Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
http://chrome-extension//efaidnbmnnnibpcajpcglclefindmkaj/https://prod-cms-files.demosphere-secure.com/_deimos/_public_files/0nxidf0wzm22j/golf-tournament/Dustin%20Appreciation.pdf?CacheKey=1713281827

Overview

General Information

Sample URL:http://chrome-extension//efaidnbmnnnibpcajpcglclefindmkaj/https://prod-cms-files.demosphere-secure.com/_deimos/_public_files/0nxidf0wzm22j/golf-tournament/Dustin%20Appreciation.pdf?CacheKey=1713281827
Analysis ID:1426996
Infos:
Errors
  • URL not reachable

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Stores files to the Windows start menu directory
Uses insecure TLS / SSL version for HTTPS connection

Classification

  • System is w10x64
  • chrome.exe (PID: 4720 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6500 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2392 --field-trial-handle=2352,i,6566851095694793694,13408189049783377515,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6192 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://chrome-extension//efaidnbmnnnibpcajpcglclefindmkaj/https://prod-cms-files.demosphere-secure.com/_deimos/_public_files/0nxidf0wzm22j/golf-tournament/Dustin%20Appreciation.pdf?CacheKey=1713281827" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49720 version: TLS 1.0
Source: unknownHTTPS traffic detected: 23.208.128.100:443 -> 192.168.2.5:49713 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.208.128.100:443 -> 192.168.2.5:49714 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49720 version: TLS 1.0
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.208.128.100
Source: unknownTCP traffic detected without corresponding DNS query: 23.208.128.100
Source: unknownTCP traffic detected without corresponding DNS query: 23.208.128.100
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.208.128.100
Source: unknownTCP traffic detected without corresponding DNS query: 23.208.128.100
Source: unknownTCP traffic detected without corresponding DNS query: 23.208.128.100
Source: unknownTCP traffic detected without corresponding DNS query: 23.208.128.100
Source: unknownTCP traffic detected without corresponding DNS query: 23.208.128.100
Source: unknownTCP traffic detected without corresponding DNS query: 23.208.128.100
Source: unknownTCP traffic detected without corresponding DNS query: 23.208.128.100
Source: unknownTCP traffic detected without corresponding DNS query: 23.208.128.100
Source: unknownTCP traffic detected without corresponding DNS query: 23.208.128.100
Source: unknownTCP traffic detected without corresponding DNS query: 23.208.128.100
Source: unknownTCP traffic detected without corresponding DNS query: 23.208.128.100
Source: unknownTCP traffic detected without corresponding DNS query: 23.208.128.100
Source: unknownTCP traffic detected without corresponding DNS query: 23.208.128.100
Source: unknownTCP traffic detected without corresponding DNS query: 23.208.128.100
Source: unknownTCP traffic detected without corresponding DNS query: 23.208.128.100
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
Source: unknownDNS traffic detected: queries for: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownHTTPS traffic detected: 23.208.128.100:443 -> 192.168.2.5:49713 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.208.128.100:443 -> 192.168.2.5:49714 version: TLS 1.2
Source: classification engineClassification label: unknown1.win@19/6@4/3
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2392 --field-trial-handle=2352,i,6566851095694793694,13408189049783377515,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://chrome-extension//efaidnbmnnnibpcajpcglclefindmkaj/https://prod-cms-files.demosphere-secure.com/_deimos/_public_files/0nxidf0wzm22j/golf-tournament/Dustin%20Appreciation.pdf?CacheKey=1713281827"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2392 --field-trial-handle=2352,i,6566851095694793694,13408189049783377515,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Google Drive.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1426996 URL: http://chrome-extension//ef... Startdate: 16/04/2024 Architecture: WINDOWS Score: 1 5 chrome.exe 8 2->5         started        8 chrome.exe 2->8         started        dnsIp3 13 192.168.2.5, 443, 49703, 49712 unknown unknown 5->13 15 239.255.255.250 unknown Reserved 5->15 10 chrome.exe 5->10         started        process4 dnsIp5 17 www.google.com 64.233.177.99, 443, 49712 GOOGLEUS United States 10->17 19 google.com 10->19

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.210.172
truefalse
    unknown
    google.com
    108.177.122.101
    truefalse
      high
      www.google.com
      64.233.177.99
      truefalse
        high
        fp2e7a.wpc.phicdn.net
        192.229.211.108
        truefalse
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          239.255.255.250
          unknownReserved
          unknownunknownfalse
          64.233.177.99
          www.google.comUnited States
          15169GOOGLEUSfalse
          IP
          192.168.2.5
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1426996
          Start date and time:2024-04-16 21:18:24 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 1m 53s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:browseurl.jbs
          Sample URL:http://chrome-extension//efaidnbmnnnibpcajpcglclefindmkaj/https://prod-cms-files.demosphere-secure.com/_deimos/_public_files/0nxidf0wzm22j/golf-tournament/Dustin%20Appreciation.pdf?CacheKey=1713281827
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:6
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:UNKNOWN
          Classification:unknown1.win@19/6@4/3
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • URL browsing timeout or error
          • URL not reachable
          • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 172.253.124.94, 173.194.219.139, 173.194.219.100, 173.194.219.138, 173.194.219.113, 173.194.219.102, 173.194.219.101, 64.233.185.84, 34.104.35.123, 20.12.23.50, 23.40.205.49, 199.232.210.172, 192.229.211.108, 13.95.31.18
          • Excluded domains from analysis (whitelisted): fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, clientservices.googleapis.com, ctldl.windowsupdate.com, wu-bg-shim.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, ocsp.digicert.com, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, clients.l.google.com, glb.sls.prod.dcat.dsp.trafficmanager.net
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtSetInformationFile calls found.
          • VT rate limit hit for: http://chrome-extension//efaidnbmnnnibpcajpcglclefindmkaj/https://prod-cms-files.demosphere-secure.com/_deimos/_public_files/0nxidf0wzm22j/golf-tournament/Dustin%20Appreciation.pdf?CacheKey=1713281827
          No simulations
          No context
          No context
          No context
          No context
          No context
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 16 18:19:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2677
          Entropy (8bit):3.969193557511649
          Encrypted:false
          SSDEEP:48:86dCjTmGYfH1idAKZdA19ehwiZUklqehOy+3:83bCVy
          MD5:3573BD0638174B49C44A6C72BA1E7257
          SHA1:34FEEBC89BD45083E665200BB7F42DC921B2FA13
          SHA-256:06D7C8F0FC74DA701EF9F400711E00D2D300C5404737927A4445EEA9CEE01762
          SHA-512:63636B858908BD13FDDBB6F36DF4854C7675ABA150253B5418127E9302B388A5D113DB22DABE6367B56D33636B359B9C5411BC57ADE4E0493EAE55F1A9F4689D
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,....y._.2...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.Xe.....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xe.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xe.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xe............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Xi............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............6......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 16 18:19:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2679
          Entropy (8bit):3.9856184291151417
          Encrypted:false
          SSDEEP:48:8C2dCjTmGYfH1idAKZdA1weh/iZUkAQkqehFy+2:8CrbY9QMy
          MD5:E30F05914FB8474FE34B7F45DC887C02
          SHA1:5BC9367BF841C434B32072551270F10B3B623E77
          SHA-256:6C441B3ED5C3352530EFB0A2EF36F7988CF7CC4A0F945C1ED6D70457BB1CD000
          SHA-512:9427F4462B79A3B2EFDE1882A0748486354B622E2617B6AE9C65CDD0117A56F65BD3FA21DE1055E12335BE7BF2C43A0CAEE6B04A19139CF3A085D36C1AC3C8FC
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,......R.2...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.Xe.....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xe.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xe.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xe............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Xi............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............6......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2693
          Entropy (8bit):3.9983421639879886
          Encrypted:false
          SSDEEP:48:8xXdCjTmGsH1idAKZdA14tseh7sFiZUkmgqeh7sTy+BX:8x4bUnRy
          MD5:5F8DC52AD5FCF8DB52EF07EF60304996
          SHA1:0047AA49990AFE5C004762F6EB8DB9E6CE0B52F0
          SHA-256:3C2A8B83DFC4E188236583532836BB4EF427D5BB57E94A46166FA1CA2FB438EE
          SHA-512:4AA31B48AAB9BBEC5975A8931C4FAD446A171FBED9CF27463E414F10CEA66829282187D8E2587B6458252C16B7C72CF9943C17453CC3E0487265DCA4DC91A9C7
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,......e>....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.Xe.....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xe.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xe.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xe............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VDW.n...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............6......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 16 18:19:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2681
          Entropy (8bit):3.982740590403344
          Encrypted:false
          SSDEEP:48:8fdCjTmGYfH1idAKZdA1vehDiZUkwqeh5y+R:8wbDby
          MD5:52BF2275A5C2B51C440A75423E3020AC
          SHA1:C73F05F7D9067E6F793C2475F3D9DDB99475330B
          SHA-256:775A7004ED51BA93CBCCCF4B46C4784F298187C4F870BFF450A67396CAED155D
          SHA-512:567E0DB7D0A4C03E26F4C1D90617CEA97C1B17AA19314F373DA8E74C60B93416A4507442A651657B8427B64131358DF4D726957CD484B8F4B49F686DEDF3F247
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,...._$F.2...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.Xe.....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xe.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xe.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xe............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Xi............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............6......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 16 18:19:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2681
          Entropy (8bit):3.973766854830111
          Encrypted:false
          SSDEEP:48:83dCjTmGYfH1idAKZdA1hehBiZUk1W1qeh/y+C:8YbT9fy
          MD5:A756B259824115B2D07550F8C7511042
          SHA1:EB0ECD7C6C4749380B4E9D5D8C8F88043B656C5C
          SHA-256:A6DA2047C3BF9E2224F83CCDA0F533F3EA03DD328756A32A1998CA883D14CF15
          SHA-512:06A48BC607CD22B281DD9253A2479137461C83B7EB3FB0DC695D48252AED1871D5DD1AC4C1F05D332A4392F2560C5EAF4F993B9FB58044C2BBFA4D46CBE512B3
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,..... Z.2...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.Xe.....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xe.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xe.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xe............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Xi............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............6......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 16 18:19:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2683
          Entropy (8bit):3.985386964093841
          Encrypted:false
          SSDEEP:48:8ddCjTmGYfH1idAKZdA1duT+ehOuTbbiZUk5OjqehOuTbRy+yT+:8KbDT/TbxWOvTbRy7T
          MD5:96C1A0C9633044F4B791612BF392E390
          SHA1:FC859F3AB38A6444C3BB9BADBA5298C331B06BD8
          SHA-256:1423E0FB1795C0FAE4FC6FA4CD4126E98707DA40715062D638AFDB0826086718
          SHA-512:6E0750C1D456D953EFB9DDF4B7560886984527007B82DBCCD575100321562CCD367322AF0EB6F307FB6965C2CF155891BE9FF08ACA0B06C59A5914A3E95C7DC1
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,....N.>.2...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.Xe.....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xe.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xe.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xe............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Xi............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............6......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          No static file info
          TimestampSource PortDest PortSource IPDest IP
          Apr 16, 2024 21:19:08.682394981 CEST49675443192.168.2.523.1.237.91
          Apr 16, 2024 21:19:08.682396889 CEST49674443192.168.2.523.1.237.91
          Apr 16, 2024 21:19:08.776144028 CEST49673443192.168.2.523.1.237.91
          Apr 16, 2024 21:19:17.998481035 CEST49712443192.168.2.564.233.177.99
          Apr 16, 2024 21:19:17.998512030 CEST4434971264.233.177.99192.168.2.5
          Apr 16, 2024 21:19:17.998789072 CEST49712443192.168.2.564.233.177.99
          Apr 16, 2024 21:19:17.998975039 CEST49712443192.168.2.564.233.177.99
          Apr 16, 2024 21:19:17.998992920 CEST4434971264.233.177.99192.168.2.5
          Apr 16, 2024 21:19:18.228041887 CEST4434971264.233.177.99192.168.2.5
          Apr 16, 2024 21:19:18.231359959 CEST49712443192.168.2.564.233.177.99
          Apr 16, 2024 21:19:18.231379986 CEST4434971264.233.177.99192.168.2.5
          Apr 16, 2024 21:19:18.233005047 CEST4434971264.233.177.99192.168.2.5
          Apr 16, 2024 21:19:18.233093977 CEST49712443192.168.2.564.233.177.99
          Apr 16, 2024 21:19:18.234390020 CEST49712443192.168.2.564.233.177.99
          Apr 16, 2024 21:19:18.234635115 CEST4434971264.233.177.99192.168.2.5
          Apr 16, 2024 21:19:18.325963020 CEST49712443192.168.2.564.233.177.99
          Apr 16, 2024 21:19:18.325980902 CEST4434971264.233.177.99192.168.2.5
          Apr 16, 2024 21:19:18.326081991 CEST49674443192.168.2.523.1.237.91
          Apr 16, 2024 21:19:18.343151093 CEST49675443192.168.2.523.1.237.91
          Apr 16, 2024 21:19:18.452472925 CEST49673443192.168.2.523.1.237.91
          Apr 16, 2024 21:19:18.516134977 CEST49712443192.168.2.564.233.177.99
          Apr 16, 2024 21:19:19.723936081 CEST49713443192.168.2.523.208.128.100
          Apr 16, 2024 21:19:19.723979950 CEST4434971323.208.128.100192.168.2.5
          Apr 16, 2024 21:19:19.724072933 CEST49713443192.168.2.523.208.128.100
          Apr 16, 2024 21:19:19.725925922 CEST49713443192.168.2.523.208.128.100
          Apr 16, 2024 21:19:19.725941896 CEST4434971323.208.128.100192.168.2.5
          Apr 16, 2024 21:19:19.762525082 CEST4434970323.1.237.91192.168.2.5
          Apr 16, 2024 21:19:19.762674093 CEST49703443192.168.2.523.1.237.91
          Apr 16, 2024 21:19:19.946688890 CEST4434971323.208.128.100192.168.2.5
          Apr 16, 2024 21:19:19.946887016 CEST49713443192.168.2.523.208.128.100
          Apr 16, 2024 21:19:19.948863983 CEST49713443192.168.2.523.208.128.100
          Apr 16, 2024 21:19:19.948889971 CEST4434971323.208.128.100192.168.2.5
          Apr 16, 2024 21:19:19.949314117 CEST4434971323.208.128.100192.168.2.5
          Apr 16, 2024 21:19:19.992444038 CEST49713443192.168.2.523.208.128.100
          Apr 16, 2024 21:19:20.040155888 CEST4434971323.208.128.100192.168.2.5
          Apr 16, 2024 21:19:20.148785114 CEST4434971323.208.128.100192.168.2.5
          Apr 16, 2024 21:19:20.148859978 CEST4434971323.208.128.100192.168.2.5
          Apr 16, 2024 21:19:20.148922920 CEST49713443192.168.2.523.208.128.100
          Apr 16, 2024 21:19:20.149008989 CEST49713443192.168.2.523.208.128.100
          Apr 16, 2024 21:19:20.149034023 CEST4434971323.208.128.100192.168.2.5
          Apr 16, 2024 21:19:20.149050951 CEST49713443192.168.2.523.208.128.100
          Apr 16, 2024 21:19:20.149058104 CEST4434971323.208.128.100192.168.2.5
          Apr 16, 2024 21:19:20.195070982 CEST49714443192.168.2.523.208.128.100
          Apr 16, 2024 21:19:20.195105076 CEST4434971423.208.128.100192.168.2.5
          Apr 16, 2024 21:19:20.195287943 CEST49714443192.168.2.523.208.128.100
          Apr 16, 2024 21:19:20.195513010 CEST49714443192.168.2.523.208.128.100
          Apr 16, 2024 21:19:20.195538998 CEST4434971423.208.128.100192.168.2.5
          Apr 16, 2024 21:19:20.409565926 CEST4434971423.208.128.100192.168.2.5
          Apr 16, 2024 21:19:20.409647942 CEST49714443192.168.2.523.208.128.100
          Apr 16, 2024 21:19:20.417742014 CEST49714443192.168.2.523.208.128.100
          Apr 16, 2024 21:19:20.417754889 CEST4434971423.208.128.100192.168.2.5
          Apr 16, 2024 21:19:20.418153048 CEST4434971423.208.128.100192.168.2.5
          Apr 16, 2024 21:19:20.420110941 CEST49714443192.168.2.523.208.128.100
          Apr 16, 2024 21:19:20.464135885 CEST4434971423.208.128.100192.168.2.5
          Apr 16, 2024 21:19:20.617455006 CEST4434971423.208.128.100192.168.2.5
          Apr 16, 2024 21:19:20.617528915 CEST4434971423.208.128.100192.168.2.5
          Apr 16, 2024 21:19:20.617575884 CEST49714443192.168.2.523.208.128.100
          Apr 16, 2024 21:19:20.619591951 CEST49714443192.168.2.523.208.128.100
          Apr 16, 2024 21:19:20.619616985 CEST4434971423.208.128.100192.168.2.5
          Apr 16, 2024 21:19:20.619631052 CEST49714443192.168.2.523.208.128.100
          Apr 16, 2024 21:19:20.619637966 CEST4434971423.208.128.100192.168.2.5
          Apr 16, 2024 21:19:28.213267088 CEST4434971264.233.177.99192.168.2.5
          Apr 16, 2024 21:19:28.213392019 CEST4434971264.233.177.99192.168.2.5
          Apr 16, 2024 21:19:28.213450909 CEST49712443192.168.2.564.233.177.99
          Apr 16, 2024 21:19:28.626416922 CEST49712443192.168.2.564.233.177.99
          Apr 16, 2024 21:19:28.626444101 CEST4434971264.233.177.99192.168.2.5
          Apr 16, 2024 21:19:29.917135954 CEST49703443192.168.2.523.1.237.91
          Apr 16, 2024 21:19:29.917202950 CEST49703443192.168.2.523.1.237.91
          Apr 16, 2024 21:19:29.917479038 CEST49720443192.168.2.523.1.237.91
          Apr 16, 2024 21:19:29.917495966 CEST4434972023.1.237.91192.168.2.5
          Apr 16, 2024 21:19:29.917562008 CEST49720443192.168.2.523.1.237.91
          Apr 16, 2024 21:19:29.917752981 CEST49720443192.168.2.523.1.237.91
          Apr 16, 2024 21:19:29.917758942 CEST4434972023.1.237.91192.168.2.5
          Apr 16, 2024 21:19:30.069055080 CEST4434970323.1.237.91192.168.2.5
          Apr 16, 2024 21:19:30.069113016 CEST4434970323.1.237.91192.168.2.5
          Apr 16, 2024 21:19:30.349152088 CEST4434972023.1.237.91192.168.2.5
          Apr 16, 2024 21:19:30.349222898 CEST49720443192.168.2.523.1.237.91
          TimestampSource PortDest PortSource IPDest IP
          Apr 16, 2024 21:19:13.787672043 CEST53648911.1.1.1192.168.2.5
          Apr 16, 2024 21:19:13.988085032 CEST53572571.1.1.1192.168.2.5
          Apr 16, 2024 21:19:15.099523067 CEST53627681.1.1.1192.168.2.5
          Apr 16, 2024 21:19:17.891855001 CEST5764553192.168.2.51.1.1.1
          Apr 16, 2024 21:19:17.891855955 CEST6424953192.168.2.51.1.1.1
          Apr 16, 2024 21:19:17.997081041 CEST53642491.1.1.1192.168.2.5
          Apr 16, 2024 21:19:17.997333050 CEST53576451.1.1.1192.168.2.5
          Apr 16, 2024 21:19:18.120656967 CEST5506753192.168.2.58.8.8.8
          Apr 16, 2024 21:19:18.120789051 CEST5462053192.168.2.51.1.1.1
          Apr 16, 2024 21:19:18.225289106 CEST53546201.1.1.1192.168.2.5
          Apr 16, 2024 21:19:18.225413084 CEST53550678.8.8.8192.168.2.5
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Apr 16, 2024 21:19:17.891855001 CEST192.168.2.51.1.1.10x3345Standard query (0)www.google.comA (IP address)IN (0x0001)false
          Apr 16, 2024 21:19:17.891855955 CEST192.168.2.51.1.1.10xd2fbStandard query (0)www.google.com65IN (0x0001)false
          Apr 16, 2024 21:19:18.120656967 CEST192.168.2.58.8.8.80xad66Standard query (0)google.comA (IP address)IN (0x0001)false
          Apr 16, 2024 21:19:18.120789051 CEST192.168.2.51.1.1.10x11c3Standard query (0)google.comA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Apr 16, 2024 21:19:17.997081041 CEST1.1.1.1192.168.2.50xd2fbNo error (0)www.google.com65IN (0x0001)false
          Apr 16, 2024 21:19:17.997333050 CEST1.1.1.1192.168.2.50x3345No error (0)www.google.com64.233.177.99A (IP address)IN (0x0001)false
          Apr 16, 2024 21:19:17.997333050 CEST1.1.1.1192.168.2.50x3345No error (0)www.google.com64.233.177.104A (IP address)IN (0x0001)false
          Apr 16, 2024 21:19:17.997333050 CEST1.1.1.1192.168.2.50x3345No error (0)www.google.com64.233.177.103A (IP address)IN (0x0001)false
          Apr 16, 2024 21:19:17.997333050 CEST1.1.1.1192.168.2.50x3345No error (0)www.google.com64.233.177.147A (IP address)IN (0x0001)false
          Apr 16, 2024 21:19:17.997333050 CEST1.1.1.1192.168.2.50x3345No error (0)www.google.com64.233.177.105A (IP address)IN (0x0001)false
          Apr 16, 2024 21:19:17.997333050 CEST1.1.1.1192.168.2.50x3345No error (0)www.google.com64.233.177.106A (IP address)IN (0x0001)false
          Apr 16, 2024 21:19:18.225289106 CEST1.1.1.1192.168.2.50x11c3No error (0)google.com108.177.122.101A (IP address)IN (0x0001)false
          Apr 16, 2024 21:19:18.225289106 CEST1.1.1.1192.168.2.50x11c3No error (0)google.com108.177.122.102A (IP address)IN (0x0001)false
          Apr 16, 2024 21:19:18.225289106 CEST1.1.1.1192.168.2.50x11c3No error (0)google.com108.177.122.113A (IP address)IN (0x0001)false
          Apr 16, 2024 21:19:18.225289106 CEST1.1.1.1192.168.2.50x11c3No error (0)google.com108.177.122.100A (IP address)IN (0x0001)false
          Apr 16, 2024 21:19:18.225289106 CEST1.1.1.1192.168.2.50x11c3No error (0)google.com108.177.122.139A (IP address)IN (0x0001)false
          Apr 16, 2024 21:19:18.225289106 CEST1.1.1.1192.168.2.50x11c3No error (0)google.com108.177.122.138A (IP address)IN (0x0001)false
          Apr 16, 2024 21:19:18.225413084 CEST8.8.8.8192.168.2.50xad66No error (0)google.com142.250.217.174A (IP address)IN (0x0001)false
          Apr 16, 2024 21:19:29.514105082 CEST1.1.1.1192.168.2.50xa69bNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
          Apr 16, 2024 21:19:29.514105082 CEST1.1.1.1192.168.2.50xa69bNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
          Apr 16, 2024 21:19:29.694139004 CEST1.1.1.1192.168.2.50xcdfaNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
          Apr 16, 2024 21:19:29.694139004 CEST1.1.1.1192.168.2.50xcdfaNo error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
          • fs.microsoft.com
          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          0192.168.2.54971323.208.128.100443
          TimestampBytes transferredDirectionData
          2024-04-16 19:19:19 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          Accept-Encoding: identity
          User-Agent: Microsoft BITS/7.8
          Host: fs.microsoft.com
          2024-04-16 19:19:20 UTC468INHTTP/1.1 200 OK
          Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
          Content-Type: application/octet-stream
          ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
          Last-Modified: Tue, 16 May 2017 22:58:00 GMT
          Server: ECAcc (chd/073D)
          X-CID: 11
          X-Ms-ApiVersion: Distribute 1.2
          X-Ms-Region: prod-eus2-z1
          Cache-Control: public, max-age=128709
          Date: Tue, 16 Apr 2024 19:19:20 GMT
          Connection: close
          X-CID: 2


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          1192.168.2.54971423.208.128.100443
          TimestampBytes transferredDirectionData
          2024-04-16 19:19:20 UTC239OUTGET /fs/windows/config.json HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          Accept-Encoding: identity
          If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
          Range: bytes=0-2147483646
          User-Agent: Microsoft BITS/7.8
          Host: fs.microsoft.com
          2024-04-16 19:19:20 UTC531INHTTP/1.1 200 OK
          Content-Type: application/octet-stream
          Last-Modified: Tue, 16 May 2017 22:58:00 GMT
          ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
          ApiVersion: Distribute 1.1
          Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
          X-Azure-Ref: 0rcGnYgAAAAANOnx9vccHTr21ROgX9ESTU0pDRURHRTAzMDkAY2VmYzI1ODMtYTliMi00NGE3LTk3NTUtYjc2ZDE3ZTA1Zjdm
          Cache-Control: public, max-age=128718
          Date: Tue, 16 Apr 2024 19:19:20 GMT
          Content-Length: 55
          Connection: close
          X-CID: 2
          2024-04-16 19:19:20 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
          Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


          Click to jump to process

          Click to jump to process

          Click to jump to process

          Target ID:0
          Start time:21:19:09
          Start date:16/04/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
          Imagebase:0x7ff715980000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:1
          Start time:21:19:12
          Start date:16/04/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2392 --field-trial-handle=2352,i,6566851095694793694,13408189049783377515,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
          Imagebase:0x7ff715980000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:3
          Start time:21:19:15
          Start date:16/04/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://chrome-extension//efaidnbmnnnibpcajpcglclefindmkaj/https://prod-cms-files.demosphere-secure.com/_deimos/_public_files/0nxidf0wzm22j/golf-tournament/Dustin%20Appreciation.pdf?CacheKey=1713281827"
          Imagebase:0x7ff715980000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          No disassembly