Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://am.freshrelevance.com

Overview

General Information

Sample URL:https://am.freshrelevance.com
Analysis ID:1417029
Infos:
Errors
  • URL not reachable

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Stores files to the Windows start menu directory
Uses insecure TLS / SSL version for HTTPS connection

Classification

Analysis Advice

Joe Sandbox was unable to browse the URL (domain or webserver down or HTTPS issue), try to browse the URL again later
Some HTTP requests failed (404). It is likely that the sample will exhibit less behavior.
  • System is w10x64
  • chrome.exe (PID: 6504 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 2748 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 --field-trial-handle=2248,i,14691212922574595024,4520142932314191809,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6148 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://am.freshrelevance.com" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49720 version: TLS 1.0
Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49720 version: TLS 1.0
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: am.freshrelevance.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: unknownDNS traffic detected: queries for: am.freshrelevance.com
Source: unknownHTTP traffic detected: POST /threshold/xls.aspx HTTP/1.1Origin: https://www.bing.comReferer: https://www.bing.com/AS/API/WindowsCortanaPane/V2/InitAccept: */*Accept-Language: en-CHContent-type: text/xmlX-Agent-DeviceId: 01000A410900D492X-BM-CBT: 1696428841X-BM-DateFormat: dd/MM/yyyyX-BM-DeviceDimensions: 784x984X-BM-DeviceDimensionsLogical: 784x984X-BM-DeviceScale: 100X-BM-DTZ: 120X-BM-Market: CHX-BM-Theme: 000000;0078d7X-BM-WindowsFlights: FX:117B9872,FX:119E26AD,FX:11C0E96C,FX:11C6E5C2,FX:11C7EB6A,FX:11C9408A,FX:11C940DB,FX:11CB9A9F,FX:11CB9AC1,FX:11CC111C,FX:11D5BFCD,FX:11DF5B12,FX:11DF5B75,FX:1240931B,FX:124B38D0,FX:127FC878,FX:1283FFE8,FX:12840617,FX:128979F9,FX:128EBD7E,FX:129135BB,FX:129E053F,FX:12A74DB5,FX:12AB734D,FX:12B8450E,FX:12BD6E73,FX:12C3331B,FX:12C7D66EX-Device-ClientSession: DB0AFB19004F47BC80E5208C7478FF22X-Device-isOptin: falseX-Device-MachineId: {92C86F7C-DB2B-4F6A-95AD-98B4A2AE008A}X-Device-OSSKU: 48X-Device-Touch: falseX-DeviceID: 01000A410900D492X-MSEdge-ExternalExp: d-thshld39,d-thshld42,d-thshld77,d-thshld78,staticshX-MSEdge-ExternalExpType: JointCoordX-PositionerType: DesktopX-Search-AppId: Microsoft.Windows.Cortana_cw5n1h2txyewy!CortanaUIX-Search-CortanaAvailableCapabilities: NoneX-Search-SafeSearch: ModerateX-Search-TimeZone: Bias=-60; DaylightBias=-60; TimeZoneKeyName=W. Europe Standard TimeX-UserAgeClass: UnknownAccept-Encoding: gzip, deflate, brUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Cortana 1.14.7.19041; 10.0.0.0.19045.2006) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19045Host: www.bing.comContent-Length: 2484Connection: Keep-AliveCache-Control: no-cacheCookie: MUID=2F4E96DB8B7049E59AD4484C3C00F7CF; _SS=SID=1A6DEABB468B65843EB5F91B47916435&CPID=1711632765804&AC=1&CPH=d1a4eb75; _EDGE_S=SID=1A6DEABB468B65843EB5F91B47916435; SRCHUID=V=2&GUID=3D32B8AC657C4AD781A584E283227995&dmnchg=1; SRCHD=AF=NOFORM; SRCHUSR=DOB=20231004; SRCHHPGUSR=SRCHLANG=en&IPMH=986d886c&IPMID=1696428841029&HV=1696428756; CortanaAppUID=5A290E2CC4B523E2D8B5E2E3E4CB7CB7; MUIDB=2F4E96DB8B7049E59AD4484C3C00F7CF
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 28 Mar 2024 13:33:03 GMTTransfer-Encoding: chunkedConnection: closeAccess-Control-Allow-Origin: *
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: classification engineClassification label: unknown1.win@17/6@4/4
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 --field-trial-handle=2248,i,14691212922574595024,4520142932314191809,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://am.freshrelevance.com"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 --field-trial-handle=2248,i,14691212922574595024,4520142932314191809,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Google Drive.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media4
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive5
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture3
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://am.freshrelevance.com0%Avira URL Cloudsafe
https://am.freshrelevance.com0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
www.google.com
142.251.16.105
truefalse
    high
    am.freshrelevance.com
    52.211.146.239
    truefalse
      high
      fp2e7a.wpc.phicdn.net
      192.229.211.108
      truefalse
        unknown
        NameMaliciousAntivirus DetectionReputation
        https://am.freshrelevance.com/false
          high
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          52.211.146.239
          am.freshrelevance.comUnited States
          16509AMAZON-02USfalse
          239.255.255.250
          unknownReserved
          unknownunknownfalse
          142.251.16.105
          www.google.comUnited States
          15169GOOGLEUSfalse
          IP
          192.168.2.5
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1417029
          Start date and time:2024-03-28 14:32:13 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 1m 54s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:browseurl.jbs
          Sample URL:https://am.freshrelevance.com
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Run name:Potential for more IOCs and behavior
          Number of analysed new started processes analysed:6
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:UNKNOWN
          Classification:unknown1.win@17/6@4/4
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • URL browsing timeout or error
          • URL not reachable
          • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 142.251.163.94, 142.251.163.84, 142.251.167.102, 142.251.167.139, 142.251.167.138, 142.251.167.100, 142.251.167.101, 142.251.167.113, 34.104.35.123, 23.54.46.90, 40.127.169.103, 192.229.211.108, 72.21.81.240, 20.3.187.198
          • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, clientservices.googleapis.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wu.azureedge.net, clients2.google.com, ocsp.digicert.com, e16604.g.akamaiedge.net, ocsp.edge.digicert.com, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, prod.fs.microsoft.com.akadns.net, glb.sls.prod.dcat.dsp.trafficmanager.net, fs.microsoft.com, accounts.google.com, wu.ec.azureedge.net, ctldl.windowsupdate.com, wu-bg-shim.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, edgedl.me.gvt1.com, clients.l.google.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtSetInformationFile calls found.
          No simulations
          No context
          No context
          No context
          No context
          No context
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 12:33:02 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2677
          Entropy (8bit):3.9721861625468686
          Encrypted:false
          SSDEEP:48:80Yd/cTfAc/HFidAKZdA19ehwiZUklqehly+3:80Xv/qy
          MD5:1198A1E60DA517053F6F799B76D57D03
          SHA1:B7C9F704301B82EB53B57750F7CB625CC4E3065A
          SHA-256:BD301A4E10D901B1D9F8B42C069B8D5CAAB9C397EFC693ABB022FD0240DB3FDC
          SHA-512:DDF99DC859AA6375186DC4EC8C4649888286B8EA32277585675ED689214B185ABFFC66C5D010492BDAE408860147BA466433657ECC59834AEFC786DA236B0494
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,....g-$u....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I|X.l....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V|X.l....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V|X.l....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V|X.l..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V|X"l...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........'/W......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 12:33:02 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2679
          Entropy (8bit):3.9901049522516603
          Encrypted:false
          SSDEEP:48:8Bd/cTfAc/HFidAKZdA1weh/iZUkAQkqehay+2:8gvF9Qny
          MD5:1E45084743E7E88580BDD51A4A1A34D8
          SHA1:5EF15D17647AD06CB37A1D8E493C73EDB080A084
          SHA-256:873EA470BD980955A554D223DF566095C757E71A778C197ACC28B79F643332EB
          SHA-512:499775B5C6325078E60C932543BE754D4FA75E2194C4D2B963455546F0CFA89B5D86E29E014FE3A482DC7F2B110CCA72E7431FE86A804D727626C88C557528D9
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,.......u....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I|X.l....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V|X.l....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V|X.l....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V|X.l..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V|X"l...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........'/W......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2693
          Entropy (8bit):4.000634068741677
          Encrypted:false
          SSDEEP:48:8xdd/cTfAcsHFidAKZdA14tseh7sFiZUkmgqeh7sMy+BX:8xEvInmy
          MD5:CADEB194AF8C5286C5882E8314955B7B
          SHA1:0AB5EF786B6E1672D68C86AAB08354424F873705
          SHA-256:75C678134323C59337F23471A5AF290044D0CC5E4EB0F53AFDD44364FC9B7DEB
          SHA-512:0A00520AE9D8DAE7F64889E399DB70BC5B03144AE453C3808D27231CECA7D9F4B7E99DEEC28BDAEC50257BBAF0CB0C79573B3AE2758B52AA7CB362DC84FB78F4
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,......e>....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I|X.l....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V|X.l....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V|X.l....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V|X.l..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VDW.n...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........'/W......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 12:33:02 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2681
          Entropy (8bit):3.9880180946529022
          Encrypted:false
          SSDEEP:48:8Dd/cTfAc/HFidAKZdA1vehDiZUkwqehey+R:8yvGky
          MD5:CE8611DD6E06FD554D34729A998599DE
          SHA1:AC5F8B7B0AC62323E10BF4807BA10B0AE259C88A
          SHA-256:42DD2794D2BF434E1F5F16E5A0500BC3E26DD2526F962FBEA805B66DD3912972
          SHA-512:508D7E23AC8C3B24A8998DD2D7C1B95EEE7E9FE5484703F44A055A841943F11115551D91BD697FF8308C012466DF33BE4A322D163ABD079EB1AC84D8B5BFC6AF
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,....5O.u....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I|X.l....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V|X.l....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V|X.l....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V|X.l..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V|X"l...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........'/W......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 12:33:02 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2681
          Entropy (8bit):3.973919675280322
          Encrypted:false
          SSDEEP:48:8Kd/cTfAc/HFidAKZdA1hehBiZUk1W1qehoy+C:85vG9Iy
          MD5:574C964C940AD2CAEDE8C00CDCF1CA7C
          SHA1:11E19FB4E9B147AF06E89EF548BB343C08A53782
          SHA-256:C304BB9F4813DE4C1F0406A52A7872C8C6B4C8F3418A1AD7AE9282C9BCDF359F
          SHA-512:E0978576FE29ED53E23F2433E23573B5220A9996459EF280594B290387A9B19CB6260FEAC7B035A0351C4D57DC0FC3E0061F699330A31DA1C007B73819387E55
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,.....C.u....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I|X.l....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V|X.l....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V|X.l....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V|X.l..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V|X"l...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........'/W......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 12:33:02 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2683
          Entropy (8bit):3.989556433730912
          Encrypted:false
          SSDEEP:48:8zd/cTfAc/HFidAKZdA1duT+ehOuTbbiZUk5OjqehOuTbmy+yT+:8CvYT/TbxWOvTbmy7T
          MD5:59F152364743DD409DBE8413BFA8B280
          SHA1:D58CB8E3CB8DCC7223A890EFECD3EDCFA447B4AD
          SHA-256:FE23638F4D383C282A29501077F60CED7F5E70157034A11F04644696ED4D608D
          SHA-512:2705F14057C80EC7CC79748AFD055D1A7FB93C6F970E3F0F4AA44A05FB7BA07F90CAABB20D4B42252224572DE420912A064F62C1F52C69F2B3A8790FE785509D
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,......u....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I|X.l....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V|X.l....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V|X.l....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V|X.l..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V|X"l...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........'/W......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          No static file info
          TimestampSource PortDest PortSource IPDest IP
          Mar 28, 2024 14:32:56.132735014 CET49674443192.168.2.523.1.237.91
          Mar 28, 2024 14:32:56.132832050 CET49675443192.168.2.523.1.237.91
          Mar 28, 2024 14:32:56.273376942 CET49673443192.168.2.523.1.237.91
          Mar 28, 2024 14:33:03.037380934 CET49710443192.168.2.552.211.146.239
          Mar 28, 2024 14:33:03.037410021 CET4434971052.211.146.239192.168.2.5
          Mar 28, 2024 14:33:03.037477970 CET49710443192.168.2.552.211.146.239
          Mar 28, 2024 14:33:03.037703991 CET49710443192.168.2.552.211.146.239
          Mar 28, 2024 14:33:03.037715912 CET4434971052.211.146.239192.168.2.5
          Mar 28, 2024 14:33:03.038077116 CET49711443192.168.2.552.211.146.239
          Mar 28, 2024 14:33:03.038098097 CET4434971152.211.146.239192.168.2.5
          Mar 28, 2024 14:33:03.038149118 CET49711443192.168.2.552.211.146.239
          Mar 28, 2024 14:33:03.038347960 CET49711443192.168.2.552.211.146.239
          Mar 28, 2024 14:33:03.038361073 CET4434971152.211.146.239192.168.2.5
          Mar 28, 2024 14:33:03.580665112 CET4434971152.211.146.239192.168.2.5
          Mar 28, 2024 14:33:03.583043098 CET49711443192.168.2.552.211.146.239
          Mar 28, 2024 14:33:03.583069086 CET4434971152.211.146.239192.168.2.5
          Mar 28, 2024 14:33:03.584110022 CET4434971152.211.146.239192.168.2.5
          Mar 28, 2024 14:33:03.584166050 CET49711443192.168.2.552.211.146.239
          Mar 28, 2024 14:33:03.588253975 CET49711443192.168.2.552.211.146.239
          Mar 28, 2024 14:33:03.588376045 CET4434971152.211.146.239192.168.2.5
          Mar 28, 2024 14:33:03.589112043 CET49711443192.168.2.552.211.146.239
          Mar 28, 2024 14:33:03.589118004 CET4434971152.211.146.239192.168.2.5
          Mar 28, 2024 14:33:03.590406895 CET4434971052.211.146.239192.168.2.5
          Mar 28, 2024 14:33:03.601232052 CET49710443192.168.2.552.211.146.239
          Mar 28, 2024 14:33:03.601242065 CET4434971052.211.146.239192.168.2.5
          Mar 28, 2024 14:33:03.602324009 CET4434971052.211.146.239192.168.2.5
          Mar 28, 2024 14:33:03.602385044 CET49710443192.168.2.552.211.146.239
          Mar 28, 2024 14:33:03.604660988 CET49710443192.168.2.552.211.146.239
          Mar 28, 2024 14:33:03.604756117 CET4434971052.211.146.239192.168.2.5
          Mar 28, 2024 14:33:03.630702972 CET49711443192.168.2.552.211.146.239
          Mar 28, 2024 14:33:03.646521091 CET49710443192.168.2.552.211.146.239
          Mar 28, 2024 14:33:03.646547079 CET4434971052.211.146.239192.168.2.5
          Mar 28, 2024 14:33:03.688194036 CET49710443192.168.2.552.211.146.239
          Mar 28, 2024 14:33:03.767375946 CET4434971152.211.146.239192.168.2.5
          Mar 28, 2024 14:33:03.767498970 CET4434971152.211.146.239192.168.2.5
          Mar 28, 2024 14:33:03.767568111 CET49711443192.168.2.552.211.146.239
          Mar 28, 2024 14:33:03.767976046 CET49711443192.168.2.552.211.146.239
          Mar 28, 2024 14:33:03.767992973 CET4434971152.211.146.239192.168.2.5
          Mar 28, 2024 14:33:05.233561039 CET49714443192.168.2.5142.251.16.105
          Mar 28, 2024 14:33:05.233599901 CET44349714142.251.16.105192.168.2.5
          Mar 28, 2024 14:33:05.233659029 CET49714443192.168.2.5142.251.16.105
          Mar 28, 2024 14:33:05.233861923 CET49714443192.168.2.5142.251.16.105
          Mar 28, 2024 14:33:05.233876944 CET44349714142.251.16.105192.168.2.5
          Mar 28, 2024 14:33:05.443789005 CET44349714142.251.16.105192.168.2.5
          Mar 28, 2024 14:33:05.447930098 CET49714443192.168.2.5142.251.16.105
          Mar 28, 2024 14:33:05.447957993 CET44349714142.251.16.105192.168.2.5
          Mar 28, 2024 14:33:05.449156046 CET44349714142.251.16.105192.168.2.5
          Mar 28, 2024 14:33:05.449220896 CET49714443192.168.2.5142.251.16.105
          Mar 28, 2024 14:33:05.747214079 CET49675443192.168.2.523.1.237.91
          Mar 28, 2024 14:33:05.747212887 CET49674443192.168.2.523.1.237.91
          Mar 28, 2024 14:33:05.811804056 CET49714443192.168.2.5142.251.16.105
          Mar 28, 2024 14:33:05.811975956 CET44349714142.251.16.105192.168.2.5
          Mar 28, 2024 14:33:05.859807968 CET49714443192.168.2.5142.251.16.105
          Mar 28, 2024 14:33:05.859836102 CET44349714142.251.16.105192.168.2.5
          Mar 28, 2024 14:33:05.888174057 CET49673443192.168.2.523.1.237.91
          Mar 28, 2024 14:33:05.919086933 CET49714443192.168.2.5142.251.16.105
          Mar 28, 2024 14:33:07.251638889 CET4434970323.1.237.91192.168.2.5
          Mar 28, 2024 14:33:07.251741886 CET49703443192.168.2.523.1.237.91
          Mar 28, 2024 14:33:15.441847086 CET44349714142.251.16.105192.168.2.5
          Mar 28, 2024 14:33:15.441921949 CET44349714142.251.16.105192.168.2.5
          Mar 28, 2024 14:33:15.441973925 CET49714443192.168.2.5142.251.16.105
          Mar 28, 2024 14:33:15.662770033 CET49714443192.168.2.5142.251.16.105
          Mar 28, 2024 14:33:15.662803888 CET44349714142.251.16.105192.168.2.5
          Mar 28, 2024 14:33:17.180708885 CET49703443192.168.2.523.1.237.91
          Mar 28, 2024 14:33:17.180903912 CET49703443192.168.2.523.1.237.91
          Mar 28, 2024 14:33:17.181502104 CET49720443192.168.2.523.1.237.91
          Mar 28, 2024 14:33:17.181534052 CET4434972023.1.237.91192.168.2.5
          Mar 28, 2024 14:33:17.181756020 CET49720443192.168.2.523.1.237.91
          Mar 28, 2024 14:33:17.182787895 CET49720443192.168.2.523.1.237.91
          Mar 28, 2024 14:33:17.182801008 CET4434972023.1.237.91192.168.2.5
          Mar 28, 2024 14:33:17.338319063 CET4434970323.1.237.91192.168.2.5
          Mar 28, 2024 14:33:17.338407993 CET4434970323.1.237.91192.168.2.5
          Mar 28, 2024 14:33:17.507801056 CET4434972023.1.237.91192.168.2.5
          Mar 28, 2024 14:33:17.508033991 CET49720443192.168.2.523.1.237.91
          Mar 28, 2024 14:33:17.650279045 CET49720443192.168.2.523.1.237.91
          Mar 28, 2024 14:33:17.650300980 CET4434972023.1.237.91192.168.2.5
          Mar 28, 2024 14:33:17.650737047 CET4434972023.1.237.91192.168.2.5
          Mar 28, 2024 14:33:17.650824070 CET49720443192.168.2.523.1.237.91
          Mar 28, 2024 14:33:17.664511919 CET49720443192.168.2.523.1.237.91
          Mar 28, 2024 14:33:17.664541960 CET4434972023.1.237.91192.168.2.5
          Mar 28, 2024 14:33:17.670413017 CET49720443192.168.2.523.1.237.91
          Mar 28, 2024 14:33:17.670420885 CET4434972023.1.237.91192.168.2.5
          Mar 28, 2024 14:33:18.031009912 CET4434972023.1.237.91192.168.2.5
          Mar 28, 2024 14:33:18.031124115 CET49720443192.168.2.523.1.237.91
          Mar 28, 2024 14:33:18.031495094 CET4434972023.1.237.91192.168.2.5
          Mar 28, 2024 14:33:18.031543970 CET4434972023.1.237.91192.168.2.5
          Mar 28, 2024 14:33:18.031563997 CET49720443192.168.2.523.1.237.91
          Mar 28, 2024 14:33:18.031622887 CET49720443192.168.2.523.1.237.91
          Mar 28, 2024 14:33:18.039629936 CET49720443192.168.2.523.1.237.91
          Mar 28, 2024 14:33:18.039648056 CET4434972023.1.237.91192.168.2.5
          Mar 28, 2024 14:33:18.039685965 CET49720443192.168.2.523.1.237.91
          Mar 28, 2024 14:33:18.039730072 CET49720443192.168.2.523.1.237.91
          TimestampSource PortDest PortSource IPDest IP
          Mar 28, 2024 14:33:01.311444044 CET53555321.1.1.1192.168.2.5
          Mar 28, 2024 14:33:01.397828102 CET53536871.1.1.1192.168.2.5
          Mar 28, 2024 14:33:02.083833933 CET53536111.1.1.1192.168.2.5
          Mar 28, 2024 14:33:02.925173044 CET6063753192.168.2.51.1.1.1
          Mar 28, 2024 14:33:02.925378084 CET6463253192.168.2.51.1.1.1
          Mar 28, 2024 14:33:03.022430897 CET53646321.1.1.1192.168.2.5
          Mar 28, 2024 14:33:03.036808968 CET53606371.1.1.1192.168.2.5
          Mar 28, 2024 14:33:05.117563009 CET6243653192.168.2.51.1.1.1
          Mar 28, 2024 14:33:05.118252039 CET5304753192.168.2.51.1.1.1
          Mar 28, 2024 14:33:05.213421106 CET53624361.1.1.1192.168.2.5
          Mar 28, 2024 14:33:05.213443995 CET53530471.1.1.1192.168.2.5
          Mar 28, 2024 14:33:19.960047007 CET53647151.1.1.1192.168.2.5
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Mar 28, 2024 14:33:02.925173044 CET192.168.2.51.1.1.10xe171Standard query (0)am.freshrelevance.comA (IP address)IN (0x0001)false
          Mar 28, 2024 14:33:02.925378084 CET192.168.2.51.1.1.10xa7d2Standard query (0)am.freshrelevance.com65IN (0x0001)false
          Mar 28, 2024 14:33:05.117563009 CET192.168.2.51.1.1.10x78b8Standard query (0)www.google.comA (IP address)IN (0x0001)false
          Mar 28, 2024 14:33:05.118252039 CET192.168.2.51.1.1.10x2b5bStandard query (0)www.google.com65IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Mar 28, 2024 14:33:03.036808968 CET1.1.1.1192.168.2.50xe171No error (0)am.freshrelevance.com52.211.146.239A (IP address)IN (0x0001)false
          Mar 28, 2024 14:33:03.036808968 CET1.1.1.1192.168.2.50xe171No error (0)am.freshrelevance.com99.81.203.36A (IP address)IN (0x0001)false
          Mar 28, 2024 14:33:03.036808968 CET1.1.1.1192.168.2.50xe171No error (0)am.freshrelevance.com34.251.80.161A (IP address)IN (0x0001)false
          Mar 28, 2024 14:33:05.213421106 CET1.1.1.1192.168.2.50x78b8No error (0)www.google.com142.251.16.105A (IP address)IN (0x0001)false
          Mar 28, 2024 14:33:05.213421106 CET1.1.1.1192.168.2.50x78b8No error (0)www.google.com142.251.16.106A (IP address)IN (0x0001)false
          Mar 28, 2024 14:33:05.213421106 CET1.1.1.1192.168.2.50x78b8No error (0)www.google.com142.251.16.104A (IP address)IN (0x0001)false
          Mar 28, 2024 14:33:05.213421106 CET1.1.1.1192.168.2.50x78b8No error (0)www.google.com142.251.16.103A (IP address)IN (0x0001)false
          Mar 28, 2024 14:33:05.213421106 CET1.1.1.1192.168.2.50x78b8No error (0)www.google.com142.251.16.99A (IP address)IN (0x0001)false
          Mar 28, 2024 14:33:05.213421106 CET1.1.1.1192.168.2.50x78b8No error (0)www.google.com142.251.16.147A (IP address)IN (0x0001)false
          Mar 28, 2024 14:33:05.213443995 CET1.1.1.1192.168.2.50x2b5bNo error (0)www.google.com65IN (0x0001)false
          Mar 28, 2024 14:33:16.913655043 CET1.1.1.1192.168.2.50x30d9No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
          Mar 28, 2024 14:33:16.913655043 CET1.1.1.1192.168.2.50x30d9No error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
          • am.freshrelevance.com
          • https:
            • www.bing.com
          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          0192.168.2.54971152.211.146.2394432748C:\Program Files\Google\Chrome\Application\chrome.exe
          TimestampBytes transferredDirectionData
          2024-03-28 13:33:03 UTC664OUTGET / HTTP/1.1
          Host: am.freshrelevance.com
          Connection: keep-alive
          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
          sec-ch-ua-mobile: ?0
          sec-ch-ua-platform: "Windows"
          Upgrade-Insecure-Requests: 1
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
          Sec-Fetch-Site: none
          Sec-Fetch-Mode: navigate
          Sec-Fetch-User: ?1
          Sec-Fetch-Dest: document
          Accept-Encoding: gzip, deflate, br
          Accept-Language: en-US,en;q=0.9
          2024-03-28 13:33:03 UTC142INHTTP/1.1 404 Not Found
          Date: Thu, 28 Mar 2024 13:33:03 GMT
          Transfer-Encoding: chunked
          Connection: close
          Access-Control-Allow-Origin: *
          2024-03-28 13:33:03 UTC5INData Raw: 30 0d 0a 0d 0a
          Data Ascii: 0


          Session IDSource IPSource PortDestination IPDestination Port
          1192.168.2.54972023.1.237.91443
          TimestampBytes transferredDirectionData
          2024-03-28 13:33:17 UTC2148OUTPOST /threshold/xls.aspx HTTP/1.1
          Origin: https://www.bing.com
          Referer: https://www.bing.com/AS/API/WindowsCortanaPane/V2/Init
          Accept: */*
          Accept-Language: en-CH
          Content-type: text/xml
          X-Agent-DeviceId: 01000A410900D492
          X-BM-CBT: 1696428841
          X-BM-DateFormat: dd/MM/yyyy
          X-BM-DeviceDimensions: 784x984
          X-BM-DeviceDimensionsLogical: 784x984
          X-BM-DeviceScale: 100
          X-BM-DTZ: 120
          X-BM-Market: CH
          X-BM-Theme: 000000;0078d7
          X-BM-WindowsFlights: FX:117B9872,FX:119E26AD,FX:11C0E96C,FX:11C6E5C2,FX:11C7EB6A,FX:11C9408A,FX:11C940DB,FX:11CB9A9F,FX:11CB9AC1,FX:11CC111C,FX:11D5BFCD,FX:11DF5B12,FX:11DF5B75,FX:1240931B,FX:124B38D0,FX:127FC878,FX:1283FFE8,FX:12840617,FX:128979F9,FX:128EBD7E,FX:129135BB,FX:129E053F,FX:12A74DB5,FX:12AB734D,FX:12B8450E,FX:12BD6E73,FX:12C3331B,FX:12C7D66E
          X-Device-ClientSession: DB0AFB19004F47BC80E5208C7478FF22
          X-Device-isOptin: false
          X-Device-MachineId: {92C86F7C-DB2B-4F6A-95AD-98B4A2AE008A}
          X-Device-OSSKU: 48
          X-Device-Touch: false
          X-DeviceID: 01000A410900D492
          X-MSEdge-ExternalExp: d-thshld39,d-thshld42,d-thshld77,d-thshld78,staticsh
          X-MSEdge-ExternalExpType: JointCoord
          X-PositionerType: Desktop
          X-Search-AppId: Microsoft.Windows.Cortana_cw5n1h2txyewy!CortanaUI
          X-Search-CortanaAvailableCapabilities: None
          X-Search-SafeSearch: Moderate
          X-Search-TimeZone: Bias=-60; DaylightBias=-60; TimeZoneKeyName=W. Europe Standard Time
          X-UserAgeClass: Unknown
          Accept-Encoding: gzip, deflate, br
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Cortana 1.14.7.19041; 10.0.0.0.19045.2006) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19045
          Host: www.bing.com
          Content-Length: 2484
          Connection: Keep-Alive
          Cache-Control: no-cache
          Cookie: MUID=2F4E96DB8B7049E59AD4484C3C00F7CF; _SS=SID=1A6DEABB468B65843EB5F91B47916435&CPID=1711632765804&AC=1&CPH=d1a4eb75; _EDGE_S=SID=1A6DEABB468B65843EB5F91B47916435; SRCHUID=V=2&GUID=3D32B8AC657C4AD781A584E283227995&dmnchg=1; SRCHD=AF=NOFORM; SRCHUSR=DOB=20231004; SRCHHPGUSR=SRCHLANG=en&IPMH=986d886c&IPMID=1696428841029&HV=1696428756; CortanaAppUID=5A290E2CC4B523E2D8B5E2E3E4CB7CB7; MUIDB=2F4E96DB8B7049E59AD4484C3C00F7CF
          2024-03-28 13:33:17 UTC1OUTData Raw: 3c
          Data Ascii: <
          2024-03-28 13:33:17 UTC2483OUTData Raw: 43 6c 69 65 6e 74 49 6e 73 74 52 65 71 75 65 73 74 3e 3c 43 49 44 3e 33 36 34 34 46 44 37 34 44 46 31 36 36 31 38 46 30 38 46 37 45 43 30 33 44 45 35 35 36 30 30 31 3c 2f 43 49 44 3e 3c 45 76 65 6e 74 73 3e 3c 45 3e 3c 54 3e 45 76 65 6e 74 2e 43 6c 69 65 6e 74 49 6e 73 74 3c 2f 54 3e 3c 49 47 3e 37 35 32 32 38 31 35 36 37 30 33 41 34 30 44 35 42 39 37 45 35 41 36 38 33 36 46 32 41 31 43 45 3c 2f 49 47 3e 3c 44 3e 3c 21 5b 43 44 41 54 41 5b 7b 22 43 75 72 55 72 6c 22 3a 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 62 69 6e 67 2e 63 6f 6d 2f 41 53 2f 41 50 49 2f 57 69 6e 64 6f 77 73 43 6f 72 74 61 6e 61 50 61 6e 65 2f 56 32 2f 49 6e 69 74 22 2c 22 50 69 76 6f 74 22 3a 22 51 46 22 2c 22 54 22 3a 22 43 49 2e 42 6f 78 4d 6f 64 65 6c 22 2c 22 46 49 44 22 3a 22 43 49
          Data Ascii: ClientInstRequest><CID>3644FD74DF16618F08F7EC03DE556001</CID><Events><E><T>Event.ClientInst</T><IG>75228156703A40D5B97E5A6836F2A1CE</IG><D><![CDATA[{"CurUrl":"https://www.bing.com/AS/API/WindowsCortanaPane/V2/Init","Pivot":"QF","T":"CI.BoxModel","FID":"CI
          2024-03-28 13:33:18 UTC480INHTTP/1.1 204 No Content
          Access-Control-Allow-Origin: *
          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
          X-MSEdge-Ref: Ref A: FEFC62FF4F5F4A1491EAB89C8B8CF329 Ref B: LAX311000115021 Ref C: 2024-03-28T13:33:17Z
          Date: Thu, 28 Mar 2024 13:33:17 GMT
          Connection: close
          Alt-Svc: h3=":443"; ma=93600
          X-CDN-TraceID: 0.5ded0117.1711632797.3b79b1d3


          Click to jump to process

          Click to jump to process

          Click to jump to process

          Target ID:0
          Start time:14:32:56
          Start date:28/03/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
          Imagebase:0x7ff715980000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:2
          Start time:14:32:59
          Start date:28/03/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 --field-trial-handle=2248,i,14691212922574595024,4520142932314191809,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
          Imagebase:0x7ff715980000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:3
          Start time:14:33:01
          Start date:28/03/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://am.freshrelevance.com"
          Imagebase:0x7ff715980000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          No disassembly