Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
http://apps.identrust.com/roots/dstrootcax3.p7c

Overview

General Information

Sample URL:http://apps.identrust.com/roots/dstrootcax3.p7c
Analysis ID:1428413
Infos:

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Stores files to the Windows start menu directory

Classification

  • System is w10x64
  • chrome.exe (PID: 6232 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
    • chrome.exe (PID: 2848 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=1996,i,16050332450259264952,18118608799944959310,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
  • chrome.exe (PID: 6848 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://apps.identrust.com/roots/dstrootcax3.p7c" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
  • wab.exe (PID: 2068 cmdline: "C:\Program Files\Windows Mail\wab.exe" /certificate "C:\Users\user\Downloads\dstrootcax3.p7c" MD5: DBB30349963DBF34B6A50E6A2C3F3644)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownHTTPS traffic detected: 23.220.189.216:443 -> 192.168.2.10:49714 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.220.189.216:443 -> 192.168.2.10:49715 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.10:49716 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.10:49720 version: TLS 1.2
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.55
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.55
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.85
Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.85
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.85
Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.85
Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.85
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.55
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.55
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.85
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.85
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=f+Ob+umVvNVAt2g&MD=fatcWGYf HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=f+Ob+umVvNVAt2g&MD=fatcWGYf HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: unknownDNS traffic detected: queries for: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49677 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownHTTPS traffic detected: 23.220.189.216:443 -> 192.168.2.10:49714 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.220.189.216:443 -> 192.168.2.10:49715 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.10:49716 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.10:49720 version: TLS 1.2
Source: classification engineClassification label: clean0.win@19/11@2/4
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\Downloads\2b9facec-1b33-46a3-b813-88eb15abeae9.tmpJump to behavior
Source: C:\Program Files\Windows Mail\wab.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=1996,i,16050332450259264952,18118608799944959310,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://apps.identrust.com/roots/dstrootcax3.p7c"
Source: unknownProcess created: C:\Program Files\Windows Mail\wab.exe "C:\Program Files\Windows Mail\wab.exe" /certificate "C:\Users\user\Downloads\dstrootcax3.p7c"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=1996,i,16050332450259264952,18118608799944959310,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Windows Mail\wab.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Program Files\Windows Mail\wab.exeSection loaded: cryptdlg.dllJump to behavior
Source: C:\Program Files\Windows Mail\wab.exeSection loaded: msoert2.dllJump to behavior
Source: C:\Program Files\Windows Mail\wab.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Program Files\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
Source: C:\Program Files\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Program Files\Windows Mail\wab.exeSection loaded: cryptui.dllJump to behavior
Source: C:\Program Files\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Program Files\Windows Mail\wab.exeSection loaded: msftedit.dllJump to behavior
Source: C:\Program Files\Windows Mail\wab.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Program Files\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files\Windows Mail\wab.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Program Files\Windows Mail\wab.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Program Files\Windows Mail\wab.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Program Files\Windows Mail\wab.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Program Files\Windows Mail\wab.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Program Files\Windows Mail\wab.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Program Files\Windows Mail\wab.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Program Files\Windows Mail\wab.exeSection loaded: wintypes.dllJump to behavior
Source: Google Drive.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: C:\Program Files\Windows Mail\wab.exeFile opened: C:\Windows\SYSTEM32\msftedit.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
System Information Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Registry Run Keys / Startup Folder
1
DLL Side-Loading
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Registry Run Keys / Startup Folder
1
DLL Side-Loading
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1428413 URL: http://apps.identrust.com/r... Startdate: 18/04/2024 Architecture: WINDOWS Score: 0 5 chrome.exe 20 2->5         started        8 wab.exe 2->8         started        10 chrome.exe 2->10         started        dnsIp3 15 192.168.2.10, 138, 443, 49415 unknown unknown 5->15 17 192.168.2.16 unknown unknown 5->17 19 239.255.255.250 unknown Reserved 5->19 12 chrome.exe 5->12         started        process4 dnsIp5 21 www.google.com 74.125.138.106, 443, 49713, 49722 GOOGLEUS United States 12->21

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
www.google.com
74.125.138.106
truefalse
    high
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    239.255.255.250
    unknownReserved
    unknownunknownfalse
    74.125.138.106
    www.google.comUnited States
    15169GOOGLEUSfalse
    IP
    192.168.2.10
    192.168.2.16
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1428413
    Start date and time:2024-04-18 22:36:34 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 3m 23s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:browseurl.jbs
    Sample URL:http://apps.identrust.com/roots/dstrootcax3.p7c
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:17
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:CLEAN
    Classification:clean0.win@19/11@2/4
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, Sgrmuserer.exe, conhost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 172.217.215.94, 173.194.219.100, 173.194.219.113, 173.194.219.139, 173.194.219.102, 173.194.219.101, 173.194.219.138, 142.250.9.84, 34.104.35.123, 23.209.36.11, 23.209.36.49, 23.40.205.83, 74.125.138.94, 142.250.9.100, 142.250.9.139, 142.250.9.102, 142.250.9.113, 142.250.9.138, 142.250.9.101
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtSetInformationFile calls found.
    • VT rate limit hit for: http://apps.identrust.com/roots/dstrootcax3.p7c
    No simulations
    No context
    No context
    No context
    No context
    No context
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 18 19:37:27 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
    Category:dropped
    Size (bytes):2673
    Entropy (8bit):3.9848293154011403
    Encrypted:false
    SSDEEP:48:8NSgsbdeTcuHoidAKZdA1uehwiZUklqehiy+3:8/BwCpy
    MD5:E458F484A9A3AB2CAEC6166AD99D9D02
    SHA1:D34ED94BAB2D26F39C001664FEE785D364240825
    SHA-256:F81944429B53051F41AC90FBD37DBB5A3DC862B0A22907A00C431B3294882B8F
    SHA-512:1A2638392FAF065AF54B34E7A7CA5F268CA4B91AA9A0CB268D763DE620D48C753AD5E6BABD9A14831D757ED5A0B60C7A261D053FA601562853F0AEF49EFF386F
    Malicious:false
    Reputation:low
    Preview:L..................F.@.. ...$+.,....'Ed:.......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW$O..PROGRA~1..t......O.I.X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....EW.L..Chrome..>......CW.V.X......M......................k..C.h.r.o.m.e.....`.1.....EW.L..APPLIC~1..H......CW.V.X.............................k..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V.X......N.......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........#.-Z.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 18 19:37:27 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
    Category:dropped
    Size (bytes):2675
    Entropy (8bit):4.0035534032657045
    Encrypted:false
    SSDEEP:48:8/SgsbdeTcuHoidAKZdA1Heh/iZUkAQkqehZy+2:89BwM9Qsy
    MD5:5100EEC577C05CBDC3384799DECC52BF
    SHA1:9ECC2D51156C3FB56DDB915A76218E059BD9E591
    SHA-256:40E0A0487D33EE3C30AD3DB0DB2083E66F6F4C701F2E1BC6ADBD11A6074C1224
    SHA-512:65B56BDC37851655143C8590B7E0F6BC3840613E6206CB5D848D28A7F515DAC0495B6FF0C32CD4D662EF56B12396F6D94B49353EEB4DF29E2D73044B91C03909
    Malicious:false
    Reputation:low
    Preview:L..................F.@.. ...$+.,......V:.......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW$O..PROGRA~1..t......O.I.X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....EW.L..Chrome..>......CW.V.X......M......................k..C.h.r.o.m.e.....`.1.....EW.L..APPLIC~1..H......CW.V.X.............................k..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V.X......N.......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........#.-Z.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 08:59:33 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
    Category:dropped
    Size (bytes):2689
    Entropy (8bit):4.008956207344414
    Encrypted:false
    SSDEEP:48:8FsbdeTcbHoidAKZdA149eh7sFiZUkmgqeh7sLy+BX:8FBwLndy
    MD5:6B75BACDCE3EBDD1EAC6745520BF3960
    SHA1:E1FD6B3EF6763AACBB6C7D9E4E18AF959510EBEA
    SHA-256:B70795EF9F23EFAEDB3030F9B146E9C581046F7E36D82E84BD3D924B8D522EE9
    SHA-512:ED4B841AFCAA36F8975B8F5BFF9885506C6D0E49C301C34DCC35A5BD09AA1D624F5A1DF27214B42EA4BB08964C30C4DFC8537F0755BD3305D2B2057AAD2F7218
    Malicious:false
    Reputation:low
    Preview:L..................F.@.. ...$+.,....K..r.......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW$O..PROGRA~1..t......O.I.X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....EW.L..Chrome..>......CW.V.X......M......................k..C.h.r.o.m.e.....`.1.....EW.L..APPLIC~1..H......CW.V.X.............................k..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VEW.L....N.......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........#.-Z.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 18 19:37:27 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
    Category:dropped
    Size (bytes):2677
    Entropy (8bit):4.000410283105235
    Encrypted:false
    SSDEEP:48:8TnSgsbdeTcuHoidAKZdA14ehDiZUkwqehFy+R:8JBwHTy
    MD5:402BEF647EE1C5527AE6AA7BD77288F6
    SHA1:AA3EBE0A98B5C8DE1E82E8286998758B1CDF8CCF
    SHA-256:43D4D8F2019522C510E5B2B180C420A47D2B036D4A0E6A4C0E7FAA2BE1D7228B
    SHA-512:39E4BCB285D84A6478106498EFE5C625C4FACEE40EFAC9686629B6350C20BF8E4803B67126CD4681C09AAA43ECD7C89A60C40FD28E5817664CB905B2F4B75B4F
    Malicious:false
    Reputation:low
    Preview:L..................F.@.. ...$+.,......O:.......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW$O..PROGRA~1..t......O.I.X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....EW.L..Chrome..>......CW.V.X......M......................k..C.h.r.o.m.e.....`.1.....EW.L..APPLIC~1..H......CW.V.X.............................k..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V.X......N.......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........#.-Z.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 18 19:37:27 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
    Category:dropped
    Size (bytes):2677
    Entropy (8bit):3.989847405443639
    Encrypted:false
    SSDEEP:48:8USSgsbdeTcuHoidAKZdA1mehBiZUk1W1qehPy+C:8UWBwn9vy
    MD5:00239C8D620E30F8C74E9FE25EE6E8E2
    SHA1:496AEA141F09505E71E4E1170CB8B78F95FC6B80
    SHA-256:945BF860BD8A298F2F5C9F1D50B5A04244AED081CB4FD5EB7BC25BAF3085FE4E
    SHA-512:F52055BA364F8DEA19C9CA5EE1341AF4DCA9C77AF5835F25C0049BA3C43A0E64011D3F4164857FDC11CEAA4D38E249491CABC7DA944BE5BBC08F565C252585F6
    Malicious:false
    Reputation:low
    Preview:L..................F.@.. ...$+.,...../^:.......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW$O..PROGRA~1..t......O.I.X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....EW.L..Chrome..>......CW.V.X......M......................k..C.h.r.o.m.e.....`.1.....EW.L..APPLIC~1..H......CW.V.X.............................k..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V.X......N.......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........#.-Z.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 18 19:37:27 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
    Category:dropped
    Size (bytes):2679
    Entropy (8bit):4.001014799714917
    Encrypted:false
    SSDEEP:48:83SgsbdeTcuHoidAKZdA1duT1ehOuTbbiZUk5OjqehOuTbdy+yT+:8FBwmTyTbxWOvTbdy7T
    MD5:534D3C65ADB340D4B6ECB8D103A68328
    SHA1:831BAA43E2DC9C3E0E21D0749874DD1CE26BDC46
    SHA-256:D47005C7E63117C6851F899049461BC4254D4FA841E3C8D9BC094B99B3E509FD
    SHA-512:7431ADCECF4003A3735BB4D364A41FEB5164F9F2CF25F095C95E644D11BF32A975306884FEA1700AB323A9C304FA3E866ED35A20BE9AAD17D11F4315A5C8D7F2
    Malicious:false
    Reputation:low
    Preview:L..................F.@.. ...$+.,......D:.......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW$O..PROGRA~1..t......O.I.X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....EW.L..Chrome..>......CW.V.X......M......................k..C.h.r.o.m.e.....`.1.....EW.L..APPLIC~1..H......CW.V.X.............................k..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V.X......N.......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........#.-Z.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:data
    Category:dropped
    Size (bytes):893
    Entropy (8bit):7.366016576663508
    Encrypted:false
    SSDEEP:24:hBntmDvKUQQDvKUr7C5fpqp8gPvXHmXvponXux:3ntmD5QQD5XC5RqHHXmXvp++x
    MD5:D4AE187B4574036C2D76B6DF8A8C1A30
    SHA1:B06F409FA14BAB33CBAF4A37811B8740B624D9E5
    SHA-256:A2CE3A0FA7D2A833D1801E01EC48E35B70D84F3467CC9F8FAB370386E13879C7
    SHA-512:1F44A360E8BB8ADA22BC5BFE001F1BABB4E72005A46BC2A94C33C4BD149FF256CCE6F35D65CA4F7FC2A5B9E15494155449830D2809C8CF218D0B9196EC646B0C
    Malicious:false
    Reputation:low
    Preview:0..y..*.H.........j0..f...1.0...*.H.........N0..J0..2.......D....'..09...@k0...*.H........0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30...000930211219Z..210930140115Z0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30.."0...*.H.............0..........P..W..be......,k0.[...}.@......3vI*.?!I..N..>H.e...!.e.*.2....w..{........s.z..2..~..0....*8.y.1.P..e.Qc...a.Ka..Rk...K.(.H......>.... .[.*....p....%.tr.{j.4.0...h.{T....Z...=d.....Ap..r.&.8U9C....\@........%.......:..n.>..\..<.i....*.)W..=....]......B0@0...U.......0....0...U...........0...U.........{,q...K.u...`...0...*.H...............,...\...(f7:...?K.... ]..YD.>.>..K.t.....t..~.....K. D....}..j.....N..:.pI...........:^H...X._..Z.....Y..n......f3.Y[...sG.+..7H..VK....r2...D.SrmC.&H.Rg.X..gvqx...V..9$1....Z0G..P.......dc`........}...=2.e..|.Wv..(9..e...w.j..w.......)...55.1.
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:data
    Category:dropped
    Size (bytes):893
    Entropy (8bit):7.366016576663508
    Encrypted:false
    SSDEEP:24:hBntmDvKUQQDvKUr7C5fpqp8gPvXHmXvponXux:3ntmD5QQD5XC5RqHHXmXvp++x
    MD5:D4AE187B4574036C2D76B6DF8A8C1A30
    SHA1:B06F409FA14BAB33CBAF4A37811B8740B624D9E5
    SHA-256:A2CE3A0FA7D2A833D1801E01EC48E35B70D84F3467CC9F8FAB370386E13879C7
    SHA-512:1F44A360E8BB8ADA22BC5BFE001F1BABB4E72005A46BC2A94C33C4BD149FF256CCE6F35D65CA4F7FC2A5B9E15494155449830D2809C8CF218D0B9196EC646B0C
    Malicious:false
    Reputation:low
    Preview:0..y..*.H.........j0..f...1.0...*.H.........N0..J0..2.......D....'..09...@k0...*.H........0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30...000930211219Z..210930140115Z0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30.."0...*.H.............0..........P..W..be......,k0.[...}.@......3vI*.?!I..N..>H.e...!.e.*.2....w..{........s.z..2..~..0....*8.y.1.P..e.Qc...a.Ka..Rk...K.(.H......>.... .[.*....p....%.tr.{j.4.0...h.{T....Z...=d.....Ap..r.&.8U9C....\@........%.......:..n.>..\..<.i....*.)W..=....]......B0@0...U.......0....0...U...........0...U.........{,q...K.u...`...0...*.H...............,...\...(f7:...?K.... ]..YD.>.>..K.t.....t..~.....K. D....}..j.....N..:.pI...........:^H...X._..Z.....Y..n......f3.Y[...sG.+..7H..VK....r2...D.SrmC.&H.Rg.X..gvqx...V..9$1....Z0G..P.......dc`........}...=2.e..|.Wv..(9..e...w.j..w.......)...55.1.
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:data
    Category:dropped
    Size (bytes):893
    Entropy (8bit):7.366016576663508
    Encrypted:false
    SSDEEP:24:hBntmDvKUQQDvKUr7C5fpqp8gPvXHmXvponXux:3ntmD5QQD5XC5RqHHXmXvp++x
    MD5:D4AE187B4574036C2D76B6DF8A8C1A30
    SHA1:B06F409FA14BAB33CBAF4A37811B8740B624D9E5
    SHA-256:A2CE3A0FA7D2A833D1801E01EC48E35B70D84F3467CC9F8FAB370386E13879C7
    SHA-512:1F44A360E8BB8ADA22BC5BFE001F1BABB4E72005A46BC2A94C33C4BD149FF256CCE6F35D65CA4F7FC2A5B9E15494155449830D2809C8CF218D0B9196EC646B0C
    Malicious:false
    Reputation:low
    Preview:0..y..*.H.........j0..f...1.0...*.H.........N0..J0..2.......D....'..09...@k0...*.H........0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30...000930211219Z..210930140115Z0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30.."0...*.H.............0..........P..W..be......,k0.[...}.@......3vI*.?!I..N..>H.e...!.e.*.2....w..{........s.z..2..~..0....*8.y.1.P..e.Qc...a.Ka..Rk...K.(.H......>.... .[.*....p....%.tr.{j.4.0...h.{T....Z...=d.....Ap..r.&.8U9C....\@........%.......:..n.>..\..<.i....*.)W..=....]......B0@0...U.......0....0...U...........0...U.........{,q...K.u...`...0...*.H...............,...\...(f7:...?K.... ]..YD.>.>..K.t.....t..~.....K. D....}..j.....N..:.pI...........:^H...X._..Z.....Y..n......f3.Y[...sG.+..7H..VK....r2...D.SrmC.&H.Rg.X..gvqx...V..9$1....Z0G..P.......dc`........}...=2.e..|.Wv..(9..e...w.j..w.......)...55.1.
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:data
    Category:downloaded
    Size (bytes):893
    Entropy (8bit):7.366016576663508
    Encrypted:false
    SSDEEP:24:hBntmDvKUQQDvKUr7C5fpqp8gPvXHmXvponXux:3ntmD5QQD5XC5RqHHXmXvp++x
    MD5:D4AE187B4574036C2D76B6DF8A8C1A30
    SHA1:B06F409FA14BAB33CBAF4A37811B8740B624D9E5
    SHA-256:A2CE3A0FA7D2A833D1801E01EC48E35B70D84F3467CC9F8FAB370386E13879C7
    SHA-512:1F44A360E8BB8ADA22BC5BFE001F1BABB4E72005A46BC2A94C33C4BD149FF256CCE6F35D65CA4F7FC2A5B9E15494155449830D2809C8CF218D0B9196EC646B0C
    Malicious:false
    Reputation:low
    URL:http://apps.identrust.com/roots/dstrootcax3.p7c
    Preview:0..y..*.H.........j0..f...1.0...*.H.........N0..J0..2.......D....'..09...@k0...*.H........0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30...000930211219Z..210930140115Z0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30.."0...*.H.............0..........P..W..be......,k0.[...}.@......3vI*.?!I..N..>H.e...!.e.*.2....w..{........s.z..2..~..0....*8.y.1.P..e.Qc...a.Ka..Rk...K.(.H......>.... .[.*....p....%.tr.{j.4.0...h.{T....Z...=d.....Ap..r.&.8U9C....\@........%.......:..n.>..\..<.i....*.)W..=....]......B0@0...U.......0....0...U...........0...U.........{,q...K.u...`...0...*.H...............,...\...(f7:...?K.... ]..YD.>.>..K.t.....t..~.....K. D....}..j.....N..:.pI...........:^H...X._..Z.....Y..n......f3.Y[...sG.+..7H..VK....r2...D.SrmC.&H.Rg.X..gvqx...V..9$1....Z0G..P.......dc`........}...=2.e..|.Wv..(9..e...w.j..w.......)...55.1.
    No static file info
    Icon Hash:b29a8a8e86868381
    TimestampSource PortDest PortSource IPDest IP
    Apr 18, 2024 22:37:18.489355087 CEST49671443192.168.2.10204.79.197.203
    Apr 18, 2024 22:37:20.817435980 CEST49674443192.168.2.10173.222.162.55
    Apr 18, 2024 22:37:20.817734003 CEST49675443192.168.2.10173.222.162.55
    Apr 18, 2024 22:37:20.895509958 CEST49671443192.168.2.10204.79.197.203
    Apr 18, 2024 22:37:25.468986988 CEST49677443192.168.2.1020.42.65.85
    Apr 18, 2024 22:37:25.770488977 CEST49677443192.168.2.1020.42.65.85
    Apr 18, 2024 22:37:25.786117077 CEST49671443192.168.2.10204.79.197.203
    Apr 18, 2024 22:37:26.379967928 CEST49677443192.168.2.1020.42.65.85
    Apr 18, 2024 22:37:27.645132065 CEST49677443192.168.2.1020.42.65.85
    Apr 18, 2024 22:37:30.050724030 CEST49677443192.168.2.1020.42.65.85
    Apr 18, 2024 22:37:30.488193989 CEST49674443192.168.2.10173.222.162.55
    Apr 18, 2024 22:37:30.488357067 CEST49675443192.168.2.10173.222.162.55
    Apr 18, 2024 22:37:31.536055088 CEST49713443192.168.2.1074.125.138.106
    Apr 18, 2024 22:37:31.536112070 CEST4434971374.125.138.106192.168.2.10
    Apr 18, 2024 22:37:31.536173105 CEST49713443192.168.2.1074.125.138.106
    Apr 18, 2024 22:37:31.536473989 CEST49713443192.168.2.1074.125.138.106
    Apr 18, 2024 22:37:31.536495924 CEST4434971374.125.138.106192.168.2.10
    Apr 18, 2024 22:37:31.757719040 CEST4434971374.125.138.106192.168.2.10
    Apr 18, 2024 22:37:31.758068085 CEST49713443192.168.2.1074.125.138.106
    Apr 18, 2024 22:37:31.758094072 CEST4434971374.125.138.106192.168.2.10
    Apr 18, 2024 22:37:31.759139061 CEST4434971374.125.138.106192.168.2.10
    Apr 18, 2024 22:37:31.759206057 CEST49713443192.168.2.1074.125.138.106
    Apr 18, 2024 22:37:31.760664940 CEST49713443192.168.2.1074.125.138.106
    Apr 18, 2024 22:37:31.760724068 CEST4434971374.125.138.106192.168.2.10
    Apr 18, 2024 22:37:31.801147938 CEST49713443192.168.2.1074.125.138.106
    Apr 18, 2024 22:37:31.801213026 CEST4434971374.125.138.106192.168.2.10
    Apr 18, 2024 22:37:31.848037958 CEST49713443192.168.2.1074.125.138.106
    Apr 18, 2024 22:37:32.319983959 CEST49714443192.168.2.1023.220.189.216
    Apr 18, 2024 22:37:32.320039988 CEST4434971423.220.189.216192.168.2.10
    Apr 18, 2024 22:37:32.320197105 CEST49714443192.168.2.1023.220.189.216
    Apr 18, 2024 22:37:32.322956085 CEST49714443192.168.2.1023.220.189.216
    Apr 18, 2024 22:37:32.322983027 CEST4434971423.220.189.216192.168.2.10
    Apr 18, 2024 22:37:32.554094076 CEST4434971423.220.189.216192.168.2.10
    Apr 18, 2024 22:37:32.554178953 CEST49714443192.168.2.1023.220.189.216
    Apr 18, 2024 22:37:32.558871031 CEST49714443192.168.2.1023.220.189.216
    Apr 18, 2024 22:37:32.558900118 CEST4434971423.220.189.216192.168.2.10
    Apr 18, 2024 22:37:32.559349060 CEST4434971423.220.189.216192.168.2.10
    Apr 18, 2024 22:37:32.607707977 CEST49714443192.168.2.1023.220.189.216
    Apr 18, 2024 22:37:32.648124933 CEST4434971423.220.189.216192.168.2.10
    Apr 18, 2024 22:37:32.750528097 CEST4434971423.220.189.216192.168.2.10
    Apr 18, 2024 22:37:32.750701904 CEST4434971423.220.189.216192.168.2.10
    Apr 18, 2024 22:37:32.750791073 CEST49714443192.168.2.1023.220.189.216
    Apr 18, 2024 22:37:32.750941992 CEST49714443192.168.2.1023.220.189.216
    Apr 18, 2024 22:37:32.750963926 CEST4434971423.220.189.216192.168.2.10
    Apr 18, 2024 22:37:32.750974894 CEST49714443192.168.2.1023.220.189.216
    Apr 18, 2024 22:37:32.750982046 CEST4434971423.220.189.216192.168.2.10
    Apr 18, 2024 22:37:32.790868044 CEST49715443192.168.2.1023.220.189.216
    Apr 18, 2024 22:37:32.790930033 CEST4434971523.220.189.216192.168.2.10
    Apr 18, 2024 22:37:32.791033030 CEST49715443192.168.2.1023.220.189.216
    Apr 18, 2024 22:37:32.791373968 CEST49715443192.168.2.1023.220.189.216
    Apr 18, 2024 22:37:32.791392088 CEST4434971523.220.189.216192.168.2.10
    Apr 18, 2024 22:37:33.008028984 CEST4434971523.220.189.216192.168.2.10
    Apr 18, 2024 22:37:33.008136988 CEST49715443192.168.2.1023.220.189.216
    Apr 18, 2024 22:37:33.009538889 CEST49715443192.168.2.1023.220.189.216
    Apr 18, 2024 22:37:33.009569883 CEST4434971523.220.189.216192.168.2.10
    Apr 18, 2024 22:37:33.009854078 CEST4434971523.220.189.216192.168.2.10
    Apr 18, 2024 22:37:33.011046886 CEST49715443192.168.2.1023.220.189.216
    Apr 18, 2024 22:37:33.056117058 CEST4434971523.220.189.216192.168.2.10
    Apr 18, 2024 22:37:33.218059063 CEST4434971523.220.189.216192.168.2.10
    Apr 18, 2024 22:37:33.218141079 CEST4434971523.220.189.216192.168.2.10
    Apr 18, 2024 22:37:33.218199015 CEST49715443192.168.2.1023.220.189.216
    Apr 18, 2024 22:37:33.220460892 CEST49715443192.168.2.1023.220.189.216
    Apr 18, 2024 22:37:33.220483065 CEST4434971523.220.189.216192.168.2.10
    Apr 18, 2024 22:37:33.220499039 CEST49715443192.168.2.1023.220.189.216
    Apr 18, 2024 22:37:33.220504999 CEST4434971523.220.189.216192.168.2.10
    Apr 18, 2024 22:37:34.863142014 CEST49677443192.168.2.1020.42.65.85
    Apr 18, 2024 22:37:35.394470930 CEST49671443192.168.2.10204.79.197.203
    Apr 18, 2024 22:37:40.864898920 CEST49716443192.168.2.1013.85.23.86
    Apr 18, 2024 22:37:40.864998102 CEST4434971613.85.23.86192.168.2.10
    Apr 18, 2024 22:37:40.865381002 CEST49716443192.168.2.1013.85.23.86
    Apr 18, 2024 22:37:40.866470098 CEST49716443192.168.2.1013.85.23.86
    Apr 18, 2024 22:37:40.866509914 CEST4434971613.85.23.86192.168.2.10
    Apr 18, 2024 22:37:41.258960009 CEST4434971613.85.23.86192.168.2.10
    Apr 18, 2024 22:37:41.259203911 CEST49716443192.168.2.1013.85.23.86
    Apr 18, 2024 22:37:41.261698961 CEST49716443192.168.2.1013.85.23.86
    Apr 18, 2024 22:37:41.261729956 CEST4434971613.85.23.86192.168.2.10
    Apr 18, 2024 22:37:41.262006998 CEST4434971613.85.23.86192.168.2.10
    Apr 18, 2024 22:37:41.316998005 CEST49716443192.168.2.1013.85.23.86
    Apr 18, 2024 22:37:41.766767979 CEST4434971374.125.138.106192.168.2.10
    Apr 18, 2024 22:37:41.766921997 CEST4434971374.125.138.106192.168.2.10
    Apr 18, 2024 22:37:41.767194033 CEST49713443192.168.2.1074.125.138.106
    Apr 18, 2024 22:37:41.769725084 CEST49716443192.168.2.1013.85.23.86
    Apr 18, 2024 22:37:41.812125921 CEST4434971613.85.23.86192.168.2.10
    Apr 18, 2024 22:37:42.022927999 CEST4434971613.85.23.86192.168.2.10
    Apr 18, 2024 22:37:42.022947073 CEST4434971613.85.23.86192.168.2.10
    Apr 18, 2024 22:37:42.022953033 CEST4434971613.85.23.86192.168.2.10
    Apr 18, 2024 22:37:42.022964954 CEST4434971613.85.23.86192.168.2.10
    Apr 18, 2024 22:37:42.022970915 CEST4434971613.85.23.86192.168.2.10
    Apr 18, 2024 22:37:42.022975922 CEST4434971613.85.23.86192.168.2.10
    Apr 18, 2024 22:37:42.023036957 CEST49716443192.168.2.1013.85.23.86
    Apr 18, 2024 22:37:42.023056984 CEST4434971613.85.23.86192.168.2.10
    Apr 18, 2024 22:37:42.023067951 CEST4434971613.85.23.86192.168.2.10
    Apr 18, 2024 22:37:42.023113966 CEST4434971613.85.23.86192.168.2.10
    Apr 18, 2024 22:37:42.023132086 CEST49716443192.168.2.1013.85.23.86
    Apr 18, 2024 22:37:42.023163080 CEST49716443192.168.2.1013.85.23.86
    Apr 18, 2024 22:37:42.265587091 CEST49716443192.168.2.1013.85.23.86
    Apr 18, 2024 22:37:42.265630960 CEST4434971613.85.23.86192.168.2.10
    Apr 18, 2024 22:37:42.265647888 CEST49716443192.168.2.1013.85.23.86
    Apr 18, 2024 22:37:42.265655041 CEST4434971613.85.23.86192.168.2.10
    Apr 18, 2024 22:37:43.511473894 CEST49713443192.168.2.1074.125.138.106
    Apr 18, 2024 22:37:43.511504889 CEST4434971374.125.138.106192.168.2.10
    Apr 18, 2024 22:37:44.475227118 CEST49677443192.168.2.1020.42.65.85
    Apr 18, 2024 22:38:18.648406029 CEST49720443192.168.2.1013.85.23.86
    Apr 18, 2024 22:38:18.648443937 CEST4434972013.85.23.86192.168.2.10
    Apr 18, 2024 22:38:18.648511887 CEST49720443192.168.2.1013.85.23.86
    Apr 18, 2024 22:38:18.649024963 CEST49720443192.168.2.1013.85.23.86
    Apr 18, 2024 22:38:18.649036884 CEST4434972013.85.23.86192.168.2.10
    Apr 18, 2024 22:38:19.045717955 CEST4434972013.85.23.86192.168.2.10
    Apr 18, 2024 22:38:19.045845985 CEST49720443192.168.2.1013.85.23.86
    Apr 18, 2024 22:38:19.052261114 CEST49720443192.168.2.1013.85.23.86
    Apr 18, 2024 22:38:19.052279949 CEST4434972013.85.23.86192.168.2.10
    Apr 18, 2024 22:38:19.052535057 CEST4434972013.85.23.86192.168.2.10
    Apr 18, 2024 22:38:19.065956116 CEST49720443192.168.2.1013.85.23.86
    Apr 18, 2024 22:38:19.108139038 CEST4434972013.85.23.86192.168.2.10
    Apr 18, 2024 22:38:19.434591055 CEST4434972013.85.23.86192.168.2.10
    Apr 18, 2024 22:38:19.434614897 CEST4434972013.85.23.86192.168.2.10
    Apr 18, 2024 22:38:19.434698105 CEST4434972013.85.23.86192.168.2.10
    Apr 18, 2024 22:38:19.434701920 CEST49720443192.168.2.1013.85.23.86
    Apr 18, 2024 22:38:19.434737921 CEST4434972013.85.23.86192.168.2.10
    Apr 18, 2024 22:38:19.434752941 CEST4434972013.85.23.86192.168.2.10
    Apr 18, 2024 22:38:19.434758902 CEST49720443192.168.2.1013.85.23.86
    Apr 18, 2024 22:38:19.434789896 CEST4434972013.85.23.86192.168.2.10
    Apr 18, 2024 22:38:19.434820890 CEST49720443192.168.2.1013.85.23.86
    Apr 18, 2024 22:38:19.434828043 CEST4434972013.85.23.86192.168.2.10
    Apr 18, 2024 22:38:19.434850931 CEST4434972013.85.23.86192.168.2.10
    Apr 18, 2024 22:38:19.434850931 CEST49720443192.168.2.1013.85.23.86
    Apr 18, 2024 22:38:19.434902906 CEST49720443192.168.2.1013.85.23.86
    Apr 18, 2024 22:38:19.438759089 CEST49720443192.168.2.1013.85.23.86
    Apr 18, 2024 22:38:19.438775063 CEST4434972013.85.23.86192.168.2.10
    Apr 18, 2024 22:38:19.438787937 CEST49720443192.168.2.1013.85.23.86
    Apr 18, 2024 22:38:19.438795090 CEST4434972013.85.23.86192.168.2.10
    Apr 18, 2024 22:38:31.490875959 CEST49722443192.168.2.1074.125.138.106
    Apr 18, 2024 22:38:31.490921021 CEST4434972274.125.138.106192.168.2.10
    Apr 18, 2024 22:38:31.491127014 CEST49722443192.168.2.1074.125.138.106
    Apr 18, 2024 22:38:31.491367102 CEST49722443192.168.2.1074.125.138.106
    Apr 18, 2024 22:38:31.491383076 CEST4434972274.125.138.106192.168.2.10
    Apr 18, 2024 22:38:31.708316088 CEST4434972274.125.138.106192.168.2.10
    Apr 18, 2024 22:38:31.708990097 CEST49722443192.168.2.1074.125.138.106
    Apr 18, 2024 22:38:31.709022999 CEST4434972274.125.138.106192.168.2.10
    Apr 18, 2024 22:38:31.709340096 CEST4434972274.125.138.106192.168.2.10
    Apr 18, 2024 22:38:31.710002899 CEST49722443192.168.2.1074.125.138.106
    Apr 18, 2024 22:38:31.710067987 CEST4434972274.125.138.106192.168.2.10
    Apr 18, 2024 22:38:31.755649090 CEST49722443192.168.2.1074.125.138.106
    Apr 18, 2024 22:38:41.726047039 CEST4434972274.125.138.106192.168.2.10
    Apr 18, 2024 22:38:41.726115942 CEST4434972274.125.138.106192.168.2.10
    Apr 18, 2024 22:38:41.726228952 CEST49722443192.168.2.1074.125.138.106
    Apr 18, 2024 22:38:43.508907080 CEST49722443192.168.2.1074.125.138.106
    Apr 18, 2024 22:38:43.508943081 CEST4434972274.125.138.106192.168.2.10
    TimestampSource PortDest PortSource IPDest IP
    Apr 18, 2024 22:37:27.102464914 CEST53615351.1.1.1192.168.2.10
    Apr 18, 2024 22:37:27.244163990 CEST53519001.1.1.1192.168.2.10
    Apr 18, 2024 22:37:27.925491095 CEST53598031.1.1.1192.168.2.10
    Apr 18, 2024 22:37:31.427335024 CEST5300553192.168.2.101.1.1.1
    Apr 18, 2024 22:37:31.427704096 CEST6019353192.168.2.101.1.1.1
    Apr 18, 2024 22:37:31.532283068 CEST53530051.1.1.1192.168.2.10
    Apr 18, 2024 22:37:31.534651041 CEST53601931.1.1.1192.168.2.10
    Apr 18, 2024 22:37:45.564147949 CEST53494151.1.1.1192.168.2.10
    Apr 18, 2024 22:38:04.454746008 CEST53589061.1.1.1192.168.2.10
    Apr 18, 2024 22:38:23.722532034 CEST138138192.168.2.10192.168.2.255
    Apr 18, 2024 22:38:26.915999889 CEST53503701.1.1.1192.168.2.10
    Apr 18, 2024 22:38:27.534168005 CEST53605101.1.1.1192.168.2.10
    Apr 18, 2024 22:38:54.847925901 CEST53617621.1.1.1192.168.2.10
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Apr 18, 2024 22:37:31.427335024 CEST192.168.2.101.1.1.10x7e94Standard query (0)www.google.comA (IP address)IN (0x0001)false
    Apr 18, 2024 22:37:31.427704096 CEST192.168.2.101.1.1.10x4af7Standard query (0)www.google.com65IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Apr 18, 2024 22:37:31.532283068 CEST1.1.1.1192.168.2.100x7e94No error (0)www.google.com74.125.138.106A (IP address)IN (0x0001)false
    Apr 18, 2024 22:37:31.532283068 CEST1.1.1.1192.168.2.100x7e94No error (0)www.google.com74.125.138.103A (IP address)IN (0x0001)false
    Apr 18, 2024 22:37:31.532283068 CEST1.1.1.1192.168.2.100x7e94No error (0)www.google.com74.125.138.104A (IP address)IN (0x0001)false
    Apr 18, 2024 22:37:31.532283068 CEST1.1.1.1192.168.2.100x7e94No error (0)www.google.com74.125.138.147A (IP address)IN (0x0001)false
    Apr 18, 2024 22:37:31.532283068 CEST1.1.1.1192.168.2.100x7e94No error (0)www.google.com74.125.138.105A (IP address)IN (0x0001)false
    Apr 18, 2024 22:37:31.532283068 CEST1.1.1.1192.168.2.100x7e94No error (0)www.google.com74.125.138.99A (IP address)IN (0x0001)false
    Apr 18, 2024 22:37:31.534651041 CEST1.1.1.1192.168.2.100x4af7No error (0)www.google.com65IN (0x0001)false
    • fs.microsoft.com
    • slscr.update.microsoft.com
    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    0192.168.2.104971423.220.189.216443
    TimestampBytes transferredDirectionData
    2024-04-18 20:37:32 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    Accept-Encoding: identity
    User-Agent: Microsoft BITS/7.8
    Host: fs.microsoft.com
    2024-04-18 20:37:32 UTC467INHTTP/1.1 200 OK
    Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
    Content-Type: application/octet-stream
    ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
    Last-Modified: Tue, 16 May 2017 22:58:00 GMT
    Server: ECAcc (chd/073D)
    X-CID: 11
    X-Ms-ApiVersion: Distribute 1.2
    X-Ms-Region: prod-eus-z1
    Cache-Control: public, max-age=210340
    Date: Thu, 18 Apr 2024 20:37:32 GMT
    Connection: close
    X-CID: 2


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    1192.168.2.104971523.220.189.216443
    TimestampBytes transferredDirectionData
    2024-04-18 20:37:33 UTC239OUTGET /fs/windows/config.json HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    Accept-Encoding: identity
    If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
    Range: bytes=0-2147483646
    User-Agent: Microsoft BITS/7.8
    Host: fs.microsoft.com
    2024-04-18 20:37:33 UTC535INHTTP/1.1 200 OK
    Content-Type: application/octet-stream
    Last-Modified: Tue, 16 May 2017 22:58:00 GMT
    ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
    ApiVersion: Distribute 1.1
    Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
    X-Azure-Ref: 01uvbYwAAAACkqWtaEMjWQL/4cpisZkorTUVNMzBFREdFMDgxMQBjZWZjMjU4My1hOWIyLTQ0YTctOTc1NS1iNzZkMTdlMDVmN2Y=
    Cache-Control: public, max-age=210316
    Date: Thu, 18 Apr 2024 20:37:33 GMT
    Content-Length: 55
    Connection: close
    X-CID: 2
    2024-04-18 20:37:33 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
    Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    2192.168.2.104971613.85.23.86443
    TimestampBytes transferredDirectionData
    2024-04-18 20:37:41 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=f+Ob+umVvNVAt2g&MD=fatcWGYf HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
    Host: slscr.update.microsoft.com
    2024-04-18 20:37:42 UTC560INHTTP/1.1 200 OK
    Cache-Control: no-cache
    Pragma: no-cache
    Content-Type: application/octet-stream
    Expires: -1
    Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
    ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
    MS-CorrelationId: 9d65a648-e8b2-4934-b136-2d72afa5ddec
    MS-RequestId: 1a98fe5b-6a30-41e8-bbfd-e3ab76b85914
    MS-CV: ILe/XTA1zku7ztQE.0
    X-Microsoft-SLSClientCache: 2880
    Content-Disposition: attachment; filename=environment.cab
    X-Content-Type-Options: nosniff
    Date: Thu, 18 Apr 2024 20:37:41 GMT
    Connection: close
    Content-Length: 24490
    2024-04-18 20:37:42 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
    Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
    2024-04-18 20:37:42 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
    Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    3192.168.2.104972013.85.23.86443
    TimestampBytes transferredDirectionData
    2024-04-18 20:38:19 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=f+Ob+umVvNVAt2g&MD=fatcWGYf HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
    Host: slscr.update.microsoft.com
    2024-04-18 20:38:19 UTC560INHTTP/1.1 200 OK
    Cache-Control: no-cache
    Pragma: no-cache
    Content-Type: application/octet-stream
    Expires: -1
    Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
    ETag: "Mx1RoJH/qEwpWfKllx7sbsl28AuERz5IYdcsvtTJcgM=_2160"
    MS-CorrelationId: 50fd2f0e-ffc4-40da-a839-43201f92d6e5
    MS-RequestId: 4f022b6f-3201-430a-9d3d-29aba8e98c19
    MS-CV: 3Mc52XtQ8EGYvibm.0
    X-Microsoft-SLSClientCache: 2160
    Content-Disposition: attachment; filename=environment.cab
    X-Content-Type-Options: nosniff
    Date: Thu, 18 Apr 2024 20:38:18 GMT
    Connection: close
    Content-Length: 25457
    2024-04-18 20:38:19 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 51 22 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 db 8e 00 00 14 00 00 00 00 00 10 00 51 22 00 00 20 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 f3 43 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 0d 92 6f db e5 21 f3 43 43 4b ed 5a 09 38 55 5b df 3f 93 99 90 29 99 e7 29 ec 73 cc 4a 66 32 cf 84 32 64 c8 31 c7 11 52 38 87 90 42 66 09 99 87 32 0f 19 0a 09 51 a6 a8 08 29 53 86 4a 52 84 50 df 46 83 ba dd 7b df fb 7e ef 7d ee 7d bf ef 9e e7 d9 67 ef 35 ee b5 fe eb 3f ff b6 96 81 a2 0a 04 fc 31 40 21 5b 3f a5 ed 1b 04 0e 85 42 a0 10 04 64 12 6c a5 de aa a1 d8 ea f3 58 01 f2 f5 67 0b 5e 9b bd e8 a0 90 1d bf 40 88 9d eb 49 b4 87 9b ab 8b 9d 2b 46 c8 c7 c5 19 92
    Data Ascii: MSCFQ"DQ" AdCenvironment.cabo!CCKZ8U[?))sJf22d1R8Bf2Q)SJRPF{~}}g5?1@![?BdlXg^@I+F
    2024-04-18 20:38:19 UTC9633INData Raw: 21 6f b3 eb a6 cc f5 31 be cf 05 e2 a9 fe fa 57 6d 19 30 b3 c2 c5 66 c9 6a df f5 e7 f0 78 bd c7 a8 9e 25 e3 f9 bc ed 6b 54 57 08 2b 51 82 44 12 fb b9 53 8c cc f4 60 12 8a 76 cc 40 40 41 9b dc 5c 17 ff 5c f9 5e 17 35 98 24 56 4b 74 ef 42 10 c8 af bf 7f c6 7f f2 37 7d 5a 3f 1c f2 99 79 4a 91 52 00 af 38 0f 17 f5 2f 79 81 65 d9 a9 b5 6b e4 c7 ce f6 ca 7a 00 6f 4b 30 44 24 22 3c cf ed 03 a5 96 8f 59 29 bc b6 fd 04 e1 70 9f 32 4a 27 fd 55 af 2f fe b6 e5 8e 33 bb 62 5f 9a db 57 40 e9 f1 ce 99 66 90 8c ff 6a 62 7f dd c5 4a 0b 91 26 e2 39 ec 19 4a 71 63 9d 7b 21 6d c3 9c a3 a2 3c fa 7f 7d 96 6a 90 78 a6 6d d2 e1 9c f9 1d fc 38 d8 94 f4 c6 a5 0a 96 86 a4 bd 9e 1a ae 04 42 83 b8 b5 80 9b 22 38 20 b5 25 e5 64 ec f7 f4 bf 7e 63 59 25 0f 7a 2e 39 57 76 a2 71 aa 06 8a
    Data Ascii: !o1Wm0fjx%kTW+QDS`v@@A\\^5$VKtB7}Z?yJR8/yekzoK0D$"<Y)p2J'U/3b_W@fjbJ&9Jqc{!m<}jxm8B"8 %d~cY%z.9Wvq


    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:1
    Start time:22:37:21
    Start date:18/04/2024
    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
    Imagebase:0x7ff6c5c30000
    File size:3'242'272 bytes
    MD5 hash:83395EAB5B03DEA9720F8D7AC0D15CAA
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    Target ID:5
    Start time:22:37:25
    Start date:18/04/2024
    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=1996,i,16050332450259264952,18118608799944959310,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
    Imagebase:0x7ff6c5c30000
    File size:3'242'272 bytes
    MD5 hash:83395EAB5B03DEA9720F8D7AC0D15CAA
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    Target ID:10
    Start time:22:37:27
    Start date:18/04/2024
    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://apps.identrust.com/roots/dstrootcax3.p7c"
    Imagebase:0x7ff6c5c30000
    File size:3'242'272 bytes
    MD5 hash:83395EAB5B03DEA9720F8D7AC0D15CAA
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:16
    Start time:22:38:44
    Start date:18/04/2024
    Path:C:\Program Files\Windows Mail\wab.exe
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Windows Mail\wab.exe" /certificate "C:\Users\user\Downloads\dstrootcax3.p7c"
    Imagebase:0x7ff7cedf0000
    File size:518'656 bytes
    MD5 hash:DBB30349963DBF34B6A50E6A2C3F3644
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    No disassembly