Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://www.provincialnetcash.com/SVEKYOP/kyop_mult_web_pub/index.html#

Overview

General Information

Sample URL:https://www.provincialnetcash.com/SVEKYOP/kyop_mult_web_pub/index.html#
Analysis ID:1437898
Infos:

Detection

Score:21
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Multimodal LLM detected phishing page
HTML body contains low number of good links
HTML title does not match URL

Classification

  • System is w7x64
  • chrome.exe (PID: 2168 cmdline: "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: FFA2B8E17F645BCC20F0E0201FEF83ED)
    • chrome.exe (PID: 1052 cmdline: "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1476 --field-trial-handle=1256,i,4293504143906383849,8966591030562114885,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: FFA2B8E17F645BCC20F0E0201FEF83ED)
  • chrome.exe (PID: 2728 cmdline: "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" "https://www.provincialnetcash.com/SVEKYOP/kyop_mult_web_pub/index.html#" MD5: FFA2B8E17F645BCC20F0E0201FEF83ED)
    • chrome.exe (PID: 3148 cmdline: "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1444 --field-trial-handle=1244,i,10506233396208386409,2587740212930642001,131072 /prefetch:8 MD5: FFA2B8E17F645BCC20F0E0201FEF83ED)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: https://www.provincialnetcash.com/SVEKYOP/kyop_mult_web_pub/index.html#LLM: Score: 8 brands: IBM Reasons: The URL 'https://www.provincialnetcash.com/SVEKYOP/kyop_mult_web_pub/index.html#' does not match the expected domain for IBM, which typically uses 'ibm.com'. The presence of a login form on a suspicious domain increases the likelihood of a phishing attempt. The site uses the IBM brand name and styling to appear legitimate, which is a common social engineering technique.
Source: https://www.provincialnetcash.com/SVEKYOP/kyop_mult_web_pub/index.html#HTTP Parser: Number of links: 0
Source: https://www.provincialnetcash.com/SVEKYOP/kyop_mult_web_pub/index.html#HTTP Parser: Title: IBM Security Access Manager does not match URL
Source: https://www.provincialnetcash.com/SVEKYOP/kyop_mult_web_pub/index.html#HTTP Parser: <input type="password" .../> found
Source: https://www.provincialnetcash.com/SVEKYOP/kyop_mult_web_pub/index.html#HTTP Parser: No favicon
Source: https://www.provincialnetcash.com/SVEKYOP/kyop_mult_web_pub/index.html#HTTP Parser: No favicon
Source: https://www.provincialnetcash.com/SVEKYOP/kyop_mult_web_pub/index.html#HTTP Parser: No <meta name="author".. found
Source: https://www.provincialnetcash.com/SVEKYOP/kyop_mult_web_pub/index.html#HTTP Parser: No <meta name="author".. found
Source: https://www.provincialnetcash.com/SVEKYOP/kyop_mult_web_pub/index.html#HTTP Parser: No <meta name="copyright".. found
Source: https://www.provincialnetcash.com/SVEKYOP/kyop_mult_web_pub/index.html#HTTP Parser: No <meta name="copyright".. found
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\GoogleJump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\GoogleUpdaterJump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\chrome_BITS_2168_1968616028Jump to behavior
Source: global trafficDNS traffic detected: DNS query: www.provincialnetcash.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49168
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49174
Source: unknownNetwork traffic detected: HTTP traffic on port 49168 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49174 -> 443
Source: classification engineClassification label: sus21.phis.win@21/5@6/2
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exeFile created: C:\Program Files\GoogleJump to behavior
Source: unknownProcess created: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1476 --field-trial-handle=1256,i,4293504143906383849,8966591030562114885,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" "https://www.provincialnetcash.com/SVEKYOP/kyop_mult_web_pub/index.html#"
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1444 --field-trial-handle=1244,i,10506233396208386409,2587740212930642001,131072 /prefetch:8
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1476 --field-trial-handle=1256,i,4293504143906383849,8966591030562114885,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1444 --field-trial-handle=1244,i,10506233396208386409,2587740212930642001,131072 /prefetch:8Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\GoogleJump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\GoogleUpdaterJump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\chrome_BITS_2168_1968616028Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath Interception1
Process Injection
2
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1437898 URL: https://www.provincialnetca... Startdate: 08/05/2024 Architecture: WINDOWS Score: 21 22 Multimodal LLM detected phishing page 2->22 6 chrome.exe 4 2->6         started        9 chrome.exe 2->9         started        process3 dnsIp4 16 239.255.255.250 unknown Reserved 6->16 11 chrome.exe 6->11         started        14 chrome.exe 9->14         started        process5 dnsIp6 18 www.google.com 142.250.191.36, 443, 49168, 49174 GOOGLEUS United States 11->18 20 www.provincialnetcash.com 11->20

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://www.provincialnetcash.com/SVEKYOP/kyop_mult_web_pub/index.html#0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
www.google.com
142.250.191.36
truefalse
    high
    www.provincialnetcash.com
    unknown
    unknownfalse
      high
      NameMaliciousAntivirus DetectionReputation
      https://www.provincialnetcash.com/SVEKYOP/kyop_mult_web_pub/index.html#false
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        239.255.255.250
        unknownReserved
        unknownunknownfalse
        142.250.191.36
        www.google.comUnited States
        15169GOOGLEUSfalse
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1437898
        Start date and time:2024-05-08 01:30:48 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 3m 58s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:browseurl.jbs
        Sample URL:https://www.provincialnetcash.com/SVEKYOP/kyop_mult_web_pub/index.html#
        Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
        Number of analysed new started processes analysed:4
        Number of new started drivers analysed:4
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:SUS
        Classification:sus21.phis.win@21/5@6/2
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        • Exclude process from analysis (whitelisted): vga.dll
        • Excluded IPs from analysis (whitelisted): 142.251.46.195, 172.217.12.110, 74.125.142.84, 34.104.35.123, 184.26.150.52, 142.250.191.42, 142.250.191.74, 142.251.46.170, 142.251.46.202, 172.217.164.106, 142.250.189.170, 142.250.189.202, 142.251.32.42, 142.251.46.234, 142.251.214.138, 172.217.12.106, 142.250.188.10, 142.250.189.234, 142.251.32.35
        • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, edgedl.me.gvt1.com, e17723.a.akamaiedge.net, content-autofill.googleapis.com, www.provincialnetcash.com.edgekey.net, update.googleapis.com, clientservices.googleapis.com, clients.l.google.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtSetInformationFile calls found.
        • VT rate limit hit for: https://www.provincialnetcash.com/SVEKYOP/kyop_mult_web_pub/index.html#
        No simulations
        InputOutput
        URL: https://www.provincialnetcash.com/SVEKYOP/kyop_mult_web_pub/index.html#
        ```json{  "phishing_score": 8,  "brands": "IBM",  "phishing": true,  "suspicious_domain": true,  "has_loginform": true,  "has_captcha": false,  "setechniques": true,  "blank": false,  "reasons": "The URL 'https://www.provincialnetcash.com/SVEKYOP/kyop_mult_web_pub/index.html#' does not match the expected domain for IBM, which typically uses 'ibm.com'. The presence of a login form on a suspicious domain increases the likelihood of a phishing attempt. The site uses the IBM brand name and styling to appear legitimate, which is a common social engineering technique."}
        No context
        No context
        No context
        No context
        No context
        Process:C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with no line terminators
        Category:downloaded
        Size (bytes):28
        Entropy (8bit):4.066108939837481
        Encrypted:false
        SSDEEP:3:GMyoSt:jFSt
        MD5:96B191AE794C2C78387B3F4F9BB7A251
        SHA1:F974547DF0ADFFB7E80699552C6BCE3E709343A6
        SHA-256:CE76758AEEF2CAF12021AFB5257D0CA4E9E5C20015C2C85D68BB27FA6B1AFB28
        SHA-512:07EE1CFDBD53C1046FA4F44FF7C83F4456CDAA099299816B451D114E3EEAAD4BE8F0CD0FC09F0E838418BCBB5E50547E806E8E080B8E3421D0DB26FF4C15D412
        Malicious:false
        Reputation:low
        URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTA5LjAuNTQxNC4xMjASFwlgSEX-rDKUBxIFDeeNQA4SBQ3OQUx6?alt=proto
        Preview:ChIKBw3njUAOGgAKBw3OQUx6GgA=
        Process:C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
        File Type:MS Windows icon resource - 1 icon, 16x16, 16 colors
        Category:downloaded
        Size (bytes):318
        Entropy (8bit):0.8954609074739015
        Encrypted:false
        SSDEEP:3:PFErXllvlNl/AXll1//tn/55555555555555R:kyt/55555555555555R
        MD5:48EF31D7B8CB961FD55261CE750BD6A8
        SHA1:C0D46D8A20B4FA14530F92C9587D303AC6F94347
        SHA-256:8A9FEA80F249B97C4075C4A2CD73FBCB005367375C41D8C4075806CB86EC9A72
        SHA-512:8352BB4693CDCB3BA47E4C918D414A3A56B7C54D9F4334E167F795E516273A05ACB58108C3EFE0D56EF42B1A05571C4B74B78337FA7F2216752F8A715DE62DC5
        Malicious:false
        Reputation:low
        URL:https://www.provincialnetcash.com/favicon.ico
        Preview:..............(.......(....... ................................3..............................................................................................................................................................................................................................................................
        Process:C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
        File Type:MS Windows icon resource - 1 icon, 16x16, 16 colors
        Category:dropped
        Size (bytes):318
        Entropy (8bit):0.8954609074739015
        Encrypted:false
        SSDEEP:3:PFErXllvlNl/AXll1//tn/55555555555555R:kyt/55555555555555R
        MD5:48EF31D7B8CB961FD55261CE750BD6A8
        SHA1:C0D46D8A20B4FA14530F92C9587D303AC6F94347
        SHA-256:8A9FEA80F249B97C4075C4A2CD73FBCB005367375C41D8C4075806CB86EC9A72
        SHA-512:8352BB4693CDCB3BA47E4C918D414A3A56B7C54D9F4334E167F795E516273A05ACB58108C3EFE0D56EF42B1A05571C4B74B78337FA7F2216752F8A715DE62DC5
        Malicious:false
        Reputation:low
        Preview:..............(.......(....... ................................3..............................................................................................................................................................................................................................................................
        No static file info
        TimestampSource PortDest PortSource IPDest IP
        May 8, 2024 01:31:41.640369892 CEST49168443192.168.2.22142.250.191.36
        May 8, 2024 01:31:41.640402079 CEST44349168142.250.191.36192.168.2.22
        May 8, 2024 01:31:41.640508890 CEST49168443192.168.2.22142.250.191.36
        May 8, 2024 01:31:41.670569897 CEST49168443192.168.2.22142.250.191.36
        May 8, 2024 01:31:41.670594931 CEST44349168142.250.191.36192.168.2.22
        May 8, 2024 01:31:42.059153080 CEST44349168142.250.191.36192.168.2.22
        May 8, 2024 01:31:42.151392937 CEST49168443192.168.2.22142.250.191.36
        May 8, 2024 01:31:42.151407957 CEST44349168142.250.191.36192.168.2.22
        May 8, 2024 01:31:42.152851105 CEST44349168142.250.191.36192.168.2.22
        May 8, 2024 01:31:42.152864933 CEST44349168142.250.191.36192.168.2.22
        May 8, 2024 01:31:42.152906895 CEST49168443192.168.2.22142.250.191.36
        May 8, 2024 01:31:43.225658894 CEST49168443192.168.2.22142.250.191.36
        May 8, 2024 01:31:43.225857973 CEST44349168142.250.191.36192.168.2.22
        May 8, 2024 01:31:43.444123983 CEST44349168142.250.191.36192.168.2.22
        May 8, 2024 01:31:43.444200993 CEST49168443192.168.2.22142.250.191.36
        May 8, 2024 01:31:52.066565990 CEST44349168142.250.191.36192.168.2.22
        May 8, 2024 01:31:52.066636086 CEST44349168142.250.191.36192.168.2.22
        May 8, 2024 01:31:52.066692114 CEST49168443192.168.2.22142.250.191.36
        May 8, 2024 01:31:52.124160051 CEST49168443192.168.2.22142.250.191.36
        May 8, 2024 01:31:52.124190092 CEST44349168142.250.191.36192.168.2.22
        May 8, 2024 01:32:41.536695004 CEST49174443192.168.2.22142.250.191.36
        May 8, 2024 01:32:41.536725998 CEST44349174142.250.191.36192.168.2.22
        May 8, 2024 01:32:41.536823988 CEST49174443192.168.2.22142.250.191.36
        May 8, 2024 01:32:41.537003040 CEST49174443192.168.2.22142.250.191.36
        May 8, 2024 01:32:41.537017107 CEST44349174142.250.191.36192.168.2.22
        May 8, 2024 01:32:41.918709040 CEST44349174142.250.191.36192.168.2.22
        May 8, 2024 01:32:41.919013023 CEST49174443192.168.2.22142.250.191.36
        May 8, 2024 01:32:41.919034004 CEST44349174142.250.191.36192.168.2.22
        May 8, 2024 01:32:41.919368029 CEST44349174142.250.191.36192.168.2.22
        May 8, 2024 01:32:41.919873953 CEST49174443192.168.2.22142.250.191.36
        May 8, 2024 01:32:41.919938087 CEST44349174142.250.191.36192.168.2.22
        May 8, 2024 01:32:42.124121904 CEST44349174142.250.191.36192.168.2.22
        May 8, 2024 01:32:42.124176025 CEST49174443192.168.2.22142.250.191.36
        May 8, 2024 01:32:51.962086916 CEST44349174142.250.191.36192.168.2.22
        May 8, 2024 01:32:51.962162018 CEST44349174142.250.191.36192.168.2.22
        May 8, 2024 01:32:51.962213993 CEST49174443192.168.2.22142.250.191.36
        May 8, 2024 01:32:52.120805025 CEST49174443192.168.2.22142.250.191.36
        May 8, 2024 01:32:52.120837927 CEST44349174142.250.191.36192.168.2.22
        TimestampSource PortDest PortSource IPDest IP
        May 8, 2024 01:31:37.184017897 CEST53548218.8.8.8192.168.2.22
        May 8, 2024 01:31:37.320839882 CEST53527818.8.8.8192.168.2.22
        May 8, 2024 01:31:38.521661043 CEST53626728.8.8.8192.168.2.22
        May 8, 2024 01:31:40.318558931 CEST5484253192.168.2.228.8.8.8
        May 8, 2024 01:31:40.318627119 CEST5810553192.168.2.228.8.8.8
        May 8, 2024 01:31:41.464040041 CEST5809553192.168.2.228.8.8.8
        May 8, 2024 01:31:41.464188099 CEST5426153192.168.2.228.8.8.8
        May 8, 2024 01:31:41.628758907 CEST53542618.8.8.8192.168.2.22
        May 8, 2024 01:31:41.636459112 CEST53580958.8.8.8192.168.2.22
        May 8, 2024 01:31:44.458468914 CEST53496088.8.8.8192.168.2.22
        May 8, 2024 01:31:46.045304060 CEST6245353192.168.2.228.8.8.8
        May 8, 2024 01:31:46.045479059 CEST5056853192.168.2.228.8.8.8
        May 8, 2024 01:31:56.290610075 CEST53634698.8.8.8192.168.2.22
        May 8, 2024 01:32:03.147150040 CEST53650098.8.8.8192.168.2.22
        May 8, 2024 01:32:14.168919086 CEST53589718.8.8.8192.168.2.22
        May 8, 2024 01:32:32.279530048 CEST53615988.8.8.8192.168.2.22
        May 8, 2024 01:32:37.073079109 CEST53549508.8.8.8192.168.2.22
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        May 8, 2024 01:31:40.318558931 CEST192.168.2.228.8.8.80xfea2Standard query (0)www.provincialnetcash.comA (IP address)IN (0x0001)false
        May 8, 2024 01:31:40.318627119 CEST192.168.2.228.8.8.80x39faStandard query (0)www.provincialnetcash.com65IN (0x0001)false
        May 8, 2024 01:31:41.464040041 CEST192.168.2.228.8.8.80x85b8Standard query (0)www.google.comA (IP address)IN (0x0001)false
        May 8, 2024 01:31:41.464188099 CEST192.168.2.228.8.8.80xbaf1Standard query (0)www.google.com65IN (0x0001)false
        May 8, 2024 01:31:46.045304060 CEST192.168.2.228.8.8.80xf1d4Standard query (0)www.provincialnetcash.comA (IP address)IN (0x0001)false
        May 8, 2024 01:31:46.045479059 CEST192.168.2.228.8.8.80x8c4aStandard query (0)www.provincialnetcash.com65IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        May 8, 2024 01:31:40.530556917 CEST8.8.8.8192.168.2.220xfea2No error (0)www.provincialnetcash.comwww.provincialnetcash.com.edgekey.netCNAME (Canonical name)IN (0x0001)false
        May 8, 2024 01:31:40.548090935 CEST8.8.8.8192.168.2.220x39faNo error (0)www.provincialnetcash.comwww.provincialnetcash.com.edgekey.netCNAME (Canonical name)IN (0x0001)false
        May 8, 2024 01:31:41.628758907 CEST8.8.8.8192.168.2.220xbaf1No error (0)www.google.com65IN (0x0001)false
        May 8, 2024 01:31:41.636459112 CEST8.8.8.8192.168.2.220x85b8No error (0)www.google.com142.250.191.36A (IP address)IN (0x0001)false
        May 8, 2024 01:31:46.283047915 CEST8.8.8.8192.168.2.220xf1d4No error (0)www.provincialnetcash.comwww.provincialnetcash.com.edgekey.netCNAME (Canonical name)IN (0x0001)false
        May 8, 2024 01:31:46.332638025 CEST8.8.8.8192.168.2.220x8c4aNo error (0)www.provincialnetcash.comwww.provincialnetcash.com.edgekey.netCNAME (Canonical name)IN (0x0001)false

        Click to jump to process

        Click to jump to process

        Click to jump to process

        Target ID:0
        Start time:01:31:34
        Start date:08/05/2024
        Path:C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
        Wow64 process (32bit):false
        Commandline:"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
        Imagebase:0x13f0f0000
        File size:3'151'128 bytes
        MD5 hash:FFA2B8E17F645BCC20F0E0201FEF83ED
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        Target ID:1
        Start time:01:31:35
        Start date:08/05/2024
        Path:C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
        Wow64 process (32bit):false
        Commandline:"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1476 --field-trial-handle=1256,i,4293504143906383849,8966591030562114885,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
        Imagebase:0x13f0f0000
        File size:3'151'128 bytes
        MD5 hash:FFA2B8E17F645BCC20F0E0201FEF83ED
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        Target ID:4
        Start time:01:31:38
        Start date:08/05/2024
        Path:C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
        Wow64 process (32bit):false
        Commandline:"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" "https://www.provincialnetcash.com/SVEKYOP/kyop_mult_web_pub/index.html#"
        Imagebase:0x13f0f0000
        File size:3'151'128 bytes
        MD5 hash:FFA2B8E17F645BCC20F0E0201FEF83ED
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Target ID:5
        Start time:01:31:39
        Start date:08/05/2024
        Path:C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
        Wow64 process (32bit):false
        Commandline:"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1444 --field-trial-handle=1244,i,10506233396208386409,2587740212930642001,131072 /prefetch:8
        Imagebase:0x13f0f0000
        File size:3'151'128 bytes
        MD5 hash:FFA2B8E17F645BCC20F0E0201FEF83ED
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        No disassembly