Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
http://macVmlSchemaUri

Overview

General Information

Sample URL:http://macVmlSchemaUri
Analysis ID:1432177
Infos:
Errors
  • URL not reachable

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Stores files to the Windows start menu directory
Uses insecure TLS / SSL version for HTTPS connection

Classification

  • System is w10x64
  • chrome.exe (PID: 4668 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 3712 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1868,i,5792780041876249084,1818617043423654441,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 1288 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://macVmlSchemaUri" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49720 version: TLS 1.0
Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.5:49712 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49720 version: TLS 1.0
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=fzYxZtwdnhP7TOz&MD=UCdc7sMT HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.5:49712 version: TLS 1.2
Source: classification engineClassification label: unknown1.win@19/6@4/3
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1868,i,5792780041876249084,1818617043423654441,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://macVmlSchemaUri"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1868,i,5792780041876249084,1818617043423654441,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Google Drive.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1432177 URL: http://macVmlSchemaUri Startdate: 26/04/2024 Architecture: WINDOWS Score: 1 5 chrome.exe 8 2->5         started        8 chrome.exe 2->8         started        dnsIp3 13 192.168.2.5, 137, 443, 49703 unknown unknown 5->13 15 239.255.255.250 unknown Reserved 5->15 10 chrome.exe 5->10         started        process4 dnsIp5 17 www.google.com 142.250.217.164, 443, 49705 GOOGLEUS United States 10->17 19 google.com 10->19

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
http://macVmlSchemaUri0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
google.com
142.250.217.238
truefalse
    high
    www.google.com
    142.250.217.164
    truefalse
      high
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      142.250.217.164
      www.google.comUnited States
      15169GOOGLEUSfalse
      239.255.255.250
      unknownReserved
      unknownunknownfalse
      IP
      192.168.2.5
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1432177
      Start date and time:2024-04-26 16:31:41 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 2m 30s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:browseurl.jbs
      Sample URL:http://macVmlSchemaUri
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:6
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:UNKNOWN
      Classification:unknown1.win@19/6@4/3
      EGA Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • URL browsing timeout or error
      • URL not reachable
      • Exclude process from analysis (whitelisted): WMIADAP.exe, SIHClient.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 142.250.64.195, 142.250.217.238, 172.253.123.84, 23.45.182.107, 34.104.35.123, 192.229.211.108, 20.242.39.171, 23.204.76.112, 52.165.164.15
      • Excluded domains from analysis (whitelisted): fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, clientservices.googleapis.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, clients2.google.com, ocsp.digicert.com, edgedl.me.gvt1.com, e16604.g.akamaiedge.net, glb.cws.prod.dcat.dsp.trafficmanager.net, clients.l.google.com, prod.fs.microsoft.com.akadns.net
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtSetInformationFile calls found.
      No simulations
      No context
      No context
      No context
      No context
      No context
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 13:33:00 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
      Category:dropped
      Size (bytes):2677
      Entropy (8bit):3.9745368206911125
      Encrypted:false
      SSDEEP:48:8Id0T+L8MH2idAKZdA19ehwiZUklqehey+3:8HPlty
      MD5:6D0B7D6C7EECD180D691C28BA82ED0C1
      SHA1:374D81638574EF6D9B77B823103B5E66187EFA19
      SHA-256:410753650A8E85BD570A5EDF3D5C81B7EE539452D3B1DE48600C53277149E302
      SHA-512:5BCDB6218C950B9F91A3E473CD0505430C4880760758847CA312995615CA74B31914E92D523C0A5F4E20A41BB4292DE4AB8DC01D3EC7F66D6DED0D9078379DC6
      Malicious:false
      Reputation:low
      Preview:L..................F.@.. ...$+.,....A......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X.t....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.t....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.t....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.t..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X!t...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........U.5n.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 13:33:00 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
      Category:dropped
      Size (bytes):2679
      Entropy (8bit):3.9904333358620754
      Encrypted:false
      SSDEEP:48:8fgd0T+L8MH2idAKZdA1weh/iZUkAQkqehdy+2:83P/9Q0y
      MD5:CF583D9982FFBC8195CDFEBC1BD8015F
      SHA1:284FFD21218001A58F4EB8C0F07F2516F8B55E24
      SHA-256:5169B46A1F9BFB9459E1A5574AEC49FB54B7C73F83CE13C885C10CD622099606
      SHA-512:06F43F7016DF9813C091AC053292247639EEE05B4D79CA996E9F388C721EFCEFD39CDA33C5EFE2008246241D7EDBDDFB6D85EC597C356977AE5EBD03E67D7EE0
      Malicious:false
      Reputation:low
      Preview:L..................F.@.. ...$+.,.....l.....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X.t....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.t....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.t....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.t..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X!t...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........U.5n.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
      Category:dropped
      Size (bytes):2693
      Entropy (8bit):3.9988227105601664
      Encrypted:false
      SSDEEP:48:8xtd0T+L8sH2idAKZdA14tseh7sFiZUkmgqeh7s7y+BX:8xUP/nRy
      MD5:931863DE655408DF8F548888CAA74E07
      SHA1:C7A293E2D661ABC98805A2F61A1AF5ACF854CBA6
      SHA-256:3A95217AE222CB13ECB4E3B1E363AAFB4EA2CCD8B9369F36D6FAB9100519C338
      SHA-512:CB44F1C0D7092773C3D733652E04285DABDEADB9B9F488BE37A4AEB9C81FBC62E929E41198D907C83059002DAAA75531FA51D6F748FD2DE64C2D12294750DF8A
      Malicious:false
      Reputation:low
      Preview:L..................F.@.. ...$+.,......e>....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X.t....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.t....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.t....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.t..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VDW.n...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........U.5n.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 13:33:00 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
      Category:dropped
      Size (bytes):2681
      Entropy (8bit):3.990175702438507
      Encrypted:false
      SSDEEP:48:8hd0T+L8MH2idAKZdA1vehDiZUkwqehZy+R:8AP8jy
      MD5:91A0B99F1FF6B38BFEB8A2C4FCAEE7EA
      SHA1:9E7F8391D7A885920D07E952BA366C68690F5EA6
      SHA-256:6D114662639CE9ACA4BC18F3EA604EA5F10FDFB8F976124BBE924329731D024F
      SHA-512:54D1608176EAEA988D9DA420D013ED111931B2DA078016E41E7ED0A9D35B198C7F6EECD8C709146CE681219F82404A147043102821663879E381E6250CB1652C
      Malicious:false
      Reputation:low
      Preview:L..................F.@.. ...$+.,......w....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X.t....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.t....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.t....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.t..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X!t...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........U.5n.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 13:33:00 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
      Category:dropped
      Size (bytes):2681
      Entropy (8bit):3.9799755386345126
      Encrypted:false
      SSDEEP:48:8ahd0T+L8MH2idAKZdA1hehBiZUk1W1qeh/y+C:8NPM9fy
      MD5:1B869B0FAF246B120E71259D6BDD138B
      SHA1:B8202E744755D7612836F2FF39517FC3D7F60686
      SHA-256:8D3FA9DA12B674C83EDE455AB210B896649E12A6FFE3503F3DC5F10C7B361473
      SHA-512:36C017A23475CB5D4B8F4A7A68A0A0D6CCD6FBA8C9C2DE7AEDA94CF16EAB07249DE87DFEDF09F4603FBB982AE56917FD021BD8910DFD86C5B256D58B5573A96D
      Malicious:false
      Reputation:low
      Preview:L..................F.@.. ...$+.,...........N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X.t....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.t....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.t....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.t..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X!t...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........U.5n.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 13:33:00 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
      Category:dropped
      Size (bytes):2683
      Entropy (8bit):3.986476862677518
      Encrypted:false
      SSDEEP:48:8Id0T+L8MH2idAKZdA1duT+ehOuTbbiZUk5OjqehOuTbRy+yT+:8HPiT/TbxWOvTbRy7T
      MD5:FB91C0575C153195AC2B62C6707A1D26
      SHA1:09A52A636D9130034AC7134A96D0799F0A516A4B
      SHA-256:748278DBB4C1FB84D443AB847C358313456F20B30C0921D31D77FA98D21B32AE
      SHA-512:CA95CD0EA36350A4AE3D709E2C48A2F12617481A011EBAB9DEC82148320C7EDC0C7E214427116DD97355D6489E3F637D8D99FE53CBE1A9E3E4A926FE2610E536
      Malicious:false
      Reputation:low
      Preview:L..................F.@.. ...$+.,....k.m....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X.t....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.t....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.t....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.t..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X!t...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........U.5n.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
      No static file info
      TimestampSource PortDest PortSource IPDest IP
      Apr 26, 2024 16:32:36.744180918 CEST49674443192.168.2.523.1.237.91
      Apr 26, 2024 16:32:36.744184971 CEST49675443192.168.2.523.1.237.91
      Apr 26, 2024 16:32:36.869173050 CEST49673443192.168.2.523.1.237.91
      Apr 26, 2024 16:32:46.353552103 CEST49674443192.168.2.523.1.237.91
      Apr 26, 2024 16:32:46.354099989 CEST49675443192.168.2.523.1.237.91
      Apr 26, 2024 16:32:46.478578091 CEST49673443192.168.2.523.1.237.91
      Apr 26, 2024 16:32:48.689999104 CEST4434970323.1.237.91192.168.2.5
      Apr 26, 2024 16:32:48.690099955 CEST49703443192.168.2.523.1.237.91
      Apr 26, 2024 16:32:57.894959927 CEST49705443192.168.2.5142.250.217.164
      Apr 26, 2024 16:32:57.894998074 CEST44349705142.250.217.164192.168.2.5
      Apr 26, 2024 16:32:57.895059109 CEST49705443192.168.2.5142.250.217.164
      Apr 26, 2024 16:32:57.900239944 CEST49705443192.168.2.5142.250.217.164
      Apr 26, 2024 16:32:57.900254965 CEST44349705142.250.217.164192.168.2.5
      Apr 26, 2024 16:32:58.306405067 CEST44349705142.250.217.164192.168.2.5
      Apr 26, 2024 16:32:58.306699991 CEST49705443192.168.2.5142.250.217.164
      Apr 26, 2024 16:32:58.306725979 CEST44349705142.250.217.164192.168.2.5
      Apr 26, 2024 16:32:58.307975054 CEST44349705142.250.217.164192.168.2.5
      Apr 26, 2024 16:32:58.308028936 CEST49705443192.168.2.5142.250.217.164
      Apr 26, 2024 16:32:58.309043884 CEST49705443192.168.2.5142.250.217.164
      Apr 26, 2024 16:32:58.309111118 CEST44349705142.250.217.164192.168.2.5
      Apr 26, 2024 16:32:58.441780090 CEST49705443192.168.2.5142.250.217.164
      Apr 26, 2024 16:32:58.441785097 CEST44349705142.250.217.164192.168.2.5
      Apr 26, 2024 16:32:58.485441923 CEST49712443192.168.2.513.85.23.86
      Apr 26, 2024 16:32:58.485480070 CEST4434971213.85.23.86192.168.2.5
      Apr 26, 2024 16:32:58.485719919 CEST49712443192.168.2.513.85.23.86
      Apr 26, 2024 16:32:58.488255978 CEST49712443192.168.2.513.85.23.86
      Apr 26, 2024 16:32:58.488269091 CEST4434971213.85.23.86192.168.2.5
      Apr 26, 2024 16:32:58.640223980 CEST49705443192.168.2.5142.250.217.164
      Apr 26, 2024 16:32:58.977904081 CEST4434971213.85.23.86192.168.2.5
      Apr 26, 2024 16:32:58.978065968 CEST49712443192.168.2.513.85.23.86
      Apr 26, 2024 16:33:00.226949930 CEST49712443192.168.2.513.85.23.86
      Apr 26, 2024 16:33:00.226980925 CEST4434971213.85.23.86192.168.2.5
      Apr 26, 2024 16:33:00.227463961 CEST4434971213.85.23.86192.168.2.5
      Apr 26, 2024 16:33:00.332514048 CEST49712443192.168.2.513.85.23.86
      Apr 26, 2024 16:33:01.126734972 CEST49712443192.168.2.513.85.23.86
      Apr 26, 2024 16:33:01.168127060 CEST4434971213.85.23.86192.168.2.5
      Apr 26, 2024 16:33:01.444189072 CEST4434971213.85.23.86192.168.2.5
      Apr 26, 2024 16:33:01.444226980 CEST4434971213.85.23.86192.168.2.5
      Apr 26, 2024 16:33:01.444240093 CEST4434971213.85.23.86192.168.2.5
      Apr 26, 2024 16:33:01.444293022 CEST49712443192.168.2.513.85.23.86
      Apr 26, 2024 16:33:01.444305897 CEST4434971213.85.23.86192.168.2.5
      Apr 26, 2024 16:33:01.444319010 CEST4434971213.85.23.86192.168.2.5
      Apr 26, 2024 16:33:01.444328070 CEST4434971213.85.23.86192.168.2.5
      Apr 26, 2024 16:33:01.444348097 CEST4434971213.85.23.86192.168.2.5
      Apr 26, 2024 16:33:01.444366932 CEST49712443192.168.2.513.85.23.86
      Apr 26, 2024 16:33:01.444366932 CEST49712443192.168.2.513.85.23.86
      Apr 26, 2024 16:33:01.444387913 CEST49712443192.168.2.513.85.23.86
      Apr 26, 2024 16:33:01.444412947 CEST49712443192.168.2.513.85.23.86
      Apr 26, 2024 16:33:01.444828987 CEST4434971213.85.23.86192.168.2.5
      Apr 26, 2024 16:33:01.444900990 CEST49712443192.168.2.513.85.23.86
      Apr 26, 2024 16:33:01.444906950 CEST4434971213.85.23.86192.168.2.5
      Apr 26, 2024 16:33:01.444922924 CEST4434971213.85.23.86192.168.2.5
      Apr 26, 2024 16:33:01.444973946 CEST49712443192.168.2.513.85.23.86
      Apr 26, 2024 16:33:01.776748896 CEST49712443192.168.2.513.85.23.86
      Apr 26, 2024 16:33:01.776778936 CEST4434971213.85.23.86192.168.2.5
      Apr 26, 2024 16:33:01.776819944 CEST49712443192.168.2.513.85.23.86
      Apr 26, 2024 16:33:01.776828051 CEST4434971213.85.23.86192.168.2.5
      Apr 26, 2024 16:33:01.890049934 CEST49703443192.168.2.523.1.237.91
      Apr 26, 2024 16:33:01.890358925 CEST49703443192.168.2.523.1.237.91
      Apr 26, 2024 16:33:01.890799046 CEST49720443192.168.2.523.1.237.91
      Apr 26, 2024 16:33:01.890831947 CEST4434972023.1.237.91192.168.2.5
      Apr 26, 2024 16:33:01.891324997 CEST49720443192.168.2.523.1.237.91
      Apr 26, 2024 16:33:01.893115044 CEST49720443192.168.2.523.1.237.91
      Apr 26, 2024 16:33:01.893127918 CEST4434972023.1.237.91192.168.2.5
      Apr 26, 2024 16:33:02.120095968 CEST4434970323.1.237.91192.168.2.5
      Apr 26, 2024 16:33:02.120273113 CEST4434970323.1.237.91192.168.2.5
      Apr 26, 2024 16:33:02.363743067 CEST4434972023.1.237.91192.168.2.5
      Apr 26, 2024 16:33:02.363826990 CEST49720443192.168.2.523.1.237.91
      Apr 26, 2024 16:33:08.284569979 CEST44349705142.250.217.164192.168.2.5
      Apr 26, 2024 16:33:08.284631014 CEST44349705142.250.217.164192.168.2.5
      Apr 26, 2024 16:33:08.284737110 CEST49705443192.168.2.5142.250.217.164
      Apr 26, 2024 16:33:08.587852001 CEST49705443192.168.2.5142.250.217.164
      Apr 26, 2024 16:33:08.587873936 CEST44349705142.250.217.164192.168.2.5
      Apr 26, 2024 16:33:21.610914946 CEST4434972023.1.237.91192.168.2.5
      Apr 26, 2024 16:33:21.610976934 CEST49720443192.168.2.523.1.237.91
      TimestampSource PortDest PortSource IPDest IP
      Apr 26, 2024 16:32:57.356848955 CEST5869053192.168.2.51.1.1.1
      Apr 26, 2024 16:32:57.357076883 CEST5909653192.168.2.51.1.1.1
      Apr 26, 2024 16:32:57.454087019 CEST53584971.1.1.1192.168.2.5
      Apr 26, 2024 16:32:57.481990099 CEST53586901.1.1.1192.168.2.5
      Apr 26, 2024 16:32:57.482729912 CEST53590961.1.1.1192.168.2.5
      Apr 26, 2024 16:32:57.703362942 CEST53529021.1.1.1192.168.2.5
      Apr 26, 2024 16:32:58.754287004 CEST53535281.1.1.1192.168.2.5
      Apr 26, 2024 16:33:00.620033979 CEST137137192.168.2.5192.168.2.255
      Apr 26, 2024 16:33:01.379005909 CEST137137192.168.2.5192.168.2.255
      Apr 26, 2024 16:33:02.130743027 CEST137137192.168.2.5192.168.2.255
      Apr 26, 2024 16:33:04.629256010 CEST5589653192.168.2.58.8.8.8
      Apr 26, 2024 16:33:04.655147076 CEST5456853192.168.2.51.1.1.1
      Apr 26, 2024 16:33:04.780560017 CEST53545681.1.1.1192.168.2.5
      Apr 26, 2024 16:33:04.786845922 CEST53558968.8.8.8192.168.2.5
      Apr 26, 2024 16:33:05.864007950 CEST137137192.168.2.5192.168.2.255
      Apr 26, 2024 16:33:06.620543003 CEST137137192.168.2.5192.168.2.255
      Apr 26, 2024 16:33:07.370990038 CEST137137192.168.2.5192.168.2.255
      Apr 26, 2024 16:33:13.402899027 CEST137137192.168.2.5192.168.2.255
      Apr 26, 2024 16:33:14.160470963 CEST137137192.168.2.5192.168.2.255
      Apr 26, 2024 16:33:14.918121099 CEST137137192.168.2.5192.168.2.255
      Apr 26, 2024 16:33:18.509694099 CEST53654881.1.1.1192.168.2.5
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Apr 26, 2024 16:32:57.356848955 CEST192.168.2.51.1.1.10x7c0aStandard query (0)www.google.comA (IP address)IN (0x0001)false
      Apr 26, 2024 16:32:57.357076883 CEST192.168.2.51.1.1.10x6f44Standard query (0)www.google.com65IN (0x0001)false
      Apr 26, 2024 16:33:04.629256010 CEST192.168.2.58.8.8.80x80e8Standard query (0)google.comA (IP address)IN (0x0001)false
      Apr 26, 2024 16:33:04.655147076 CEST192.168.2.51.1.1.10x8fb2Standard query (0)google.comA (IP address)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Apr 26, 2024 16:32:57.481990099 CEST1.1.1.1192.168.2.50x7c0aNo error (0)www.google.com142.250.217.164A (IP address)IN (0x0001)false
      Apr 26, 2024 16:32:57.482729912 CEST1.1.1.1192.168.2.50x6f44No error (0)www.google.com65IN (0x0001)false
      Apr 26, 2024 16:33:04.780560017 CEST1.1.1.1192.168.2.50x8fb2No error (0)google.com142.250.217.238A (IP address)IN (0x0001)false
      Apr 26, 2024 16:33:04.786845922 CEST8.8.8.8192.168.2.50x80e8No error (0)google.com142.250.113.101A (IP address)IN (0x0001)false
      Apr 26, 2024 16:33:04.786845922 CEST8.8.8.8192.168.2.50x80e8No error (0)google.com142.250.113.139A (IP address)IN (0x0001)false
      Apr 26, 2024 16:33:04.786845922 CEST8.8.8.8192.168.2.50x80e8No error (0)google.com142.250.113.113A (IP address)IN (0x0001)false
      Apr 26, 2024 16:33:04.786845922 CEST8.8.8.8192.168.2.50x80e8No error (0)google.com142.250.113.100A (IP address)IN (0x0001)false
      Apr 26, 2024 16:33:04.786845922 CEST8.8.8.8192.168.2.50x80e8No error (0)google.com142.250.113.102A (IP address)IN (0x0001)false
      Apr 26, 2024 16:33:04.786845922 CEST8.8.8.8192.168.2.50x80e8No error (0)google.com142.250.113.138A (IP address)IN (0x0001)false
      • slscr.update.microsoft.com
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.54971213.85.23.86443
      TimestampBytes transferredDirectionData
      2024-04-26 14:33:01 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=fzYxZtwdnhP7TOz&MD=UCdc7sMT HTTP/1.1
      Connection: Keep-Alive
      Accept: */*
      User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
      Host: slscr.update.microsoft.com
      2024-04-26 14:33:01 UTC560INHTTP/1.1 200 OK
      Cache-Control: no-cache
      Pragma: no-cache
      Content-Type: application/octet-stream
      Expires: -1
      Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
      ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
      MS-CorrelationId: 577c98cb-af98-46da-b300-dabdb61b3ae9
      MS-RequestId: 1899fdd9-a37d-4d4e-a666-6a7ef980ffa9
      MS-CV: EB+8R+HefkefUAXI.0
      X-Microsoft-SLSClientCache: 2880
      Content-Disposition: attachment; filename=environment.cab
      X-Content-Type-Options: nosniff
      Date: Fri, 26 Apr 2024 14:33:00 GMT
      Connection: close
      Content-Length: 24490
      2024-04-26 14:33:01 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
      Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
      2024-04-26 14:33:01 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
      Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


      Click to jump to process

      Click to jump to process

      Click to jump to process

      Target ID:0
      Start time:16:32:37
      Start date:26/04/2024
      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
      Imagebase:0x7ff715980000
      File size:3'242'272 bytes
      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:2
      Start time:16:32:46
      Start date:26/04/2024
      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1868,i,5792780041876249084,1818617043423654441,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
      Imagebase:0x7ff715980000
      File size:3'242'272 bytes
      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:4
      Start time:16:32:59
      Start date:26/04/2024
      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://macVmlSchemaUri"
      Imagebase:0x7ff715980000
      File size:3'242'272 bytes
      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      No disassembly