Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
http://414611

Overview

General Information

Sample URL:http://414611
Analysis ID:1596235

Detection

HTMLPhisher
Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected HtmlPhish29
AI detected landing page (webpage, office document or email)
AI detected suspicious Javascript
Phishing site or detected (based on various text indicators)
HTML body contains low number of good links
HTML page contains hidden javascript code
HTML title does not match URL
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 5744 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
    • chrome.exe (PID: 4484 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=2020,i,15960276221289448869,14868523073801796373,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
  • chrome.exe (PID: 6536 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://414611" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
  • cleanup
SourceRuleDescriptionAuthorStrings
1.2.pages.csvJoeSecurity_HtmlPhish_29Yara detected HtmlPhish_29Joe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    Phishing

    barindex
    Source: Yara matchFile source: 1.2.pages.csv, type: HTML
    Source: https://customervoice.microsoft.com/Pages/ResponsePage.aspx?id=YVa6oC_oKUy4sDgZhr8IWhbOKT_Vm3xEjaaVu5eEMxtUMzZGVVU3VVJaMDVZVkM3VUxUMVg3U1JDUS4uJoe Sandbox AI: Page contains button: 'VIEW DOCUMENT HERE' Source: '1.2.pages.csv'
    Source: 0.18.id.script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: https://3o1w.peativerthera.ru/yHAr8r/... This script exhibits several high-risk behaviors, including dynamic code execution, data exfiltration, and obfuscated code/URLs. The use of `atob()` and `decodeURIComponent()` to decode and execute remote code is a clear indicator of malicious intent. Additionally, the script attempts to disable common browser security features like the context menu and certain keyboard shortcuts, further suggesting suspicious behavior. Overall, this script poses a significant risk and should be treated with caution.
    Source: Chrome DOM: 1.2OCR Text: New PDF Document Received Received on Tuesday, Jan 21 2025 You've received (2) PDF Documents for your review VIEW DOCUMENT HERE
    Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638730873665178837.ZDdlOTQ5MWUtZDQ4Yy00ZGFlLWJiZDYtZWE0Y2Q3ZDZkNTY5N2YxMjRlYWUtMmQ1Zi00NzI3LWIzNGYtOTY0MzIyYmRlMGUw&ui_locales=en-US&mkt=en-US&client-request-id=015710e4-7002-4484-91b6-22b8bfbe5bb2&state=tP6ISCNOxnc_RimKr8sug4-0UI99uO4P40LzHiElatlLoeWhtk8Pt1GoNBWEwNEIArWrqGZaA6olGUsQIAXqu9fp7MoN0zEsqIg3dmoaan5DaYMnqlZy3CVG632JbGcMe6As-aJspiZiibm_PPpwAUFMKU3WXkPmbr3QJWNwtkReNm8ZzXq2JAHtgGZ9mT3mAW1eXL2qEe68ByRR51ifkppqVOB8rtcCNLbmd29SL9yB-PZWpdwevfsAX94rLM77zr_X9VPfXlYU_vewMqxcPQ&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0HTTP Parser: Number of links: 0
    Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638730873665178837.ZDdlOTQ5MWUtZDQ4Yy00ZGFlLWJiZDYtZWE0Y2Q3ZDZkNTY5N2YxMjRlYWUtMmQ1Zi00NzI3LWIzNGYtOTY0MzIyYmRlMGUw&ui_locales=en-US&mkt=en-US&client-request-id=015710e4-7002-4484-91b6-22b8bfbe5bb2&state=tP6ISCNOxnc_RimKr8sug4-0UI99uO4P40LzHiElatlLoeWhtk8Pt1GoNBWEwNEIArWrqGZaA6olGUsQIAXqu9fp7MoN0zEsqIg3dmoaan5DaYMnqlZy3CVG632JbGcMe6As-aJspiZiibm_PPpwAUFMKU3WXkPmbr3QJWNwtkReNm8ZzXq2JAHtgGZ9mT3mAW1eXL2qEe68ByRR51ifkppqVOB8rtcCNLbmd29SL9yB-PZWpdwevfsAX94rLM77zr_X9VPfXlYU_vewMqxcPQ&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0&sso_reload=trueHTTP Parser: Number of links: 0
    Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638730873665178837.ZDdlOTQ5MWUtZDQ4Yy00ZGFlLWJiZDYtZWE0Y2Q3ZDZkNTY5N2YxMjRlYWUtMmQ1Zi00NzI3LWIzNGYtOTY0MzIyYmRlMGUw&ui_locales=en-US&mkt=en-US&client-request-id=015710e4-7002-4484-91b6-22b8bfbe5bb2&state=tP6ISCNOxnc_RimKr8sug4-0UI99uO4P40LzHiElatlLoeWhtk8Pt1GoNBWEwNEIArWrqGZaA6olGUsQIAXqu9fp7MoN0zEsqIg3dmoaan5DaYMnqlZy3CVG632JbGcMe6As-aJspiZiibm_PPpwAUFMKU3WXkPmbr3QJWNwtkReNm8ZzXq2JAHtgGZ9mT3mAW1eXL2qEe68ByRR51ifkppqVOB8rtcCNLbmd29SL9yB-PZWpdwevfsAX94rLM77zr_X9VPfXlYU_vewMqxcPQ&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0HTTP Parser: Base64 decoded: d7e9491e-d48c-4dae-bbd6-ea4cd7d6d5697f124eae-2d5f-4727-b34f-964322bde0e0
    Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638730873665178837.ZDdlOTQ5MWUtZDQ4Yy00ZGFlLWJiZDYtZWE0Y2Q3ZDZkNTY5N2YxMjRlYWUtMmQ1Zi00NzI3LWIzNGYtOTY0MzIyYmRlMGUw&ui_locales=en-US&mkt=en-US&client-request-id=015710e4-7002-4484-91b6-22b8bfbe5bb2&state=tP6ISCNOxnc_RimKr8sug4-0UI99uO4P40LzHiElatlLoeWhtk8Pt1GoNBWEwNEIArWrqGZaA6olGUsQIAXqu9fp7MoN0zEsqIg3dmoaan5DaYMnqlZy3CVG632JbGcMe6As-aJspiZiibm_PPpwAUFMKU3WXkPmbr3QJWNwtkReNm8ZzXq2JAHtgGZ9mT3mAW1eXL2qEe68ByRR51ifkppqVOB8rtcCNLbmd29SL9yB-PZWpdwevfsAX94rLM77zr_X9VPfXlYU_vewMqxcPQ&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0HTTP Parser: Title: Redirecting does not match URL
    Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638730873665178837.ZDdlOTQ5MWUtZDQ4Yy00ZGFlLWJiZDYtZWE0Y2Q3ZDZkNTY5N2YxMjRlYWUtMmQ1Zi00NzI3LWIzNGYtOTY0MzIyYmRlMGUw&ui_locales=en-US&mkt=en-US&client-request-id=015710e4-7002-4484-91b6-22b8bfbe5bb2&state=tP6ISCNOxnc_RimKr8sug4-0UI99uO4P40LzHiElatlLoeWhtk8Pt1GoNBWEwNEIArWrqGZaA6olGUsQIAXqu9fp7MoN0zEsqIg3dmoaan5DaYMnqlZy3CVG632JbGcMe6As-aJspiZiibm_PPpwAUFMKU3WXkPmbr3QJWNwtkReNm8ZzXq2JAHtgGZ9mT3mAW1eXL2qEe68ByRR51ifkppqVOB8rtcCNLbmd29SL9yB-PZWpdwevfsAX94rLM77zr_X9VPfXlYU_vewMqxcPQ&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0&sso_reload=trueHTTP Parser: Title: Sign in to your account does not match URL
    Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638730873665178837.ZDdlOTQ5MWUtZDQ4Yy00ZGFlLWJiZDYtZWE0Y2Q3ZDZkNTY5N2YxMjRlYWUtMmQ1Zi00NzI3LWIzNGYtOTY0MzIyYmRlMGUw&ui_locales=en-US&mkt=en-US&client-request-id=015710e4-7002-4484-91b6-22b8bfbe5bb2&state=tP6ISCNOxnc_RimKr8sug4-0UI99uO4P40LzHiElatlLoeWhtk8Pt1GoNBWEwNEIArWrqGZaA6olGUsQIAXqu9fp7MoN0zEsqIg3dmoaan5DaYMnqlZy3CVG632JbGcMe6As-aJspiZiibm_PPpwAUFMKU3WXkPmbr3QJWNwtkReNm8ZzXq2JAHtgGZ9mT3mAW1eXL2qEe68ByRR51ifkppqVOB8rtcCNLbmd29SL9yB-PZWpdwevfsAX94rLM77zr_X9VPfXlYU_vewMqxcPQ&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0&sso_reload=trueHTTP Parser: <input type="password" .../> found
    Source: https://3o1w.peativerthera.ru/yHAr8r/HTTP Parser: No favicon
    Source: https://3o1w.peativerthera.ru/yHAr8r/HTTP Parser: No favicon
    Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638730873665178837.ZDdlOTQ5MWUtZDQ4Yy00ZGFlLWJiZDYtZWE0Y2Q3ZDZkNTY5N2YxMjRlYWUtMmQ1Zi00NzI3LWIzNGYtOTY0MzIyYmRlMGUw&ui_locales=en-US&mkt=en-US&client-request-id=015710e4-7002-4484-91b6-22b8bfbe5bb2&state=tP6ISCNOxnc_RimKr8sug4-0UI99uO4P40LzHiElatlLoeWhtk8Pt1GoNBWEwNEIArWrqGZaA6olGUsQIAXqu9fp7MoN0zEsqIg3dmoaan5DaYMnqlZy3CVG632JbGcMe6As-aJspiZiibm_PPpwAUFMKU3WXkPmbr3QJWNwtkReNm8ZzXq2JAHtgGZ9mT3mAW1eXL2qEe68ByRR51ifkppqVOB8rtcCNLbmd29SL9yB-PZWpdwevfsAX94rLM77zr_X9VPfXlYU_vewMqxcPQ&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0HTTP Parser: No favicon
    Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638730873665178837.ZDdlOTQ5MWUtZDQ4Yy00ZGFlLWJiZDYtZWE0Y2Q3ZDZkNTY5N2YxMjRlYWUtMmQ1Zi00NzI3LWIzNGYtOTY0MzIyYmRlMGUw&ui_locales=en-US&mkt=en-US&client-request-id=015710e4-7002-4484-91b6-22b8bfbe5bb2&state=tP6ISCNOxnc_RimKr8sug4-0UI99uO4P40LzHiElatlLoeWhtk8Pt1GoNBWEwNEIArWrqGZaA6olGUsQIAXqu9fp7MoN0zEsqIg3dmoaan5DaYMnqlZy3CVG632JbGcMe6As-aJspiZiibm_PPpwAUFMKU3WXkPmbr3QJWNwtkReNm8ZzXq2JAHtgGZ9mT3mAW1eXL2qEe68ByRR51ifkppqVOB8rtcCNLbmd29SL9yB-PZWpdwevfsAX94rLM77zr_X9VPfXlYU_vewMqxcPQ&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0HTTP Parser: No <meta name="author".. found
    Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638730873665178837.ZDdlOTQ5MWUtZDQ4Yy00ZGFlLWJiZDYtZWE0Y2Q3ZDZkNTY5N2YxMjRlYWUtMmQ1Zi00NzI3LWIzNGYtOTY0MzIyYmRlMGUw&ui_locales=en-US&mkt=en-US&client-request-id=015710e4-7002-4484-91b6-22b8bfbe5bb2&state=tP6ISCNOxnc_RimKr8sug4-0UI99uO4P40LzHiElatlLoeWhtk8Pt1GoNBWEwNEIArWrqGZaA6olGUsQIAXqu9fp7MoN0zEsqIg3dmoaan5DaYMnqlZy3CVG632JbGcMe6As-aJspiZiibm_PPpwAUFMKU3WXkPmbr3QJWNwtkReNm8ZzXq2JAHtgGZ9mT3mAW1eXL2qEe68ByRR51ifkppqVOB8rtcCNLbmd29SL9yB-PZWpdwevfsAX94rLM77zr_X9VPfXlYU_vewMqxcPQ&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0&sso_reload=trueHTTP Parser: No <meta name="author".. found
    Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638730873665178837.ZDdlOTQ5MWUtZDQ4Yy00ZGFlLWJiZDYtZWE0Y2Q3ZDZkNTY5N2YxMjRlYWUtMmQ1Zi00NzI3LWIzNGYtOTY0MzIyYmRlMGUw&ui_locales=en-US&mkt=en-US&client-request-id=015710e4-7002-4484-91b6-22b8bfbe5bb2&state=tP6ISCNOxnc_RimKr8sug4-0UI99uO4P40LzHiElatlLoeWhtk8Pt1GoNBWEwNEIArWrqGZaA6olGUsQIAXqu9fp7MoN0zEsqIg3dmoaan5DaYMnqlZy3CVG632JbGcMe6As-aJspiZiibm_PPpwAUFMKU3WXkPmbr3QJWNwtkReNm8ZzXq2JAHtgGZ9mT3mAW1eXL2qEe68ByRR51ifkppqVOB8rtcCNLbmd29SL9yB-PZWpdwevfsAX94rLM77zr_X9VPfXlYU_vewMqxcPQ&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0&sso_reload=trueHTTP Parser: No <meta name="author".. found
    Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638730873665178837.ZDdlOTQ5MWUtZDQ4Yy00ZGFlLWJiZDYtZWE0Y2Q3ZDZkNTY5N2YxMjRlYWUtMmQ1Zi00NzI3LWIzNGYtOTY0MzIyYmRlMGUw&ui_locales=en-US&mkt=en-US&client-request-id=015710e4-7002-4484-91b6-22b8bfbe5bb2&state=tP6ISCNOxnc_RimKr8sug4-0UI99uO4P40LzHiElatlLoeWhtk8Pt1GoNBWEwNEIArWrqGZaA6olGUsQIAXqu9fp7MoN0zEsqIg3dmoaan5DaYMnqlZy3CVG632JbGcMe6As-aJspiZiibm_PPpwAUFMKU3WXkPmbr3QJWNwtkReNm8ZzXq2JAHtgGZ9mT3mAW1eXL2qEe68ByRR51ifkppqVOB8rtcCNLbmd29SL9yB-PZWpdwevfsAX94rLM77zr_X9VPfXlYU_vewMqxcPQ&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0HTTP Parser: No <meta name="copyright".. found
    Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638730873665178837.ZDdlOTQ5MWUtZDQ4Yy00ZGFlLWJiZDYtZWE0Y2Q3ZDZkNTY5N2YxMjRlYWUtMmQ1Zi00NzI3LWIzNGYtOTY0MzIyYmRlMGUw&ui_locales=en-US&mkt=en-US&client-request-id=015710e4-7002-4484-91b6-22b8bfbe5bb2&state=tP6ISCNOxnc_RimKr8sug4-0UI99uO4P40LzHiElatlLoeWhtk8Pt1GoNBWEwNEIArWrqGZaA6olGUsQIAXqu9fp7MoN0zEsqIg3dmoaan5DaYMnqlZy3CVG632JbGcMe6As-aJspiZiibm_PPpwAUFMKU3WXkPmbr3QJWNwtkReNm8ZzXq2JAHtgGZ9mT3mAW1eXL2qEe68ByRR51ifkppqVOB8rtcCNLbmd29SL9yB-PZWpdwevfsAX94rLM77zr_X9VPfXlYU_vewMqxcPQ&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0&sso_reload=trueHTTP Parser: No <meta name="copyright".. found
    Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638730873665178837.ZDdlOTQ5MWUtZDQ4Yy00ZGFlLWJiZDYtZWE0Y2Q3ZDZkNTY5N2YxMjRlYWUtMmQ1Zi00NzI3LWIzNGYtOTY0MzIyYmRlMGUw&ui_locales=en-US&mkt=en-US&client-request-id=015710e4-7002-4484-91b6-22b8bfbe5bb2&state=tP6ISCNOxnc_RimKr8sug4-0UI99uO4P40LzHiElatlLoeWhtk8Pt1GoNBWEwNEIArWrqGZaA6olGUsQIAXqu9fp7MoN0zEsqIg3dmoaan5DaYMnqlZy3CVG632JbGcMe6As-aJspiZiibm_PPpwAUFMKU3WXkPmbr3QJWNwtkReNm8ZzXq2JAHtgGZ9mT3mAW1eXL2qEe68ByRR51ifkppqVOB8rtcCNLbmd29SL9yB-PZWpdwevfsAX94rLM77zr_X9VPfXlYU_vewMqxcPQ&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0&sso_reload=trueHTTP Parser: No <meta name="copyright".. found
    Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.17:49713 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.17:49719 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.17:49721 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 20.190.160.17:443 -> 192.168.2.17:49744 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 13.107.5.88:443 -> 192.168.2.17:49745 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 20.190.160.17:443 -> 192.168.2.17:49772 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 2.21.65.154:443 -> 192.168.2.17:49776 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.17:49787 version: TLS 1.2
    Source: chrome.exeMemory has grown: Private usage: 10MB later: 30MB
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
    Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
    Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
    Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
    Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
    Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
    Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
    Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
    Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
    Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
    Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
    Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
    Source: global trafficDNS traffic detected: DNS query: www.google.com
    Source: global trafficDNS traffic detected: DNS query: nam.dcv.ms
    Source: global trafficDNS traffic detected: DNS query: cdn.forms.office.net
    Source: global trafficDNS traffic detected: DNS query: 3o1w.peativerthera.ru
    Source: global trafficDNS traffic detected: DNS query: code.jquery.com
    Source: global trafficDNS traffic detected: DNS query: challenges.cloudflare.com
    Source: global trafficDNS traffic detected: DNS query: cdnjs.cloudflare.com
    Source: global trafficDNS traffic detected: DNS query: ihwjpvyrytspls5chz5iun9t4rddoxkmtaujmafslnkfvvvtf6rbja6.gageodeg.ru
    Source: global trafficDNS traffic detected: DNS query: login.microsoftonline.com
    Source: global trafficDNS traffic detected: DNS query: www.office.com
    Source: global trafficDNS traffic detected: DNS query: aadcdn.msftauth.net
    Source: global trafficDNS traffic detected: DNS query: identity.nel.measure.office.net
    Source: global trafficDNS traffic detected: DNS query: a.nel.cloudflare.com
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49865
    Source: unknownNetwork traffic detected: HTTP traffic on port 49817 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49864
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49863
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49862
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49861
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49860
    Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
    Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
    Source: unknownNetwork traffic detected: HTTP traffic on port 49841 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49854
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
    Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49853
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
    Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49851
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49850
    Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49823 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
    Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49849
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49848
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49847
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49846
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
    Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49845
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49844
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49843
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49842
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49841
    Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49840
    Source: unknownNetwork traffic detected: HTTP traffic on port 49834 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49828 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49839
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49838
    Source: unknownNetwork traffic detected: HTTP traffic on port 49680 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49837
    Source: unknownNetwork traffic detected: HTTP traffic on port 49847 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49836
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49835
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49834
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49833
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49832
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49831
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49830
    Source: unknownNetwork traffic detected: HTTP traffic on port 49839 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49864 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49822 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49853 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49829
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49828
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49827
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49826
    Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49825
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49824
    Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49823
    Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49822
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
    Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49676 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
    Source: unknownNetwork traffic detected: HTTP traffic on port 49836 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49807 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49845 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
    Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
    Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
    Source: unknownNetwork traffic detected: HTTP traffic on port 49862 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
    Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49851 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49830 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
    Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
    Source: unknownNetwork traffic detected: HTTP traffic on port 49863 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
    Source: unknownNetwork traffic detected: HTTP traffic on port 49840 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49824 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
    Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49835 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49829 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
    Source: unknownNetwork traffic detected: HTTP traffic on port 49846 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
    Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49866
    Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49826 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49849 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49866 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49820 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49837 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49691
    Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49798 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49861 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49819 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49844 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49850 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49831 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49799
    Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49798
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
    Source: unknownNetwork traffic detected: HTTP traffic on port 49677 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
    Source: unknownNetwork traffic detected: HTTP traffic on port 49814 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
    Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49825 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49808 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
    Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49821
    Source: unknownNetwork traffic detected: HTTP traffic on port 49865 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49820
    Source: unknownNetwork traffic detected: HTTP traffic on port 49842 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49691 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49833 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49819
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49818
    Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49810 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49817
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49816
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49814
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49813
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49812
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49810
    Source: unknownNetwork traffic detected: HTTP traffic on port 49816 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49827 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49809
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49808
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49807
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49806
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49805
    Source: unknownNetwork traffic detected: HTTP traffic on port 49848 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
    Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49802
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
    Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49800
    Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49838 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49821 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49854 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49809 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49860 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49843 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49832 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
    Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.17:49713 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.17:49719 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.17:49721 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 20.190.160.17:443 -> 192.168.2.17:49744 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 13.107.5.88:443 -> 192.168.2.17:49745 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 20.190.160.17:443 -> 192.168.2.17:49772 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 2.21.65.154:443 -> 192.168.2.17:49776 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.17:49787 version: TLS 1.2
    Source: classification engineClassification label: mal60.phis.win@28/6@40/248
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
    Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=2020,i,15960276221289448869,14868523073801796373,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
    Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://414611"
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=2020,i,15960276221289448869,14868523073801796373,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation2
    Browser Extensions
    1
    Process Injection
    1
    Masquerading
    OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/Job1
    Registry Run Keys / Startup Folder
    1
    Registry Run Keys / Startup Folder
    1
    Process Injection
    LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
    Extra Window Memory Injection
    1
    Extra Window Memory Injection
    Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    http://4146110%Avira URL Cloudsafe
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    NameIPActiveMaliciousAntivirus DetectionReputation
    www.tm.ak.prd.aadg.trafficmanager.net
    20.190.159.23
    truefalse
      high
      e329293.dscd.akamaiedge.net
      2.23.227.223
      truefalse
        high
        a.nel.cloudflare.com
        35.190.80.1
        truefalse
          high
          3o1w.peativerthera.ru
          104.21.29.161
          truetrue
            unknown
            c-msn-pme.trafficmanager.net
            13.74.129.1
            truefalse
              high
              s-part-0017.t-0009.t-msedge.net
              13.107.246.45
              truefalse
                high
                b-0004.b-msedge.net
                13.107.6.156
                truefalse
                  high
                  a1894.dscb.akamai.net
                  2.19.126.143
                  truefalse
                    high
                    a1894.dscms.akamai.net
                    2.21.22.185
                    truefalse
                      high
                      code.jquery.com
                      151.101.66.137
                      truefalse
                        high
                        cdnjs.cloudflare.com
                        104.17.24.14
                        truefalse
                          high
                          challenges.cloudflare.com
                          104.18.95.41
                          truefalse
                            high
                            ihwjpvyrytspls5chz5iun9t4rddoxkmtaujmafslnkfvvvtf6rbja6.gageodeg.ru
                            104.21.112.1
                            truefalse
                              unknown
                              www.google.com
                              142.250.181.228
                              truefalse
                                high
                                www.office.com
                                unknown
                                unknownfalse
                                  high
                                  aadcdn.msftauth.net
                                  unknown
                                  unknownfalse
                                    high
                                    cdn.forms.office.net
                                    unknown
                                    unknownfalse
                                      high
                                      identity.nel.measure.office.net
                                      unknown
                                      unknownfalse
                                        high
                                        nam.dcv.ms
                                        unknown
                                        unknownfalse
                                          high
                                          login.microsoftonline.com
                                          unknown
                                          unknownfalse
                                            high
                                            NameMaliciousAntivirus DetectionReputation
                                            https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638730873665178837.ZDdlOTQ5MWUtZDQ4Yy00ZGFlLWJiZDYtZWE0Y2Q3ZDZkNTY5N2YxMjRlYWUtMmQ1Zi00NzI3LWIzNGYtOTY0MzIyYmRlMGUw&ui_locales=en-US&mkt=en-US&client-request-id=015710e4-7002-4484-91b6-22b8bfbe5bb2&state=tP6ISCNOxnc_RimKr8sug4-0UI99uO4P40LzHiElatlLoeWhtk8Pt1GoNBWEwNEIArWrqGZaA6olGUsQIAXqu9fp7MoN0zEsqIg3dmoaan5DaYMnqlZy3CVG632JbGcMe6As-aJspiZiibm_PPpwAUFMKU3WXkPmbr3QJWNwtkReNm8ZzXq2JAHtgGZ9mT3mAW1eXL2qEe68ByRR51ifkppqVOB8rtcCNLbmd29SL9yB-PZWpdwevfsAX94rLM77zr_X9VPfXlYU_vewMqxcPQ&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0&sso_reload=truefalse
                                              unknown
                                              https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638730873665178837.ZDdlOTQ5MWUtZDQ4Yy00ZGFlLWJiZDYtZWE0Y2Q3ZDZkNTY5N2YxMjRlYWUtMmQ1Zi00NzI3LWIzNGYtOTY0MzIyYmRlMGUw&ui_locales=en-US&mkt=en-US&client-request-id=015710e4-7002-4484-91b6-22b8bfbe5bb2&state=tP6ISCNOxnc_RimKr8sug4-0UI99uO4P40LzHiElatlLoeWhtk8Pt1GoNBWEwNEIArWrqGZaA6olGUsQIAXqu9fp7MoN0zEsqIg3dmoaan5DaYMnqlZy3CVG632JbGcMe6As-aJspiZiibm_PPpwAUFMKU3WXkPmbr3QJWNwtkReNm8ZzXq2JAHtgGZ9mT3mAW1eXL2qEe68ByRR51ifkppqVOB8rtcCNLbmd29SL9yB-PZWpdwevfsAX94rLM77zr_X9VPfXlYU_vewMqxcPQ&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0false
                                                unknown
                                                https://3o1w.peativerthera.ru/yHAr8r/true
                                                  unknown
                                                  • No. of IPs < 25%
                                                  • 25% < No. of IPs < 50%
                                                  • 50% < No. of IPs < 75%
                                                  • 75% < No. of IPs
                                                  IPDomainCountryFlagASNASN NameMalicious
                                                  13.107.6.156
                                                  b-0004.b-msedge.netUnited States
                                                  8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                  13.107.246.45
                                                  s-part-0017.t-0009.t-msedge.netUnited States
                                                  8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                  2.21.22.185
                                                  a1894.dscms.akamai.netEuropean Union
                                                  20940AKAMAI-ASN1EUfalse
                                                  104.18.94.41
                                                  unknownUnited States
                                                  13335CLOUDFLARENETUSfalse
                                                  104.21.80.1
                                                  unknownUnited States
                                                  13335CLOUDFLARENETUSfalse
                                                  104.21.112.1
                                                  ihwjpvyrytspls5chz5iun9t4rddoxkmtaujmafslnkfvvvtf6rbja6.gageodeg.ruUnited States
                                                  13335CLOUDFLARENETUSfalse
                                                  20.190.159.23
                                                  www.tm.ak.prd.aadg.trafficmanager.netUnited States
                                                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                  2.19.126.143
                                                  a1894.dscb.akamai.netEuropean Union
                                                  16625AKAMAI-ASUSfalse
                                                  13.74.129.1
                                                  c-msn-pme.trafficmanager.netUnited States
                                                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                  151.101.66.137
                                                  code.jquery.comUnited States
                                                  54113FASTLYUSfalse
                                                  35.190.80.1
                                                  a.nel.cloudflare.comUnited States
                                                  15169GOOGLEUSfalse
                                                  172.217.18.10
                                                  unknownUnited States
                                                  15169GOOGLEUSfalse
                                                  52.178.17.235
                                                  unknownUnited States
                                                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                  204.79.197.237
                                                  unknownUnited States
                                                  8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                  104.17.24.14
                                                  cdnjs.cloudflare.comUnited States
                                                  13335CLOUDFLARENETUSfalse
                                                  1.1.1.1
                                                  unknownAustralia
                                                  13335CLOUDFLARENETUSfalse
                                                  74.125.133.84
                                                  unknownUnited States
                                                  15169GOOGLEUSfalse
                                                  13.107.246.57
                                                  unknownUnited States
                                                  8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                  142.250.185.110
                                                  unknownUnited States
                                                  15169GOOGLEUSfalse
                                                  104.18.95.41
                                                  challenges.cloudflare.comUnited States
                                                  13335CLOUDFLARENETUSfalse
                                                  13.107.246.70
                                                  unknownUnited States
                                                  8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                  104.21.29.161
                                                  3o1w.peativerthera.ruUnited States
                                                  13335CLOUDFLARENETUStrue
                                                  239.255.255.250
                                                  unknownReserved
                                                  unknownunknownfalse
                                                  20.190.160.22
                                                  unknownUnited States
                                                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                  142.250.181.228
                                                  www.google.comUnited States
                                                  15169GOOGLEUSfalse
                                                  142.250.186.142
                                                  unknownUnited States
                                                  15169GOOGLEUSfalse
                                                  216.58.212.163
                                                  unknownUnited States
                                                  15169GOOGLEUSfalse
                                                  20.50.201.204
                                                  unknownUnited States
                                                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                  IP
                                                  192.168.2.17
                                                  192.168.2.18
                                                  Joe Sandbox version:42.0.0 Malachite
                                                  Analysis ID:1596235
                                                  Start date and time:2025-01-21 21:14:30 +01:00
                                                  Joe Sandbox product:CloudBasic
                                                  Overall analysis duration:
                                                  Hypervisor based Inspection enabled:false
                                                  Report type:full
                                                  Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                                  Sample URL:http://414611
                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                  Number of analysed new started processes analysed:20
                                                  Number of new started drivers analysed:0
                                                  Number of existing processes analysed:0
                                                  Number of existing drivers analysed:0
                                                  Number of injected processes analysed:0
                                                  Technologies:
                                                  • EGA enabled
                                                  Analysis Mode:stream
                                                  Analysis stop reason:Timeout
                                                  Detection:MAL
                                                  Classification:mal60.phis.win@28/6@40/248
                                                  • Exclude process from analysis (whitelisted): TextInputHost.exe
                                                  • Excluded IPs from analysis (whitelisted): 216.58.212.163, 142.250.186.142, 74.125.133.84, 216.58.212.142, 216.58.206.78
                                                  • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, redirector.gvt1.com, clientservices.googleapis.com, clients.l.google.com
                                                  • Not all processes where analyzed, report is missing behavior information
                                                  • VT rate limit hit for: http://414611
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jan 21 19:15:03 2025, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                                  Category:dropped
                                                  Size (bytes):2677
                                                  Entropy (8bit):3.9902495632617203
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:9E0592A1433D534C9D1916DE1FAC2BED
                                                  SHA1:26800F7581743982EB66872908185D31A409CF74
                                                  SHA-256:DE6FD60ECD11C577A855EA5B0B41E3F4EB106F37ED8B6E8BBEC26CB5DE7AA74C
                                                  SHA-512:4DA22EE734ADFF0E45A0B2D44BE8F9C54641783F8E70C539A9EBB532EA3E5E5672BBDF3AABDE936C4A2951D3DA791FCAA93A93B09A4A2C9CBF61DFE068090942
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:L..................F.@.. ...$+.,....7.'Al......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I5Z.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V5Z.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V5Z.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V5Z............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V5Z............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............hH.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jan 21 19:15:02 2025, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                                  Category:dropped
                                                  Size (bytes):2679
                                                  Entropy (8bit):4.005549314335595
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:59B3E9869A3B834661EBA7C4B57461CB
                                                  SHA1:7262384398B2D43E70280821C1A4F7749521F515
                                                  SHA-256:D6D1C0DF1643EC5C4E9797727137F6B8157DA57A6BD7D8F821D88AD6852145B1
                                                  SHA-512:1BBBC3AF12BC235E2AC28BE76DA9866F485F5214454C475481D96560F736E95B7C99D531F48818F15C2C3C20DE2FAE5398B0D8AE8C995E49DBF2BF0867D988B2
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:L..................F.@.. ...$+.,....7..'Al......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I5Z.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V5Z.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V5Z.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V5Z............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V5Z............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............hH.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:54:41 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                                  Category:dropped
                                                  Size (bytes):2693
                                                  Entropy (8bit):4.017321579590179
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:A4CA5441794A0FF9024B815E234DE4DB
                                                  SHA1:CAF441266623D76EBF9F7EA25709966727CF0AFF
                                                  SHA-256:34BC70DD0051A04A6DD8D2BD8B11BD904035046E2F02E2803F4DFA7C19623BD3
                                                  SHA-512:23FC86D5D8E78D56D369B3413FDF6FBDE50A71E338727080AFC40A1F7EF1E543C3A2888C70F43B62B2AA75E57E69D4892ADC208F379B3250ACBE99FF7A2E6114
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:L..................F.@.. ...$+.,.....v. ;.......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I5Z.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V5Z.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V5Z.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V5Z............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VFW.N...........................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............hH.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jan 21 19:15:02 2025, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                                  Category:dropped
                                                  Size (bytes):2681
                                                  Entropy (8bit):4.004808597079232
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:44CBAABA44C4F9E59E0D68292E31E130
                                                  SHA1:C83AF4FA2FFAF04DB962ECE45FCEFD5DFF7F2055
                                                  SHA-256:D43E0FA22E94C320ECABCEAB9DC52C76E051873073A158279686758EF004AD8D
                                                  SHA-512:E6E46808FA1D0FEDFCA47A01B132A7050EA1E84CD1E17CC8F556D84397DA99B9DE6221692FAD79C8FD7F4FA78D4A4B77150D6D5B0EBB5268E4E46266C558305B
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:L..................F.@.. ...$+.,......z'Al......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I5Z.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V5Z.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V5Z.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V5Z............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V5Z............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............hH.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jan 21 19:15:02 2025, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                                  Category:dropped
                                                  Size (bytes):2681
                                                  Entropy (8bit):3.9935657079067335
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:6FABD8413B2E58D3142C17BAB031E22B
                                                  SHA1:7A1F20D2D47BDA438F2AF5B55E449333E5B85BD7
                                                  SHA-256:DEF4363BE0986FF7173B92D2E76B8BCEB47C0A0D94B08A7245CD42EB6546DD53
                                                  SHA-512:58FD93D935A80D0A47F992541675FF1BF063CA866FEE4CD599527DFDC0D2D6A607D17B1C65CD968F233B624C16EDA44D3AC7BC9A5F69FE5FEBAC35BB859928A3
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:L..................F.@.. ...$+.,....c.'Al......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I5Z.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V5Z.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V5Z.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V5Z............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V5Z............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............hH.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jan 21 19:15:02 2025, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                                  Category:dropped
                                                  Size (bytes):2683
                                                  Entropy (8bit):4.005309304382878
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:D8CDB4334FB32827DF9C5BECC18F3BCA
                                                  SHA1:75E042731084E2F2793848AE6254CC4266AF4B71
                                                  SHA-256:0FBB85DD0C3AA82E2878ADF23B599FFCE14A7D1BD6686F2A262919B298BCB0BA
                                                  SHA-512:757F4D5F4646D6EEAEDE42327A7CC8E9D4E6D0F3338DFC7F94A01D652044CA4CDA83630F0279F76EA65628E13BA0DADB141E6A2308CC30443DDD0A3648FB7824
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:L..................F.@.. ...$+.,......p'Al......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I5Z.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V5Z.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V5Z.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V5Z............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V5Z............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............hH.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                  No static file info