Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://www.intel.com/content/www/us/en/support/products/99745/memory-and-storage/intel-optane-memory.html

Overview

General Information

Sample URL:https://www.intel.com/content/www/us/en/support/products/99745/memory-and-storage/intel-optane-memory.html
Analysis ID:1431863
Infos:

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Stores files to the Windows start menu directory
Uses insecure TLS / SSL version for HTTPS connection

Classification

  • System is w10x64
  • chrome.exe (PID: 2604 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 5640 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 --field-trial-handle=2032,i,5426947174690932885,2057003017959117069,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 2992 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.intel.com/content/www/us/en/support/products/99745/memory-and-storage/intel-optane-memory.html" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: https://www.intel.com/content/www/us/en/support/products/99745/memory-and-storage/intel-optane-memory.htmlHTTP Parser: No favicon
Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49721 version: TLS 1.0
Source: unknownHTTPS traffic detected: 23.44.104.130:443 -> 192.168.2.5:49715 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.44.104.130:443 -> 192.168.2.5:49716 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49721 version: TLS 1.0
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.104.130
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.104.130
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.104.130
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.104.130
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.104.130
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.104.130
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.104.130
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.104.130
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.104.130
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.104.130
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.104.130
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.104.130
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.104.130
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.104.130
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.104.130
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.104.130
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.104.130
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.104.130
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.104.130
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
Source: global trafficDNS traffic detected: DNS query: www.intel.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownHTTPS traffic detected: 23.44.104.130:443 -> 192.168.2.5:49715 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.44.104.130:443 -> 192.168.2.5:49716 version: TLS 1.2
Source: classification engineClassification label: clean1.win@16/10@4/3
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 --field-trial-handle=2032,i,5426947174690932885,2057003017959117069,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.intel.com/content/www/us/en/support/products/99745/memory-and-storage/intel-optane-memory.html"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 --field-trial-handle=2032,i,5426947174690932885,2057003017959117069,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Google Drive.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1431863 URL: https://www.intel.com/conte... Startdate: 25/04/2024 Architecture: WINDOWS Score: 1 5 chrome.exe 9 2->5         started        8 chrome.exe 2->8         started        dnsIp3 13 192.168.2.5, 443, 49379, 49703 unknown unknown 5->13 15 239.255.255.250 unknown Reserved 5->15 10 chrome.exe 5->10         started        process4 dnsIp5 17 www.google.com 172.217.215.104, 443, 49714, 49726 GOOGLEUS United States 10->17 19 www.intel.com 10->19

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://www.intel.com/content/www/us/en/support/products/99745/memory-and-storage/intel-optane-memory.html0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.214.172
truefalse
    unknown
    www.google.com
    172.217.215.104
    truefalse
      high
      fp2e7a.wpc.phicdn.net
      192.229.211.108
      truefalse
        unknown
        www.intel.com
        unknown
        unknownfalse
          high
          NameMaliciousAntivirus DetectionReputation
          https://www.intel.com/content/www/us/en/support/products/99745/memory-and-storage/intel-optane-memory.htmlfalse
            high
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            239.255.255.250
            unknownReserved
            unknownunknownfalse
            172.217.215.104
            www.google.comUnited States
            15169GOOGLEUSfalse
            IP
            192.168.2.5
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1431863
            Start date and time:2024-04-25 21:59:53 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 3m 11s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:browseurl.jbs
            Sample URL:https://www.intel.com/content/www/us/en/support/products/99745/memory-and-storage/intel-optane-memory.html
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:7
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:CLEAN
            Classification:clean1.win@16/10@4/3
            EGA Information:Failed
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
            • Excluded IPs from analysis (whitelisted): 173.194.219.94, 74.125.136.138, 74.125.136.139, 74.125.136.102, 74.125.136.113, 74.125.136.101, 74.125.136.100, 64.233.176.84, 34.104.35.123, 104.67.194.36, 52.165.165.26, 199.232.210.172, 199.232.214.172, 192.229.211.108, 13.95.31.18, 52.165.164.15, 142.250.105.94, 23.40.205.75, 23.40.205.48, 23.40.205.26, 23.40.205.81
            • Excluded domains from analysis (whitelisted): fs.microsoft.com, accounts.google.com, intel11.cn.edgekey.net, slscr.update.microsoft.com, e7842.dsca.akamaiedge.net, clientservices.googleapis.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu-bg-shim.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net, fe3.delivery.mp.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, ocsp.digicert.com, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, update.googleapis.com, clients.l.google.com, glb.sls.prod.dcat.dsp.trafficmanager.net
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtSetInformationFile calls found.
            • VT rate limit hit for: https://www.intel.com/content/www/us/en/support/products/99745/memory-and-storage/intel-optane-memory.html
            No simulations
            No context
            No context
            No context
            No context
            No context
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 19:00:44 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2677
            Entropy (8bit):3.977969668604267
            Encrypted:false
            SSDEEP:48:8ydUTY4FDH5idAKZdA19ehwiZUklqehQy+3:85tFv/y
            MD5:550C3698882BA3FAC618B02342DC435D
            SHA1:C4D2DAA1895BE7A82648421C461FE866DB12533A
            SHA-256:5B072CE85A4E25D4C255A6CE248D7417E8371353923D896C60B9788E728E702D
            SHA-512:4C12A54373ED23C11FF5F4017696076CFCB6F6F64DAE6B477ED67D42A6B57CC709E1E74E56655CA1774A0888FA8BCDA498A405908359C5F6A63EA2B4E7977950
            Malicious:false
            Reputation:low
            Preview:L..................F.@.. ...$+.,.......BK...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........Z.._.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 19:00:44 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2679
            Entropy (8bit):3.993303089815488
            Encrypted:false
            SSDEEP:48:8ddUTY4FDH5idAKZdA1weh/iZUkAQkqehvy+2:8EtFV9QWy
            MD5:C8820715E1A922475BD2687A8E790AAE
            SHA1:963885E1C0ED51C782C8B7E7AB01BD1624540462
            SHA-256:CFD9B6E2FEAA2F23653C10C7B047118FE6F87D4B01EECC4958657567F23FFD58
            SHA-512:D0DD5A7D6F69AD73EA337D63C83CB2C2D2FF7CFCBD0E98C87CB45CFAC1283DECBEF5C09CA2DD76CAF99C45814747B10472801BB8DDB731B68976555F3DB873F7
            Malicious:false
            Reputation:low
            Preview:L..................F.@.. ...$+.,.......BK...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........Z.._.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2693
            Entropy (8bit):4.003283266408676
            Encrypted:false
            SSDEEP:48:8xNdUTY4FsH5idAKZdA14tseh7sFiZUkmgqeh7sdy+BX:8xUtFYnLy
            MD5:EC8760A0E62A0CBA139FD9E4378232BD
            SHA1:5EAF37C1123192ACA61157FBA04D634E83CEA011
            SHA-256:6587F47B2990E79E2CD82492F0EB3A32DC7495A347FD01022A3B4E039550A2AA
            SHA-512:15392E035CD35FF643A602F4C2E91B91D0991F066DCB8F8EAD9CFE750B5BA8E66DD33B152F4B99622102E9933B54F651246A9678ABD0BAF8E90AD0E5023B016D
            Malicious:false
            Reputation:low
            Preview:L..................F.@.. ...$+.,......e>....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VDW.n...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........Z.._.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 19:00:44 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2681
            Entropy (8bit):3.993070427171118
            Encrypted:false
            SSDEEP:48:8ydUTY4FDH5idAKZdA1vehDiZUkwqehjy+R:85tF2Vy
            MD5:0791186A8DDD11BF98C5947258269F9A
            SHA1:D982636842012DB424C505F2203484BD47A3ADB5
            SHA-256:CC5C03A19EA6EC12C261D2B424C008CE7F6FA79D087A1EAA78705AF203915211
            SHA-512:6F328601B439255739D976FB05E3E9179C0ACC6A98CF395629E0AD13695BD45D910FDE74DAAB4CA63AED27DFEC4D26F22AB77E7D6CE7E83AE21FBEE621ABAE9A
            Malicious:false
            Reputation:low
            Preview:L..................F.@.. ...$+.,.......BK...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........Z.._.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 19:00:44 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2681
            Entropy (8bit):3.983095075100039
            Encrypted:false
            SSDEEP:48:8KudUTY4FDH5idAKZdA1hehBiZUk1W1qehJy+C:8K9tFW9py
            MD5:EDBCC19549C957EF47E544E15B7A0267
            SHA1:31F9948442995EA22F7502BCFA8E3C3C175D496D
            SHA-256:98F7E99FAAE829B6BEE258231EF0F0F0D1421A5F8AA6E30E74E7D1C4F340358A
            SHA-512:01F2BE22D9F4B18D9C582F605FF396E3E151050B9592DF33C1FD36C79BB08759302C2505AC231D6F853FB5806D76D331B9A17026968FEFDA0E057B2FEDCB3D5A
            Malicious:false
            Reputation:low
            Preview:L..................F.@.. ...$+.,.......BK...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........Z.._.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 19:00:44 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2683
            Entropy (8bit):3.9937812094807463
            Encrypted:false
            SSDEEP:48:8OdUTY4FDH5idAKZdA1duT+ehOuTbbiZUk5OjqehOuTbLy+yT+:8dtFoT/TbxWOvTbLy7T
            MD5:9DFBB0C5C54DB0BB952B5ECA13441108
            SHA1:07CBCE087DC0FB65D638DED5F5D262CBA64A7208
            SHA-256:C1616E26110125173F02AEED416EB602FD0F3CD459A73FDB6CCDCB4DB12094B0
            SHA-512:CBE27123EFF4834EC3240C5C17DC288DFF8C0F902EB5A4F628BC1BAEB076819CA0B516AD3891A853D747C2B096A5D19EB96440CC840171F07212310DA307B144
            Malicious:false
            Reputation:low
            Preview:L..................F.@.. ...$+.,.......AK...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........Z.._.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:HTML document, ASCII text
            Category:downloaded
            Size (bytes):499
            Entropy (8bit):5.212094350215592
            Encrypted:false
            SSDEEP:12:dkK9dg5qEaCoZFeEahnwAR3+vzYJk1jfvkD:dtg5qEaCEF3aBOjU
            MD5:DC520CB8D5C38D98EDD4FBDF33EBE68A
            SHA1:DEB7D560F89FAD67BCDDC5BE6C226FD5C747EBB1
            SHA-256:2B315FA6557FB280021623F5AD5691916AF5C07E6F1231930DDBC2366D512CB1
            SHA-512:47C98F79A76704C091FDF68BAB3C8FE7114CA459F186248E6A1533576ED94F74D086A7A6AB67A43250746D88D14FAFD8B73F0DDECF4715A9EFD058205D97C555
            Malicious:false
            Reputation:low
            URL:https://www.intel.com/content/www/us/en/support/products/99745/memory-and-storage/intel-optane-memory.html
            Preview:<HTML><HEAD>.<TITLE>Access Denied</TITLE>.</HEAD><BODY>.<H1>Access Denied</H1>. .You don't have permission to access "http&#58;&#47;&#47;www&#46;intel&#46;com&#47;content&#47;www&#47;us&#47;en&#47;support&#47;products&#47;99745&#47;memory&#45;and&#45;storage&#47;intel&#45;optane&#45;memory&#46;html" on this server.<P>.Reference&#32;&#35;18&#46;8a644217&#46;1714075246&#46;d390bb.<P>https&#58;&#47;&#47;errors&#46;edgesuite&#46;net&#47;18&#46;8a644217&#46;1714075246&#46;d390bb</P>.</BODY>.</HTML>.
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:HTML document, ASCII text
            Category:downloaded
            Size (bytes):378
            Entropy (8bit):5.261630303836422
            Encrypted:false
            SSDEEP:6:wBqWekiTakpxxdGztoIhS3EaNibRCsDPLCmKJclOQWbcaS3jfU0cMVclOQ0RQT:dkK9dg5qEaCcJk1jfvkD
            MD5:36390ADE354CC524041B39F843C5B6AF
            SHA1:87F4D11042377C90EFD0E36ABCDD870EA3F530C4
            SHA-256:751A97F81D1AAD111473115E550F98AA400344631A68BD44CB7EAB35DF3C3DD2
            SHA-512:8622410BE72BB7BBF50A4C2AAF439A251F9E1CA666B044815830B19DDAB5729E8187FA0E768975EFE98FBE79F32D88C2E4D7BF8B8B68D8FD6D9DAA0EF0836771
            Malicious:false
            Reputation:low
            URL:https://www.intel.com/favicon.ico
            Preview:<HTML><HEAD>.<TITLE>Access Denied</TITLE>.</HEAD><BODY>.<H1>Access Denied</H1>. .You don't have permission to access "http&#58;&#47;&#47;www&#46;intel&#46;com&#47;favicon&#46;ico" on this server.<P>.Reference&#32;&#35;18&#46;8a644217&#46;1714075246&#46;d390c5.<P>https&#58;&#47;&#47;errors&#46;edgesuite&#46;net&#47;18&#46;8a644217&#46;1714075246&#46;d390c5</P>.</BODY>.</HTML>.
            No static file info
            TimestampSource PortDest PortSource IPDest IP
            Apr 25, 2024 22:00:38.271141052 CEST49674443192.168.2.523.1.237.91
            Apr 25, 2024 22:00:38.271167994 CEST49675443192.168.2.523.1.237.91
            Apr 25, 2024 22:00:38.380569935 CEST49673443192.168.2.523.1.237.91
            Apr 25, 2024 22:00:46.579027891 CEST49714443192.168.2.5172.217.215.104
            Apr 25, 2024 22:00:46.579145908 CEST44349714172.217.215.104192.168.2.5
            Apr 25, 2024 22:00:46.579344034 CEST49714443192.168.2.5172.217.215.104
            Apr 25, 2024 22:00:46.579472065 CEST49714443192.168.2.5172.217.215.104
            Apr 25, 2024 22:00:46.579492092 CEST44349714172.217.215.104192.168.2.5
            Apr 25, 2024 22:00:46.811516047 CEST44349714172.217.215.104192.168.2.5
            Apr 25, 2024 22:00:46.812649012 CEST49714443192.168.2.5172.217.215.104
            Apr 25, 2024 22:00:46.812683105 CEST44349714172.217.215.104192.168.2.5
            Apr 25, 2024 22:00:46.814115047 CEST44349714172.217.215.104192.168.2.5
            Apr 25, 2024 22:00:46.814199924 CEST49714443192.168.2.5172.217.215.104
            Apr 25, 2024 22:00:46.817987919 CEST49714443192.168.2.5172.217.215.104
            Apr 25, 2024 22:00:46.818075895 CEST44349714172.217.215.104192.168.2.5
            Apr 25, 2024 22:00:46.871917009 CEST49714443192.168.2.5172.217.215.104
            Apr 25, 2024 22:00:46.871938944 CEST44349714172.217.215.104192.168.2.5
            Apr 25, 2024 22:00:46.918751001 CEST49714443192.168.2.5172.217.215.104
            Apr 25, 2024 22:00:47.872267008 CEST49674443192.168.2.523.1.237.91
            Apr 25, 2024 22:00:47.872284889 CEST49675443192.168.2.523.1.237.91
            Apr 25, 2024 22:00:47.981637955 CEST49673443192.168.2.523.1.237.91
            Apr 25, 2024 22:00:48.127908945 CEST49715443192.168.2.523.44.104.130
            Apr 25, 2024 22:00:48.127938986 CEST4434971523.44.104.130192.168.2.5
            Apr 25, 2024 22:00:48.128001928 CEST49715443192.168.2.523.44.104.130
            Apr 25, 2024 22:00:48.130470037 CEST49715443192.168.2.523.44.104.130
            Apr 25, 2024 22:00:48.130482912 CEST4434971523.44.104.130192.168.2.5
            Apr 25, 2024 22:00:48.370951891 CEST4434971523.44.104.130192.168.2.5
            Apr 25, 2024 22:00:48.371081114 CEST49715443192.168.2.523.44.104.130
            Apr 25, 2024 22:00:48.380423069 CEST49715443192.168.2.523.44.104.130
            Apr 25, 2024 22:00:48.380439997 CEST4434971523.44.104.130192.168.2.5
            Apr 25, 2024 22:00:48.380820990 CEST4434971523.44.104.130192.168.2.5
            Apr 25, 2024 22:00:48.434760094 CEST49715443192.168.2.523.44.104.130
            Apr 25, 2024 22:00:48.500997066 CEST49715443192.168.2.523.44.104.130
            Apr 25, 2024 22:00:48.544126987 CEST4434971523.44.104.130192.168.2.5
            Apr 25, 2024 22:00:48.611884117 CEST4434971523.44.104.130192.168.2.5
            Apr 25, 2024 22:00:48.612152100 CEST4434971523.44.104.130192.168.2.5
            Apr 25, 2024 22:00:48.612185955 CEST49715443192.168.2.523.44.104.130
            Apr 25, 2024 22:00:48.612215042 CEST4434971523.44.104.130192.168.2.5
            Apr 25, 2024 22:00:48.612225056 CEST49715443192.168.2.523.44.104.130
            Apr 25, 2024 22:00:48.612234116 CEST4434971523.44.104.130192.168.2.5
            Apr 25, 2024 22:00:48.612240076 CEST49715443192.168.2.523.44.104.130
            Apr 25, 2024 22:00:48.612242937 CEST4434971523.44.104.130192.168.2.5
            Apr 25, 2024 22:00:48.660836935 CEST49716443192.168.2.523.44.104.130
            Apr 25, 2024 22:00:48.660867929 CEST4434971623.44.104.130192.168.2.5
            Apr 25, 2024 22:00:48.660979033 CEST49716443192.168.2.523.44.104.130
            Apr 25, 2024 22:00:48.661525965 CEST49716443192.168.2.523.44.104.130
            Apr 25, 2024 22:00:48.661540031 CEST4434971623.44.104.130192.168.2.5
            Apr 25, 2024 22:00:48.893696070 CEST4434971623.44.104.130192.168.2.5
            Apr 25, 2024 22:00:48.893802881 CEST49716443192.168.2.523.44.104.130
            Apr 25, 2024 22:00:48.895713091 CEST49716443192.168.2.523.44.104.130
            Apr 25, 2024 22:00:48.895716906 CEST4434971623.44.104.130192.168.2.5
            Apr 25, 2024 22:00:48.896073103 CEST4434971623.44.104.130192.168.2.5
            Apr 25, 2024 22:00:48.898592949 CEST49716443192.168.2.523.44.104.130
            Apr 25, 2024 22:00:48.940123081 CEST4434971623.44.104.130192.168.2.5
            Apr 25, 2024 22:00:49.123152971 CEST4434971623.44.104.130192.168.2.5
            Apr 25, 2024 22:00:49.123243093 CEST4434971623.44.104.130192.168.2.5
            Apr 25, 2024 22:00:49.123470068 CEST49716443192.168.2.523.44.104.130
            Apr 25, 2024 22:00:49.124120951 CEST49716443192.168.2.523.44.104.130
            Apr 25, 2024 22:00:49.124131918 CEST4434971623.44.104.130192.168.2.5
            Apr 25, 2024 22:00:49.124141932 CEST49716443192.168.2.523.44.104.130
            Apr 25, 2024 22:00:49.124146938 CEST4434971623.44.104.130192.168.2.5
            Apr 25, 2024 22:00:49.397254944 CEST4434970323.1.237.91192.168.2.5
            Apr 25, 2024 22:00:49.397412062 CEST49703443192.168.2.523.1.237.91
            Apr 25, 2024 22:00:56.808173895 CEST44349714172.217.215.104192.168.2.5
            Apr 25, 2024 22:00:56.808259010 CEST44349714172.217.215.104192.168.2.5
            Apr 25, 2024 22:00:56.808340073 CEST49714443192.168.2.5172.217.215.104
            Apr 25, 2024 22:00:57.686161041 CEST49714443192.168.2.5172.217.215.104
            Apr 25, 2024 22:00:57.686239958 CEST44349714172.217.215.104192.168.2.5
            Apr 25, 2024 22:00:59.373878956 CEST49703443192.168.2.523.1.237.91
            Apr 25, 2024 22:00:59.374124050 CEST49703443192.168.2.523.1.237.91
            Apr 25, 2024 22:00:59.374458075 CEST49721443192.168.2.523.1.237.91
            Apr 25, 2024 22:00:59.374489069 CEST4434972123.1.237.91192.168.2.5
            Apr 25, 2024 22:00:59.374555111 CEST49721443192.168.2.523.1.237.91
            Apr 25, 2024 22:00:59.374820948 CEST49721443192.168.2.523.1.237.91
            Apr 25, 2024 22:00:59.374834061 CEST4434972123.1.237.91192.168.2.5
            Apr 25, 2024 22:00:59.531743050 CEST4434970323.1.237.91192.168.2.5
            Apr 25, 2024 22:00:59.531943083 CEST4434970323.1.237.91192.168.2.5
            Apr 25, 2024 22:00:59.702476025 CEST4434972123.1.237.91192.168.2.5
            Apr 25, 2024 22:00:59.702646971 CEST49721443192.168.2.523.1.237.91
            Apr 25, 2024 22:01:18.851735115 CEST4434972123.1.237.91192.168.2.5
            Apr 25, 2024 22:01:18.851788044 CEST49721443192.168.2.523.1.237.91
            Apr 25, 2024 22:01:46.518383026 CEST49726443192.168.2.5172.217.215.104
            Apr 25, 2024 22:01:46.518419027 CEST44349726172.217.215.104192.168.2.5
            Apr 25, 2024 22:01:46.518515110 CEST49726443192.168.2.5172.217.215.104
            Apr 25, 2024 22:01:46.518763065 CEST49726443192.168.2.5172.217.215.104
            Apr 25, 2024 22:01:46.518771887 CEST44349726172.217.215.104192.168.2.5
            Apr 25, 2024 22:01:46.749027014 CEST44349726172.217.215.104192.168.2.5
            Apr 25, 2024 22:01:46.749577999 CEST49726443192.168.2.5172.217.215.104
            Apr 25, 2024 22:01:46.749603987 CEST44349726172.217.215.104192.168.2.5
            Apr 25, 2024 22:01:46.750063896 CEST44349726172.217.215.104192.168.2.5
            Apr 25, 2024 22:01:46.750732899 CEST49726443192.168.2.5172.217.215.104
            Apr 25, 2024 22:01:46.750802040 CEST44349726172.217.215.104192.168.2.5
            Apr 25, 2024 22:01:46.793584108 CEST49726443192.168.2.5172.217.215.104
            Apr 25, 2024 22:01:56.769349098 CEST44349726172.217.215.104192.168.2.5
            Apr 25, 2024 22:01:56.769452095 CEST44349726172.217.215.104192.168.2.5
            Apr 25, 2024 22:01:56.769509077 CEST49726443192.168.2.5172.217.215.104
            Apr 25, 2024 22:01:57.686456919 CEST49726443192.168.2.5172.217.215.104
            Apr 25, 2024 22:01:57.686490059 CEST44349726172.217.215.104192.168.2.5
            TimestampSource PortDest PortSource IPDest IP
            Apr 25, 2024 22:00:43.428817987 CEST53591241.1.1.1192.168.2.5
            Apr 25, 2024 22:00:43.430608034 CEST53625381.1.1.1192.168.2.5
            Apr 25, 2024 22:00:44.105972052 CEST53624511.1.1.1192.168.2.5
            Apr 25, 2024 22:00:45.395533085 CEST6096653192.168.2.51.1.1.1
            Apr 25, 2024 22:00:45.395792961 CEST5776853192.168.2.51.1.1.1
            Apr 25, 2024 22:00:46.467194080 CEST5704053192.168.2.51.1.1.1
            Apr 25, 2024 22:00:46.467318058 CEST4937953192.168.2.51.1.1.1
            Apr 25, 2024 22:00:46.577568054 CEST53570401.1.1.1192.168.2.5
            Apr 25, 2024 22:00:46.578017950 CEST53493791.1.1.1192.168.2.5
            Apr 25, 2024 22:01:01.094126940 CEST53516161.1.1.1192.168.2.5
            Apr 25, 2024 22:01:20.090056896 CEST53534161.1.1.1192.168.2.5
            Apr 25, 2024 22:01:42.822868109 CEST53552831.1.1.1192.168.2.5
            Apr 25, 2024 22:01:43.631489038 CEST53587861.1.1.1192.168.2.5
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Apr 25, 2024 22:00:45.395533085 CEST192.168.2.51.1.1.10x8a1Standard query (0)www.intel.comA (IP address)IN (0x0001)false
            Apr 25, 2024 22:00:45.395792961 CEST192.168.2.51.1.1.10xff16Standard query (0)www.intel.com65IN (0x0001)false
            Apr 25, 2024 22:00:46.467194080 CEST192.168.2.51.1.1.10xc150Standard query (0)www.google.comA (IP address)IN (0x0001)false
            Apr 25, 2024 22:00:46.467318058 CEST192.168.2.51.1.1.10x3b08Standard query (0)www.google.com65IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Apr 25, 2024 22:00:45.507615089 CEST1.1.1.1192.168.2.50xff16No error (0)www.intel.comintel11.cn.edgekey.netCNAME (Canonical name)IN (0x0001)false
            Apr 25, 2024 22:00:45.507680893 CEST1.1.1.1192.168.2.50x8a1No error (0)www.intel.comintel11.cn.edgekey.netCNAME (Canonical name)IN (0x0001)false
            Apr 25, 2024 22:00:46.577568054 CEST1.1.1.1192.168.2.50xc150No error (0)www.google.com172.217.215.104A (IP address)IN (0x0001)false
            Apr 25, 2024 22:00:46.577568054 CEST1.1.1.1192.168.2.50xc150No error (0)www.google.com172.217.215.105A (IP address)IN (0x0001)false
            Apr 25, 2024 22:00:46.577568054 CEST1.1.1.1192.168.2.50xc150No error (0)www.google.com172.217.215.103A (IP address)IN (0x0001)false
            Apr 25, 2024 22:00:46.577568054 CEST1.1.1.1192.168.2.50xc150No error (0)www.google.com172.217.215.99A (IP address)IN (0x0001)false
            Apr 25, 2024 22:00:46.577568054 CEST1.1.1.1192.168.2.50xc150No error (0)www.google.com172.217.215.106A (IP address)IN (0x0001)false
            Apr 25, 2024 22:00:46.577568054 CEST1.1.1.1192.168.2.50xc150No error (0)www.google.com172.217.215.147A (IP address)IN (0x0001)false
            Apr 25, 2024 22:00:46.578017950 CEST1.1.1.1192.168.2.50x3b08No error (0)www.google.com65IN (0x0001)false
            Apr 25, 2024 22:00:58.958795071 CEST1.1.1.1192.168.2.50xf739No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
            Apr 25, 2024 22:00:58.958795071 CEST1.1.1.1192.168.2.50xf739No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
            Apr 25, 2024 22:00:59.145481110 CEST1.1.1.1192.168.2.50xf547No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
            Apr 25, 2024 22:00:59.145481110 CEST1.1.1.1192.168.2.50xf547No error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
            Apr 25, 2024 22:01:12.167510986 CEST1.1.1.1192.168.2.50x123bNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
            Apr 25, 2024 22:01:12.167510986 CEST1.1.1.1192.168.2.50x123bNo error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
            Apr 25, 2024 22:01:35.202303886 CEST1.1.1.1192.168.2.50xea78No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
            Apr 25, 2024 22:01:35.202303886 CEST1.1.1.1192.168.2.50xea78No error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
            Apr 25, 2024 22:01:55.720757008 CEST1.1.1.1192.168.2.50xac09No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
            Apr 25, 2024 22:01:55.720757008 CEST1.1.1.1192.168.2.50xac09No error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
            • fs.microsoft.com
            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            0192.168.2.54971523.44.104.130443
            TimestampBytes transferredDirectionData
            2024-04-25 20:00:48 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
            Connection: Keep-Alive
            Accept: */*
            Accept-Encoding: identity
            User-Agent: Microsoft BITS/7.8
            Host: fs.microsoft.com
            2024-04-25 20:00:48 UTC467INHTTP/1.1 200 OK
            Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
            Content-Type: application/octet-stream
            ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
            Last-Modified: Tue, 16 May 2017 22:58:00 GMT
            Server: ECAcc (chd/0712)
            X-CID: 11
            X-Ms-ApiVersion: Distribute 1.2
            X-Ms-Region: prod-eus-z1
            Cache-Control: public, max-age=126134
            Date: Thu, 25 Apr 2024 20:00:48 GMT
            Connection: close
            X-CID: 2


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            1192.168.2.54971623.44.104.130443
            TimestampBytes transferredDirectionData
            2024-04-25 20:00:48 UTC239OUTGET /fs/windows/config.json HTTP/1.1
            Connection: Keep-Alive
            Accept: */*
            Accept-Encoding: identity
            If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
            Range: bytes=0-2147483646
            User-Agent: Microsoft BITS/7.8
            Host: fs.microsoft.com
            2024-04-25 20:00:49 UTC531INHTTP/1.1 200 OK
            Content-Type: application/octet-stream
            Last-Modified: Tue, 16 May 2017 22:58:00 GMT
            ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
            ApiVersion: Distribute 1.1
            Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
            X-Azure-Ref: 0rcGnYgAAAAANOnx9vccHTr21ROgX9ESTU0pDRURHRTAzMDkAY2VmYzI1ODMtYTliMi00NGE3LTk3NTUtYjc2ZDE3ZTA1Zjdm
            Cache-Control: public, max-age=126223
            Date: Thu, 25 Apr 2024 20:00:49 GMT
            Content-Length: 55
            Connection: close
            X-CID: 2
            2024-04-25 20:00:49 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
            Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


            Click to jump to process

            Click to jump to process

            Click to jump to process

            Target ID:0
            Start time:22:00:38
            Start date:25/04/2024
            Path:C:\Program Files\Google\Chrome\Application\chrome.exe
            Wow64 process (32bit):false
            Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
            Imagebase:0x7ff715980000
            File size:3'242'272 bytes
            MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:false

            Target ID:2
            Start time:22:00:41
            Start date:25/04/2024
            Path:C:\Program Files\Google\Chrome\Application\chrome.exe
            Wow64 process (32bit):false
            Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 --field-trial-handle=2032,i,5426947174690932885,2057003017959117069,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
            Imagebase:0x7ff715980000
            File size:3'242'272 bytes
            MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:false

            Target ID:3
            Start time:22:00:44
            Start date:25/04/2024
            Path:C:\Program Files\Google\Chrome\Application\chrome.exe
            Wow64 process (32bit):false
            Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.intel.com/content/www/us/en/support/products/99745/memory-and-storage/intel-optane-memory.html"
            Imagebase:0x7ff715980000
            File size:3'242'272 bytes
            MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            No disassembly