Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://jll.aravo.com/aems/pub/attachment/logoexport.do?attachmentId=445982305&allowCaching=true&cs=aR57lq0tTvIqgE1HvStgpWbR9gAx8eUoCTYzp-i_SaU.arv

Overview

General Information

Sample URL:https://jll.aravo.com/aems/pub/attachment/logoexport.do?attachmentId=445982305&allowCaching=true&cs=aR57lq0tTvIqgE1HvStgpWbR9gAx8eUoCTYzp-i_SaU.arv
Analysis ID:1431050
Infos:

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Creates files inside the system directory
Stores files to the Windows start menu directory
Uses insecure TLS / SSL version for HTTPS connection

Classification

  • System is w10x64
  • chrome.exe (PID: 5244 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6664 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 --field-trial-handle=2344,i,10810502265876699492,17973120504647186442,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6148 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://jll.aravo.com/aems/pub/attachment/logoexport.do?attachmentId=445982305&allowCaching=true&cs=aR57lq0tTvIqgE1HvStgpWbR9gAx8eUoCTYzp-i_SaU.arv" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • mspaint.exe (PID: 3840 cmdline: mspaint.exe "C:\Users\user\Desktop\" MD5: 986A191E95952C9E3FE6BE112FB92026)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49720 version: TLS 1.0
Source: unknownHTTPS traffic detected: 23.61.210.98:443 -> 192.168.2.5:49715 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.61.210.98:443 -> 192.168.2.5:49716 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.5:49717 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.5:49724 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49720 version: TLS 1.0
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /aems/pub/attachment/logoexport.do?attachmentId=445982305&allowCaching=true&cs=aR57lq0tTvIqgE1HvStgpWbR9gAx8eUoCTYzp-i_SaU.arv HTTP/1.1Host: jll.aravo.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=rtToKtDfWxsRbzS&MD=X6ApKLzS HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=rtToKtDfWxsRbzS&MD=X6ApKLzS HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: global trafficDNS traffic detected: DNS query: jll.aravo.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownHTTPS traffic detected: 23.61.210.98:443 -> 192.168.2.5:49715 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.61.210.98:443 -> 192.168.2.5:49716 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.5:49717 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.5:49724 version: TLS 1.2
Source: C:\Windows\SysWOW64\mspaint.exeFile created: C:\Windows\Debug\WIAJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeFile created: C:\Windows\Debug\WIA\wiatrace.logJump to behavior
Source: classification engineClassification label: clean1.win@18/12@4/4
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 --field-trial-handle=2344,i,10810502265876699492,17973120504647186442,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://jll.aravo.com/aems/pub/attachment/logoexport.do?attachmentId=445982305&allowCaching=true&cs=aR57lq0tTvIqgE1HvStgpWbR9gAx8eUoCTYzp-i_SaU.arv"
Source: unknownProcess created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe "C:\Users\user\Desktop\"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 --field-trial-handle=2344,i,10810502265876699492,17973120504647186442,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: mfc42u.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: winmm.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: msftedit.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: uiribbon.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: efswrt.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: sti.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: wiatrace.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: atlthunk.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: ntmarta.dllJump to behavior
Source: Google Drive.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: C:\Windows\SysWOW64\mspaint.exeFile opened: C:\Windows\SysWOW64\MSFTEDIT.DLLJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeProcess information queried: ProcessInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
11
Masquerading
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Registry Run Keys / Startup Folder
1
DLL Side-Loading
1
Process Injection
LSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Registry Run Keys / Startup Folder
1
DLL Side-Loading
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://jll.aravo.com/aems/pub/attachment/logoexport.do?attachmentId=445982305&allowCaching=true&cs=aR57lq0tTvIqgE1HvStgpWbR9gAx8eUoCTYzp-i_SaU.arv0%Avira URL Cloudsafe
https://jll.aravo.com/aems/pub/attachment/logoexport.do?attachmentId=445982305&allowCaching=true&cs=aR57lq0tTvIqgE1HvStgpWbR9gAx8eUoCTYzp-i_SaU.arv0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
www.google.com
142.250.141.103
truefalse
    high
    prod.aravo.com
    67.192.161.8
    truefalse
      high
      jll.aravo.com
      unknown
      unknownfalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        239.255.255.250
        unknownReserved
        unknownunknownfalse
        67.192.161.8
        prod.aravo.comUnited States
        33070RMH-14USfalse
        142.250.141.103
        www.google.comUnited States
        15169GOOGLEUSfalse
        IP
        192.168.2.5
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1431050
        Start date and time:2024-04-24 14:00:11 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 3m 43s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:browseurl.jbs
        Sample URL:https://jll.aravo.com/aems/pub/attachment/logoexport.do?attachmentId=445982305&allowCaching=true&cs=aR57lq0tTvIqgE1HvStgpWbR9gAx8eUoCTYzp-i_SaU.arv
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:10
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:CLEAN
        Classification:clean1.win@18/12@4/4
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 74.125.137.94, 142.251.2.113, 142.251.2.102, 142.251.2.139, 142.251.2.100, 142.251.2.138, 142.251.2.101, 142.251.2.84, 34.104.35.123, 199.232.210.172, 192.229.211.108, 199.232.214.172, 142.250.101.94
        • Excluded domains from analysis (whitelisted): fs.microsoft.com, clients2.google.com, ocsp.digicert.com, accounts.google.com, edgedl.me.gvt1.com, slscr.update.microsoft.com, update.googleapis.com, ctldl.windowsupdate.com, clientservices.googleapis.com, clients.l.google.com, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        • Report size getting too big, too many NtSetInformationFile calls found.
        No simulations
        No context
        No context
        No context
        No context
        No context
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Apr 24 11:01:06 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2677
        Entropy (8bit):3.9776871672369123
        Encrypted:false
        SSDEEP:48:8pdATk4tHeidAKZdA19ehwiZUklqeh2y+3:8cvOBy
        MD5:B2EEBC28DFB91BC796D762F783EED6C6
        SHA1:928658B0AB08A242235B425781BB0CF6E33A98CE
        SHA-256:21549D6FB14CA4F3A22A03AA741889F3A060AE906095340A3B0D7D91806FE2A5
        SHA-512:B6158E4CD974E0925B62FA2048F442A225CD3BA8750C9AB37F609DF21B27692A778ACAED3318D2037F6C1AD7A40ABC92ACB6929995A061772AF6289067BECB78
        Malicious:false
        Reputation:low
        Preview:L..................F.@.. ...$+.,....K.p.?...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X!`....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X!`....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X!`....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X!`..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X$`...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........i.9;.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Apr 24 11:01:06 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2679
        Entropy (8bit):3.995755769810792
        Encrypted:false
        SSDEEP:48:8MdATk4tHeidAKZdA1weh/iZUkAQkqehxy+2:8/vM9QEy
        MD5:A590641DA8641F8C4A936D21CEDFCCBC
        SHA1:B12A73311D71038102FCE38D8D917A9BAE53C55D
        SHA-256:F5B50FA7DEFE99477832A8C991EB06AE5BACCF1A49FF0B335B14E0E80AEDDFE1
        SHA-512:A8417FFBE1F59A53459916347D2C833FA44494FC02AF94C9518021210E817FFF489EEEAA149D3181E59E97532E1668A87E07749B8A888A5C4DFDC39F2578D5C1
        Malicious:false
        Reputation:low
        Preview:L..................F.@.. ...$+.,....b.].?...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X!`....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X!`....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X!`....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X!`..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X$`...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........i.9;.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2693
        Entropy (8bit):4.0055949571066325
        Encrypted:false
        SSDEEP:48:8xhdATk4sHeidAKZdA14tseh7sFiZUkmgqeh7sny+BX:8xEvvndy
        MD5:4971AB8775D8D9D349411180406AE54A
        SHA1:DBDB2148F9930E1A2272B0219F23B4CECDE3CBFB
        SHA-256:84688F9988F80FF527FFF99C07A30CF13FDD311C67241A951AC78168A9EDBEBE
        SHA-512:CF39237BB7B06D230CD7A804295D19919EEFD9DA277648E24B8BA71D149939E09671C6B54128CDB363DC9DFBE5729B4506D2FA373E75180418771092AC74CEA6
        Malicious:false
        Reputation:low
        Preview:L..................F.@.. ...$+.,......e>....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X!`....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X!`....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X!`....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X!`..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VDW.n...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........i.9;.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Apr 24 11:01:06 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2681
        Entropy (8bit):3.994976097458001
        Encrypted:false
        SSDEEP:48:8wdATk4tHeidAKZdA1vehDiZUkwqehFy+R:8jv3vy
        MD5:F168BEFBE13EE4D53949A24191577AB3
        SHA1:A5B12C8267B93FA13562A31F2B56A8C7779D8276
        SHA-256:26F9C2D1DB4C393767443B7749F9E499FEE78BC13169408ABE3EF3A7104835A5
        SHA-512:01937D5D3E84AF0EC490048697E4E5720FEBC488572C0DBF6FC45E3D2BF383C4FABFD6EEAB74C1E483A020635D58E7C83618DB6C3E4E2A2552F9C6C74E09C066
        Malicious:false
        Reputation:low
        Preview:L..................F.@.. ...$+.,......W.?...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X!`....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X!`....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X!`....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X!`..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X$`...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........i.9;.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Apr 24 11:01:06 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2681
        Entropy (8bit):3.9825388268187543
        Encrypted:false
        SSDEEP:48:8a2edATk4tHeidAKZdA1hehBiZUk1W1qehTy+C:8xvH9zy
        MD5:1C29D8D4F7FEFC360F288B247673CE72
        SHA1:1E3908CC0AB91EC6AFCDBC82B07637DE89E46459
        SHA-256:A3628B5423351905EF4E93321CE0D7A265AB417C4C0BB0DE4909D454EB880DA7
        SHA-512:5C4231C32217B11EA88E627B2D89F65D978C51203F4DCD6AD2F826FAF7128A04154E55B672422C6672B7428BB6906C12076249945EECE41C004E211E04F21C55
        Malicious:false
        Reputation:low
        Preview:L..................F.@.. ...$+.,......d.?...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X!`....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X!`....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X!`....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X!`..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X$`...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........i.9;.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Apr 24 11:01:06 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2683
        Entropy (8bit):3.993581442917054
        Encrypted:false
        SSDEEP:48:8ddATk4tHeidAKZdA1duT+ehOuTbbiZUk5OjqehOuTbdy+yT+:8QvPT/TbxWOvTbdy7T
        MD5:474C9A9F4EA767EB10026771BDFA5ECE
        SHA1:B5099CC90C355D3AEFAC5927F9F8BB8C59CD3A5E
        SHA-256:8D0DEA9D204D7C0F7931BCDDF072BF58D0660CCC967D4A5B2B95C50377E0DB04
        SHA-512:80EB01617A06596B745EE20CAC837A7FE8CE259C2C0A6D8E0DD9F798EF79C9E48C2238F6FE13C8788DB182E7D865F8CD8DA8107D6E96546343932FBD5C1EA5AF
        Malicious:false
        Reputation:low
        Preview:L..................F.@.. ...$+.,......O.?...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X!`....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X!`....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X!`....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X!`..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X$`...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........i.9;.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:PNG image data, 81 x 50, 8-bit/color RGBA, non-interlaced
        Category:dropped
        Size (bytes):2401
        Entropy (8bit):7.798164511475268
        Encrypted:false
        SSDEEP:48:LDBd+Ip20GmxT0oOrn80utDwaBuGU2U/QZLESVct:PjbY960oO80ly3U2Ub
        MD5:DA231955EAE61AF353083F16619EBD24
        SHA1:3E99DFF9B8866AA46396133DEFF18C293BE0307E
        SHA-256:C28B95E9CDE15FADCD4C45DE8937532539D6EC5F149370C027A50AB48EF8F3F6
        SHA-512:435894F42BBEE1E5688A429CA0D25D389D1CC6CE03A2CBC2F4E6A6AC1C583DA4D8317EA1AFC1962A7E3F34F3EC37FBDF99AEBCBEC67ACAF01B601C30E6975D99
        Malicious:false
        Reputation:low
        Preview:.PNG........IHDR...Q...2.....$.7.....pHYs..\F..\F...CA....tIME.....-.5.q.....tEXtAuthor....H....tEXtDescription...!#....tEXtCopyright....:....tEXtCreation time.5.......tEXtSoftware.]p.:....tEXtDisclaimer.........tEXtWarning........tEXtSource.........tEXtComment........tEXtTitle....'...,IDATh..Y.%U.........+MO..4..1.1b...Q...@b..$>..... >..."..A0.@..DML.\A6.........v..v.:...N(..x.+....rRu....s~uN.9_.....d.....5!&.&........P.b.jBL@M....1.5!&.&...$u.9/.."...V..E...ycl{..f...F.T1.[...R.@R..[[..........|.+E.....S..(7.E.Hdo[.lM........n..It.t.l%.s......l.V.--.........q.."..k./XdO...U.p^.1w...\3l.'..........HU7.,C..........7E_...[.2...h.p.[...i'.TU&........PU.w.........7..%m....~..u..U.17....z...Q.?Z.5.....:..RSN....cnp~.........0.w.n7...MM.1...y...-.%g.#]1..T.]Y+.....L..?...>........w.[v..d...C...Y7s.P*..l..7T^...........Xq;.8...M.AU.Y..>.u..(.....V..4.!.M.B.........6*.T.G.n.`-.c.{t..o.:..e.[G..,..i/X.......x:._.2.I/\<.....*..x..X.........~.|...).J`&fW.n..m..
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:PNG image data, 81 x 50, 8-bit/color RGBA, non-interlaced
        Category:dropped
        Size (bytes):2401
        Entropy (8bit):7.798164511475268
        Encrypted:false
        SSDEEP:48:LDBd+Ip20GmxT0oOrn80utDwaBuGU2U/QZLESVct:PjbY960oO80ly3U2Ub
        MD5:DA231955EAE61AF353083F16619EBD24
        SHA1:3E99DFF9B8866AA46396133DEFF18C293BE0307E
        SHA-256:C28B95E9CDE15FADCD4C45DE8937532539D6EC5F149370C027A50AB48EF8F3F6
        SHA-512:435894F42BBEE1E5688A429CA0D25D389D1CC6CE03A2CBC2F4E6A6AC1C583DA4D8317EA1AFC1962A7E3F34F3EC37FBDF99AEBCBEC67ACAF01B601C30E6975D99
        Malicious:false
        Reputation:low
        Preview:.PNG........IHDR...Q...2.....$.7.....pHYs..\F..\F...CA....tIME.....-.5.q.....tEXtAuthor....H....tEXtDescription...!#....tEXtCopyright....:....tEXtCreation time.5.......tEXtSoftware.]p.:....tEXtDisclaimer.........tEXtWarning........tEXtSource.........tEXtComment........tEXtTitle....'...,IDATh..Y.%U.........+MO..4..1.1b...Q...@b..$>..... >..."..A0.@..DML.\A6.........v..v.:...N(..x.+....rRu....s~uN.9_.....d.....5!&.&........P.b.jBL@M....1.5!&.&...$u.9/.."...V..E...ycl{..f...F.T1.[...R.@R..[[..........|.+E.....S..(7.E.Hdo[.lM........n..It.t.l%.s......l.V.--.........q.."..k./XdO...U.p^.1w...\3l.'..........HU7.,C..........7E_...[.2...h.p.[...i'.TU&........PU.w.........7..%m....~..u..U.17....z...Q.?Z.5.....:..RSN....cnp~.........0.w.n7...MM.1...y...-.%g.#]1..T.]Y+.....L..?...>........w.[v..d...C...Y7s.P*..l..7T^...........Xq;.8...M.AU.Y..>.u..(.....V..4.!.M.B.........6*.T.G.n.`-.c.{t..o.:..e.[G..,..i/X.......x:._.2.I/\<.....*..x..X.........~.|...).J`&fW.n..m..
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:PNG image data, 81 x 50, 8-bit/color RGBA, non-interlaced
        Category:dropped
        Size (bytes):2401
        Entropy (8bit):7.798164511475268
        Encrypted:false
        SSDEEP:48:LDBd+Ip20GmxT0oOrn80utDwaBuGU2U/QZLESVct:PjbY960oO80ly3U2Ub
        MD5:DA231955EAE61AF353083F16619EBD24
        SHA1:3E99DFF9B8866AA46396133DEFF18C293BE0307E
        SHA-256:C28B95E9CDE15FADCD4C45DE8937532539D6EC5F149370C027A50AB48EF8F3F6
        SHA-512:435894F42BBEE1E5688A429CA0D25D389D1CC6CE03A2CBC2F4E6A6AC1C583DA4D8317EA1AFC1962A7E3F34F3EC37FBDF99AEBCBEC67ACAF01B601C30E6975D99
        Malicious:false
        Reputation:low
        Preview:.PNG........IHDR...Q...2.....$.7.....pHYs..\F..\F...CA....tIME.....-.5.q.....tEXtAuthor....H....tEXtDescription...!#....tEXtCopyright....:....tEXtCreation time.5.......tEXtSoftware.]p.:....tEXtDisclaimer.........tEXtWarning........tEXtSource.........tEXtComment........tEXtTitle....'...,IDATh..Y.%U.........+MO..4..1.1b...Q...@b..$>..... >..."..A0.@..DML.\A6.........v..v.:...N(..x.+....rRu....s~uN.9_.....d.....5!&.&........P.b.jBL@M....1.5!&.&...$u.9/.."...V..E...ycl{..f...F.T1.[...R.@R..[[..........|.+E.....S..(7.E.Hdo[.lM........n..It.t.l%.s......l.V.--.........q.."..k./XdO...U.p^.1w...\3l.'..........HU7.,C..........7E_...[.2...h.p.[...i'.TU&........PU.w.........7..%m....~..u..U.17....z...Q.?Z.5.....:..RSN....cnp~.........0.w.n7...MM.1...y...-.%g.#]1..T.]Y+.....L..?...>........w.[v..d...C...Y7s.P*..l..7T^...........Xq;.8...M.AU.Y..>.u..(.....V..4.!.M.B.........6*.T.G.n.`-.c.{t..o.:..e.[G..,..i/X.......x:._.2.I/\<.....*..x..X.........~.|...).J`&fW.n..m..
        Process:C:\Windows\SysWOW64\mspaint.exe
        File Type:ASCII text, with CRLF, LF line terminators
        Category:dropped
        Size (bytes):1515
        Entropy (8bit):5.252481739824826
        Encrypted:false
        SSDEEP:24:0u/2dTF02k9YXCrTF0qJuFF0kuqsF0w3ORTF0HXd/bXE34UcXd/TzUugNYxee77X:0u/2tSmX2SJSkutSw3sS3RzE34HRTz4C
        MD5:64115B879AE705CD51CBBED863FB4E19
        SHA1:BBFA690B27D87C7A696F7029C27A4BB943C8C711
        SHA-256:911C431F453E5AE86D483D2FBD5CA0CAB5E5FB5D69EE3843BB542B4DC3830137
        SHA-512:B224CDE8C4C423E0EAD51F3403757A5913727B9F3E8A685AE1F41C42994A10349A20AF9D431AEA597F3CAFCAD2E1F1DE9143D26B80A9561FA1D023BD383AAD18
        Malicious:false
        Reputation:low
        Preview:..**************** Started trace for Module: [sti.dll] in Executable [mspaint.exe] ProcessID: [3840] at 2024/04/24 14:02:23:361 ****************..WIA: 3840.4436 0 0 0 [sti.dll] AsyncRPCEventTransport::OpenConnectionToServer, AsyncRPC Connection established to server..WIA: 3840.4436 0 0 0 [sti.dll] AsyncRPCEventTransport::OpenConnectionToServer, Got my context 029955C8 from server...WIA: 3840.4436 0 0 0 [sti.dll] WiaEventReceiver::Start, WiaEventReceiver Started.....WIA: 3840.2640 0 0 0 [sti.dll] AsyncRPCEventTransport::CloseNotificationChannel, Closing the async notification channel.....WIA: 3840.2640 0 0 0 [sti.dll] AsyncRPCEventTransport::OpenNotificationChannel, Opening the async notification channel.....WIA: 3840.4436 0 0 0 [sti.dll] AsyncRPCEventTransport::SendRegisterUnregisterInfo, Sent RPC Register/Unregister information...WIA: 3840.4436 0 0 0 [sti.dll] WiaEventReceiver::SendRegisterUnregisterInfo, Added new registration:..WIA: 3840.4436 0 0 0 [sti.dll] EventRegistrationInfo::D
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:PNG image data, 81 x 50, 8-bit/color RGBA, non-interlaced
        Category:downloaded
        Size (bytes):2401
        Entropy (8bit):7.798164511475268
        Encrypted:false
        SSDEEP:48:LDBd+Ip20GmxT0oOrn80utDwaBuGU2U/QZLESVct:PjbY960oO80ly3U2Ub
        MD5:DA231955EAE61AF353083F16619EBD24
        SHA1:3E99DFF9B8866AA46396133DEFF18C293BE0307E
        SHA-256:C28B95E9CDE15FADCD4C45DE8937532539D6EC5F149370C027A50AB48EF8F3F6
        SHA-512:435894F42BBEE1E5688A429CA0D25D389D1CC6CE03A2CBC2F4E6A6AC1C583DA4D8317EA1AFC1962A7E3F34F3EC37FBDF99AEBCBEC67ACAF01B601C30E6975D99
        Malicious:false
        Reputation:low
        URL:https://jll.aravo.com/aems/pub/attachment/logoexport.do?attachmentId=445982305&allowCaching=true&cs=aR57lq0tTvIqgE1HvStgpWbR9gAx8eUoCTYzp-i_SaU.arv
        Preview:.PNG........IHDR...Q...2.....$.7.....pHYs..\F..\F...CA....tIME.....-.5.q.....tEXtAuthor....H....tEXtDescription...!#....tEXtCopyright....:....tEXtCreation time.5.......tEXtSoftware.]p.:....tEXtDisclaimer.........tEXtWarning........tEXtSource.........tEXtComment........tEXtTitle....'...,IDATh..Y.%U.........+MO..4..1.1b...Q...@b..$>..... >..."..A0.@..DML.\A6.........v..v.:...N(..x.+....rRu....s~uN.9_.....d.....5!&.&........P.b.jBL@M....1.5!&.&...$u.9/.."...V..E...ycl{..f...F.T1.[...R.@R..[[..........|.+E.....S..(7.E.Hdo[.lM........n..It.t.l%.s......l.V.--.........q.."..k./XdO...U.p^.1w...\3l.'..........HU7.,C..........7E_...[.2...h.p.[...i'.TU&........PU.w.........7..%m....~..u..U.17....z...Q.?Z.5.....:..RSN....cnp~.........0.w.n7...MM.1...y...-.%g.#]1..T.]Y+.....L..?...>........w.[v..d...C...Y7s.P*..l..7T^...........Xq;.8...M.AU.Y..>.u..(.....V..4.!.M.B.........6*.T.G.n.`-.c.{t..o.:..e.[G..,..i/X.......x:._.2.I/\<.....*..x..X.........~.|...).J`&fW.n..m..
        No static file info
        TimestampSource PortDest PortSource IPDest IP
        Apr 24, 2024 14:00:58.091908932 CEST49675443192.168.2.523.1.237.91
        Apr 24, 2024 14:00:58.091964006 CEST49674443192.168.2.523.1.237.91
        Apr 24, 2024 14:00:58.217000008 CEST49673443192.168.2.523.1.237.91
        Apr 24, 2024 14:01:06.532989025 CEST49710443192.168.2.567.192.161.8
        Apr 24, 2024 14:01:06.533046961 CEST4434971067.192.161.8192.168.2.5
        Apr 24, 2024 14:01:06.533113003 CEST49710443192.168.2.567.192.161.8
        Apr 24, 2024 14:01:06.533649921 CEST49711443192.168.2.567.192.161.8
        Apr 24, 2024 14:01:06.533741951 CEST4434971167.192.161.8192.168.2.5
        Apr 24, 2024 14:01:06.533824921 CEST49711443192.168.2.567.192.161.8
        Apr 24, 2024 14:01:06.533970118 CEST49710443192.168.2.567.192.161.8
        Apr 24, 2024 14:01:06.533997059 CEST4434971067.192.161.8192.168.2.5
        Apr 24, 2024 14:01:06.534226894 CEST49711443192.168.2.567.192.161.8
        Apr 24, 2024 14:01:06.534265041 CEST4434971167.192.161.8192.168.2.5
        Apr 24, 2024 14:01:07.114814997 CEST4434971167.192.161.8192.168.2.5
        Apr 24, 2024 14:01:07.116519928 CEST49711443192.168.2.567.192.161.8
        Apr 24, 2024 14:01:07.116549015 CEST4434971167.192.161.8192.168.2.5
        Apr 24, 2024 14:01:07.117624998 CEST4434971167.192.161.8192.168.2.5
        Apr 24, 2024 14:01:07.117696047 CEST49711443192.168.2.567.192.161.8
        Apr 24, 2024 14:01:07.118262053 CEST4434971067.192.161.8192.168.2.5
        Apr 24, 2024 14:01:07.120105028 CEST49710443192.168.2.567.192.161.8
        Apr 24, 2024 14:01:07.120119095 CEST4434971067.192.161.8192.168.2.5
        Apr 24, 2024 14:01:07.121623993 CEST4434971067.192.161.8192.168.2.5
        Apr 24, 2024 14:01:07.121680021 CEST49710443192.168.2.567.192.161.8
        Apr 24, 2024 14:01:07.125053883 CEST49711443192.168.2.567.192.161.8
        Apr 24, 2024 14:01:07.125132084 CEST4434971167.192.161.8192.168.2.5
        Apr 24, 2024 14:01:07.127166986 CEST49710443192.168.2.567.192.161.8
        Apr 24, 2024 14:01:07.127326965 CEST4434971067.192.161.8192.168.2.5
        Apr 24, 2024 14:01:07.127460957 CEST49711443192.168.2.567.192.161.8
        Apr 24, 2024 14:01:07.127470970 CEST4434971167.192.161.8192.168.2.5
        Apr 24, 2024 14:01:07.175585032 CEST49710443192.168.2.567.192.161.8
        Apr 24, 2024 14:01:07.175605059 CEST4434971067.192.161.8192.168.2.5
        Apr 24, 2024 14:01:07.175599098 CEST49711443192.168.2.567.192.161.8
        Apr 24, 2024 14:01:07.222800970 CEST49710443192.168.2.567.192.161.8
        Apr 24, 2024 14:01:07.373440981 CEST4434971167.192.161.8192.168.2.5
        Apr 24, 2024 14:01:07.373472929 CEST4434971167.192.161.8192.168.2.5
        Apr 24, 2024 14:01:07.373562098 CEST4434971167.192.161.8192.168.2.5
        Apr 24, 2024 14:01:07.373560905 CEST49711443192.168.2.567.192.161.8
        Apr 24, 2024 14:01:07.373636961 CEST49711443192.168.2.567.192.161.8
        Apr 24, 2024 14:01:07.374844074 CEST49711443192.168.2.567.192.161.8
        Apr 24, 2024 14:01:07.374882936 CEST4434971167.192.161.8192.168.2.5
        Apr 24, 2024 14:01:07.423269033 CEST49713443192.168.2.5142.250.141.103
        Apr 24, 2024 14:01:07.423293114 CEST44349713142.250.141.103192.168.2.5
        Apr 24, 2024 14:01:07.423347950 CEST49713443192.168.2.5142.250.141.103
        Apr 24, 2024 14:01:07.423871040 CEST49713443192.168.2.5142.250.141.103
        Apr 24, 2024 14:01:07.423886061 CEST44349713142.250.141.103192.168.2.5
        Apr 24, 2024 14:01:07.699991941 CEST49674443192.168.2.523.1.237.91
        Apr 24, 2024 14:01:07.699992895 CEST49675443192.168.2.523.1.237.91
        Apr 24, 2024 14:01:07.784594059 CEST44349713142.250.141.103192.168.2.5
        Apr 24, 2024 14:01:07.785768032 CEST49713443192.168.2.5142.250.141.103
        Apr 24, 2024 14:01:07.785784006 CEST44349713142.250.141.103192.168.2.5
        Apr 24, 2024 14:01:07.786791086 CEST44349713142.250.141.103192.168.2.5
        Apr 24, 2024 14:01:07.786863089 CEST49713443192.168.2.5142.250.141.103
        Apr 24, 2024 14:01:07.787909031 CEST49713443192.168.2.5142.250.141.103
        Apr 24, 2024 14:01:07.787970066 CEST44349713142.250.141.103192.168.2.5
        Apr 24, 2024 14:01:07.822638035 CEST49673443192.168.2.523.1.237.91
        Apr 24, 2024 14:01:07.831830978 CEST49713443192.168.2.5142.250.141.103
        Apr 24, 2024 14:01:07.831840038 CEST44349713142.250.141.103192.168.2.5
        Apr 24, 2024 14:01:07.875495911 CEST49713443192.168.2.5142.250.141.103
        Apr 24, 2024 14:01:09.205308914 CEST4434970323.1.237.91192.168.2.5
        Apr 24, 2024 14:01:09.205395937 CEST49703443192.168.2.523.1.237.91
        Apr 24, 2024 14:01:09.771152973 CEST49715443192.168.2.523.61.210.98
        Apr 24, 2024 14:01:09.771255016 CEST4434971523.61.210.98192.168.2.5
        Apr 24, 2024 14:01:09.771332979 CEST49715443192.168.2.523.61.210.98
        Apr 24, 2024 14:01:09.772913933 CEST49715443192.168.2.523.61.210.98
        Apr 24, 2024 14:01:09.772952080 CEST4434971523.61.210.98192.168.2.5
        Apr 24, 2024 14:01:10.107464075 CEST4434971523.61.210.98192.168.2.5
        Apr 24, 2024 14:01:10.107553005 CEST49715443192.168.2.523.61.210.98
        Apr 24, 2024 14:01:10.109770060 CEST49715443192.168.2.523.61.210.98
        Apr 24, 2024 14:01:10.109788895 CEST4434971523.61.210.98192.168.2.5
        Apr 24, 2024 14:01:10.110199928 CEST4434971523.61.210.98192.168.2.5
        Apr 24, 2024 14:01:10.148758888 CEST49715443192.168.2.523.61.210.98
        Apr 24, 2024 14:01:10.196119070 CEST4434971523.61.210.98192.168.2.5
        Apr 24, 2024 14:01:10.419610023 CEST4434971523.61.210.98192.168.2.5
        Apr 24, 2024 14:01:10.419758081 CEST4434971523.61.210.98192.168.2.5
        Apr 24, 2024 14:01:10.419831991 CEST49715443192.168.2.523.61.210.98
        Apr 24, 2024 14:01:10.419910908 CEST49715443192.168.2.523.61.210.98
        Apr 24, 2024 14:01:10.419951916 CEST4434971523.61.210.98192.168.2.5
        Apr 24, 2024 14:01:10.419982910 CEST49715443192.168.2.523.61.210.98
        Apr 24, 2024 14:01:10.419998884 CEST4434971523.61.210.98192.168.2.5
        Apr 24, 2024 14:01:10.454770088 CEST49716443192.168.2.523.61.210.98
        Apr 24, 2024 14:01:10.454819918 CEST4434971623.61.210.98192.168.2.5
        Apr 24, 2024 14:01:10.454895020 CEST49716443192.168.2.523.61.210.98
        Apr 24, 2024 14:01:10.455199957 CEST49716443192.168.2.523.61.210.98
        Apr 24, 2024 14:01:10.455216885 CEST4434971623.61.210.98192.168.2.5
        Apr 24, 2024 14:01:10.786422014 CEST4434971623.61.210.98192.168.2.5
        Apr 24, 2024 14:01:10.786544085 CEST49716443192.168.2.523.61.210.98
        Apr 24, 2024 14:01:10.787767887 CEST49716443192.168.2.523.61.210.98
        Apr 24, 2024 14:01:10.787782907 CEST4434971623.61.210.98192.168.2.5
        Apr 24, 2024 14:01:10.788592100 CEST4434971623.61.210.98192.168.2.5
        Apr 24, 2024 14:01:10.789639950 CEST49716443192.168.2.523.61.210.98
        Apr 24, 2024 14:01:10.832160950 CEST4434971623.61.210.98192.168.2.5
        Apr 24, 2024 14:01:11.102473021 CEST4434971623.61.210.98192.168.2.5
        Apr 24, 2024 14:01:11.102946997 CEST4434971623.61.210.98192.168.2.5
        Apr 24, 2024 14:01:11.103019953 CEST49716443192.168.2.523.61.210.98
        Apr 24, 2024 14:01:11.103329897 CEST49716443192.168.2.523.61.210.98
        Apr 24, 2024 14:01:11.103329897 CEST49716443192.168.2.523.61.210.98
        Apr 24, 2024 14:01:11.103353024 CEST4434971623.61.210.98192.168.2.5
        Apr 24, 2024 14:01:11.103364944 CEST4434971623.61.210.98192.168.2.5
        Apr 24, 2024 14:01:17.779596090 CEST44349713142.250.141.103192.168.2.5
        Apr 24, 2024 14:01:17.779665947 CEST44349713142.250.141.103192.168.2.5
        Apr 24, 2024 14:01:17.779758930 CEST49713443192.168.2.5142.250.141.103
        Apr 24, 2024 14:01:18.280674934 CEST49717443192.168.2.552.165.165.26
        Apr 24, 2024 14:01:18.280714035 CEST4434971752.165.165.26192.168.2.5
        Apr 24, 2024 14:01:18.280884981 CEST49717443192.168.2.552.165.165.26
        Apr 24, 2024 14:01:18.282234907 CEST49717443192.168.2.552.165.165.26
        Apr 24, 2024 14:01:18.282248020 CEST4434971752.165.165.26192.168.2.5
        Apr 24, 2024 14:01:18.892935991 CEST4434971752.165.165.26192.168.2.5
        Apr 24, 2024 14:01:18.893029928 CEST49717443192.168.2.552.165.165.26
        Apr 24, 2024 14:01:18.896066904 CEST49717443192.168.2.552.165.165.26
        Apr 24, 2024 14:01:18.896080017 CEST4434971752.165.165.26192.168.2.5
        Apr 24, 2024 14:01:18.896341085 CEST4434971752.165.165.26192.168.2.5
        Apr 24, 2024 14:01:18.947967052 CEST49717443192.168.2.552.165.165.26
        Apr 24, 2024 14:01:19.225670099 CEST49713443192.168.2.5142.250.141.103
        Apr 24, 2024 14:01:19.225696087 CEST44349713142.250.141.103192.168.2.5
        Apr 24, 2024 14:01:19.456614971 CEST49703443192.168.2.523.1.237.91
        Apr 24, 2024 14:01:19.456697941 CEST49703443192.168.2.523.1.237.91
        Apr 24, 2024 14:01:19.457140923 CEST49720443192.168.2.523.1.237.91
        Apr 24, 2024 14:01:19.457199097 CEST4434972023.1.237.91192.168.2.5
        Apr 24, 2024 14:01:19.457307100 CEST49720443192.168.2.523.1.237.91
        Apr 24, 2024 14:01:19.457854986 CEST49720443192.168.2.523.1.237.91
        Apr 24, 2024 14:01:19.457891941 CEST4434972023.1.237.91192.168.2.5
        Apr 24, 2024 14:01:19.467236996 CEST49717443192.168.2.552.165.165.26
        Apr 24, 2024 14:01:19.508157969 CEST4434971752.165.165.26192.168.2.5
        Apr 24, 2024 14:01:19.616193056 CEST4434970323.1.237.91192.168.2.5
        Apr 24, 2024 14:01:19.616210938 CEST4434970323.1.237.91192.168.2.5
        Apr 24, 2024 14:01:19.797506094 CEST4434972023.1.237.91192.168.2.5
        Apr 24, 2024 14:01:19.797581911 CEST49720443192.168.2.523.1.237.91
        Apr 24, 2024 14:01:19.865056992 CEST4434971752.165.165.26192.168.2.5
        Apr 24, 2024 14:01:19.865086079 CEST4434971752.165.165.26192.168.2.5
        Apr 24, 2024 14:01:19.865096092 CEST4434971752.165.165.26192.168.2.5
        Apr 24, 2024 14:01:19.865122080 CEST4434971752.165.165.26192.168.2.5
        Apr 24, 2024 14:01:19.865137100 CEST4434971752.165.165.26192.168.2.5
        Apr 24, 2024 14:01:19.865148067 CEST4434971752.165.165.26192.168.2.5
        Apr 24, 2024 14:01:19.865150928 CEST49717443192.168.2.552.165.165.26
        Apr 24, 2024 14:01:19.865175962 CEST4434971752.165.165.26192.168.2.5
        Apr 24, 2024 14:01:19.865195036 CEST49717443192.168.2.552.165.165.26
        Apr 24, 2024 14:01:19.865240097 CEST49717443192.168.2.552.165.165.26
        Apr 24, 2024 14:01:19.865626097 CEST4434971752.165.165.26192.168.2.5
        Apr 24, 2024 14:01:19.865714073 CEST49717443192.168.2.552.165.165.26
        Apr 24, 2024 14:01:19.865737915 CEST4434971752.165.165.26192.168.2.5
        Apr 24, 2024 14:01:19.865943909 CEST4434971752.165.165.26192.168.2.5
        Apr 24, 2024 14:01:19.866126060 CEST49717443192.168.2.552.165.165.26
        Apr 24, 2024 14:01:20.234328985 CEST49717443192.168.2.552.165.165.26
        Apr 24, 2024 14:01:20.234364033 CEST4434971752.165.165.26192.168.2.5
        Apr 24, 2024 14:01:20.234399080 CEST49717443192.168.2.552.165.165.26
        Apr 24, 2024 14:01:20.234410048 CEST4434971752.165.165.26192.168.2.5
        Apr 24, 2024 14:01:38.945589066 CEST4434972023.1.237.91192.168.2.5
        Apr 24, 2024 14:01:38.945662022 CEST49720443192.168.2.523.1.237.91
        Apr 24, 2024 14:01:52.184175014 CEST49710443192.168.2.567.192.161.8
        Apr 24, 2024 14:01:52.184190989 CEST4434971067.192.161.8192.168.2.5
        Apr 24, 2024 14:01:56.638777018 CEST49724443192.168.2.552.165.165.26
        Apr 24, 2024 14:01:56.638849020 CEST4434972452.165.165.26192.168.2.5
        Apr 24, 2024 14:01:56.638926029 CEST49724443192.168.2.552.165.165.26
        Apr 24, 2024 14:01:56.639359951 CEST49724443192.168.2.552.165.165.26
        Apr 24, 2024 14:01:56.639393091 CEST4434972452.165.165.26192.168.2.5
        Apr 24, 2024 14:01:57.246095896 CEST4434972452.165.165.26192.168.2.5
        Apr 24, 2024 14:01:57.246212006 CEST49724443192.168.2.552.165.165.26
        Apr 24, 2024 14:01:57.250401974 CEST49724443192.168.2.552.165.165.26
        Apr 24, 2024 14:01:57.250431061 CEST4434972452.165.165.26192.168.2.5
        Apr 24, 2024 14:01:57.250658035 CEST4434972452.165.165.26192.168.2.5
        Apr 24, 2024 14:01:57.259344101 CEST49724443192.168.2.552.165.165.26
        Apr 24, 2024 14:01:57.304116964 CEST4434972452.165.165.26192.168.2.5
        Apr 24, 2024 14:01:57.843015909 CEST4434972452.165.165.26192.168.2.5
        Apr 24, 2024 14:01:57.843036890 CEST4434972452.165.165.26192.168.2.5
        Apr 24, 2024 14:01:57.843075991 CEST4434972452.165.165.26192.168.2.5
        Apr 24, 2024 14:01:57.843107939 CEST49724443192.168.2.552.165.165.26
        Apr 24, 2024 14:01:57.843144894 CEST4434972452.165.165.26192.168.2.5
        Apr 24, 2024 14:01:57.843164921 CEST49724443192.168.2.552.165.165.26
        Apr 24, 2024 14:01:57.843199968 CEST49724443192.168.2.552.165.165.26
        Apr 24, 2024 14:01:57.843255043 CEST4434972452.165.165.26192.168.2.5
        Apr 24, 2024 14:01:57.843300104 CEST4434972452.165.165.26192.168.2.5
        Apr 24, 2024 14:01:57.843313932 CEST49724443192.168.2.552.165.165.26
        Apr 24, 2024 14:01:57.843319893 CEST4434972452.165.165.26192.168.2.5
        Apr 24, 2024 14:01:57.843377113 CEST49724443192.168.2.552.165.165.26
        Apr 24, 2024 14:01:57.843380928 CEST4434972452.165.165.26192.168.2.5
        Apr 24, 2024 14:01:57.843420029 CEST49724443192.168.2.552.165.165.26
        Apr 24, 2024 14:01:57.851716042 CEST49724443192.168.2.552.165.165.26
        Apr 24, 2024 14:01:57.851746082 CEST4434972452.165.165.26192.168.2.5
        Apr 24, 2024 14:01:57.851761103 CEST49724443192.168.2.552.165.165.26
        Apr 24, 2024 14:01:57.851769924 CEST4434972452.165.165.26192.168.2.5
        Apr 24, 2024 14:02:07.202497959 CEST49710443192.168.2.567.192.161.8
        Apr 24, 2024 14:02:07.202658892 CEST4434971067.192.161.8192.168.2.5
        Apr 24, 2024 14:02:07.202841997 CEST49710443192.168.2.567.192.161.8
        Apr 24, 2024 14:02:07.293025017 CEST49726443192.168.2.5142.250.141.103
        Apr 24, 2024 14:02:07.293051004 CEST44349726142.250.141.103192.168.2.5
        Apr 24, 2024 14:02:07.293116093 CEST49726443192.168.2.5142.250.141.103
        Apr 24, 2024 14:02:07.293414116 CEST49726443192.168.2.5142.250.141.103
        Apr 24, 2024 14:02:07.293426037 CEST44349726142.250.141.103192.168.2.5
        Apr 24, 2024 14:02:07.652477026 CEST44349726142.250.141.103192.168.2.5
        Apr 24, 2024 14:02:07.653145075 CEST49726443192.168.2.5142.250.141.103
        Apr 24, 2024 14:02:07.653157949 CEST44349726142.250.141.103192.168.2.5
        Apr 24, 2024 14:02:07.654227972 CEST44349726142.250.141.103192.168.2.5
        Apr 24, 2024 14:02:07.654654026 CEST49726443192.168.2.5142.250.141.103
        Apr 24, 2024 14:02:07.654822111 CEST44349726142.250.141.103192.168.2.5
        Apr 24, 2024 14:02:07.698121071 CEST49726443192.168.2.5142.250.141.103
        Apr 24, 2024 14:02:17.681646109 CEST44349726142.250.141.103192.168.2.5
        Apr 24, 2024 14:02:17.681698084 CEST44349726142.250.141.103192.168.2.5
        Apr 24, 2024 14:02:17.681852102 CEST49726443192.168.2.5142.250.141.103
        Apr 24, 2024 14:02:19.203473091 CEST49726443192.168.2.5142.250.141.103
        Apr 24, 2024 14:02:19.203493118 CEST44349726142.250.141.103192.168.2.5
        TimestampSource PortDest PortSource IPDest IP
        Apr 24, 2024 14:01:05.161617041 CEST53543961.1.1.1192.168.2.5
        Apr 24, 2024 14:01:05.171319962 CEST53601521.1.1.1192.168.2.5
        Apr 24, 2024 14:01:06.137850046 CEST53566581.1.1.1192.168.2.5
        Apr 24, 2024 14:01:06.362565041 CEST5060653192.168.2.51.1.1.1
        Apr 24, 2024 14:01:06.362725973 CEST5607253192.168.2.51.1.1.1
        Apr 24, 2024 14:01:06.532018900 CEST53506061.1.1.1192.168.2.5
        Apr 24, 2024 14:01:06.532377958 CEST53560721.1.1.1192.168.2.5
        Apr 24, 2024 14:01:07.242822886 CEST6165553192.168.2.51.1.1.1
        Apr 24, 2024 14:01:07.243181944 CEST6341253192.168.2.51.1.1.1
        Apr 24, 2024 14:01:07.396435022 CEST53616551.1.1.1192.168.2.5
        Apr 24, 2024 14:01:07.396790028 CEST53634121.1.1.1192.168.2.5
        Apr 24, 2024 14:01:23.117300987 CEST53648651.1.1.1192.168.2.5
        Apr 24, 2024 14:01:42.119432926 CEST53620471.1.1.1192.168.2.5
        Apr 24, 2024 14:02:04.418894053 CEST53622191.1.1.1192.168.2.5
        Apr 24, 2024 14:02:04.791583061 CEST53535181.1.1.1192.168.2.5
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Apr 24, 2024 14:01:06.362565041 CEST192.168.2.51.1.1.10x5a41Standard query (0)jll.aravo.comA (IP address)IN (0x0001)false
        Apr 24, 2024 14:01:06.362725973 CEST192.168.2.51.1.1.10xf034Standard query (0)jll.aravo.com65IN (0x0001)false
        Apr 24, 2024 14:01:07.242822886 CEST192.168.2.51.1.1.10x3b0cStandard query (0)www.google.comA (IP address)IN (0x0001)false
        Apr 24, 2024 14:01:07.243181944 CEST192.168.2.51.1.1.10x9e28Standard query (0)www.google.com65IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Apr 24, 2024 14:01:06.532018900 CEST1.1.1.1192.168.2.50x5a41No error (0)jll.aravo.comprod.aravo.comCNAME (Canonical name)IN (0x0001)false
        Apr 24, 2024 14:01:06.532018900 CEST1.1.1.1192.168.2.50x5a41No error (0)prod.aravo.com67.192.161.8A (IP address)IN (0x0001)false
        Apr 24, 2024 14:01:06.532377958 CEST1.1.1.1192.168.2.50xf034No error (0)jll.aravo.comprod.aravo.comCNAME (Canonical name)IN (0x0001)false
        Apr 24, 2024 14:01:07.396435022 CEST1.1.1.1192.168.2.50x3b0cNo error (0)www.google.com142.250.141.103A (IP address)IN (0x0001)false
        Apr 24, 2024 14:01:07.396435022 CEST1.1.1.1192.168.2.50x3b0cNo error (0)www.google.com142.250.141.106A (IP address)IN (0x0001)false
        Apr 24, 2024 14:01:07.396435022 CEST1.1.1.1192.168.2.50x3b0cNo error (0)www.google.com142.250.141.99A (IP address)IN (0x0001)false
        Apr 24, 2024 14:01:07.396435022 CEST1.1.1.1192.168.2.50x3b0cNo error (0)www.google.com142.250.141.105A (IP address)IN (0x0001)false
        Apr 24, 2024 14:01:07.396435022 CEST1.1.1.1192.168.2.50x3b0cNo error (0)www.google.com142.250.141.147A (IP address)IN (0x0001)false
        Apr 24, 2024 14:01:07.396435022 CEST1.1.1.1192.168.2.50x3b0cNo error (0)www.google.com142.250.141.104A (IP address)IN (0x0001)false
        Apr 24, 2024 14:01:07.396790028 CEST1.1.1.1192.168.2.50x9e28No error (0)www.google.com65IN (0x0001)false
        • jll.aravo.com
        • fs.microsoft.com
        • slscr.update.microsoft.com
        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        0192.168.2.54971167.192.161.84436664C:\Program Files\Google\Chrome\Application\chrome.exe
        TimestampBytes transferredDirectionData
        2024-04-24 12:01:07 UTC781OUTGET /aems/pub/attachment/logoexport.do?attachmentId=445982305&allowCaching=true&cs=aR57lq0tTvIqgE1HvStgpWbR9gAx8eUoCTYzp-i_SaU.arv HTTP/1.1
        Host: jll.aravo.com
        Connection: keep-alive
        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
        sec-ch-ua-mobile: ?0
        sec-ch-ua-platform: "Windows"
        Upgrade-Insecure-Requests: 1
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
        Sec-Fetch-Site: none
        Sec-Fetch-Mode: navigate
        Sec-Fetch-User: ?1
        Sec-Fetch-Dest: document
        Accept-Encoding: gzip, deflate, br
        Accept-Language: en-US,en;q=0.9
        2024-04-24 12:01:07 UTC729INHTTP/1.1 200
        Set-Cookie: JSESSIONID=2A92810535F35364967CB1BBFE9E719A; Path=/aems; Secure; HttpOnly
        Date: Wed, 24 Apr 2024 12:01:07 GMT
        Expires: Thu, 24 Apr 2025 12:01:07 GMT
        Pragma: public
        Cache-control: public
        X-XSS-Protection: 1; mode=block
        X-Content-Type-Options: nosniff
        Referrer-Policy: origin-when-cross-origin
        Content-Disposition: attachment; filename*=UTF-8''JLL%20Logo%20Positive%2010-29mm%20RGB_resized.png
        Content-Type: image/png;charset=UTF-8
        Content-Length: 2401
        Connection: close
        Set-Cookie: b1pi=!K3Bf4j3pVT0yGzF1OXIWsuaD7FD62fSbQK+j0nxt9+/UYwrP7YQbRq1gC22It92VPDfM5/CqEi7mYoY=; path=/; Httponly; Secure
        X-FRAME-OPTIONS: SAMEORIGIN
        Strict-Transport-Security: max-age=31536000; includeSubDomains
        2024-04-24 12:01:07 UTC2401INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 00 51 00 00 00 32 08 06 00 00 00 24 ef 37 c2 00 00 00 09 70 48 59 73 00 00 5c 46 00 00 5c 46 01 14 94 43 41 00 00 00 07 74 49 4d 45 07 e6 09 0e 11 2d 06 35 ab 71 e0 00 00 00 07 74 45 58 74 41 75 74 68 6f 72 00 a9 ae cc 48 00 00 00 0c 74 45 58 74 44 65 73 63 72 69 70 74 69 6f 6e 00 13 09 21 23 00 00 00 0a 74 45 58 74 43 6f 70 79 72 69 67 68 74 00 ac 0f cc 3a 00 00 00 0e 74 45 58 74 43 72 65 61 74 69 6f 6e 20 74 69 6d 65 00 35 f7 0f 09 00 00 00 09 74 45 58 74 53 6f 66 74 77 61 72 65 00 5d 70 ff 3a 00 00 00 0b 74 45 58 74 44 69 73 63 6c 61 69 6d 65 72 00 b7 c0 b4 8f 00 00 00 08 74 45 58 74 57 61 72 6e 69 6e 67 00 c0 1b e6 87 00 00 00 07 74 45 58 74 53 6f 75 72 63 65 00 f5 ff 83 eb 00 00 00 08 74 45 58 74
        Data Ascii: PNGIHDRQ2$7pHYs\F\FCAtIME-5qtEXtAuthorHtEXtDescription!#tEXtCopyright:tEXtCreation time5tEXtSoftware]p:tEXtDisclaimertEXtWarningtEXtSourcetEXt


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        1192.168.2.54971523.61.210.98443
        TimestampBytes transferredDirectionData
        2024-04-24 12:01:10 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
        Connection: Keep-Alive
        Accept: */*
        Accept-Encoding: identity
        User-Agent: Microsoft BITS/7.8
        Host: fs.microsoft.com
        2024-04-24 12:01:10 UTC467INHTTP/1.1 200 OK
        Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
        Content-Type: application/octet-stream
        ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
        Last-Modified: Tue, 16 May 2017 22:58:00 GMT
        Server: ECAcc (sac/2518)
        X-CID: 11
        X-Ms-ApiVersion: Distribute 1.2
        X-Ms-Region: prod-eus-z1
        Cache-Control: public, max-age=241333
        Date: Wed, 24 Apr 2024 12:01:10 GMT
        Connection: close
        X-CID: 2


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        2192.168.2.54971623.61.210.98443
        TimestampBytes transferredDirectionData
        2024-04-24 12:01:10 UTC239OUTGET /fs/windows/config.json HTTP/1.1
        Connection: Keep-Alive
        Accept: */*
        Accept-Encoding: identity
        If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
        Range: bytes=0-2147483646
        User-Agent: Microsoft BITS/7.8
        Host: fs.microsoft.com
        2024-04-24 12:01:11 UTC456INHTTP/1.1 200 OK
        ApiVersion: Distribute 1.1
        Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
        Content-Type: application/octet-stream
        ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
        Last-Modified: Tue, 16 May 2017 22:58:00 GMT
        Server: ECAcc (sac/2578)
        X-CID: 11
        Cache-Control: public, max-age=241380
        Date: Wed, 24 Apr 2024 12:01:11 GMT
        Content-Length: 55
        Connection: close
        X-CID: 2
        2024-04-24 12:01:11 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
        Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        3192.168.2.54971752.165.165.26443
        TimestampBytes transferredDirectionData
        2024-04-24 12:01:19 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=rtToKtDfWxsRbzS&MD=X6ApKLzS HTTP/1.1
        Connection: Keep-Alive
        Accept: */*
        User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
        Host: slscr.update.microsoft.com
        2024-04-24 12:01:19 UTC560INHTTP/1.1 200 OK
        Cache-Control: no-cache
        Pragma: no-cache
        Content-Type: application/octet-stream
        Expires: -1
        Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
        ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
        MS-CorrelationId: b4712acf-1be6-426f-979c-11801dae08c4
        MS-RequestId: bf1380fe-3429-4af2-baa6-a2e0ab42ee53
        MS-CV: WPXa77Fh8UaOjcz+.0
        X-Microsoft-SLSClientCache: 2880
        Content-Disposition: attachment; filename=environment.cab
        X-Content-Type-Options: nosniff
        Date: Wed, 24 Apr 2024 12:01:19 GMT
        Connection: close
        Content-Length: 24490
        2024-04-24 12:01:19 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
        Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
        2024-04-24 12:01:19 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
        Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        4192.168.2.54972452.165.165.26443
        TimestampBytes transferredDirectionData
        2024-04-24 12:01:57 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=rtToKtDfWxsRbzS&MD=X6ApKLzS HTTP/1.1
        Connection: Keep-Alive
        Accept: */*
        User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
        Host: slscr.update.microsoft.com
        2024-04-24 12:01:57 UTC560INHTTP/1.1 200 OK
        Cache-Control: no-cache
        Pragma: no-cache
        Content-Type: application/octet-stream
        Expires: -1
        Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
        ETag: "Mx1RoJH/qEwpWfKllx7sbsl28AuERz5IYdcsvtTJcgM=_2160"
        MS-CorrelationId: 872f79dd-8d07-4743-83ea-cedb14cb802a
        MS-RequestId: f107e9fa-7c9c-4e71-932e-194b135e8ae3
        MS-CV: Z8B6XaUXT0at+x9W.0
        X-Microsoft-SLSClientCache: 2160
        Content-Disposition: attachment; filename=environment.cab
        X-Content-Type-Options: nosniff
        Date: Wed, 24 Apr 2024 12:01:56 GMT
        Connection: close
        Content-Length: 25457
        2024-04-24 12:01:57 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 51 22 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 db 8e 00 00 14 00 00 00 00 00 10 00 51 22 00 00 20 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 f3 43 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 0d 92 6f db e5 21 f3 43 43 4b ed 5a 09 38 55 5b df 3f 93 99 90 29 99 e7 29 ec 73 cc 4a 66 32 cf 84 32 64 c8 31 c7 11 52 38 87 90 42 66 09 99 87 32 0f 19 0a 09 51 a6 a8 08 29 53 86 4a 52 84 50 df 46 83 ba dd 7b df fb 7e ef 7d ee 7d bf ef 9e e7 d9 67 ef 35 ee b5 fe eb 3f ff b6 96 81 a2 0a 04 fc 31 40 21 5b 3f a5 ed 1b 04 0e 85 42 a0 10 04 64 12 6c a5 de aa a1 d8 ea f3 58 01 f2 f5 67 0b 5e 9b bd e8 a0 90 1d bf 40 88 9d eb 49 b4 87 9b ab 8b 9d 2b 46 c8 c7 c5 19 92
        Data Ascii: MSCFQ"DQ" AdCenvironment.cabo!CCKZ8U[?))sJf22d1R8Bf2Q)SJRPF{~}}g5?1@![?BdlXg^@I+F
        2024-04-24 12:01:57 UTC9633INData Raw: 21 6f b3 eb a6 cc f5 31 be cf 05 e2 a9 fe fa 57 6d 19 30 b3 c2 c5 66 c9 6a df f5 e7 f0 78 bd c7 a8 9e 25 e3 f9 bc ed 6b 54 57 08 2b 51 82 44 12 fb b9 53 8c cc f4 60 12 8a 76 cc 40 40 41 9b dc 5c 17 ff 5c f9 5e 17 35 98 24 56 4b 74 ef 42 10 c8 af bf 7f c6 7f f2 37 7d 5a 3f 1c f2 99 79 4a 91 52 00 af 38 0f 17 f5 2f 79 81 65 d9 a9 b5 6b e4 c7 ce f6 ca 7a 00 6f 4b 30 44 24 22 3c cf ed 03 a5 96 8f 59 29 bc b6 fd 04 e1 70 9f 32 4a 27 fd 55 af 2f fe b6 e5 8e 33 bb 62 5f 9a db 57 40 e9 f1 ce 99 66 90 8c ff 6a 62 7f dd c5 4a 0b 91 26 e2 39 ec 19 4a 71 63 9d 7b 21 6d c3 9c a3 a2 3c fa 7f 7d 96 6a 90 78 a6 6d d2 e1 9c f9 1d fc 38 d8 94 f4 c6 a5 0a 96 86 a4 bd 9e 1a ae 04 42 83 b8 b5 80 9b 22 38 20 b5 25 e5 64 ec f7 f4 bf 7e 63 59 25 0f 7a 2e 39 57 76 a2 71 aa 06 8a
        Data Ascii: !o1Wm0fjx%kTW+QDS`v@@A\\^5$VKtB7}Z?yJR8/yekzoK0D$"<Y)p2J'U/3b_W@fjbJ&9Jqc{!m<}jxm8B"8 %d~cY%z.9Wvq


        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:14:00:58
        Start date:24/04/2024
        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
        Imagebase:0x7ff715980000
        File size:3'242'272 bytes
        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        Target ID:2
        Start time:14:01:02
        Start date:24/04/2024
        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 --field-trial-handle=2344,i,10810502265876699492,17973120504647186442,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
        Imagebase:0x7ff715980000
        File size:3'242'272 bytes
        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        Target ID:3
        Start time:14:01:05
        Start date:24/04/2024
        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://jll.aravo.com/aems/pub/attachment/logoexport.do?attachmentId=445982305&allowCaching=true&cs=aR57lq0tTvIqgE1HvStgpWbR9gAx8eUoCTYzp-i_SaU.arv"
        Imagebase:0x7ff715980000
        File size:3'242'272 bytes
        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Target ID:8
        Start time:14:02:21
        Start date:24/04/2024
        Path:C:\Windows\SysWOW64\mspaint.exe
        Wow64 process (32bit):true
        Commandline:mspaint.exe "C:\Users\user\Desktop\"
        Imagebase:0x380000
        File size:743'424 bytes
        MD5 hash:986A191E95952C9E3FE6BE112FB92026
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        No disassembly