Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
http://client-api.arkoselabs.com

Overview

General Information

Sample URL:http://client-api.arkoselabs.com
Analysis ID:1427206
Infos:

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Stores files to the Windows start menu directory
Uses insecure TLS / SSL version for HTTPS connection

Classification

  • System is w10x64
  • chrome.exe (PID: 6976 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6728 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2564 --field-trial-handle=2532,i,1663464397611797074,18441567628792014833,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 2020 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://client-api.arkoselabs.com" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49722 version: TLS 1.0
Source: unknownHTTPS traffic detected: 23.55.253.34:443 -> 192.168.2.5:49715 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.55.253.34:443 -> 192.168.2.5:49716 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49722 version: TLS 1.0
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.55.253.34
Source: unknownTCP traffic detected without corresponding DNS query: 23.55.253.34
Source: unknownTCP traffic detected without corresponding DNS query: 23.55.253.34
Source: unknownTCP traffic detected without corresponding DNS query: 23.55.253.34
Source: unknownTCP traffic detected without corresponding DNS query: 23.55.253.34
Source: unknownTCP traffic detected without corresponding DNS query: 23.55.253.34
Source: unknownTCP traffic detected without corresponding DNS query: 23.55.253.34
Source: unknownTCP traffic detected without corresponding DNS query: 23.55.253.34
Source: unknownTCP traffic detected without corresponding DNS query: 23.55.253.34
Source: unknownTCP traffic detected without corresponding DNS query: 23.55.253.34
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.55.253.34
Source: unknownTCP traffic detected without corresponding DNS query: 23.55.253.34
Source: unknownTCP traffic detected without corresponding DNS query: 23.55.253.34
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.55.253.34
Source: unknownTCP traffic detected without corresponding DNS query: 23.55.253.34
Source: unknownTCP traffic detected without corresponding DNS query: 23.55.253.34
Source: unknownTCP traffic detected without corresponding DNS query: 23.55.253.34
Source: unknownTCP traffic detected without corresponding DNS query: 23.55.253.34
Source: unknownTCP traffic detected without corresponding DNS query: 23.55.253.34
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
Source: unknownDNS traffic detected: queries for: client-api.arkoselabs.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownHTTPS traffic detected: 23.55.253.34:443 -> 192.168.2.5:49715 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.55.253.34:443 -> 192.168.2.5:49716 version: TLS 1.2
Source: classification engineClassification label: clean1.win@18/6@6/3
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2564 --field-trial-handle=2532,i,1663464397611797074,18441567628792014833,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://client-api.arkoselabs.com"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2564 --field-trial-handle=2532,i,1663464397611797074,18441567628792014833,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Google Drive.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
http://client-api.arkoselabs.com0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
www.google.com
74.125.136.103
truefalse
    high
    fp2e7a.wpc.phicdn.net
    192.229.211.108
    truefalse
      unknown
      client-api.arkoselabs.com
      unknown
      unknownfalse
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        239.255.255.250
        unknownReserved
        unknownunknownfalse
        74.125.136.103
        www.google.comUnited States
        15169GOOGLEUSfalse
        IP
        192.168.2.5
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1427206
        Start date and time:2024-04-17 09:02:29 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 3m 9s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:browseurl.jbs
        Sample URL:http://client-api.arkoselabs.com
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:7
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:CLEAN
        Classification:clean1.win@18/6@6/3
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 142.251.15.94, 172.253.124.101, 172.253.124.113, 172.253.124.102, 172.253.124.100, 172.253.124.138, 172.253.124.139, 142.250.105.84, 34.104.35.123, 104.18.33.170, 172.64.154.86, 52.165.165.26, 199.232.214.172, 96.7.245.17, 96.7.245.89, 192.229.211.108, 20.166.126.56, 20.3.187.198, 40.68.123.157, 64.233.185.94, 13.85.23.86
        • Excluded domains from analysis (whitelisted): fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, clientservices.googleapis.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu-bg-shim.trafficmanager.net, download.windowsupdate.com.edgesuite.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, client-api.arkoselabs.com.cdn.cloudflare.net, ocsp.digicert.com, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, update.googleapis.com, clients.l.google.com, glb.sls.prod.dcat.dsp.trafficmanager.net
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtSetInformationFile calls found.
        No simulations
        No context
        No context
        No context
        No context
        No context
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Apr 17 06:03:18 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2677
        Entropy (8bit):3.9753364825878545
        Encrypted:false
        SSDEEP:48:82dJTRJoHyidAKZdA19ehwiZUklqehHy+3:8w/lcy
        MD5:8215E6B56D1F01C18B1C053C26D1031D
        SHA1:090A2651909059E2BC54375DCCD0AB6E5D6E1604
        SHA-256:B3C58EF3ABF44897C030DBAD9181A35CCC08DD6DA6FE2DAC3E35FBDE2795FA65
        SHA-512:092D39FC5C79A2B624FDD295E6A5806FB8740D9C2F2DC6EC44C075CF329546BC487D1CA18896A9532C3AC385E8E719871F370E859A303B70DEFE28380C92A5F0
        Malicious:false
        Reputation:low
        Preview:L..................F.@.. ...$+.,....N.S....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.Xg8....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xg8....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xg8....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xg8..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Xj8...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........V."p.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Apr 17 06:03:18 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2679
        Entropy (8bit):3.9924860020541977
        Encrypted:false
        SSDEEP:48:8BdJTRJoHyidAKZdA1weh/iZUkAQkqehMy+2:8V//9Q1y
        MD5:820C7682056CDC8D6814CA63692B0044
        SHA1:1129F27E96C300490CB2B9742EA58EF66548C0E9
        SHA-256:C9D28A583A81B00D1106DA8BA78E35DEC6F5AF84FCB3E108E9E0240E5AC0A9D3
        SHA-512:797FD6444E33746977DE67C893BAE2E0682952BF495CCE36946DA031B30E172A8AE8BBBA7B2B8AA970D3851016B92C9029D04A0AD110EE14C43DB3B73CBCE011
        Malicious:false
        Reputation:low
        Preview:L..................F.@.. ...$+.,....q.S....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.Xg8....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xg8....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xg8....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xg8..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Xj8...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........V."p.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2693
        Entropy (8bit):4.002135870404837
        Encrypted:false
        SSDEEP:48:8xqdJTRJsHyidAKZdA14tseh7sFiZUkmgqeh7sSy+BX:8xs/bngy
        MD5:B00384486BD717F516CC543CD47B619F
        SHA1:4790B11D6CC72F931FA06FF37B59554DB2F7240B
        SHA-256:D0598C87E812D4F2CE0CC6D1A4F1936FEA4BFF44F4A17DBD64C17B6F8B2D8699
        SHA-512:5A1C86448ACE6CB0E7DE6607AF94FEE3AB0B8A5C6397DD3870DE1E6401984AACA8DD1DC5114972294431903A7557AA326378E8B3B70335A1EA3D97BBF631F85F
        Malicious:false
        Reputation:low
        Preview:L..................F.@.. ...$+.,......e>....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.Xg8....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xg8....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xg8....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xg8..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VDW.n...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........V."p.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Apr 17 06:03:18 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2681
        Entropy (8bit):3.991281899198532
        Encrypted:false
        SSDEEP:48:8cdJTRJoHyidAKZdA1vehDiZUkwqehoy+R:86/8ay
        MD5:51CB10B3D0CDDFEB409C2ED1140DEAD2
        SHA1:ED386EB56178E3638B2CAC3399A11CEC83A50A5F
        SHA-256:C673C6B4EC2B8778DE0059145A35CDC62E18234D8739DBB082F2979F3ECF3C9B
        SHA-512:2860BC2E636EAC3413F89BEB94D61923DBB20BE7C6C6D5DA9F204F22A0719FF17A09EE544EAC124D1EF75301AC72CF59653B5BBF3F5537C228E6DCA43927BEDC
        Malicious:false
        Reputation:low
        Preview:L..................F.@.. ...$+.,....J.S....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.Xg8....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xg8....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xg8....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xg8..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Xj8...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........V."p.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Apr 17 06:03:18 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2681
        Entropy (8bit):3.980537566229726
        Encrypted:false
        SSDEEP:48:87dJTRJoHyidAKZdA1hehBiZUk1W1qeh2y+C:8D/M9Wy
        MD5:2E8137CF0BAB98ACA4EB133AC659365D
        SHA1:A0175D68D5D8423867AAF8B10C9F15F85AD27399
        SHA-256:C78E4D91B4F895E441F8EEF3387F02E9F6C59CB873F3756285A55CD26EFF14F7
        SHA-512:9509AA435AF926367EF3277EA16266E6419D63853F958FF07C504BEC082DD7048E95ED4B5A699841496D5029B43AF63A8F192A84209C533CB77D21D097B56B5C
        Malicious:false
        Reputation:low
        Preview:L..................F.@.. ...$+.,......S....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.Xg8....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xg8....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xg8....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xg8..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Xj8...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........V."p.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Apr 17 06:03:18 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2683
        Entropy (8bit):3.9901762022944385
        Encrypted:false
        SSDEEP:48:8gdJTRJoHyidAKZdA1duT+ehOuTbbiZUk5OjqehOuTbgy+yT+:82/iT/TbxWOvTbgy7T
        MD5:736D2356AF881BFA8A88FA45CF3CBC8E
        SHA1:4C8AF77A4A44509263EC9D91EEEDFEBDE504A0D5
        SHA-256:C7520834A441C349313C92B8AA06A254E42B2C25DABBB5849BC66A326D59C417
        SHA-512:40D807401DEED49976692149311B29C3E3C9391BF671D761E9B6BD54FFF5BB38DBD93DFD7C4C1CCC26695FC5446772D9AF209DC5055FA2FF2F098A705FB3D84F
        Malicious:false
        Reputation:low
        Preview:L..................F.@.. ...$+.,.....+.S....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.Xg8....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xg8....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xg8....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xg8..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Xj8...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........V."p.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        No static file info
        TimestampSource PortDest PortSource IPDest IP
        Apr 17, 2024 09:03:13.464766026 CEST49675443192.168.2.523.1.237.91
        Apr 17, 2024 09:03:13.464766026 CEST49674443192.168.2.523.1.237.91
        Apr 17, 2024 09:03:13.574143887 CEST49673443192.168.2.523.1.237.91
        Apr 17, 2024 09:03:21.852154016 CEST49714443192.168.2.574.125.136.103
        Apr 17, 2024 09:03:21.852169991 CEST4434971474.125.136.103192.168.2.5
        Apr 17, 2024 09:03:21.852237940 CEST49714443192.168.2.574.125.136.103
        Apr 17, 2024 09:03:21.853671074 CEST49714443192.168.2.574.125.136.103
        Apr 17, 2024 09:03:21.853684902 CEST4434971474.125.136.103192.168.2.5
        Apr 17, 2024 09:03:22.079335928 CEST4434971474.125.136.103192.168.2.5
        Apr 17, 2024 09:03:22.079580069 CEST49714443192.168.2.574.125.136.103
        Apr 17, 2024 09:03:22.079591036 CEST4434971474.125.136.103192.168.2.5
        Apr 17, 2024 09:03:22.081260920 CEST4434971474.125.136.103192.168.2.5
        Apr 17, 2024 09:03:22.081340075 CEST49714443192.168.2.574.125.136.103
        Apr 17, 2024 09:03:22.234087944 CEST49714443192.168.2.574.125.136.103
        Apr 17, 2024 09:03:22.234261036 CEST4434971474.125.136.103192.168.2.5
        Apr 17, 2024 09:03:22.278064013 CEST49714443192.168.2.574.125.136.103
        Apr 17, 2024 09:03:22.278073072 CEST4434971474.125.136.103192.168.2.5
        Apr 17, 2024 09:03:22.324939966 CEST49714443192.168.2.574.125.136.103
        Apr 17, 2024 09:03:22.610172987 CEST49715443192.168.2.523.55.253.34
        Apr 17, 2024 09:03:22.610253096 CEST4434971523.55.253.34192.168.2.5
        Apr 17, 2024 09:03:22.610373974 CEST49715443192.168.2.523.55.253.34
        Apr 17, 2024 09:03:22.613895893 CEST49715443192.168.2.523.55.253.34
        Apr 17, 2024 09:03:22.613930941 CEST4434971523.55.253.34192.168.2.5
        Apr 17, 2024 09:03:22.835432053 CEST4434971523.55.253.34192.168.2.5
        Apr 17, 2024 09:03:22.835525990 CEST49715443192.168.2.523.55.253.34
        Apr 17, 2024 09:03:22.841300964 CEST49715443192.168.2.523.55.253.34
        Apr 17, 2024 09:03:22.841329098 CEST4434971523.55.253.34192.168.2.5
        Apr 17, 2024 09:03:22.841598988 CEST4434971523.55.253.34192.168.2.5
        Apr 17, 2024 09:03:22.887439013 CEST49715443192.168.2.523.55.253.34
        Apr 17, 2024 09:03:22.928415060 CEST49715443192.168.2.523.55.253.34
        Apr 17, 2024 09:03:22.972121954 CEST4434971523.55.253.34192.168.2.5
        Apr 17, 2024 09:03:23.037070990 CEST4434971523.55.253.34192.168.2.5
        Apr 17, 2024 09:03:23.037230015 CEST4434971523.55.253.34192.168.2.5
        Apr 17, 2024 09:03:23.037283897 CEST49715443192.168.2.523.55.253.34
        Apr 17, 2024 09:03:23.037283897 CEST49715443192.168.2.523.55.253.34
        Apr 17, 2024 09:03:23.037355900 CEST4434971523.55.253.34192.168.2.5
        Apr 17, 2024 09:03:23.037395954 CEST49715443192.168.2.523.55.253.34
        Apr 17, 2024 09:03:23.037414074 CEST4434971523.55.253.34192.168.2.5
        Apr 17, 2024 09:03:23.074937105 CEST49674443192.168.2.523.1.237.91
        Apr 17, 2024 09:03:23.074934959 CEST49675443192.168.2.523.1.237.91
        Apr 17, 2024 09:03:23.084588051 CEST49716443192.168.2.523.55.253.34
        Apr 17, 2024 09:03:23.084630966 CEST4434971623.55.253.34192.168.2.5
        Apr 17, 2024 09:03:23.084701061 CEST49716443192.168.2.523.55.253.34
        Apr 17, 2024 09:03:23.085021019 CEST49716443192.168.2.523.55.253.34
        Apr 17, 2024 09:03:23.085041046 CEST4434971623.55.253.34192.168.2.5
        Apr 17, 2024 09:03:23.184333086 CEST49673443192.168.2.523.1.237.91
        Apr 17, 2024 09:03:23.303983927 CEST4434971623.55.253.34192.168.2.5
        Apr 17, 2024 09:03:23.304122925 CEST49716443192.168.2.523.55.253.34
        Apr 17, 2024 09:03:23.306252956 CEST49716443192.168.2.523.55.253.34
        Apr 17, 2024 09:03:23.306262970 CEST4434971623.55.253.34192.168.2.5
        Apr 17, 2024 09:03:23.307025909 CEST4434971623.55.253.34192.168.2.5
        Apr 17, 2024 09:03:23.308412075 CEST49716443192.168.2.523.55.253.34
        Apr 17, 2024 09:03:23.356117964 CEST4434971623.55.253.34192.168.2.5
        Apr 17, 2024 09:03:23.509747982 CEST4434971623.55.253.34192.168.2.5
        Apr 17, 2024 09:03:23.509941101 CEST4434971623.55.253.34192.168.2.5
        Apr 17, 2024 09:03:23.510045052 CEST49716443192.168.2.523.55.253.34
        Apr 17, 2024 09:03:23.510688066 CEST49716443192.168.2.523.55.253.34
        Apr 17, 2024 09:03:23.510688066 CEST49716443192.168.2.523.55.253.34
        Apr 17, 2024 09:03:23.510732889 CEST4434971623.55.253.34192.168.2.5
        Apr 17, 2024 09:03:23.510744095 CEST4434971623.55.253.34192.168.2.5
        Apr 17, 2024 09:03:24.549076080 CEST4434970323.1.237.91192.168.2.5
        Apr 17, 2024 09:03:24.549190998 CEST49703443192.168.2.523.1.237.91
        Apr 17, 2024 09:03:32.085180998 CEST4434971474.125.136.103192.168.2.5
        Apr 17, 2024 09:03:32.085268021 CEST4434971474.125.136.103192.168.2.5
        Apr 17, 2024 09:03:32.085336924 CEST49714443192.168.2.574.125.136.103
        Apr 17, 2024 09:03:34.290775061 CEST49714443192.168.2.574.125.136.103
        Apr 17, 2024 09:03:34.290793896 CEST4434971474.125.136.103192.168.2.5
        Apr 17, 2024 09:03:35.019304037 CEST49703443192.168.2.523.1.237.91
        Apr 17, 2024 09:03:35.019449949 CEST49703443192.168.2.523.1.237.91
        Apr 17, 2024 09:03:35.069638014 CEST49722443192.168.2.523.1.237.91
        Apr 17, 2024 09:03:35.069683075 CEST4434972223.1.237.91192.168.2.5
        Apr 17, 2024 09:03:35.069755077 CEST49722443192.168.2.523.1.237.91
        Apr 17, 2024 09:03:35.081830025 CEST49722443192.168.2.523.1.237.91
        Apr 17, 2024 09:03:35.081851959 CEST4434972223.1.237.91192.168.2.5
        Apr 17, 2024 09:03:35.171426058 CEST4434970323.1.237.91192.168.2.5
        Apr 17, 2024 09:03:35.171446085 CEST4434970323.1.237.91192.168.2.5
        Apr 17, 2024 09:03:35.393666029 CEST4434972223.1.237.91192.168.2.5
        Apr 17, 2024 09:03:35.393745899 CEST49722443192.168.2.523.1.237.91
        Apr 17, 2024 09:03:54.542013884 CEST4434972223.1.237.91192.168.2.5
        Apr 17, 2024 09:03:54.542093039 CEST49722443192.168.2.523.1.237.91
        Apr 17, 2024 09:04:21.772092104 CEST49727443192.168.2.574.125.136.103
        Apr 17, 2024 09:04:21.772152901 CEST4434972774.125.136.103192.168.2.5
        Apr 17, 2024 09:04:21.772236109 CEST49727443192.168.2.574.125.136.103
        Apr 17, 2024 09:04:21.772914886 CEST49727443192.168.2.574.125.136.103
        Apr 17, 2024 09:04:21.772934914 CEST4434972774.125.136.103192.168.2.5
        Apr 17, 2024 09:04:21.995291948 CEST4434972774.125.136.103192.168.2.5
        Apr 17, 2024 09:04:21.995748997 CEST49727443192.168.2.574.125.136.103
        Apr 17, 2024 09:04:21.995780945 CEST4434972774.125.136.103192.168.2.5
        Apr 17, 2024 09:04:21.997092962 CEST4434972774.125.136.103192.168.2.5
        Apr 17, 2024 09:04:22.000488043 CEST49727443192.168.2.574.125.136.103
        Apr 17, 2024 09:04:22.000705957 CEST4434972774.125.136.103192.168.2.5
        Apr 17, 2024 09:04:22.043014050 CEST49727443192.168.2.574.125.136.103
        Apr 17, 2024 09:04:31.987649918 CEST4434972774.125.136.103192.168.2.5
        Apr 17, 2024 09:04:31.987745047 CEST4434972774.125.136.103192.168.2.5
        Apr 17, 2024 09:04:31.987926960 CEST49727443192.168.2.574.125.136.103
        Apr 17, 2024 09:04:32.016494036 CEST49727443192.168.2.574.125.136.103
        Apr 17, 2024 09:04:32.016525984 CEST4434972774.125.136.103192.168.2.5
        TimestampSource PortDest PortSource IPDest IP
        Apr 17, 2024 09:03:17.944047928 CEST53624241.1.1.1192.168.2.5
        Apr 17, 2024 09:03:17.956334114 CEST53593181.1.1.1192.168.2.5
        Apr 17, 2024 09:03:18.536720037 CEST53506641.1.1.1192.168.2.5
        Apr 17, 2024 09:03:18.834316015 CEST5189553192.168.2.51.1.1.1
        Apr 17, 2024 09:03:18.834635019 CEST5033353192.168.2.51.1.1.1
        Apr 17, 2024 09:03:18.941121101 CEST53503331.1.1.1192.168.2.5
        Apr 17, 2024 09:03:19.161722898 CEST5793453192.168.2.51.1.1.1
        Apr 17, 2024 09:03:19.161835909 CEST6354553192.168.2.51.1.1.1
        Apr 17, 2024 09:03:19.266182899 CEST53635451.1.1.1192.168.2.5
        Apr 17, 2024 09:03:21.721952915 CEST5265353192.168.2.51.1.1.1
        Apr 17, 2024 09:03:21.722888947 CEST5291053192.168.2.51.1.1.1
        Apr 17, 2024 09:03:21.826385021 CEST53526531.1.1.1192.168.2.5
        Apr 17, 2024 09:03:21.826910019 CEST53529101.1.1.1192.168.2.5
        Apr 17, 2024 09:03:36.352730989 CEST53498031.1.1.1192.168.2.5
        Apr 17, 2024 09:03:55.240212917 CEST53601361.1.1.1192.168.2.5
        Apr 17, 2024 09:04:17.072196960 CEST53541911.1.1.1192.168.2.5
        Apr 17, 2024 09:04:18.258810997 CEST53646701.1.1.1192.168.2.5
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Apr 17, 2024 09:03:18.834316015 CEST192.168.2.51.1.1.10xf0baStandard query (0)client-api.arkoselabs.comA (IP address)IN (0x0001)false
        Apr 17, 2024 09:03:18.834635019 CEST192.168.2.51.1.1.10xe5adStandard query (0)client-api.arkoselabs.com65IN (0x0001)false
        Apr 17, 2024 09:03:19.161722898 CEST192.168.2.51.1.1.10x89Standard query (0)client-api.arkoselabs.comA (IP address)IN (0x0001)false
        Apr 17, 2024 09:03:19.161835909 CEST192.168.2.51.1.1.10x1cccStandard query (0)client-api.arkoselabs.com65IN (0x0001)false
        Apr 17, 2024 09:03:21.721952915 CEST192.168.2.51.1.1.10xfe3dStandard query (0)www.google.comA (IP address)IN (0x0001)false
        Apr 17, 2024 09:03:21.722888947 CEST192.168.2.51.1.1.10xaf77Standard query (0)www.google.com65IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Apr 17, 2024 09:03:18.941121101 CEST1.1.1.1192.168.2.50xe5adNo error (0)client-api.arkoselabs.comclient-api.arkoselabs.com.cdn.cloudflare.netCNAME (Canonical name)IN (0x0001)false
        Apr 17, 2024 09:03:18.941296101 CEST1.1.1.1192.168.2.50xf0baNo error (0)client-api.arkoselabs.comclient-api.arkoselabs.com.cdn.cloudflare.netCNAME (Canonical name)IN (0x0001)false
        Apr 17, 2024 09:03:19.266182899 CEST1.1.1.1192.168.2.50x1cccNo error (0)client-api.arkoselabs.comclient-api.arkoselabs.com.cdn.cloudflare.netCNAME (Canonical name)IN (0x0001)false
        Apr 17, 2024 09:03:19.266757011 CEST1.1.1.1192.168.2.50x89No error (0)client-api.arkoselabs.comclient-api.arkoselabs.com.cdn.cloudflare.netCNAME (Canonical name)IN (0x0001)false
        Apr 17, 2024 09:03:21.826385021 CEST1.1.1.1192.168.2.50xfe3dNo error (0)www.google.com74.125.136.103A (IP address)IN (0x0001)false
        Apr 17, 2024 09:03:21.826385021 CEST1.1.1.1192.168.2.50xfe3dNo error (0)www.google.com74.125.136.105A (IP address)IN (0x0001)false
        Apr 17, 2024 09:03:21.826385021 CEST1.1.1.1192.168.2.50xfe3dNo error (0)www.google.com74.125.136.147A (IP address)IN (0x0001)false
        Apr 17, 2024 09:03:21.826385021 CEST1.1.1.1192.168.2.50xfe3dNo error (0)www.google.com74.125.136.104A (IP address)IN (0x0001)false
        Apr 17, 2024 09:03:21.826385021 CEST1.1.1.1192.168.2.50xfe3dNo error (0)www.google.com74.125.136.106A (IP address)IN (0x0001)false
        Apr 17, 2024 09:03:21.826385021 CEST1.1.1.1192.168.2.50xfe3dNo error (0)www.google.com74.125.136.99A (IP address)IN (0x0001)false
        Apr 17, 2024 09:03:21.826910019 CEST1.1.1.1192.168.2.50xaf77No error (0)www.google.com65IN (0x0001)false
        Apr 17, 2024 09:03:34.722687006 CEST1.1.1.1192.168.2.50x5b76No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
        Apr 17, 2024 09:03:34.722687006 CEST1.1.1.1192.168.2.50x5b76No error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
        Apr 17, 2024 09:03:47.870136023 CEST1.1.1.1192.168.2.50xe4c5No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
        Apr 17, 2024 09:03:47.870136023 CEST1.1.1.1192.168.2.50xe4c5No error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
        Apr 17, 2024 09:04:10.337928057 CEST1.1.1.1192.168.2.50x3da6No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
        Apr 17, 2024 09:04:10.337928057 CEST1.1.1.1192.168.2.50x3da6No error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
        • fs.microsoft.com
        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        0192.168.2.54971523.55.253.34443
        TimestampBytes transferredDirectionData
        2024-04-17 07:03:22 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
        Connection: Keep-Alive
        Accept: */*
        Accept-Encoding: identity
        User-Agent: Microsoft BITS/7.8
        Host: fs.microsoft.com
        2024-04-17 07:03:23 UTC467INHTTP/1.1 200 OK
        Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
        Content-Type: application/octet-stream
        ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
        Last-Modified: Tue, 16 May 2017 22:58:00 GMT
        Server: ECAcc (chd/073D)
        X-CID: 11
        X-Ms-ApiVersion: Distribute 1.2
        X-Ms-Region: prod-eus2-z1
        Cache-Control: public, max-age=86426
        Date: Wed, 17 Apr 2024 07:03:22 GMT
        Connection: close
        X-CID: 2


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        1192.168.2.54971623.55.253.34443
        TimestampBytes transferredDirectionData
        2024-04-17 07:03:23 UTC239OUTGET /fs/windows/config.json HTTP/1.1
        Connection: Keep-Alive
        Accept: */*
        Accept-Encoding: identity
        If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
        Range: bytes=0-2147483646
        User-Agent: Microsoft BITS/7.8
        Host: fs.microsoft.com
        2024-04-17 07:03:23 UTC530INHTTP/1.1 200 OK
        Content-Type: application/octet-stream
        Last-Modified: Tue, 16 May 2017 22:58:00 GMT
        ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
        ApiVersion: Distribute 1.1
        Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
        X-Azure-Ref: 0DZ+oYgAAAABSxwJpMgMuSLkfS640ajfFQVRBRURHRTEyMTkAY2VmYzI1ODMtYTliMi00NGE3LTk3NTUtYjc2ZDE3ZTA1Zjdm
        Cache-Control: public, max-age=86424
        Date: Wed, 17 Apr 2024 07:03:23 GMT
        Content-Length: 55
        Connection: close
        X-CID: 2
        2024-04-17 07:03:23 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
        Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


        Click to jump to process

        Click to jump to process

        Click to jump to process

        Target ID:0
        Start time:09:03:13
        Start date:17/04/2024
        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
        Imagebase:0x7ff715980000
        File size:3'242'272 bytes
        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        Target ID:2
        Start time:09:03:15
        Start date:17/04/2024
        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2564 --field-trial-handle=2532,i,1663464397611797074,18441567628792014833,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
        Imagebase:0x7ff715980000
        File size:3'242'272 bytes
        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        Target ID:3
        Start time:09:03:17
        Start date:17/04/2024
        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://client-api.arkoselabs.com"
        Imagebase:0x7ff715980000
        File size:3'242'272 bytes
        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        No disassembly