Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
http://kirkland.comb96394384a89218003e26667253d58/casesp82611479h2791/court/shared/246092100873/access/files?w668856f01=4265366852&c=fh&dmc=www.atlantawinecellars.com&3911680y7&cmp=kirkland&6649762d4

Overview

General Information

Sample URL:http://kirkland.comb96394384a89218003e26667253d58/casesp82611479h2791/court/shared/246092100873/access/files?w668856f01=4265366852&c=fh&dmc=www.atlantawinecellars.com&3911680y7&cmp=kirkland&6649762d4
Analysis ID:1417175
Infos:
Errors
  • URL not reachable

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Stores files to the Windows start menu directory
Uses insecure TLS / SSL version for HTTPS connection

Classification

  • System is w10x64
  • chrome.exe (PID: 432 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 2140 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 --field-trial-handle=2220,i,17465481840783014749,2326277664288804377,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 4448 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://kirkland.comb96394384a89218003e26667253d58/casesp82611479h2791/court/shared/246092100873/access/files?w668856f01=4265366852&c=fh&dmc=www.atlantawinecellars.com&3911680y7&cmp=kirkland&6649762d4" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49719 version: TLS 1.0
Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49719 version: TLS 1.0
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownDNS traffic detected: queries for: kirkland.comb96394384a89218003e26667253d58
Source: unknownHTTP traffic detected: POST /threshold/xls.aspx HTTP/1.1Origin: https://www.bing.comReferer: https://www.bing.com/AS/API/WindowsCortanaPane/V2/InitAccept: */*Accept-Language: en-CHContent-type: text/xmlX-Agent-DeviceId: 01000A410900D492X-BM-CBT: 1696428841X-BM-DateFormat: dd/MM/yyyyX-BM-DeviceDimensions: 784x984X-BM-DeviceDimensionsLogical: 784x984X-BM-DeviceScale: 100X-BM-DTZ: 120X-BM-Market: CHX-BM-Theme: 000000;0078d7X-BM-WindowsFlights: FX:117B9872,FX:119E26AD,FX:11C0E96C,FX:11C6E5C2,FX:11C7EB6A,FX:11C9408A,FX:11C940DB,FX:11CB9A9F,FX:11CB9AC1,FX:11CC111C,FX:11D5BFCD,FX:11DF5B12,FX:11DF5B75,FX:1240931B,FX:124B38D0,FX:127FC878,FX:1283FFE8,FX:12840617,FX:128979F9,FX:128EBD7E,FX:129135BB,FX:129E053F,FX:12A74DB5,FX:12AB734D,FX:12B8450E,FX:12BD6E73,FX:12C3331B,FX:12C7D66EX-Device-ClientSession: DB0AFB19004F47BC80E5208C7478FF22X-Device-isOptin: falseX-Device-MachineId: {92C86F7C-DB2B-4F6A-95AD-98B4A2AE008A}X-Device-OSSKU: 48X-Device-Touch: falseX-DeviceID: 01000A410900D492X-MSEdge-ExternalExp: d-thshld39,d-thshld42,d-thshld77,d-thshld78,staticshX-MSEdge-ExternalExpType: JointCoordX-PositionerType: DesktopX-Search-AppId: Microsoft.Windows.Cortana_cw5n1h2txyewy!CortanaUIX-Search-CortanaAvailableCapabilities: NoneX-Search-SafeSearch: ModerateX-Search-TimeZone: Bias=-60; DaylightBias=-60; TimeZoneKeyName=W. Europe Standard TimeX-UserAgeClass: UnknownAccept-Encoding: gzip, deflate, brUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Cortana 1.14.7.19041; 10.0.0.0.19045.2006) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19045Host: www.bing.comContent-Length: 2484Connection: Keep-AliveCache-Control: no-cacheCookie: MUID=2F4E96DB8B7049E59AD4484C3C00F7CF; _SS=SID=1A6DEABB468B65843EB5F91B47916435&CPID=1711645454039&AC=1&CPH=d1a4eb75; _EDGE_S=SID=1A6DEABB468B65843EB5F91B47916435; SRCHUID=V=2&GUID=3D32B8AC657C4AD781A584E283227995&dmnchg=1; SRCHD=AF=NOFORM; SRCHUSR=DOB=20231004; SRCHHPGUSR=SRCHLANG=en&IPMH=986d886c&IPMID=1696428841029&HV=1696428756; CortanaAppUID=5A290E2CC4B523E2D8B5E2E3E4CB7CB7; MUIDB=2F4E96DB8B7049E59AD4484C3C00F7CF
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: classification engineClassification label: unknown1.win@19/6@12/3
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 --field-trial-handle=2220,i,17465481840783014749,2326277664288804377,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://kirkland.comb96394384a89218003e26667253d58/casesp82611479h2791/court/shared/246092100873/access/files?w668856f01=4265366852&c=fh&dmc=www.atlantawinecellars.com&3911680y7&cmp=kirkland&6649762d4"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 --field-trial-handle=2220,i,17465481840783014749,2326277664288804377,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Google Drive.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
http://kirkland.comb96394384a89218003e26667253d58/casesp82611479h2791/court/shared/246092100873/access/files?w668856f01=4265366852&c=fh&dmc=www.atlantawinecellars.com&3911680y7&cmp=kirkland&6649762d40%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
google.com
172.253.122.139
truefalse
    high
    www.google.com
    142.251.163.105
    truefalse
      high
      fp2e7a.wpc.phicdn.net
      192.229.211.108
      truefalse
        unknown
        kirkland.comb96394384a89218003e26667253d58
        unknown
        unknownfalse
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          239.255.255.250
          unknownReserved
          unknownunknownfalse
          142.251.163.105
          www.google.comUnited States
          15169GOOGLEUSfalse
          IP
          192.168.2.5
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1417175
          Start date and time:2024-03-28 18:03:42 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 1m 51s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:browseurl.jbs
          Sample URL:http://kirkland.comb96394384a89218003e26667253d58/casesp82611479h2791/court/shared/246092100873/access/files?w668856f01=4265366852&c=fh&dmc=www.atlantawinecellars.com&3911680y7&cmp=kirkland&6649762d4
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:6
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:UNKNOWN
          Classification:unknown1.win@19/6@12/3
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • URL browsing timeout or error
          • URL not reachable
          • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 142.251.163.94, 172.253.122.84, 172.253.115.101, 172.253.115.102, 172.253.115.138, 172.253.115.100, 172.253.115.139, 172.253.115.113, 34.104.35.123, 23.222.198.90, 20.12.23.50, 69.164.0.0, 23.207.202.43, 23.207.202.38, 23.207.202.14, 23.207.202.8, 23.207.202.6, 23.207.202.37, 23.207.202.40, 23.207.202.41, 23.207.202.30, 192.229.211.108, 20.3.187.198
          • Excluded domains from analysis (whitelisted): fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, clientservices.googleapis.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wu-bg-shim.trafficmanager.net, download.windowsupdate.com.edgesuite.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, ocsp.digicert.com, e16604.g.akamaiedge.net, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, clients.l.google.com, prod.fs.microsoft.com.akadns.net, glb.sls.prod.dcat.dsp.trafficmanager.net
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtSetInformationFile calls found.
          • VT rate limit hit for: http://kirkland.comb96394384a89218003e26667253d58/casesp82611479h2791/court/shared/246092100873/access/files?w668856f01=4265366852&c=fh&dmc=www.atlantawinecellars.com&3911680y7&cmp=kirkland&6649762d4
          No simulations
          No context
          No context
          No context
          No context
          No context
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 16:04:30 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2677
          Entropy (8bit):3.98217363910203
          Encrypted:false
          SSDEEP:48:8fdVT91VH7idAKZdA19ehwiZUklqehTy+3:8T/Loy
          MD5:1FFE157F3ABB4DA67CBEC7A6ACB31A32
          SHA1:749481A565F9B8B9CDBF08E4A29EAF1DA8B7963F
          SHA-256:B42180D1D9333A47610C7774EDDEC00E812AA9EEECA188BCB4563B8C6FFFC7A9
          SHA-512:BF5091C4C7E5FEEDA0AB634447505322BCC4B77DFF04F51DFB6942A3272560B302D7C1D51720A6FC0CBCFB52443B196D9B1B2B854CD1C097D869D2A43980E334
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,....r1..1...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I|X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V|X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V|X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V|X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V|X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............o.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 16:04:30 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2679
          Entropy (8bit):3.9990535269172125
          Encrypted:false
          SSDEEP:48:8OdVT91VH7idAKZdA1weh/iZUkAQkqehYy+2:8M/59Q1y
          MD5:B6AE0A1E50A31016E4786BA5822B5671
          SHA1:ED5FDC225F183968B58BBF786352AD4C27B1DFB0
          SHA-256:F1939DE4B86B45F07BB2678ADE9C7FA09A5811C0CC47B9BAD39A533964577D79
          SHA-512:4CE9B1C90031BDD6E119476A9F8EECB28DF055EF8357B4843FB12B4CC5FDB31753EDC0CFF53DCE8035A015E3606510CB797B8B758FBF5A171C4CE41283E9FEC3
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,........1...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I|X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V|X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V|X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V|X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V|X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............o.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2693
          Entropy (8bit):4.009347157214699
          Encrypted:false
          SSDEEP:48:8xedVT91sH7idAKZdA14tseh7sFiZUkmgqeh7sSy+BX:8xc/ynsy
          MD5:6EF88A3F5DB527727350032FA5B31A81
          SHA1:F32CCDEB4F034042A00C6A1775BC385A5D0A993D
          SHA-256:F8AB9174E75076201EAA39885EA1E5D0268ED7ADB6E409BC19457F0125A9C383
          SHA-512:1610CB30ED1EB8186709D78F8FAE763D0D6DDB7C3A4921A37322622E73F3BC62B9A08F838D240152D3BCDCB3D8B980C74141A63E9CA75D27A01FFE1685ECD298
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,......e>....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I|X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V|X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V|X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V|X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VDW.n...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............o.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 16:04:30 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2681
          Entropy (8bit):3.9996113665077466
          Encrypted:false
          SSDEEP:48:8LdVT91VH7idAKZdA1vehDiZUkwqeh0y+R:8v/aay
          MD5:634395AE83B911DED5A4A88AEA82EB92
          SHA1:31CD8FC699113817DA0709636D80197CD33F573B
          SHA-256:3FAA5BC6E10E3CE17A5EBBCD66619E7FEE445506D653B25417F77217247F7BE5
          SHA-512:F9456F23C2AD1877D35483EF2DC056C89C73F165C17A52408D62AAD35B46BAFCC0485180DFB56FD6CBDFF0FAD9A4CB0EF0A9765FF5C9861158ED1CAAAA80EEB1
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,.......1...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I|X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V|X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V|X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V|X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V|X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............o.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 16:04:30 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2681
          Entropy (8bit):3.9843829639949018
          Encrypted:false
          SSDEEP:48:8BdVT91VH7idAKZdA1hehBiZUk1W1qehGy+C:85/a9my
          MD5:5240947FA98D313A52D3E20CC6D69363
          SHA1:9B38D8C2F1974DC287A53A1567D99B660D96D21A
          SHA-256:CB123A97C50CAE75FF1A5944EAC613E51AA6366AAB0BAEC6F8214B9608E7DAF4
          SHA-512:2F821792DCF5B8AEC55438B36C8676D0F96D7A984C61490218922A7452D128D7983EBFAE0DE3D76AAC5D4BBE95C392C95056F25F7851873E11ECD000BD39A9A4
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,.....l..1...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I|X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V|X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V|X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V|X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V|X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............o.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 16:04:30 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2683
          Entropy (8bit):3.999467810416475
          Encrypted:false
          SSDEEP:48:8IdVT91VH7idAKZdA1duT+ehOuTbbiZUk5OjqehOuTbsy+yT+:8C/kT/TbxWOvTbsy7T
          MD5:05C0952C1EF7DB1ACE5FB72032291263
          SHA1:35DFEAA051ED8A019E3690D6E864FCF1ED2BB3EA
          SHA-256:05DB34CAF99435BA190AB81625ADB897557F79AFEA71FB2F9658EF5351036596
          SHA-512:9A617AB3C06935990E3399745E28763AEB71A3A2C3BAAC51102431C97A7A4A4DD3533DF7799314BDE91D5B683E9FFC70A8D8824D6BF494C368ECA31A6A719BBA
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,......{.1...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I|X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V|X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V|X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V|X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V|X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............o.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          No static file info
          TimestampSource PortDest PortSource IPDest IP
          Mar 28, 2024 18:04:24.044560909 CET49674443192.168.2.523.1.237.91
          Mar 28, 2024 18:04:24.044560909 CET49675443192.168.2.523.1.237.91
          Mar 28, 2024 18:04:24.138277054 CET49673443192.168.2.523.1.237.91
          Mar 28, 2024 18:04:32.965305090 CET49711443192.168.2.5142.251.163.105
          Mar 28, 2024 18:04:32.965338945 CET44349711142.251.163.105192.168.2.5
          Mar 28, 2024 18:04:32.965512991 CET49711443192.168.2.5142.251.163.105
          Mar 28, 2024 18:04:32.966052055 CET49711443192.168.2.5142.251.163.105
          Mar 28, 2024 18:04:32.966064930 CET44349711142.251.163.105192.168.2.5
          Mar 28, 2024 18:04:33.242137909 CET44349711142.251.163.105192.168.2.5
          Mar 28, 2024 18:04:33.250221968 CET49711443192.168.2.5142.251.163.105
          Mar 28, 2024 18:04:33.250251055 CET44349711142.251.163.105192.168.2.5
          Mar 28, 2024 18:04:33.251405954 CET44349711142.251.163.105192.168.2.5
          Mar 28, 2024 18:04:33.251488924 CET49711443192.168.2.5142.251.163.105
          Mar 28, 2024 18:04:33.253429890 CET49711443192.168.2.5142.251.163.105
          Mar 28, 2024 18:04:33.253499031 CET44349711142.251.163.105192.168.2.5
          Mar 28, 2024 18:04:33.307660103 CET49711443192.168.2.5142.251.163.105
          Mar 28, 2024 18:04:33.307670116 CET44349711142.251.163.105192.168.2.5
          Mar 28, 2024 18:04:33.354558945 CET49711443192.168.2.5142.251.163.105
          Mar 28, 2024 18:04:33.651432991 CET49675443192.168.2.523.1.237.91
          Mar 28, 2024 18:04:33.651432991 CET49674443192.168.2.523.1.237.91
          Mar 28, 2024 18:04:33.745177031 CET49673443192.168.2.523.1.237.91
          Mar 28, 2024 18:04:35.127625942 CET4434970323.1.237.91192.168.2.5
          Mar 28, 2024 18:04:35.127729893 CET49703443192.168.2.523.1.237.91
          Mar 28, 2024 18:04:43.251749039 CET44349711142.251.163.105192.168.2.5
          Mar 28, 2024 18:04:43.251813889 CET44349711142.251.163.105192.168.2.5
          Mar 28, 2024 18:04:43.251993895 CET49711443192.168.2.5142.251.163.105
          Mar 28, 2024 18:04:45.095846891 CET49711443192.168.2.5142.251.163.105
          Mar 28, 2024 18:04:45.095875025 CET44349711142.251.163.105192.168.2.5
          Mar 28, 2024 18:04:45.372699976 CET49703443192.168.2.523.1.237.91
          Mar 28, 2024 18:04:45.372699976 CET49703443192.168.2.523.1.237.91
          Mar 28, 2024 18:04:45.376276016 CET49719443192.168.2.523.1.237.91
          Mar 28, 2024 18:04:45.376301050 CET4434971923.1.237.91192.168.2.5
          Mar 28, 2024 18:04:45.377609968 CET49719443192.168.2.523.1.237.91
          Mar 28, 2024 18:04:45.417743921 CET49719443192.168.2.523.1.237.91
          Mar 28, 2024 18:04:45.417758942 CET4434971923.1.237.91192.168.2.5
          Mar 28, 2024 18:04:45.530302048 CET4434970323.1.237.91192.168.2.5
          Mar 28, 2024 18:04:45.530592918 CET4434970323.1.237.91192.168.2.5
          Mar 28, 2024 18:04:45.751708031 CET4434971923.1.237.91192.168.2.5
          Mar 28, 2024 18:04:45.751796961 CET49719443192.168.2.523.1.237.91
          Mar 28, 2024 18:04:46.015516996 CET49719443192.168.2.523.1.237.91
          Mar 28, 2024 18:04:46.015543938 CET4434971923.1.237.91192.168.2.5
          Mar 28, 2024 18:04:46.016036034 CET4434971923.1.237.91192.168.2.5
          Mar 28, 2024 18:04:46.016100883 CET49719443192.168.2.523.1.237.91
          Mar 28, 2024 18:04:46.019431114 CET49719443192.168.2.523.1.237.91
          Mar 28, 2024 18:04:46.019463062 CET4434971923.1.237.91192.168.2.5
          Mar 28, 2024 18:04:46.020405054 CET49719443192.168.2.523.1.237.91
          Mar 28, 2024 18:04:46.020416021 CET4434971923.1.237.91192.168.2.5
          Mar 28, 2024 18:04:46.383735895 CET4434971923.1.237.91192.168.2.5
          Mar 28, 2024 18:04:46.383806944 CET49719443192.168.2.523.1.237.91
          Mar 28, 2024 18:04:46.384174109 CET4434971923.1.237.91192.168.2.5
          Mar 28, 2024 18:04:46.384243011 CET49719443192.168.2.523.1.237.91
          Mar 28, 2024 18:04:46.384247065 CET4434971923.1.237.91192.168.2.5
          Mar 28, 2024 18:04:46.384299040 CET49719443192.168.2.523.1.237.91
          TimestampSource PortDest PortSource IPDest IP
          Mar 28, 2024 18:04:28.727735996 CET53501581.1.1.1192.168.2.5
          Mar 28, 2024 18:04:28.740222931 CET53522841.1.1.1192.168.2.5
          Mar 28, 2024 18:04:29.410207033 CET53534371.1.1.1192.168.2.5
          Mar 28, 2024 18:04:29.652602911 CET5506653192.168.2.51.1.1.1
          Mar 28, 2024 18:04:29.652884960 CET6390453192.168.2.51.1.1.1
          Mar 28, 2024 18:04:29.750324965 CET53550661.1.1.1192.168.2.5
          Mar 28, 2024 18:04:29.750829935 CET53639041.1.1.1192.168.2.5
          Mar 28, 2024 18:04:29.751686096 CET4921453192.168.2.51.1.1.1
          Mar 28, 2024 18:04:29.850869894 CET53492141.1.1.1192.168.2.5
          Mar 28, 2024 18:04:29.880647898 CET5053053192.168.2.58.8.8.8
          Mar 28, 2024 18:04:29.880791903 CET5889353192.168.2.51.1.1.1
          Mar 28, 2024 18:04:29.976334095 CET53588931.1.1.1192.168.2.5
          Mar 28, 2024 18:04:29.987066984 CET53505308.8.8.8192.168.2.5
          Mar 28, 2024 18:04:30.906476974 CET5453353192.168.2.51.1.1.1
          Mar 28, 2024 18:04:30.906673908 CET6386553192.168.2.51.1.1.1
          Mar 28, 2024 18:04:31.003660917 CET53638651.1.1.1192.168.2.5
          Mar 28, 2024 18:04:31.005839109 CET53545331.1.1.1192.168.2.5
          Mar 28, 2024 18:04:32.867126942 CET6195953192.168.2.51.1.1.1
          Mar 28, 2024 18:04:32.867285967 CET5165853192.168.2.51.1.1.1
          Mar 28, 2024 18:04:32.962833881 CET53516581.1.1.1192.168.2.5
          Mar 28, 2024 18:04:32.963068008 CET53619591.1.1.1192.168.2.5
          Mar 28, 2024 18:04:36.032700062 CET4993153192.168.2.51.1.1.1
          Mar 28, 2024 18:04:36.033128977 CET6356153192.168.2.51.1.1.1
          Mar 28, 2024 18:04:36.130392075 CET53635611.1.1.1192.168.2.5
          Mar 28, 2024 18:04:36.132602930 CET53499311.1.1.1192.168.2.5
          Mar 28, 2024 18:04:36.135027885 CET6069153192.168.2.51.1.1.1
          Mar 28, 2024 18:04:36.234106064 CET53606911.1.1.1192.168.2.5
          Mar 28, 2024 18:04:47.124861002 CET53524341.1.1.1192.168.2.5
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Mar 28, 2024 18:04:29.652602911 CET192.168.2.51.1.1.10xa6b2Standard query (0)kirkland.comb96394384a89218003e26667253d58A (IP address)IN (0x0001)false
          Mar 28, 2024 18:04:29.652884960 CET192.168.2.51.1.1.10xc07dStandard query (0)kirkland.comb96394384a89218003e26667253d5865IN (0x0001)false
          Mar 28, 2024 18:04:29.751686096 CET192.168.2.51.1.1.10x9c3fStandard query (0)kirkland.comb96394384a89218003e26667253d58A (IP address)IN (0x0001)false
          Mar 28, 2024 18:04:29.880647898 CET192.168.2.58.8.8.80x3096Standard query (0)google.comA (IP address)IN (0x0001)false
          Mar 28, 2024 18:04:29.880791903 CET192.168.2.51.1.1.10x5436Standard query (0)google.comA (IP address)IN (0x0001)false
          Mar 28, 2024 18:04:30.906476974 CET192.168.2.51.1.1.10x455eStandard query (0)kirkland.comb96394384a89218003e26667253d58A (IP address)IN (0x0001)false
          Mar 28, 2024 18:04:30.906673908 CET192.168.2.51.1.1.10xec10Standard query (0)kirkland.comb96394384a89218003e26667253d5865IN (0x0001)false
          Mar 28, 2024 18:04:32.867126942 CET192.168.2.51.1.1.10x99b9Standard query (0)www.google.comA (IP address)IN (0x0001)false
          Mar 28, 2024 18:04:32.867285967 CET192.168.2.51.1.1.10x808eStandard query (0)www.google.com65IN (0x0001)false
          Mar 28, 2024 18:04:36.032700062 CET192.168.2.51.1.1.10x958eStandard query (0)kirkland.comb96394384a89218003e26667253d58A (IP address)IN (0x0001)false
          Mar 28, 2024 18:04:36.033128977 CET192.168.2.51.1.1.10x5497Standard query (0)kirkland.comb96394384a89218003e26667253d5865IN (0x0001)false
          Mar 28, 2024 18:04:36.135027885 CET192.168.2.51.1.1.10xbab1Standard query (0)kirkland.comb96394384a89218003e26667253d58A (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Mar 28, 2024 18:04:29.750324965 CET1.1.1.1192.168.2.50xa6b2Name error (3)kirkland.comb96394384a89218003e26667253d58nonenoneA (IP address)IN (0x0001)false
          Mar 28, 2024 18:04:29.750829935 CET1.1.1.1192.168.2.50xc07dName error (3)kirkland.comb96394384a89218003e26667253d58nonenone65IN (0x0001)false
          Mar 28, 2024 18:04:29.850869894 CET1.1.1.1192.168.2.50x9c3fName error (3)kirkland.comb96394384a89218003e26667253d58nonenoneA (IP address)IN (0x0001)false
          Mar 28, 2024 18:04:29.976334095 CET1.1.1.1192.168.2.50x5436No error (0)google.com172.253.122.139A (IP address)IN (0x0001)false
          Mar 28, 2024 18:04:29.976334095 CET1.1.1.1192.168.2.50x5436No error (0)google.com172.253.122.100A (IP address)IN (0x0001)false
          Mar 28, 2024 18:04:29.976334095 CET1.1.1.1192.168.2.50x5436No error (0)google.com172.253.122.102A (IP address)IN (0x0001)false
          Mar 28, 2024 18:04:29.976334095 CET1.1.1.1192.168.2.50x5436No error (0)google.com172.253.122.113A (IP address)IN (0x0001)false
          Mar 28, 2024 18:04:29.976334095 CET1.1.1.1192.168.2.50x5436No error (0)google.com172.253.122.138A (IP address)IN (0x0001)false
          Mar 28, 2024 18:04:29.976334095 CET1.1.1.1192.168.2.50x5436No error (0)google.com172.253.122.101A (IP address)IN (0x0001)false
          Mar 28, 2024 18:04:29.987066984 CET8.8.8.8192.168.2.50x3096No error (0)google.com172.253.122.113A (IP address)IN (0x0001)false
          Mar 28, 2024 18:04:29.987066984 CET8.8.8.8192.168.2.50x3096No error (0)google.com172.253.122.101A (IP address)IN (0x0001)false
          Mar 28, 2024 18:04:29.987066984 CET8.8.8.8192.168.2.50x3096No error (0)google.com172.253.122.138A (IP address)IN (0x0001)false
          Mar 28, 2024 18:04:29.987066984 CET8.8.8.8192.168.2.50x3096No error (0)google.com172.253.122.102A (IP address)IN (0x0001)false
          Mar 28, 2024 18:04:29.987066984 CET8.8.8.8192.168.2.50x3096No error (0)google.com172.253.122.100A (IP address)IN (0x0001)false
          Mar 28, 2024 18:04:29.987066984 CET8.8.8.8192.168.2.50x3096No error (0)google.com172.253.122.139A (IP address)IN (0x0001)false
          Mar 28, 2024 18:04:31.003660917 CET1.1.1.1192.168.2.50xec10Name error (3)kirkland.comb96394384a89218003e26667253d58nonenone65IN (0x0001)false
          Mar 28, 2024 18:04:31.005839109 CET1.1.1.1192.168.2.50x455eName error (3)kirkland.comb96394384a89218003e26667253d58nonenoneA (IP address)IN (0x0001)false
          Mar 28, 2024 18:04:32.962833881 CET1.1.1.1192.168.2.50x808eNo error (0)www.google.com65IN (0x0001)false
          Mar 28, 2024 18:04:32.963068008 CET1.1.1.1192.168.2.50x99b9No error (0)www.google.com142.251.163.105A (IP address)IN (0x0001)false
          Mar 28, 2024 18:04:32.963068008 CET1.1.1.1192.168.2.50x99b9No error (0)www.google.com142.251.163.106A (IP address)IN (0x0001)false
          Mar 28, 2024 18:04:32.963068008 CET1.1.1.1192.168.2.50x99b9No error (0)www.google.com142.251.163.103A (IP address)IN (0x0001)false
          Mar 28, 2024 18:04:32.963068008 CET1.1.1.1192.168.2.50x99b9No error (0)www.google.com142.251.163.104A (IP address)IN (0x0001)false
          Mar 28, 2024 18:04:32.963068008 CET1.1.1.1192.168.2.50x99b9No error (0)www.google.com142.251.163.99A (IP address)IN (0x0001)false
          Mar 28, 2024 18:04:32.963068008 CET1.1.1.1192.168.2.50x99b9No error (0)www.google.com142.251.163.147A (IP address)IN (0x0001)false
          Mar 28, 2024 18:04:36.130392075 CET1.1.1.1192.168.2.50x5497Name error (3)kirkland.comb96394384a89218003e26667253d58nonenone65IN (0x0001)false
          Mar 28, 2024 18:04:36.132602930 CET1.1.1.1192.168.2.50x958eName error (3)kirkland.comb96394384a89218003e26667253d58nonenoneA (IP address)IN (0x0001)false
          Mar 28, 2024 18:04:36.234106064 CET1.1.1.1192.168.2.50xbab1Name error (3)kirkland.comb96394384a89218003e26667253d58nonenoneA (IP address)IN (0x0001)false
          Mar 28, 2024 18:04:45.017700911 CET1.1.1.1192.168.2.50x6265No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
          Mar 28, 2024 18:04:45.017700911 CET1.1.1.1192.168.2.50x6265No error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
          • https:
            • www.bing.com
          Session IDSource IPSource PortDestination IPDestination Port
          0192.168.2.54971923.1.237.91443
          TimestampBytes transferredDirectionData
          2024-03-28 17:04:46 UTC2148OUTPOST /threshold/xls.aspx HTTP/1.1
          Origin: https://www.bing.com
          Referer: https://www.bing.com/AS/API/WindowsCortanaPane/V2/Init
          Accept: */*
          Accept-Language: en-CH
          Content-type: text/xml
          X-Agent-DeviceId: 01000A410900D492
          X-BM-CBT: 1696428841
          X-BM-DateFormat: dd/MM/yyyy
          X-BM-DeviceDimensions: 784x984
          X-BM-DeviceDimensionsLogical: 784x984
          X-BM-DeviceScale: 100
          X-BM-DTZ: 120
          X-BM-Market: CH
          X-BM-Theme: 000000;0078d7
          X-BM-WindowsFlights: FX:117B9872,FX:119E26AD,FX:11C0E96C,FX:11C6E5C2,FX:11C7EB6A,FX:11C9408A,FX:11C940DB,FX:11CB9A9F,FX:11CB9AC1,FX:11CC111C,FX:11D5BFCD,FX:11DF5B12,FX:11DF5B75,FX:1240931B,FX:124B38D0,FX:127FC878,FX:1283FFE8,FX:12840617,FX:128979F9,FX:128EBD7E,FX:129135BB,FX:129E053F,FX:12A74DB5,FX:12AB734D,FX:12B8450E,FX:12BD6E73,FX:12C3331B,FX:12C7D66E
          X-Device-ClientSession: DB0AFB19004F47BC80E5208C7478FF22
          X-Device-isOptin: false
          X-Device-MachineId: {92C86F7C-DB2B-4F6A-95AD-98B4A2AE008A}
          X-Device-OSSKU: 48
          X-Device-Touch: false
          X-DeviceID: 01000A410900D492
          X-MSEdge-ExternalExp: d-thshld39,d-thshld42,d-thshld77,d-thshld78,staticsh
          X-MSEdge-ExternalExpType: JointCoord
          X-PositionerType: Desktop
          X-Search-AppId: Microsoft.Windows.Cortana_cw5n1h2txyewy!CortanaUI
          X-Search-CortanaAvailableCapabilities: None
          X-Search-SafeSearch: Moderate
          X-Search-TimeZone: Bias=-60; DaylightBias=-60; TimeZoneKeyName=W. Europe Standard Time
          X-UserAgeClass: Unknown
          Accept-Encoding: gzip, deflate, br
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Cortana 1.14.7.19041; 10.0.0.0.19045.2006) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19045
          Host: www.bing.com
          Content-Length: 2484
          Connection: Keep-Alive
          Cache-Control: no-cache
          Cookie: MUID=2F4E96DB8B7049E59AD4484C3C00F7CF; _SS=SID=1A6DEABB468B65843EB5F91B47916435&CPID=1711645454039&AC=1&CPH=d1a4eb75; _EDGE_S=SID=1A6DEABB468B65843EB5F91B47916435; SRCHUID=V=2&GUID=3D32B8AC657C4AD781A584E283227995&dmnchg=1; SRCHD=AF=NOFORM; SRCHUSR=DOB=20231004; SRCHHPGUSR=SRCHLANG=en&IPMH=986d886c&IPMID=1696428841029&HV=1696428756; CortanaAppUID=5A290E2CC4B523E2D8B5E2E3E4CB7CB7; MUIDB=2F4E96DB8B7049E59AD4484C3C00F7CF
          2024-03-28 17:04:46 UTC1OUTData Raw: 3c
          Data Ascii: <
          2024-03-28 17:04:46 UTC2483OUTData Raw: 43 6c 69 65 6e 74 49 6e 73 74 52 65 71 75 65 73 74 3e 3c 43 49 44 3e 33 36 34 34 46 44 37 34 44 46 31 36 36 31 38 46 30 38 46 37 45 43 30 33 44 45 35 35 36 30 30 31 3c 2f 43 49 44 3e 3c 45 76 65 6e 74 73 3e 3c 45 3e 3c 54 3e 45 76 65 6e 74 2e 43 6c 69 65 6e 74 49 6e 73 74 3c 2f 54 3e 3c 49 47 3e 37 35 32 32 38 31 35 36 37 30 33 41 34 30 44 35 42 39 37 45 35 41 36 38 33 36 46 32 41 31 43 45 3c 2f 49 47 3e 3c 44 3e 3c 21 5b 43 44 41 54 41 5b 7b 22 43 75 72 55 72 6c 22 3a 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 62 69 6e 67 2e 63 6f 6d 2f 41 53 2f 41 50 49 2f 57 69 6e 64 6f 77 73 43 6f 72 74 61 6e 61 50 61 6e 65 2f 56 32 2f 49 6e 69 74 22 2c 22 50 69 76 6f 74 22 3a 22 51 46 22 2c 22 54 22 3a 22 43 49 2e 42 6f 78 4d 6f 64 65 6c 22 2c 22 46 49 44 22 3a 22 43 49
          Data Ascii: ClientInstRequest><CID>3644FD74DF16618F08F7EC03DE556001</CID><Events><E><T>Event.ClientInst</T><IG>75228156703A40D5B97E5A6836F2A1CE</IG><D><![CDATA[{"CurUrl":"https://www.bing.com/AS/API/WindowsCortanaPane/V2/Init","Pivot":"QF","T":"CI.BoxModel","FID":"CI
          2024-03-28 17:04:46 UTC478INHTTP/1.1 204 No Content
          Access-Control-Allow-Origin: *
          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
          X-MSEdge-Ref: Ref A: 7D829929B551427B904BB2C9819335C0 Ref B: LAX311000111017 Ref C: 2024-03-28T17:04:46Z
          Date: Thu, 28 Mar 2024 17:04:46 GMT
          Connection: close
          Alt-Svc: h3=":443"; ma=93600
          X-CDN-TraceID: 0.57ed0117.1711645486.c5431c


          Click to jump to process

          Click to jump to process

          Click to jump to process

          Target ID:0
          Start time:18:04:24
          Start date:28/03/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
          Imagebase:0x7ff715980000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:2
          Start time:18:04:27
          Start date:28/03/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 --field-trial-handle=2220,i,17465481840783014749,2326277664288804377,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
          Imagebase:0x7ff715980000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:3
          Start time:18:04:28
          Start date:28/03/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://kirkland.comb96394384a89218003e26667253d58/casesp82611479h2791/court/shared/246092100873/access/files?w668856f01=4265366852&c=fh&dmc=www.atlantawinecellars.com&3911680y7&cmp=kirkland&6649762d4"
          Imagebase:0x7ff715980000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          No disassembly