Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://info.argyleforum.com/emailPreference/e/epc/960522/dgwqK30l1gKezy9klX-g0faebYM5M2Y0jrph8j4hh2g/37/c97c94751b6f3fd21ae24b29cd93b15b7efa2c65d8ba7b291da561db40695160/412788271

Overview

General Information

Sample URL:https://info.argyleforum.com/emailPreference/e/epc/960522/dgwqK30l1gKezy9klX-g0faebYM5M2Y0jrph8j4hh2g/37/c97c94751b6f3fd21ae24b29cd93b15b7efa2c65d8ba7b291da561db40695160/412788271
Analysis ID:1417139

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 7060 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://info.argyleforum.com/emailPreference/e/epc/960522/dgwqK30l1gKezy9klX-g0faebYM5M2Y0jrph8j4hh2g/37/c97c94751b6f3fd21ae24b29cd93b15b7efa2c65d8ba7b291da561db40695160/412788271 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 2792 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1952,i,8525276267492685879,12009673439097497366,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: https://info.argyleforum.com/emailPreference/e/epc/960522/dgwqK30l1gKezy9klX-g0faebYM5M2Y0jrph8j4hh2g/37/c97c94751b6f3fd21ae24b29cd93b15b7efa2c65d8ba7b291da561db40695160/412788271HTTP Parser: No favicon
Source: https://info.argyleforum.com/emailPreference/e/epc/960522/dgwqK30l1gKezy9klX-g0faebYM5M2Y0jrph8j4hh2g/37/c97c94751b6f3fd21ae24b29cd93b15b7efa2c65d8ba7b291da561db40695160/412788271HTTP Parser: No favicon
Source: https://info.argyleforum.com/emailPreference/e/epc/960522/qwwIvRPzE0BWlEnj4Y9CdLjPKu0a4KcZecyAz63evUs/37/c97c94751b6f3fd21ae24b29cd93b15b7efa2c65d8ba7b291da561db40695160HTTP Parser: No favicon
Source: https://info.argyleforum.com/emailPreference/e/epc/960522/dgwqK30l1gKezy9klX-g0faebYM5M2Y0jrph8j4hh2g/37/c97c94751b6f3fd21ae24b29cd93b15b7efa2c65d8ba7b291da561db40695160/412788271HTTP Parser: No favicon
Source: https://info.argyleforum.com/emailPreference/e/epc/960522/dgwqK30l1gKezy9klX-g0faebYM5M2Y0jrph8j4hh2g/37/c97c94751b6f3fd21ae24b29cd93b15b7efa2c65d8ba7b291da561db40695160/412788271HTTP Parser: No favicon
Source: https://info.argyleforum.com/emailPreference/e/epc/960522/qwwIvRPzE0BWlEnj4Y9CdLjPKu0a4KcZecyAz63evUs/37/c97c94751b6f3fd21ae24b29cd93b15b7efa2c65d8ba7b291da561db40695160HTTP Parser: No favicon
Source: unknownHTTPS traffic detected: 23.221.242.90:443 -> 192.168.2.16:49720 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.16:49719 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.221.242.90:443 -> 192.168.2.16:49721 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.16:49728 version: TLS 1.2
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 13.107.21.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 23.221.242.90
Source: unknownTCP traffic detected without corresponding DNS query: 23.221.242.90
Source: unknownTCP traffic detected without corresponding DNS query: 23.221.242.90
Source: unknownTCP traffic detected without corresponding DNS query: 23.221.242.90
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 23.221.242.90
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 23.221.242.90
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 23.221.242.90
Source: unknownTCP traffic detected without corresponding DNS query: 23.221.242.90
Source: unknownTCP traffic detected without corresponding DNS query: 23.221.242.90
Source: unknownTCP traffic detected without corresponding DNS query: 23.221.242.90
Source: unknownTCP traffic detected without corresponding DNS query: 23.221.242.90
Source: unknownTCP traffic detected without corresponding DNS query: 23.221.242.90
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 23.221.242.90
Source: unknownTCP traffic detected without corresponding DNS query: 23.221.242.90
Source: unknownTCP traffic detected without corresponding DNS query: 23.221.242.90
Source: unknownTCP traffic detected without corresponding DNS query: 23.221.242.90
Source: unknownTCP traffic detected without corresponding DNS query: 23.221.242.90
Source: unknownTCP traffic detected without corresponding DNS query: 23.221.242.90
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownDNS traffic detected: queries for: info.argyleforum.com
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownHTTPS traffic detected: 23.221.242.90:443 -> 192.168.2.16:49720 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.16:49719 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.221.242.90:443 -> 192.168.2.16:49721 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.16:49728 version: TLS 1.2
Source: classification engineClassification label: clean0.win@14/10@8/126
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://info.argyleforum.com/emailPreference/e/epc/960522/dgwqK30l1gKezy9klX-g0faebYM5M2Y0jrph8j4hh2g/37/c97c94751b6f3fd21ae24b29cd93b15b7efa2c65d8ba7b291da561db40695160/412788271
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1952,i,8525276267492685879,12009673439097497366,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1952,i,8525276267492685879,12009673439097497366,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://info.argyleforum.com/emailPreference/e/epc/960522/dgwqK30l1gKezy9klX-g0faebYM5M2Y0jrph8j4hh2g/37/c97c94751b6f3fd21ae24b29cd93b15b7efa2c65d8ba7b291da561db40695160/4127882710%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
www.google.com
142.251.16.103
truefalse
    high
    pi-ue1-public-lb-f0209c6950285322.elb.us-east-1.amazonaws.com
    3.92.120.28
    truefalse
      high
      info.argyleforum.com
      unknown
      unknownfalse
        high
        pi.pardot.com
        unknown
        unknownfalse
          high
          NameMaliciousAntivirus DetectionReputation
          https://info.argyleforum.com/emailPreference/e/epc/960522/qwwIvRPzE0BWlEnj4Y9CdLjPKu0a4KcZecyAz63evUs/37/c97c94751b6f3fd21ae24b29cd93b15b7efa2c65d8ba7b291da561db40695160false
            high
            https://info.argyleforum.com/emailPreference/e/epc/960522/dgwqK30l1gKezy9klX-g0faebYM5M2Y0jrph8j4hh2g/37/c97c94751b6f3fd21ae24b29cd93b15b7efa2c65d8ba7b291da561db40695160/412788271false
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              142.251.163.139
              unknownUnited States
              15169GOOGLEUSfalse
              1.1.1.1
              unknownAustralia
              13335CLOUDFLARENETUSfalse
              142.251.111.84
              unknownUnited States
              15169GOOGLEUSfalse
              142.251.16.103
              www.google.comUnited States
              15169GOOGLEUSfalse
              172.253.63.139
              unknownUnited States
              15169GOOGLEUSfalse
              172.253.62.95
              unknownUnited States
              15169GOOGLEUSfalse
              172.253.122.94
              unknownUnited States
              15169GOOGLEUSfalse
              3.92.120.28
              pi-ue1-public-lb-f0209c6950285322.elb.us-east-1.amazonaws.comUnited States
              14618AMAZON-AESUSfalse
              239.255.255.250
              unknownReserved
              unknownunknownfalse
              18.208.125.13
              unknownUnited States
              14618AMAZON-AESUSfalse
              172.253.115.94
              unknownUnited States
              15169GOOGLEUSfalse
              IP
              192.168.2.16
              192.168.2.4
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1417139
              Start date and time:2024-03-28 16:58:37 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:defaultwindowsinteractivecookbook.jbs
              Sample URL:https://info.argyleforum.com/emailPreference/e/epc/960522/dgwqK30l1gKezy9klX-g0faebYM5M2Y0jrph8j4hh2g/37/c97c94751b6f3fd21ae24b29cd93b15b7efa2c65d8ba7b291da561db40695160/412788271
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:12
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • EGA enabled
              Analysis Mode:stream
              Analysis stop reason:Timeout
              Detection:CLEAN
              Classification:clean0.win@14/10@8/126
              • Exclude process from analysis (whitelisted): svchost.exe
              • Excluded IPs from analysis (whitelisted): 172.253.115.94, 142.251.163.139, 142.251.163.100, 142.251.163.102, 142.251.163.101, 142.251.163.138, 142.251.163.113, 142.251.111.84, 34.104.35.123, 172.253.62.95, 142.251.16.95, 172.253.115.95, 172.253.122.95, 142.251.163.95, 142.251.167.95, 172.253.63.95, 142.251.179.95
              • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, edgedl.me.gvt1.com, content-autofill.googleapis.com, clientservices.googleapis.com, clients.l.google.com
              • Not all processes where analyzed, report is missing behavior information
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 14:59:04 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
              Category:dropped
              Size (bytes):2673
              Entropy (8bit):3.9845536074162706
              Encrypted:false
              SSDEEP:
              MD5:032D9311EA8F078197F8D7F9721A51EB
              SHA1:E381DB12BCF7428D3C942CE2307B90695876B230
              SHA-256:824B3B94209BDF5FDEBD26BAFDB2F631DCAA9B16DECAB78E3BE9A7729FB047D7
              SHA-512:06FAD49C0B0E2D84DA9C52A81EFA8E23BBB5954BEFD5A575F573A38E1AECAFB02FFF8670509D2F9A3E960B15146B3123F38A58B06B3A96B3AAD201F5DD5D361D
              Malicious:false
              Reputation:unknown
              Preview:L..................F.@.. ...$+.,....o...(...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I|XY.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V|Xa.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V|Xa.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V|Xa............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V|Xc............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............-q.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 14:59:04 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
              Category:dropped
              Size (bytes):2675
              Entropy (8bit):4.000944860827098
              Encrypted:false
              SSDEEP:
              MD5:B26409D2D2B99308C1C1E60AB9A2EBAA
              SHA1:5F594FBC0BB1CCDE0B0AEDC810FFF0524AC3841A
              SHA-256:EB2B8DAEA93E872B9C92A09DD867EDF006F1635BE963762C182964D21996370F
              SHA-512:E71FB846430FD4B8F24E99DCA1E6DFAA24FB6943DCB356B2E713A13DE2C6225C2F7A3FABE07BD9DD1E4831E096467177B80A175712F01F8B0A9D01175B0AF226
              Malicious:false
              Reputation:unknown
              Preview:L..................F.@.. ...$+.,.....O..(...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I|XY.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V|Xa.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V|Xa.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V|Xa............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V|Xc............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............-q.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
              Category:dropped
              Size (bytes):2689
              Entropy (8bit):4.008656177046167
              Encrypted:false
              SSDEEP:
              MD5:B3E08E0D37C805D5160AA3ACD2D448EA
              SHA1:7E860E0A98C0AEDBEA1A81165DC2EFB3898F2D7E
              SHA-256:4574BCC9142E076735E171503A23FA173F438E736B7066B16809A14C0232CE21
              SHA-512:F459A4EF91A7865D7337E74C30EB5B0EF39BAD9BF2C84086263EAEE25D3675885703A328F59DC24974139AC3409E9B9587B2BDC67AA2F62E4C47499766677125
              Malicious:false
              Reputation:unknown
              Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I|XY.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V|Xa.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V|Xa.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V|Xa............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............-q.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 14:59:04 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
              Category:dropped
              Size (bytes):2677
              Entropy (8bit):4.001112541263284
              Encrypted:false
              SSDEEP:
              MD5:C7CB8F2D548D29549CE35EAC133A8573
              SHA1:364D6754181DCF1C52D13043466E613AEE7EE492
              SHA-256:01B4B770D4EBFF1056224D50C68B4E542518C7AD3CFC353C7696DAAEB4955990
              SHA-512:B45819443720F1EF2820FB4DACDB181DCACD5C7F432D1379EBB61CE5F6977181BAD3BB2662243D327ECB6C886D47A6F642AAAF57606FF0637F5B9EA19F35FC95
              Malicious:false
              Reputation:unknown
              Preview:L..................F.@.. ...$+.,........(...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I|XY.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V|Xa.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V|Xa.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V|Xa............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V|Xc............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............-q.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 14:59:04 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
              Category:dropped
              Size (bytes):2677
              Entropy (8bit):3.988271750456065
              Encrypted:false
              SSDEEP:
              MD5:08818B27716C5857425B49457EC1F84F
              SHA1:D50B5014991C56639F772F4A0AB0D1CC5CF066BD
              SHA-256:82B9E598DD3B3AE9D33F09E85F2E6180A6698FDCA50A7254549E04A31C1FBC6A
              SHA-512:CAC68832CA28DB32E1215D7D800DDEA603ECFBB1A91FCCFDAE53C7D604650A8E1EA57406FA01CF39E1B848CCB3D9FF1324250856F91DFAB510BC8D956D6A67E9
              Malicious:false
              Reputation:unknown
              Preview:L..................F.@.. ...$+.,....G...(...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I|XY.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V|Xa.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V|Xa.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V|Xa............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V|Xc............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............-q.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 14:59:04 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
              Category:dropped
              Size (bytes):2679
              Entropy (8bit):3.9987657918923953
              Encrypted:false
              SSDEEP:
              MD5:19D611F837B95E1D40DEA95692F2C83D
              SHA1:8059D70B8976AD5BE3B72179460F7F6BC0AFD1E1
              SHA-256:606D86386FC435A95D8FFF969B73AA733CAC677BF7CB9B7F34D5D551421DC354
              SHA-512:4143F7971D2544A632382DBDAC9380BCC999FE3F4238E635464D2C389A893B363002C15A80A486C895FE6B780C44FBFA5CD06F84B7A78124BCF70083067E60FF
              Malicious:false
              Reputation:unknown
              Preview:L..................F.@.. ...$+.,.....[..(...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I|XY.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V|Xa.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V|Xa.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V|Xa............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V|Xc............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............-q.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:ASCII text, with very long lines (31713)
              Category:downloaded
              Size (bytes):31714
              Entropy (8bit):5.170603724747274
              Encrypted:false
              SSDEEP:
              MD5:EFACA5D5A9E62F10169303BB33FD721F
              SHA1:E1D1FC6EA2D9C04D98A0EF585601A4AC332F9764
              SHA-256:6DBD1967A8963D2EEAD020BE31031ED12DF79148ACFEA8CB787FA1358D5B4559
              SHA-512:CCC02E27A50A9E7AAAACFEDB6C37B3BC39E6448B6549AF281427C08B9EE13507D0BBCC73E0B941B0A62C3FA2DF7741D5E3E7B45B029253862EA19A3F5172E5B9
              Malicious:false
              Reputation:unknown
              URL:https://info.argyleforum.com/css/form.css?ver=2021-09-20
              Preview:form.form{color:#666;font:100%/120% Tahoma,Arial,Helvetica,Verdana,sans-serif;font-size:13px;margin:.5em 0 1em 0;padding:.5em}* html form.form{padding-top:.1em}form.form span.error{clear:left;display:block;font-weight:700;margin-top:2px;padding-left:166px}form.form span.value{display:block;margin-left:153px}form.form .value span{display:block}form.form .no-label .description,form.form .no-label .value{margin-left:0}form.form span.unsubscribe-value{display:block}form.form sup{cursor:pointer;font-size:1em;font-weight:400;text-decoration:underline}form.form label.required,form.form p.required,form.form span.required{font-weight:700}form.form p.required label,form.form span.required label{background:url(/images/required.gif) no-repeat top right}form.form p span{font-weight:400}form.form p span.description{clear:both;display:block;margin-left:153px}form.form p.email-pref span.description{display:block;margin-left:5px;font-size:.9em}form.form p{clear:left;line-height:1.4em;margin:3px 5px;pad
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:ASCII text, with very long lines (5453)
              Category:downloaded
              Size (bytes):5620
              Entropy (8bit):5.200998355308952
              Encrypted:false
              SSDEEP:
              MD5:0C0335550002DC4C4DB0DE1D9DCF043D
              SHA1:0BD0357FAA46E9FF78D939B196D43ED47C701160
              SHA-256:41402ADFC915AD6DFD6328C06C8038763D25FE603E63BEBA4A2638A2BBC03136
              SHA-512:449683E6A927848F403214C49705A91D54A880D4DA605F2E7B3FC52BF178C7475CA6131FAD823A6AEAD84A1EB4A3E0501B122900C97241CE620AB45330861F12
              Malicious:false
              Reputation:unknown
              URL:https://info.argyleforum.com/pd.js
              Preview:/*!..Marketing Cloud Account Engagement's Engagement Tracker Javascript - 2023-04-13 11:24:47..If you're an ad blocker, block the URI only. Don't block the domain..*/.function checkNamespace(e){for(var t=e.split("."),r=window,i=0;i<t.length;i++){var a=t[i];r[a]||(r[a]={}),r=r[a]}}function getPardotUrl(){var e="pi.pardot.com";return"string"==typeof piHostname&&(e=piHostname),("https:"==document.location.protocol?"https://":"http://")+e}function piTracker(e){if(checkNamespace("pi.tracker"),pi.tracker.visitor_id=piGetCookie("visitor_id"+(piAId-1e3)),pi.tracker.visitor_id_sign=piGetCookie("visitor_id"+(piAId-1e3)+"-hash"),pi.tracker.pi_opt_in=piGetCookie("pi_opt_in"+(piAId-1e3)),"false"!=pi.tracker.pi_opt_in||void 0!==pi.tracker.title&&pi.tracker.notify_pi){var t=piGetParameter(document.URL,"pi_campaign_id");null!=t?pi.tracker.campaign_id=t:"undefined"!=typeof piCId&&""!=piCId&&null!=piCId?pi.tracker.campaign_id=piCId:pi.tracker.campaign_id=null,pi.tracker.account_id=piAId,pi.tracker.title
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:ASCII text, with no line terminators
              Category:downloaded
              Size (bytes):28
              Entropy (8bit):4.2359263506290326
              Encrypted:false
              SSDEEP:
              MD5:CB22F63B958BF090C4CE656F7E29D041
              SHA1:2950720D4E7EA72EA060859C9C123AFCAEB872DF
              SHA-256:18F65810914CF7CA11345D6CA3014F6160E0453DC632E6159C338AAD4EDFAD9A
              SHA-512:25611BD1971F1BA697B189E6E861A238C7F1F13642C38D04E3E3ABB446224A6A094E9E001DA9559898F4462E8F3BFEC1BDC56FD933469CA2710306A792DBAA00
              Malicious:false
              Reputation:unknown
              URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISFwlzA7oGIRLeSxIFDQhDwzwSBQ3n2zmO?alt=proto
              Preview:ChIKBw0IQ8M8GgAKBw3n2zmOGgA=
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:GIF image data, version 89a, 16 x 16
              Category:dropped
              Size (bytes):186
              Entropy (8bit):6.097220981387893
              Encrypted:false
              SSDEEP:
              MD5:360C2EDB80E50C03397B50646654FE86
              SHA1:9D4207E407699E408E4B6E1BF32411F74043555D
              SHA-256:79BADF235E92FE69D052A2DF85DDD8D5EA24E2378EA8C46D920F51F286A229D8
              SHA-512:90CAB681C5776FB351DAB6F1910F88C5AE51FF44A8955587DF6C488F870AA44B99BCA4198A3295A3AD6FF3D6CC0F775A2F842E796C3F13F132CBCE19744FA987
              Malicious:false
              Reputation:unknown
              Preview:GIF89a.........,....z..a.....L........s.......Y.......0..j....Q....s..........*....f..................!.......,..........7.&.di.h...e."....-..B..0.. .....J.!.4T...rI.$.....y..U..;
              No static file info