Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
http://jnxm2.com

Overview

General Information

Sample URL:http://jnxm2.com
Analysis ID:1403356
Infos:

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Stores files to the Windows start menu directory

Classification

  • System is w10x64
  • chrome.exe (PID: 3672 cmdline: C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 344 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2436 --field-trial-handle=2316,i,12543249661076038132,18087643870067252752,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 5940 cmdline: C:\Program Files\Google\Chrome\Application\chrome.exe" "http://jnxm2.com MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: https://jnxm2.com/HTTP Parser: No favicon
Source: unknownHTTPS traffic detected: 104.76.104.139:443 -> 192.168.2.8:49716 version: TLS 1.2
Source: unknownHTTPS traffic detected: 104.76.104.139:443 -> 192.168.2.8:49717 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.206.229.226:443 -> 192.168.2.8:49703 version: TLS 1.2
Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 104.76.104.139
Source: unknownTCP traffic detected without corresponding DNS query: 104.76.104.139
Source: unknownTCP traffic detected without corresponding DNS query: 104.76.104.139
Source: unknownTCP traffic detected without corresponding DNS query: 104.76.104.139
Source: unknownTCP traffic detected without corresponding DNS query: 104.76.104.139
Source: unknownTCP traffic detected without corresponding DNS query: 104.76.104.139
Source: unknownTCP traffic detected without corresponding DNS query: 104.76.104.139
Source: unknownTCP traffic detected without corresponding DNS query: 104.76.104.139
Source: unknownTCP traffic detected without corresponding DNS query: 104.76.104.139
Source: unknownTCP traffic detected without corresponding DNS query: 104.76.104.139
Source: unknownTCP traffic detected without corresponding DNS query: 104.76.104.139
Source: unknownTCP traffic detected without corresponding DNS query: 104.76.104.139
Source: unknownTCP traffic detected without corresponding DNS query: 104.76.104.139
Source: unknownTCP traffic detected without corresponding DNS query: 104.76.104.139
Source: unknownTCP traffic detected without corresponding DNS query: 104.76.104.139
Source: unknownTCP traffic detected without corresponding DNS query: 104.76.104.139
Source: unknownTCP traffic detected without corresponding DNS query: 104.76.104.139
Source: unknownTCP traffic detected without corresponding DNS query: 104.76.104.139
Source: unknownTCP traffic detected without corresponding DNS query: 104.76.104.139
Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 104.117.182.64
Source: unknownTCP traffic detected without corresponding DNS query: 104.117.182.64
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: jnxm2.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
Source: unknownDNS traffic detected: queries for: jnxm2.com
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 05 Mar 2024 11:57:35 GMTContent-Type: text/html; charset=utf-8Content-Length: 139Connection: closeServer: nginxX-Powered-By: ExpressAccess-Control-Allow-Origin: *Content-Security-Policy: default-src 'none'X-Content-Type-Options: nosniff
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49676 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownHTTPS traffic detected: 104.76.104.139:443 -> 192.168.2.8:49716 version: TLS 1.2
Source: unknownHTTPS traffic detected: 104.76.104.139:443 -> 192.168.2.8:49717 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.206.229.226:443 -> 192.168.2.8:49703 version: TLS 1.2
Source: classification engineClassification label: clean0.win@17/8@6/4
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2436 --field-trial-handle=2316,i,12543249661076038132,18087643870067252752,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe" "http://jnxm2.com
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2436 --field-trial-handle=2316,i,12543249661076038132,18087643870067252752,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Google Drive.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media3
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive4
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture3
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
http://jnxm2.com0%Avira URL Cloudsafe
http://jnxm2.com4%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
jnxm2.com4%VirustotalBrowse
fp2e7a.wpc.phicdn.net0%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
jnxm2.com
3.17.122.81
truefalseunknown
www.google.com
142.250.80.36
truefalse
    high
    fp2e7a.wpc.phicdn.net
    192.229.211.108
    truefalseunknown
    NameMaliciousAntivirus DetectionReputation
    https://jnxm2.com/false
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      142.250.80.36
      www.google.comUnited States
      15169GOOGLEUSfalse
      239.255.255.250
      unknownReserved
      unknownunknownfalse
      3.17.122.81
      jnxm2.comUnited States
      16509AMAZON-02USfalse
      IP
      192.168.2.8
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1403356
      Start date and time:2024-03-05 12:56:41 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 3m 8s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:browseurl.jbs
      Sample URL:http://jnxm2.com
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:10
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:CLEAN
      Classification:clean0.win@17/8@6/4
      EGA Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 142.251.35.163, 142.250.81.238, 172.253.62.84, 34.104.35.123, 40.68.123.157, 192.229.211.108, 20.242.39.171, 13.85.23.206, 142.250.72.99
      • Excluded domains from analysis (whitelisted): fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, clientservices.googleapis.com, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, ocsp.digicert.com, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, update.googleapis.com, clients.l.google.com, glb.sls.prod.dcat.dsp.trafficmanager.net
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtSetInformationFile calls found.
      No simulations
      No context
      No context
      No context
      No context
      No context
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Mar 5 10:57:34 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
      Category:dropped
      Size (bytes):2677
      Entropy (8bit):3.9725579128162027
      Encrypted:false
      SSDEEP:48:8U0dJsTKG/HVidAKZdA1oehwiZUklqehty+3:8UYsfWay
      MD5:733FBD0129DA58B5EFF92DBA03D903C3
      SHA1:0679BCED1FC067A2588FF7F797626DF2893F50DD
      SHA-256:83B0FCA04E05E9975501D048D2D1CB023D2C64139A61E4EF9E2A198877D844EA
      SHA-512:851AF69751349E1DF00228914E3D0CAB22C9C71A5870E8242050AE6A6D181AAB17A64199AB9F4D55827658A940B5EB7099182502618C537E2A3A2079D6DE04A6
      Malicious:false
      Reputation:low
      Preview:L..................F.@.. ...$+.,......O.n..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW)C..PROGRA~1..t......O.IeX/_....B...............J.....V...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VeX/_....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VeX/_....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VeX/_..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VeX2_...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............|......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Mar 5 10:57:34 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
      Category:dropped
      Size (bytes):2679
      Entropy (8bit):3.9890829377219412
      Encrypted:false
      SSDEEP:48:890dJsTKG/HVidAKZdA1leh/iZUkAQkqehKy+2:89Ysf09QLy
      MD5:F725DF8E959A456900B89F70EDD8FCE2
      SHA1:380E3EF22A306B964BD7D399DEC186C69D715ACC
      SHA-256:3063B8C8FB8393FAFBB37F507D58497673A7406C3D286E47E4D3123F67E261E4
      SHA-512:19E5AF5455E7BDBE942A5995F989BCFDB6A5813188E15B297312C73E3F778C21328DE2A487AB0DAE7299005FA0D1BA7B3BD69698942005AD9146A56653A73DD9
      Malicious:false
      Reputation:low
      Preview:L..................F.@.. ...$+.,.......O.n..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW)C..PROGRA~1..t......O.IeX/_....B...............J.....V...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VeX/_....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VeX/_....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VeX/_..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VeX2_...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............|......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 07:00:51 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
      Category:dropped
      Size (bytes):2693
      Entropy (8bit):4.000653691023151
      Encrypted:false
      SSDEEP:48:8r0dJsTKGbHVidAKZdA14t5eh7sFiZUkmgqeh7sAy+BX:8rYsfYnWy
      MD5:4D4EF8281E6461A469D179FB768C50E5
      SHA1:95A75BAD1EB2ECA108A856BEFD124E3D84C79A97
      SHA-256:626273D6A21656E6DBB276B5146520E8E72AFA89C69BB3DCD22A2F1F6B48E5EB
      SHA-512:C5D19E11715C02F4C65741A7D47BFC736C1FF55C2215ACE5385BFD4F0E68A20050089D9D9DF24051F13688A1A4630B911BFF10A1C090C3D50D231537C1F50A80
      Malicious:false
      Reputation:low
      Preview:L..................F.@.. ...$+.,.....C..b...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW)C..PROGRA~1..t......O.IeX/_....B...............J.....V...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VeX/_....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VeX/_....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VeX/_..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VEW.@...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............|......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Mar 5 10:57:34 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
      Category:dropped
      Size (bytes):2681
      Entropy (8bit):3.987648769271549
      Encrypted:false
      SSDEEP:48:8GH0dJsTKG/HVidAKZdA16ehDiZUkwqehOy+R:8GHYsfvYy
      MD5:52B3F8E5F69A1AF3ED1BD1937C2DD8BD
      SHA1:ADCE6D276711AE0A1B4ABBCFEFF854B71CEBCA25
      SHA-256:89FE1855683D809C6709DDF8ECF70FB3678EC1F380DACED862DD590411A6F53F
      SHA-512:82BBBC57776A343518831AF9F0F96BDE612A33F7FA0AD973409AAB2A68E612D4C921B5157FEE7E9192DE01246B1D2D5214404C0D04CE998D3DFD41826CCD9C5E
      Malicious:false
      Reputation:low
      Preview:L..................F.@.. ...$+.,......O.n..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW)C..PROGRA~1..t......O.IeX/_....B...............J.....V...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VeX/_....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VeX/_....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VeX/_..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VeX2_...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............|......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Mar 5 10:57:34 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
      Category:dropped
      Size (bytes):2681
      Entropy (8bit):3.9749279082665954
      Encrypted:false
      SSDEEP:48:8b0dJsTKG/HVidAKZdA1UehBiZUk1W1qeh8y+C:8bYsfv9cy
      MD5:CBF794F0B8ACC3AF4C42F5DE2609A610
      SHA1:1B9A6244D8D3079C331F61E0ACA40A25B370920D
      SHA-256:ABE2A2D0C43511EA54E0129DDB69F2B3655A86836F668825C4DE0527AA213DDF
      SHA-512:B7BE4574583DBAE74083C62D01FEDE9D3D9E2CB1617AA10AB40060A4441E3384AC77C7A86DAFB45F6A51B9AAF4ED802FE4B4BD8B7B44B646CC3A6B3677099048
      Malicious:false
      Reputation:low
      Preview:L..................F.@.. ...$+.,.....5.O.n..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW)C..PROGRA~1..t......O.IeX/_....B...............J.....V...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VeX/_....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VeX/_....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VeX/_..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VeX2_...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............|......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Mar 5 10:57:34 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
      Category:dropped
      Size (bytes):2683
      Entropy (8bit):3.9872476823590204
      Encrypted:false
      SSDEEP:48:8K0dJsTKG/HVidAKZdA1duTrehOuTbbiZUk5OjqehOuTbWy+yT+:8KYsfoTYTbxWOvTbWy7T
      MD5:1FAEFE1B05C6520B75BF40D7F3EB7F84
      SHA1:5DDC0F9D31B7ABFFBE0FF2F145EF9BECF9020B51
      SHA-256:65DFC986DAB52AD55B5B896375BA1D386BED5552C35E61597C452BE298E92B48
      SHA-512:F563CA1323B178FF0A41A62194A93EA6C6442057728D527EEB9E56693859721D8DADDC4CE2E858325004278713A23703FEA039D110CCF3F10E0ED773F3749636
      Malicious:false
      Reputation:low
      Preview:L..................F.@.. ...$+.,......|O.n..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW)C..PROGRA~1..t......O.IeX/_....B...............J.....V...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VeX/_....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VeX/_....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VeX/_..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VeX2_...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............|......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:HTML document, ASCII text
      Category:downloaded
      Size (bytes):139
      Entropy (8bit):4.717826995152233
      Encrypted:false
      SSDEEP:3:PouV7uJzhquHbtt6vYk2ZRMRJfHKERSAEtvxLrXZiLKY8K09AbBK6c4NGL:hxuJzhqIzyYk+qRU4zEdxXZiqsbBK34A
      MD5:DA7DA7D630292E7A2A7DDA8CA87B3D39
      SHA1:A4CB76424DC44433A2DF01FE8B0BBD836D15E970
      SHA-256:52C1E7A2C36BE28C42455FE1572D7D7918C3180CAD99A2B82DAA2A38A7E7BB23
      SHA-512:9E717F9C6699B280436CA9BE7107BA6301430D4DEF8311B963A266A5B3B91B2719687B04860509B6142FA24D629A3217BD450696559FE6D9DC8C60BCCFD740AD
      Malicious:false
      Reputation:low
      URL:https://jnxm2.com/
      Preview:<!DOCTYPE html>.<html lang="en">.<head>.<meta charset="utf-8">.<title>Error</title>.</head>.<body>.<pre>Cannot GET /</pre>.</body>.</html>.
      No static file info
      TimestampSource PortDest PortSource IPDest IP
      Mar 5, 2024 12:57:24.737440109 CET49676443192.168.2.852.182.143.211
      Mar 5, 2024 12:57:27.143534899 CET49676443192.168.2.852.182.143.211
      Mar 5, 2024 12:57:27.659199953 CET49673443192.168.2.823.206.229.226
      Mar 5, 2024 12:57:28.034182072 CET49672443192.168.2.823.206.229.226
      Mar 5, 2024 12:57:31.956043005 CET49676443192.168.2.852.182.143.211
      Mar 5, 2024 12:57:33.346807003 CET49671443192.168.2.8204.79.197.203
      Mar 5, 2024 12:57:34.034281015 CET4434970323.206.229.226192.168.2.8
      Mar 5, 2024 12:57:34.034408092 CET49703443192.168.2.823.206.229.226
      Mar 5, 2024 12:57:35.296840906 CET4971080192.168.2.83.17.122.81
      Mar 5, 2024 12:57:35.299041033 CET4971180192.168.2.83.17.122.81
      Mar 5, 2024 12:57:35.299597025 CET49712443192.168.2.83.17.122.81
      Mar 5, 2024 12:57:35.299616098 CET443497123.17.122.81192.168.2.8
      Mar 5, 2024 12:57:35.299679041 CET49712443192.168.2.83.17.122.81
      Mar 5, 2024 12:57:35.299992085 CET49712443192.168.2.83.17.122.81
      Mar 5, 2024 12:57:35.299999952 CET443497123.17.122.81192.168.2.8
      Mar 5, 2024 12:57:35.398900032 CET80497103.17.122.81192.168.2.8
      Mar 5, 2024 12:57:35.399012089 CET4971080192.168.2.83.17.122.81
      Mar 5, 2024 12:57:35.401454926 CET80497113.17.122.81192.168.2.8
      Mar 5, 2024 12:57:35.401654005 CET4971180192.168.2.83.17.122.81
      Mar 5, 2024 12:57:35.617196083 CET443497123.17.122.81192.168.2.8
      Mar 5, 2024 12:57:35.617589951 CET49712443192.168.2.83.17.122.81
      Mar 5, 2024 12:57:35.617603064 CET443497123.17.122.81192.168.2.8
      Mar 5, 2024 12:57:35.618663073 CET443497123.17.122.81192.168.2.8
      Mar 5, 2024 12:57:35.618735075 CET49712443192.168.2.83.17.122.81
      Mar 5, 2024 12:57:35.619849920 CET49712443192.168.2.83.17.122.81
      Mar 5, 2024 12:57:35.619906902 CET443497123.17.122.81192.168.2.8
      Mar 5, 2024 12:57:35.620026112 CET49712443192.168.2.83.17.122.81
      Mar 5, 2024 12:57:35.620033979 CET443497123.17.122.81192.168.2.8
      Mar 5, 2024 12:57:35.667494059 CET49712443192.168.2.83.17.122.81
      Mar 5, 2024 12:57:35.724766970 CET443497123.17.122.81192.168.2.8
      Mar 5, 2024 12:57:35.724951982 CET443497123.17.122.81192.168.2.8
      Mar 5, 2024 12:57:35.726203918 CET49712443192.168.2.83.17.122.81
      Mar 5, 2024 12:57:35.729871988 CET49712443192.168.2.83.17.122.81
      Mar 5, 2024 12:57:35.729912996 CET443497123.17.122.81192.168.2.8
      Mar 5, 2024 12:57:37.061127901 CET49715443192.168.2.8142.250.80.36
      Mar 5, 2024 12:57:37.061182976 CET44349715142.250.80.36192.168.2.8
      Mar 5, 2024 12:57:37.061240911 CET49715443192.168.2.8142.250.80.36
      Mar 5, 2024 12:57:37.061670065 CET49715443192.168.2.8142.250.80.36
      Mar 5, 2024 12:57:37.061691999 CET44349715142.250.80.36192.168.2.8
      Mar 5, 2024 12:57:37.260756016 CET49673443192.168.2.823.206.229.226
      Mar 5, 2024 12:57:37.269124985 CET44349715142.250.80.36192.168.2.8
      Mar 5, 2024 12:57:37.269709110 CET49715443192.168.2.8142.250.80.36
      Mar 5, 2024 12:57:37.269769907 CET44349715142.250.80.36192.168.2.8
      Mar 5, 2024 12:57:37.270946026 CET44349715142.250.80.36192.168.2.8
      Mar 5, 2024 12:57:37.271025896 CET49715443192.168.2.8142.250.80.36
      Mar 5, 2024 12:57:37.272932053 CET49715443192.168.2.8142.250.80.36
      Mar 5, 2024 12:57:37.273031950 CET44349715142.250.80.36192.168.2.8
      Mar 5, 2024 12:57:37.323236942 CET49715443192.168.2.8142.250.80.36
      Mar 5, 2024 12:57:37.323268890 CET44349715142.250.80.36192.168.2.8
      Mar 5, 2024 12:57:37.370121956 CET49715443192.168.2.8142.250.80.36
      Mar 5, 2024 12:57:37.635986090 CET49672443192.168.2.823.206.229.226
      Mar 5, 2024 12:57:38.415921926 CET49716443192.168.2.8104.76.104.139
      Mar 5, 2024 12:57:38.415988922 CET44349716104.76.104.139192.168.2.8
      Mar 5, 2024 12:57:38.418054104 CET49716443192.168.2.8104.76.104.139
      Mar 5, 2024 12:57:38.421869040 CET49716443192.168.2.8104.76.104.139
      Mar 5, 2024 12:57:38.421904087 CET44349716104.76.104.139192.168.2.8
      Mar 5, 2024 12:57:38.611709118 CET44349716104.76.104.139192.168.2.8
      Mar 5, 2024 12:57:38.612920046 CET49716443192.168.2.8104.76.104.139
      Mar 5, 2024 12:57:38.618527889 CET49716443192.168.2.8104.76.104.139
      Mar 5, 2024 12:57:38.618546009 CET44349716104.76.104.139192.168.2.8
      Mar 5, 2024 12:57:38.618830919 CET44349716104.76.104.139192.168.2.8
      Mar 5, 2024 12:57:38.670171022 CET49716443192.168.2.8104.76.104.139
      Mar 5, 2024 12:57:38.866162062 CET49716443192.168.2.8104.76.104.139
      Mar 5, 2024 12:57:38.913908958 CET44349716104.76.104.139192.168.2.8
      Mar 5, 2024 12:57:38.968293905 CET44349716104.76.104.139192.168.2.8
      Mar 5, 2024 12:57:38.968436956 CET44349716104.76.104.139192.168.2.8
      Mar 5, 2024 12:57:38.968642950 CET49716443192.168.2.8104.76.104.139
      Mar 5, 2024 12:57:38.968879938 CET49716443192.168.2.8104.76.104.139
      Mar 5, 2024 12:57:38.968879938 CET49716443192.168.2.8104.76.104.139
      Mar 5, 2024 12:57:38.968899965 CET44349716104.76.104.139192.168.2.8
      Mar 5, 2024 12:57:38.968911886 CET44349716104.76.104.139192.168.2.8
      Mar 5, 2024 12:57:39.038358927 CET49717443192.168.2.8104.76.104.139
      Mar 5, 2024 12:57:39.038399935 CET44349717104.76.104.139192.168.2.8
      Mar 5, 2024 12:57:39.038475990 CET49717443192.168.2.8104.76.104.139
      Mar 5, 2024 12:57:39.039186954 CET49717443192.168.2.8104.76.104.139
      Mar 5, 2024 12:57:39.039201021 CET44349717104.76.104.139192.168.2.8
      Mar 5, 2024 12:57:39.221836090 CET44349717104.76.104.139192.168.2.8
      Mar 5, 2024 12:57:39.221918106 CET49717443192.168.2.8104.76.104.139
      Mar 5, 2024 12:57:39.228262901 CET49717443192.168.2.8104.76.104.139
      Mar 5, 2024 12:57:39.228280067 CET44349717104.76.104.139192.168.2.8
      Mar 5, 2024 12:57:39.228585958 CET44349717104.76.104.139192.168.2.8
      Mar 5, 2024 12:57:39.233685970 CET49717443192.168.2.8104.76.104.139
      Mar 5, 2024 12:57:39.273912907 CET44349717104.76.104.139192.168.2.8
      Mar 5, 2024 12:57:39.397001982 CET44349717104.76.104.139192.168.2.8
      Mar 5, 2024 12:57:39.397080898 CET44349717104.76.104.139192.168.2.8
      Mar 5, 2024 12:57:39.397154093 CET49717443192.168.2.8104.76.104.139
      Mar 5, 2024 12:57:39.399616003 CET49717443192.168.2.8104.76.104.139
      Mar 5, 2024 12:57:39.399637938 CET44349717104.76.104.139192.168.2.8
      Mar 5, 2024 12:57:39.399652004 CET49717443192.168.2.8104.76.104.139
      Mar 5, 2024 12:57:39.399657965 CET44349717104.76.104.139192.168.2.8
      Mar 5, 2024 12:57:41.561063051 CET49676443192.168.2.852.182.143.211
      Mar 5, 2024 12:57:47.273271084 CET44349715142.250.80.36192.168.2.8
      Mar 5, 2024 12:57:47.273346901 CET44349715142.250.80.36192.168.2.8
      Mar 5, 2024 12:57:47.273596048 CET49715443192.168.2.8142.250.80.36
      Mar 5, 2024 12:57:48.053289890 CET49715443192.168.2.8142.250.80.36
      Mar 5, 2024 12:57:48.053325891 CET44349715142.250.80.36192.168.2.8
      Mar 5, 2024 12:57:48.428435087 CET49703443192.168.2.823.206.229.226
      Mar 5, 2024 12:57:48.581228018 CET4434970323.206.229.226192.168.2.8
      Mar 5, 2024 12:57:48.581985950 CET4434970323.206.229.226192.168.2.8
      Mar 5, 2024 12:57:48.582034111 CET4434970323.206.229.226192.168.2.8
      Mar 5, 2024 12:57:48.582043886 CET49703443192.168.2.823.206.229.226
      Mar 5, 2024 12:57:48.582096100 CET49703443192.168.2.823.206.229.226
      Mar 5, 2024 12:57:48.582109928 CET4434970323.206.229.226192.168.2.8
      Mar 5, 2024 12:57:48.582125902 CET4434970323.206.229.226192.168.2.8
      Mar 5, 2024 12:57:48.582149029 CET49703443192.168.2.823.206.229.226
      Mar 5, 2024 12:57:48.582166910 CET49703443192.168.2.823.206.229.226
      Mar 5, 2024 12:57:50.210592031 CET49703443192.168.2.823.206.229.226
      Mar 5, 2024 12:57:50.363159895 CET4434970323.206.229.226192.168.2.8
      Mar 5, 2024 12:57:50.363351107 CET4434970323.206.229.226192.168.2.8
      Mar 5, 2024 12:57:50.363406897 CET49703443192.168.2.823.206.229.226
      Mar 5, 2024 12:57:50.364576101 CET49703443192.168.2.823.206.229.226
      Mar 5, 2024 12:57:50.364643097 CET49703443192.168.2.823.206.229.226
      Mar 5, 2024 12:57:50.365184069 CET49703443192.168.2.823.206.229.226
      Mar 5, 2024 12:57:50.365246058 CET49703443192.168.2.823.206.229.226
      Mar 5, 2024 12:57:50.518213987 CET4434970323.206.229.226192.168.2.8
      Mar 5, 2024 12:57:50.518233061 CET4434970323.206.229.226192.168.2.8
      Mar 5, 2024 12:57:50.518248081 CET4434970323.206.229.226192.168.2.8
      Mar 5, 2024 12:57:50.518258095 CET4434970323.206.229.226192.168.2.8
      Mar 5, 2024 12:57:50.518299103 CET4434970323.206.229.226192.168.2.8
      Mar 5, 2024 12:57:50.523781061 CET4434970323.206.229.226192.168.2.8
      Mar 5, 2024 12:57:50.523801088 CET4434970323.206.229.226192.168.2.8
      Mar 5, 2024 12:57:50.523838997 CET49703443192.168.2.823.206.229.226
      Mar 5, 2024 12:57:50.523871899 CET49703443192.168.2.823.206.229.226
      Mar 5, 2024 12:57:50.524175882 CET49703443192.168.2.823.206.229.226
      Mar 5, 2024 12:57:50.571512938 CET4434970323.206.229.226192.168.2.8
      Mar 5, 2024 12:57:50.571552992 CET4434970323.206.229.226192.168.2.8
      Mar 5, 2024 12:57:50.571680069 CET49703443192.168.2.823.206.229.226
      Mar 5, 2024 12:57:50.571680069 CET49703443192.168.2.823.206.229.226
      Mar 5, 2024 12:57:50.717160940 CET4434970323.206.229.226192.168.2.8
      Mar 5, 2024 12:58:20.400964975 CET4971080192.168.2.83.17.122.81
      Mar 5, 2024 12:58:20.416577101 CET4971180192.168.2.83.17.122.81
      Mar 5, 2024 12:58:20.503571987 CET80497103.17.122.81192.168.2.8
      Mar 5, 2024 12:58:20.519042015 CET80497113.17.122.81192.168.2.8
      Mar 5, 2024 12:58:23.245126009 CET4970480192.168.2.8104.117.182.64
      Mar 5, 2024 12:58:23.333003044 CET8049704104.117.182.64192.168.2.8
      Mar 5, 2024 12:58:23.333071947 CET4970480192.168.2.8104.117.182.64
      Mar 5, 2024 12:58:35.505103111 CET80497113.17.122.81192.168.2.8
      Mar 5, 2024 12:58:35.505131960 CET80497103.17.122.81192.168.2.8
      Mar 5, 2024 12:58:35.505193949 CET4971180192.168.2.83.17.122.81
      Mar 5, 2024 12:58:35.505249023 CET4971080192.168.2.83.17.122.81
      Mar 5, 2024 12:58:36.015938044 CET4971080192.168.2.83.17.122.81
      Mar 5, 2024 12:58:36.015997887 CET4971180192.168.2.83.17.122.81
      Mar 5, 2024 12:58:36.120280981 CET80497113.17.122.81192.168.2.8
      Mar 5, 2024 12:58:36.126140118 CET80497103.17.122.81192.168.2.8
      Mar 5, 2024 12:58:37.031280994 CET49722443192.168.2.8142.250.80.36
      Mar 5, 2024 12:58:37.031358957 CET44349722142.250.80.36192.168.2.8
      Mar 5, 2024 12:58:37.031441927 CET49722443192.168.2.8142.250.80.36
      Mar 5, 2024 12:58:37.031821012 CET49722443192.168.2.8142.250.80.36
      Mar 5, 2024 12:58:37.031841993 CET44349722142.250.80.36192.168.2.8
      Mar 5, 2024 12:58:37.220885992 CET44349722142.250.80.36192.168.2.8
      Mar 5, 2024 12:58:37.221388102 CET49722443192.168.2.8142.250.80.36
      Mar 5, 2024 12:58:37.221456051 CET44349722142.250.80.36192.168.2.8
      Mar 5, 2024 12:58:37.221823931 CET44349722142.250.80.36192.168.2.8
      Mar 5, 2024 12:58:37.222275972 CET49722443192.168.2.8142.250.80.36
      Mar 5, 2024 12:58:37.222356081 CET44349722142.250.80.36192.168.2.8
      Mar 5, 2024 12:58:37.263381004 CET49722443192.168.2.8142.250.80.36
      Mar 5, 2024 12:58:47.241978884 CET44349722142.250.80.36192.168.2.8
      Mar 5, 2024 12:58:47.242058992 CET44349722142.250.80.36192.168.2.8
      Mar 5, 2024 12:58:47.242189884 CET49722443192.168.2.8142.250.80.36
      Mar 5, 2024 12:58:48.012236118 CET49722443192.168.2.8142.250.80.36
      Mar 5, 2024 12:58:48.012307882 CET44349722142.250.80.36192.168.2.8
      TimestampSource PortDest PortSource IPDest IP
      Mar 5, 2024 12:57:33.864326954 CET53515001.1.1.1192.168.2.8
      Mar 5, 2024 12:57:33.887624979 CET53547811.1.1.1192.168.2.8
      Mar 5, 2024 12:57:34.424834013 CET53633281.1.1.1192.168.2.8
      Mar 5, 2024 12:57:35.177511930 CET5522753192.168.2.81.1.1.1
      Mar 5, 2024 12:57:35.180000067 CET6279653192.168.2.81.1.1.1
      Mar 5, 2024 12:57:35.199086905 CET5826653192.168.2.81.1.1.1
      Mar 5, 2024 12:57:35.199562073 CET6080253192.168.2.81.1.1.1
      Mar 5, 2024 12:57:35.265678883 CET53552271.1.1.1192.168.2.8
      Mar 5, 2024 12:57:35.267956018 CET53627961.1.1.1192.168.2.8
      Mar 5, 2024 12:57:35.287883997 CET53582661.1.1.1192.168.2.8
      Mar 5, 2024 12:57:35.288252115 CET53608021.1.1.1192.168.2.8
      Mar 5, 2024 12:57:36.969069958 CET6517353192.168.2.81.1.1.1
      Mar 5, 2024 12:57:36.969679117 CET5583653192.168.2.81.1.1.1
      Mar 5, 2024 12:57:37.058167934 CET53651731.1.1.1192.168.2.8
      Mar 5, 2024 12:57:37.058657885 CET53558361.1.1.1192.168.2.8
      Mar 5, 2024 12:57:51.523578882 CET53526201.1.1.1192.168.2.8
      Mar 5, 2024 12:58:10.350151062 CET53580861.1.1.1192.168.2.8
      Mar 5, 2024 12:58:22.379801035 CET138138192.168.2.8192.168.2.255
      Mar 5, 2024 12:58:32.492255926 CET53650231.1.1.1192.168.2.8
      Mar 5, 2024 12:58:32.840699911 CET53492641.1.1.1192.168.2.8
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Mar 5, 2024 12:57:35.177511930 CET192.168.2.81.1.1.10x9e8aStandard query (0)jnxm2.comA (IP address)IN (0x0001)false
      Mar 5, 2024 12:57:35.180000067 CET192.168.2.81.1.1.10xfc6dStandard query (0)jnxm2.com65IN (0x0001)false
      Mar 5, 2024 12:57:35.199086905 CET192.168.2.81.1.1.10x1f0dStandard query (0)jnxm2.comA (IP address)IN (0x0001)false
      Mar 5, 2024 12:57:35.199562073 CET192.168.2.81.1.1.10x7c67Standard query (0)jnxm2.com65IN (0x0001)false
      Mar 5, 2024 12:57:36.969069958 CET192.168.2.81.1.1.10x60b2Standard query (0)www.google.comA (IP address)IN (0x0001)false
      Mar 5, 2024 12:57:36.969679117 CET192.168.2.81.1.1.10x69e5Standard query (0)www.google.com65IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Mar 5, 2024 12:57:35.265678883 CET1.1.1.1192.168.2.80x9e8aNo error (0)jnxm2.com3.17.122.81A (IP address)IN (0x0001)false
      Mar 5, 2024 12:57:35.265678883 CET1.1.1.1192.168.2.80x9e8aNo error (0)jnxm2.com3.131.199.178A (IP address)IN (0x0001)false
      Mar 5, 2024 12:57:35.265678883 CET1.1.1.1192.168.2.80x9e8aNo error (0)jnxm2.com3.136.242.164A (IP address)IN (0x0001)false
      Mar 5, 2024 12:57:35.287883997 CET1.1.1.1192.168.2.80x1f0dNo error (0)jnxm2.com3.17.122.81A (IP address)IN (0x0001)false
      Mar 5, 2024 12:57:35.287883997 CET1.1.1.1192.168.2.80x1f0dNo error (0)jnxm2.com3.136.242.164A (IP address)IN (0x0001)false
      Mar 5, 2024 12:57:35.287883997 CET1.1.1.1192.168.2.80x1f0dNo error (0)jnxm2.com3.131.199.178A (IP address)IN (0x0001)false
      Mar 5, 2024 12:57:37.058167934 CET1.1.1.1192.168.2.80x60b2No error (0)www.google.com142.250.80.36A (IP address)IN (0x0001)false
      Mar 5, 2024 12:57:37.058657885 CET1.1.1.1192.168.2.80x69e5No error (0)www.google.com65IN (0x0001)false
      Mar 5, 2024 12:57:48.749586105 CET1.1.1.1192.168.2.80x4045No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
      Mar 5, 2024 12:57:48.749586105 CET1.1.1.1192.168.2.80x4045No error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
      Mar 5, 2024 12:58:02.459405899 CET1.1.1.1192.168.2.80xeb07No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
      Mar 5, 2024 12:58:02.459405899 CET1.1.1.1192.168.2.80xeb07No error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
      Mar 5, 2024 12:58:25.444322109 CET1.1.1.1192.168.2.80x17aNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
      Mar 5, 2024 12:58:25.444322109 CET1.1.1.1192.168.2.80x17aNo error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
      Mar 5, 2024 12:58:45.538666010 CET1.1.1.1192.168.2.80x7412No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
      Mar 5, 2024 12:58:45.538666010 CET1.1.1.1192.168.2.80x7412No error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
      • jnxm2.com
      • fs.microsoft.com
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.8497103.17.122.8180344C:\Program Files\Google\Chrome\Application\chrome.exe
      TimestampBytes transferredDirectionData
      Mar 5, 2024 12:58:20.400964975 CET6OUTData Raw: 00
      Data Ascii:


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      1192.168.2.8497113.17.122.8180344C:\Program Files\Google\Chrome\Application\chrome.exe
      TimestampBytes transferredDirectionData
      Mar 5, 2024 12:58:20.416577101 CET6OUTData Raw: 00
      Data Ascii:


      TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
      Mar 5, 2024 12:57:48.582109928 CET23.206.229.226443192.168.2.849703CN=r.bing.com, O=Microsoft Corporation, L=Redmond, ST=WA, C=US CN=Microsoft Azure ECC TLS Issuing CA 05, O=Microsoft Corporation, C=USCN=Microsoft Azure ECC TLS Issuing CA 05, O=Microsoft Corporation, C=US CN=DigiCert Global Root G3, OU=www.digicert.com, O=DigiCert Inc, C=USWed Oct 18 22:32:40 CEST 2023 Wed Aug 12 02:00:00 CEST 2020Fri Jun 28 01:59:59 CEST 2024 Fri Jun 28 01:59:59 CEST 2024771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-5-10-11-13-35-16-23-65281,29-23-24,028a2c9bd18a11de089ef85a160da29e4
      CN=Microsoft Azure ECC TLS Issuing CA 05, O=Microsoft Corporation, C=USCN=DigiCert Global Root G3, OU=www.digicert.com, O=DigiCert Inc, C=USWed Aug 12 02:00:00 CEST 2020Fri Jun 28 01:59:59 CEST 2024
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.8497123.17.122.81443344C:\Program Files\Google\Chrome\Application\chrome.exe
      TimestampBytes transferredDirectionData
      2024-03-05 11:57:35 UTC652OUTGET / HTTP/1.1
      Host: jnxm2.com
      Connection: keep-alive
      Upgrade-Insecure-Requests: 1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
      sec-ch-ua-mobile: ?0
      sec-ch-ua-platform: "Windows"
      Sec-Fetch-Site: none
      Sec-Fetch-Mode: navigate
      Sec-Fetch-User: ?1
      Sec-Fetch-Dest: document
      Accept-Encoding: gzip, deflate, br
      Accept-Language: en-US,en;q=0.9
      2024-03-05 11:57:35 UTC291INHTTP/1.1 404 Not Found
      Date: Tue, 05 Mar 2024 11:57:35 GMT
      Content-Type: text/html; charset=utf-8
      Content-Length: 139
      Connection: close
      Server: nginx
      X-Powered-By: Express
      Access-Control-Allow-Origin: *
      Content-Security-Policy: default-src 'none'
      X-Content-Type-Options: nosniff
      2024-03-05 11:57:35 UTC139INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 3c 74 69 74 6c 65 3e 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 70 72 65 3e 43 61 6e 6e 6f 74 20 47 45 54 20 2f 3c 2f 70 72 65 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a
      Data Ascii: <!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><title>Error</title></head><body><pre>Cannot GET /</pre></body></html>


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      1192.168.2.849716104.76.104.139443
      TimestampBytes transferredDirectionData
      2024-03-05 11:57:38 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
      Connection: Keep-Alive
      Accept: */*
      Accept-Encoding: identity
      User-Agent: Microsoft BITS/7.8
      Host: fs.microsoft.com
      2024-03-05 11:57:38 UTC494INHTTP/1.1 200 OK
      ApiVersion: Distribute 1.1
      Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
      Content-Type: application/octet-stream
      ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
      Last-Modified: Tue, 16 May 2017 22:58:00 GMT
      Server: ECAcc (chd/0758)
      X-CID: 11
      X-Ms-ApiVersion: Distribute 1.2
      X-Ms-Region: prod-eus-z1
      Cache-Control: public, max-age=26868
      Date: Tue, 05 Mar 2024 11:57:38 GMT
      Connection: close
      X-CID: 2


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      2192.168.2.849717104.76.104.139443
      TimestampBytes transferredDirectionData
      2024-03-05 11:57:39 UTC239OUTGET /fs/windows/config.json HTTP/1.1
      Connection: Keep-Alive
      Accept: */*
      Accept-Encoding: identity
      If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
      Range: bytes=0-2147483646
      User-Agent: Microsoft BITS/7.8
      Host: fs.microsoft.com
      2024-03-05 11:57:39 UTC530INHTTP/1.1 200 OK
      Content-Type: application/octet-stream
      Last-Modified: Tue, 16 May 2017 22:58:00 GMT
      ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
      ApiVersion: Distribute 1.1
      Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
      X-Azure-Ref: 0DMGnYgAAAACXaXykPZuVRq4aV6pCkeO8U0pDRURHRTAzMTgAY2VmYzI1ODMtYTliMi00NGE3LTk3NTUtYjc2ZDE3ZTA1Zjdm
      Cache-Control: public, max-age=26939
      Date: Tue, 05 Mar 2024 11:57:39 GMT
      Content-Length: 55
      Connection: close
      X-CID: 2
      2024-03-05 11:57:39 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
      Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


      Click to jump to process

      Click to jump to process

      Click to jump to process

      Target ID:0
      Start time:12:57:28
      Start date:05/03/2024
      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
      Wow64 process (32bit):false
      Commandline:C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank
      Imagebase:0x7ff678760000
      File size:3'242'272 bytes
      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:2
      Start time:12:57:30
      Start date:05/03/2024
      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2436 --field-trial-handle=2316,i,12543249661076038132,18087643870067252752,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
      Imagebase:0x7ff678760000
      File size:3'242'272 bytes
      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:3
      Start time:12:57:33
      Start date:05/03/2024
      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
      Wow64 process (32bit):false
      Commandline:C:\Program Files\Google\Chrome\Application\chrome.exe" "http://jnxm2.com
      Imagebase:0x7ff678760000
      File size:3'242'272 bytes
      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      No disassembly