (0)clients.l.google.com74.125.138.101A (IP address)IN (0x0001)false
                    Feb 12, 2024 20:21:03.932797909 CET1.1.1.1192.168.2.50xd88fNo error (0)clients.l.google.com74.125.138.100A (IP address)IN (0x0001)false
                    Feb 12, 2024 20:21:03.932797909 CET1.1.1.1192.168.2.50xd88fNo error (0)clients.l.google.com74.125.138.138A (IP address)IN (0x0001)false
                    Feb 12, 2024 20:21:03.932797909 CET1.1.1.1192.168.2.50xd88fNo error (0)clients.l.google.com74.125.138.113A (IP address)IN (0x0001)false
                    Feb 12, 2024 20:21:03.932797909 CET1.1.1.1192.168.2.50xd88fNo error (0)clients.l.google.com74.125.138.139A (IP address)IN (0x0001)false
                    Feb 12, 2024 20:21:03.932797909 CET1.1.1.1192.168.2.50xd88fNo error (0)clients.l.google.com74.125.138.102A (IP address)IN (0x0001)false
                    • clients2.google.com
                    • accounts.google.com
                    • fs.microsoft.com
                    • clients1.google.com
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.549709142.250.105.1024432132C:\Program Files\Google\Chrome\Application\chrome.exe
                    TimestampBytes transferredDirectionData
                    2024-02-12 19:19:38 UTC752OUTGET /service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=117.0.5938.132&lang=en-US&acceptformat=crx3,puff&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26brand%3DONGR%26ping%3Dr%253D-1%2526e%253D1 HTTP/1.1
                    Host: clients2.google.com
                    Connection: keep-alive
                    X-Goog-Update-Interactivity: fg
                    X-Goog-Update-AppId: nmmhkkegccagdldgiimedpiccmgmieda
                    X-Goog-Update-Updater: chromecrx-117.0.5938.132
                    Sec-Fetch-Site: none
                    Sec-Fetch-Mode: no-cors
                    Sec-Fetch-Dest: empty
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                    Accept-Encoding: gzip, deflate, br
                    Accept-Language: en-US,en;q=0.9
                    2024-02-12 19:19:38 UTC732INHTTP/1.1 200 OK
                    Content-Security-Policy: script-src 'report-sample' 'nonce-5UUKM0iYam5WXmk7pVZ7Fw' 'unsafe-inline' 'strict-dynamic' https: http:;object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/clientupdate-aus/1
                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                    Pragma: no-cache
                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                    Date: Mon, 12 Feb 2024 19:19:38 GMT
                    Content-Type: text/xml; charset=UTF-8
                    X-Daynum: 6251
                    X-Daystart: 40778
                    X-Content-Type-Options: nosniff
                    X-Frame-Options: SAMEORIGIN
                    X-XSS-Protection: 1; mode=block
                    Server: GSE
                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                    Accept-Ranges: none
                    Vary: Accept-Encoding
                    Connection: close
                    Transfer-Encoding: chunked
                    2024-02-12 19:19:38 UTC520INData Raw: 32 63 39 0d 0a 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 55 54 46 2d 38 22 3f 3e 3c 67 75 70 64 61 74 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 75 70 64 61 74 65 32 2f 72 65 73 70 6f 6e 73 65 22 20 70 72 6f 74 6f 63 6f 6c 3d 22 32 2e 30 22 20 73 65 72 76 65 72 3d 22 70 72 6f 64 22 3e 3c 64 61 79 73 74 61 72 74 20 65 6c 61 70 73 65 64 5f 64 61 79 73 3d 22 36 32 35 31 22 20 65 6c 61 70 73 65 64 5f 73 65 63 6f 6e 64 73 3d 22 34 30 37 37 38 22 2f 3e 3c 61 70 70 20 61 70 70 69 64 3d 22 6e 6d 6d 68 6b 6b 65 67 63 63 61 67 64 6c 64 67 69 69 6d 65 64 70 69 63 63 6d 67 6d 69 65 64 61 22 20 63 6f 68 6f 72 74 3d 22 31 3a 3a 22 20 63 6f 68 6f 72 74 6e 61 6d 65 3d 22 22
                    Data Ascii: 2c9<?xml version="1.0" encoding="UTF-8"?><gupdate xmlns="http://www.google.com/update2/response" protocol="2.0" server="prod"><daystart elapsed_days="6251" elapsed_seconds="40778"/><app appid="nmmhkkegccagdldgiimedpiccmgmieda" cohort="1::" cohortname=""
                    2024-02-12 19:19:38 UTC200INData Raw: 37 32 33 66 35 36 62 38 37 31 37 31 37 35 63 35 33 36 36 38 35 63 35 34 35 30 31 32 32 62 33 30 37 38 39 34 36 34 61 64 38 32 22 20 68 61 73 68 5f 73 68 61 32 35 36 3d 22 38 31 65 33 61 34 64 34 33 61 37 33 36 39 39 65 31 62 37 37 38 31 37 32 33 66 35 36 62 38 37 31 37 31 37 35 63 35 33 36 36 38 35 63 35 34 35 30 31 32 32 62 33 30 37 38 39 34 36 34 61 64 38 32 22 20 70 72 6f 74 65 63 74 65 64 3d 22 30 22 20 73 69 7a 65 3d 22 32 34 38 35 33 31 22 20 73 74 61 74 75 73 3d 22 6f 6b 22 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 2e 30 2e 36 22 2f 3e 3c 2f 61 70 70 3e 3c 2f 67 75 70 64 61 74 65 3e 0d 0a
                    Data Ascii: 723f56b8717175c536685c5450122b30789464ad82" hash_sha256="81e3a4d43a73699e1b7781723f56b8717175c536685c5450122b30789464ad82" protected="0" size="248531" status="ok" version="1.0.0.6"/></app></gupdate>
                    2024-02-12 19:19:38 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    1192.168.2.549710142.250.105.844432132C:\Program Files\Google\Chrome\Application\chrome.exe
                    TimestampBytes transferredDirectionData
                    2024-02-12 19:19:38 UTC680OUTPOST /ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard HTTP/1.1
                    Host: accounts.google.com
                    Connection: keep-alive
                    Content-Length: 1
                    Origin: https://www.google.com
                    Content-Type: application/x-www-form-urlencoded
                    Sec-Fetch-Site: none
                    Sec-Fetch-Mode: no-cors
                    Sec-Fetch-Dest: empty
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                    Accept-Encoding: gzip, deflate, br
                    Accept-Language: en-US,en;q=0.9
                    Cookie: NID=511=Ef5vPFGw-MZYo5hwe-0ThAVslbxbmvdVZwcHnqVzWHAU14v53MN1VvwvQq8baYfg2-IAtqZBV5NOL5rvj2NWIqrz377UhLdHtOgE-tJaBlUBYJEhuGsQdqni3oTJg0brqv1djdiLJyvTSUhdK-c5JWadCSsULPLzhSx-F-6wOg4
                    2024-02-12 19:19:38 UTC1OUTData Raw: 20
                    Data Ascii:
                    2024-02-12 19:19:38 UTC1798INHTTP/1.1 200 OK
                    Content-Type: application/json; charset=utf-8
                    Access-Control-Allow-Origin: https://www.google.com
                    Access-Control-Allow-Credentials: true
                    X-Content-Type-Options: nosniff
                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                    Pragma: no-cache
                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                    Date: Mon, 12 Feb 2024 19:19:38 GMT
                    Strict-Transport-Security: max-age=31536000; includeSubDomains
                    Cross-Origin-Opener-Policy: same-origin
                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factor, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factor=*, ch-ua-platform=*, ch-ua-platform-version=*
                    Content-Security-Policy: script-src 'report-sample' 'nonce-7005lRPx-Howp7RomFF5XQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/IdentityListAccountsHttp/cspreport;worker-src 'self'
                    Content-Security-Policy: script-src 'unsafe-inline' 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/IdentityListAccountsHttp/cspreport/allowlist
                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/IdentityListAccountsHttp/cspreport
                    reporting-endpoints: default="/_/IdentityListAccountsHttp/web-reports?context=eJzjMtDikmLw1JBiOHxtB5Meyy0mIyCe2_2UaSEQH4x7znQUiHf4eLA4pc9gDQFiIW6OU_dWrmMT2LDlTBYAoBcXfw"
                    Server: ESF
                    X-XSS-Protection: 0
                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                    Accept-Ranges: none
                    Vary: Accept-Encoding
                    Connection: close
                    Transfer-Encoding: chunked
                    2024-02-12 19:19:38 UTC23INData Raw: 31 31 0d 0a 5b 22 67 61 69 61 2e 6c 2e 61 2e 72 22 2c 5b 5d 5d 0d 0a
                    Data Ascii: 11["gaia.l.a.r",[]]
                    2024-02-12 19:19:38 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    2192.168.2.54971623.33.136.127443
                    TimestampBytes transferredDirectionData
                    2024-02-12 19:19:43 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
                    Connection: Keep-Alive
                    Accept: */*
                    Accept-Encoding: identity
                    User-Agent: Microsoft BITS/7.8
                    Host: fs.microsoft.com
                    2024-02-12 19:19:43 UTC532INHTTP/1.1 200 OK
                    Content-Type: application/octet-stream
                    Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                    ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                    X-Ms-ApiVersion: Distribute 1.2
                    X-Ms-Region: prod-eus-z1
                    Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                    X-MSEdge-Ref: Ref A: 4C5C4A27F9E3409A8AB56EFA6B524FE7 Ref B: BLUEDGE1822 Ref C: 2024-02-12T10:54:27Z
                    Cache-Control: public, max-age=228837
                    Date: Mon, 12 Feb 2024 19:19:43 GMT
                    Connection: close
                    X-CID: 2


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    3192.168.2.54971723.33.136.127443
                    TimestampBytes transferredDirectionData
                    2024-02-12 19:19:43 UTC239OUTGET /fs/windows/config.json HTTP/1.1
                    Connection: Keep-Alive
                    Accept: */*
                    Accept-Encoding: identity
                    If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
                    Range: bytes=0-2147483646
                    User-Agent: Microsoft BITS/7.8
                    Host: fs.microsoft.com
                    2024-02-12 19:19:44 UTC531INHTTP/1.1 200 OK
                    Content-Type: application/octet-stream
                    Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                    ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                    ApiVersion: Distribute 1.1
                    Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                    X-Azure-Ref: 0URSoYgAAAABePpjyRlUAQrduejDbkqt8U0pDRURHRTA1MjAAY2VmYzI1ODMtYTliMi00NGE3LTk3NTUtYjc2ZDE3ZTA1Zjdm
                    Cache-Control: public, max-age=175387
                    Date: Mon, 12 Feb 2024 19:19:44 GMT
                    Content-Length: 55
                    Connection: close
                    X-CID: 2
                    2024-02-12 19:19:44 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
                    Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


                    Session IDSource IPSource PortDestination IPDestination Port
                    4192.168.2.54972374.125.138.101443
                    TimestampBytes transferredDirectionData
                    2024-02-12 19:21:04 UTC449OUTGET /tools/pso/ping?as=chrome&brand=ONGR&pid=&hl=en&events=C1I,C2I,C7I,C1S,C7S&rep=2&rlz=C1:,C2:,C7:&id=00000000000000000000000000000000000000005EF1BFCF85 HTTP/1.1
                    Host: clients1.google.com
                    Connection: keep-alive
                    Sec-Fetch-Site: none
                    Sec-Fetch-Mode: no-cors
                    Sec-Fetch-Dest: empty
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                    Accept-Encoding: gzip, deflate, br
                    2024-02-12 19:21:04 UTC817INHTTP/1.1 200 OK
                    Content-Security-Policy: script-src 'report-sample' 'nonce-EHkt6mU5cwVbUoZK1I637A' 'unsafe-inline' 'strict-dynamic' https: http:;object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/download-dt/1
                    Content-Security-Policy: script-src 'report-sample' 'nonce-KE-2S-duv0kPzzxIS_g_ZA' 'unsafe-inline' 'strict-dynamic' https: http:;object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/download-dt/1
                    Content-Type: text/plain; charset=utf-8
                    Content-Length: 220
                    Date: Mon, 12 Feb 2024 19:21:04 GMT
                    Expires: Mon, 12 Feb 2024 19:21:04 GMT
                    Cache-Control: private, max-age=0
                    X-Content-Type-Options: nosniff
                    X-Frame-Options: SAMEORIGIN
                    X-XSS-Protection: 1; mode=block
                    Server: GSE
                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                    Connection: close
                    2024-02-12 19:21:04 UTC220INData Raw: 72 6c 7a 43 31 3a 20 31 43 31 4f 4e 47 52 5f 65 6e 55 53 31 30 39 37 0a 72 6c 7a 43 32 3a 20 31 43 32 4f 4e 47 52 5f 65 6e 55 53 31 30 39 37 0a 72 6c 7a 43 37 3a 20 31 43 37 4f 4e 47 52 5f 65 6e 55 53 31 30 39 37 0a 64 63 63 3a 20 0a 73 65 74 5f 64 63 63 3a 20 43 31 3a 31 43 31 4f 4e 47 52 5f 65 6e 55 53 31 30 39 37 2c 43 32 3a 31 43 32 4f 4e 47 52 5f 65 6e 55 53 31 30 39 37 2c 43 37 3a 31 43 37 4f 4e 47 52 5f 65 6e 55 53 31 30 39 37 0a 65 76 65 6e 74 73 3a 20 43 31 49 2c 43 32 49 2c 43 37 49 2c 43 31 53 2c 43 37 53 0a 73 74 61 74 65 66 75 6c 2d 65 76 65 6e 74 73 3a 20 43 31 49 2c 43 32 49 2c 43 37 49 0a 63 72 63 33 32 3a 20 38 39 64 63 30 38 66 37 0a
                    Data Ascii: rlzC1: 1C1ONGR_enUS1097rlzC2: 1C2ONGR_enUS1097rlzC7: 1C7ONGR_enUS1097dcc: set_dcc: C1:1C1ONGR_enUS1097,C2:1C2ONGR_enUS1097,C7:1C7ONGR_enUS1097events: C1I,C2I,C7I,C1S,C7Sstateful-events: C1I,C2I,C7Icrc32: 89dc08f7


                    Click to jump to process

                    Click to jump to process

                    Click to jump to process

                    Target ID:0
                    Start time:20:19:30
                    Start date:12/02/2024
                    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank
                    Imagebase:0x7ff715980000
                    File size:3'242'272 bytes
                    MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:false

                    Target ID:1
                    Start time:20:19:34
                    Start date:12/02/2024
                    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2568 --field-trial-handle=2532,i,1680531711560861017,17543554451149963471,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
                    Imagebase:0x7ff715980000
                    File size:3'242'272 bytes
                    MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:false

                    Target ID:3
                    Start time:20:19:37
                    Start date:12/02/2024
                    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Program Files\Google\Chrome\Application\chrome.exe" "http://https:/e.cdlt.jibjab.com/c2/225:4f16e2ba44501a8a8bf3ed302d09b87f:d240209:65c6bb2428085be667d1bac9:1707522852103/8e54784a?jwtH=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9&jwtP=eyJpYXQiOjE3MDc1MjI5NzQsImNkIjoiLmppYmphYi5jb20iLCJjZSI6ODY0MDAsInRrIjoiamliamFibSIsIm10bElEIjoiNjVjNWRiOTFmNGMwYmEzYjExMGM0ZWU4IiwibGlua1VybCI6Imh0dHBzOlwvXC93d3cuamliamFiLmNvbVwvdmlld1wvbWFrZVwvYWRkaWN0ZWRfdG9fbG92ZV9yb2JlcnRfcGFsbWVyX2Fubml2ZXJzYXJ5XC80M2M2NzZkYi0yY2IxLTQ3Y2EtOTA1NS1iMjg0N2VkNTgyNWY_cmVjaXBpZW50X3Rva2VuPTE2ZjNlOTk0LTBkZDgtNDc5Yi1iOTE3LTRhOTJlN2FiMWQxYyZ1dG1fY2FtcGFpZ249dHhfcmVjaXBpZW50X25vdGlmaWNhdGlvbiZ1dG1fdGVybT0mdXRtX3NvdXJjZT1jb3JkaWFsJnV0bV9tZWRpdW09ZW1haWwifQ&jwtS=eOhWS_qON4C7Pn_vFN9iXDtpYuHwzoYSTCcLc-Ce86o__;!!EhqYCQ!cHK5TxT8glt9qsWTQaBnSDPNius5-SdyQMZ78XjuGJ7hEnpIkoW7Wm8RBPEiYsdL79SvidfZc1DWgCTnKDTKz0SxG5Y$%20urldefense.com
                    Imagebase:0x7ff715980000
                    File size:3'242'272 bytes
                    MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:true

                    No disassembly