Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Milwaukeetool Payment.hTml

Overview

General Information

Sample Name:Milwaukeetool Payment.hTml
Analysis ID:715060
MD5:148dbfa4a28fb631b5b4180c98daf28d
SHA1:6f731eb3f50a128dab017b2fe83cbb03219a91d4
SHA256:58bb9db8b22c7b91c7c494b9a2d65a40a82cf9a7fc6ab1168e2ef6f105f7b7fb
Infos:

Detection

HTMLPhisher
Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected HtmlPhish44
Yara detected obfuscated html page
HTML document with suspicious name
Yara signature match
IP address seen in connection with other malware

Classification

  • System is w10x64
  • chrome.exe (PID: 5772 cmdline: C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank MD5: 0FEC2748F363150DC54C1CAFFB1A9408)
    • chrome.exe (PID: 5940 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1956 --field-trial-handle=1700,i,2030005579113327324,13011269261470832477,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8 MD5: 0FEC2748F363150DC54C1CAFFB1A9408)
  • chrome.exe (PID: 4912 cmdline: C:\Program Files\Google\Chrome\Application\chrome.exe" "C:\Users\user\Desktop\Milwaukeetool Payment.hTml MD5: 0FEC2748F363150DC54C1CAFFB1A9408)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Milwaukeetool Payment.hTmlSUSP_obfuscated_JS_obfuscatorioDetect JS obfuscation done by the js obfuscator (often malicious)@imp0rtp3
  • 0x156:$c8: while(!![])
  • 0x175:$d1: parseInt(_0x483f24(0x177))/0x1+-parseInt(_0x483f24(0x169))/0x2+parseInt(_0x483f24(0x171))/0x3+-parseInt(_0x483f24(0x175))/0x4+parseInt(_0x483f24(0x163))/0x5+-parseInt(_0x483f24(0x16f))/0x6*(
  • 0x195:$d1: parseInt(_0x483f24(0x169))/0x2+parseInt(_0x483f24(0x171))/0x3+-parseInt(_0x483f24(0x175))/0x4+parseInt(_0x483f24(0x163))/0x5+-parseInt(_0x483f24(0x16f))/0x6*(parseInt(_0x483f24(0x16a))/0x7)+
Milwaukeetool Payment.hTmlJoeSecurity_ObshtmlYara detected obfuscated html pageJoe Security
    Milwaukeetool Payment.hTmlJoeSecurity_HtmlPhish_44Yara detected HtmlPhish_44Joe Security
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      Phishing

      barindex
      Source: Yara matchFile source: Milwaukeetool Payment.hTml, type: SAMPLE
      Source: Yara matchFile source: Milwaukeetool Payment.hTml, type: SAMPLE
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\GoogleUpdaterJump to behavior
      Source: Joe Sandbox ViewIP Address: 239.255.255.250 239.255.255.250
      Source: unknownDNS traffic detected: queries for: clients2.google.com
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
      Source: unknownNetwork traffic detected: HTTP traffic on port 49695 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49696
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49695
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49693
      Source: unknownNetwork traffic detected: HTTP traffic on port 49696 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49691
      Source: unknownNetwork traffic detected: HTTP traffic on port 49693 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49691 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
      Source: global trafficHTTP traffic detected: GET /service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=104.0.5112.81&lang=en-US&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1 HTTP/1.1Host: clients2.google.comConnection: keep-aliveX-Goog-Update-Interactivity: fgX-Goog-Update-AppId: nmmhkkegccagdldgiimedpiccmgmiedaX-Goog-Update-Updater: chromecrx-104.0.5112.81Sec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
      Source: unknownHTTP traffic detected: POST /ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard HTTP/1.1Host: accounts.google.comConnection: keep-aliveContent-Length: 1Origin: https://www.google.comContent-Type: application/x-www-form-urlencodedSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: __Secure-ENID=6.SE=Md0Ynyf9ahpkx1CxTGF0vY434NJ6ymH-gDI2Tl5Ly-NQYGPjnNfggtiFRMAwx4JRDOC_gavEPcD5cTBJzUgtbJobmBEuJ8xi2UuotxvOZgApoqSIg1b0RP47U08XG8Bz_SExSzKy0ETSsajbToDlYyFsxfI93p7AyRAd-OeIBA0; CONSENT=PENDING+070

      System Summary

      barindex
      Source: Name includes: Milwaukeetool Payment.hTmlInitial sample: payment
      Source: Milwaukeetool Payment.hTml, type: SAMPLEMatched rule: SUSP_obfuscated_JS_obfuscatorio date = 2021-08-25, author = @imp0rtp3, description = Detect JS obfuscation done by the js obfuscator (often malicious), score = , reference = https://obfuscator.io
      Source: classification engineClassification label: mal60.phis.winHTML@28/0@7/6
      Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1956 --field-trial-handle=1700,i,2030005579113327324,13011269261470832477,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8
      Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe" "C:\Users\user\Desktop\Milwaukeetool Payment.hTml
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1956 --field-trial-handle=1700,i,2030005579113327324,13011269261470832477,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Program Files\Google\GoogleUpdaterJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\GoogleUpdaterJump to behavior
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management InstrumentationPath Interception1
      Process Injection
      2
      Masquerading
      OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local SystemExfiltration Over Other Network Medium1
      Encrypted Channel
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
      Process Injection
      LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth3
      Non-Application Layer Protocol
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration4
      Application Layer Protocol
      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled Transfer1
      Ingress Tool Transfer
      SIM Card SwapCarrier Billing Fraud
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      accounts.google.com
      142.250.203.109
      truefalse
        high
        www.google.com
        142.250.203.100
        truefalse
          high
          clients.l.google.com
          142.250.203.110
          truefalse
            high
            clients2.google.com
            unknown
            unknownfalse
              high
              NameMaliciousAntivirus DetectionReputation
              https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=104.0.5112.81&lang=en-US&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1false
                high
                https://accounts.google.com/ListAccounts?gpsia=1&source=ChromiumBrowser&json=standardfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  239.255.255.250
                  unknownReserved
                  unknownunknownfalse
                  142.250.203.100
                  www.google.comUnited States
                  15169GOOGLEUSfalse
                  142.250.203.110
                  clients.l.google.comUnited States
                  15169GOOGLEUSfalse
                  142.250.203.109
                  accounts.google.comUnited States
                  15169GOOGLEUSfalse
                  IP
                  192.168.2.1
                  127.0.0.1
                  Joe Sandbox Version:36.0.0 Rainbow Opal
                  Analysis ID:715060
                  Start date and time:2022-10-03 15:44:53 +02:00
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 6m 6s
                  Hypervisor based Inspection enabled:false
                  Report type:light
                  Sample file name:Milwaukeetool Payment.hTml
                  Cookbook file name:defaultwindowshtmlcookbook.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:14
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal60.phis.winHTML@28/0@7/6
                  EGA Information:Failed
                  HDC Information:Failed
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Found application associated with file extension: .hTml
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                  • TCP Packets have been reduced to 100
                  • Excluded IPs from analysis (whitelisted): 142.250.203.99, 34.104.35.123
                  • Excluded domains from analysis (whitelisted): fs.microsoft.com, edgedl.me.gvt1.com, unitedstand.z13.web.core.windows.net, update.googleapis.com, clientservices.googleapis.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtWriteVirtualMemory calls found.
                  No simulations
                  No context
                  No context
                  No context
                  No context
                  No context
                  No created / dropped files found
                  File type:HTML document, ASCII text, with very long lines (4733), with CRLF line terminators
                  Entropy (8bit):4.846047582522636
                  TrID:
                  • HyperText Markup Language (28028/1) 100.00%
                  File name:Milwaukeetool Payment.hTml
                  File size:4936
                  MD5:148dbfa4a28fb631b5b4180c98daf28d
                  SHA1:6f731eb3f50a128dab017b2fe83cbb03219a91d4
                  SHA256:58bb9db8b22c7b91c7c494b9a2d65a40a82cf9a7fc6ab1168e2ef6f105f7b7fb
                  SHA512:109cb1ce2e43b86e40e1f3daa22eb239c01054feae95a642c7f7b73d87d7d2283cbe688e04099f3a108820fb1fdf0ea68c0e8bc620f84056b555281b18eda66f
                  SSDEEP:96:/wNPvtA8MwTlN6f9jjOpJSfyQIfzUUm8qYPYzD0gcYnThF70gR6UX:/wNXtnTlN6fljOpjhqYPYkgcYnThZRX
                  TLSH:55A1BCC47FA8E11B079E4E5BFA16A9CFE17A59A7A88822038214F94C29F4509C5ED835
                  File Content Preview:<script language=javascript>function _0x3f84(_0x396e53,_0x4f6a6b){var _0x18e8bd=_0x3b38();return _0x3f84=function(_0x5defaf,_0x1c9ef8){_0x5defaf=_0x5defaf-0x160;var _0x381c3f=_0x18e8bd[_0x5defaf];return _0x381c3f;},_0x3f84(_0x396e53,_0x4f6a6b);}var _0x1fa
                  TimestampSource PortDest PortSource IPDest IP
                  Oct 3, 2022 15:45:54.993968964 CEST49691443192.168.2.6142.250.203.110
                  Oct 3, 2022 15:45:54.994052887 CEST44349691142.250.203.110192.168.2.6
                  Oct 3, 2022 15:45:54.994146109 CEST49691443192.168.2.6142.250.203.110
                  Oct 3, 2022 15:45:54.999108076 CEST49693443192.168.2.6142.250.203.109
                  Oct 3, 2022 15:45:54.999145031 CEST44349693142.250.203.109192.168.2.6
                  Oct 3, 2022 15:45:54.999217033 CEST49693443192.168.2.6142.250.203.109
                  Oct 3, 2022 15:45:55.002243042 CEST49695443192.168.2.6142.250.203.109
                  Oct 3, 2022 15:45:55.002289057 CEST44349695142.250.203.109192.168.2.6
                  Oct 3, 2022 15:45:55.002397060 CEST49695443192.168.2.6142.250.203.109
                  Oct 3, 2022 15:45:55.003237009 CEST49696443192.168.2.6142.250.203.110
                  Oct 3, 2022 15:45:55.003283978 CEST44349696142.250.203.110192.168.2.6
                  Oct 3, 2022 15:45:55.003349066 CEST49696443192.168.2.6142.250.203.110
                  Oct 3, 2022 15:45:55.003926992 CEST49691443192.168.2.6142.250.203.110
                  Oct 3, 2022 15:45:55.003959894 CEST44349691142.250.203.110192.168.2.6
                  Oct 3, 2022 15:45:55.004903078 CEST49693443192.168.2.6142.250.203.109
                  Oct 3, 2022 15:45:55.004925966 CEST44349693142.250.203.109192.168.2.6
                  Oct 3, 2022 15:45:55.005387068 CEST49695443192.168.2.6142.250.203.109
                  Oct 3, 2022 15:45:55.005435944 CEST44349695142.250.203.109192.168.2.6
                  Oct 3, 2022 15:45:55.006100893 CEST49696443192.168.2.6142.250.203.110
                  Oct 3, 2022 15:45:55.006129980 CEST44349696142.250.203.110192.168.2.6
                  Oct 3, 2022 15:45:55.090156078 CEST44349693142.250.203.109192.168.2.6
                  Oct 3, 2022 15:45:55.098866940 CEST49693443192.168.2.6142.250.203.109
                  Oct 3, 2022 15:45:55.098906994 CEST44349693142.250.203.109192.168.2.6
                  Oct 3, 2022 15:45:55.102360964 CEST44349693142.250.203.109192.168.2.6
                  Oct 3, 2022 15:45:55.102442980 CEST49693443192.168.2.6142.250.203.109
                  Oct 3, 2022 15:45:55.120332003 CEST44349695142.250.203.109192.168.2.6
                  Oct 3, 2022 15:45:55.124463081 CEST49695443192.168.2.6142.250.203.109
                  Oct 3, 2022 15:45:55.124499083 CEST44349695142.250.203.109192.168.2.6
                  Oct 3, 2022 15:45:55.128324986 CEST44349695142.250.203.109192.168.2.6
                  Oct 3, 2022 15:45:55.128452063 CEST49695443192.168.2.6142.250.203.109
                  Oct 3, 2022 15:45:55.133354902 CEST44349696142.250.203.110192.168.2.6
                  Oct 3, 2022 15:45:55.135584116 CEST49696443192.168.2.6142.250.203.110
                  Oct 3, 2022 15:45:55.135623932 CEST44349696142.250.203.110192.168.2.6
                  Oct 3, 2022 15:45:55.136214972 CEST44349696142.250.203.110192.168.2.6
                  Oct 3, 2022 15:45:55.136305094 CEST44349691142.250.203.110192.168.2.6
                  Oct 3, 2022 15:45:55.136351109 CEST49696443192.168.2.6142.250.203.110
                  Oct 3, 2022 15:45:55.137074947 CEST44349696142.250.203.110192.168.2.6
                  Oct 3, 2022 15:45:55.137168884 CEST49696443192.168.2.6142.250.203.110
                  Oct 3, 2022 15:45:55.189086914 CEST49691443192.168.2.6142.250.203.110
                  Oct 3, 2022 15:45:55.189155102 CEST44349691142.250.203.110192.168.2.6
                  Oct 3, 2022 15:45:55.191040993 CEST44349691142.250.203.110192.168.2.6
                  Oct 3, 2022 15:45:55.191081047 CEST44349691142.250.203.110192.168.2.6
                  Oct 3, 2022 15:45:55.191139936 CEST49691443192.168.2.6142.250.203.110
                  Oct 3, 2022 15:45:55.193635941 CEST44349691142.250.203.110192.168.2.6
                  Oct 3, 2022 15:45:55.193742037 CEST49691443192.168.2.6142.250.203.110
                  Oct 3, 2022 15:45:55.193773031 CEST44349691142.250.203.110192.168.2.6
                  Oct 3, 2022 15:45:55.402908087 CEST44349691142.250.203.110192.168.2.6
                  Oct 3, 2022 15:45:55.403394938 CEST49691443192.168.2.6142.250.203.110
                  Oct 3, 2022 15:45:55.540846109 CEST49691443192.168.2.6142.250.203.110
                  Oct 3, 2022 15:45:55.540879965 CEST44349691142.250.203.110192.168.2.6
                  Oct 3, 2022 15:45:55.541136026 CEST44349691142.250.203.110192.168.2.6
                  Oct 3, 2022 15:45:55.541398048 CEST49691443192.168.2.6142.250.203.110
                  Oct 3, 2022 15:45:55.541454077 CEST44349691142.250.203.110192.168.2.6
                  Oct 3, 2022 15:45:55.541665077 CEST49693443192.168.2.6142.250.203.109
                  Oct 3, 2022 15:45:55.541701078 CEST44349693142.250.203.109192.168.2.6
                  Oct 3, 2022 15:45:55.541829109 CEST49695443192.168.2.6142.250.203.109
                  Oct 3, 2022 15:45:55.541867018 CEST44349695142.250.203.109192.168.2.6
                  Oct 3, 2022 15:45:55.541939020 CEST44349693142.250.203.109192.168.2.6
                  Oct 3, 2022 15:45:55.542071104 CEST44349695142.250.203.109192.168.2.6
                  Oct 3, 2022 15:45:55.542335987 CEST49696443192.168.2.6142.250.203.110
                  Oct 3, 2022 15:45:55.542381048 CEST44349696142.250.203.110192.168.2.6
                  Oct 3, 2022 15:45:55.542609930 CEST44349696142.250.203.110192.168.2.6
                  Oct 3, 2022 15:45:55.543224096 CEST49693443192.168.2.6142.250.203.109
                  Oct 3, 2022 15:45:55.543258905 CEST44349693142.250.203.109192.168.2.6
                  Oct 3, 2022 15:45:55.576632023 CEST49697443192.168.2.6142.250.203.100
                  Oct 3, 2022 15:45:55.576709032 CEST44349697142.250.203.100192.168.2.6
                  Oct 3, 2022 15:45:55.576983929 CEST49697443192.168.2.6142.250.203.100
                  Oct 3, 2022 15:45:55.580363989 CEST49697443192.168.2.6142.250.203.100
                  Oct 3, 2022 15:45:55.580425978 CEST44349697142.250.203.100192.168.2.6
                  Oct 3, 2022 15:45:55.598562956 CEST44349693142.250.203.109192.168.2.6
                  Oct 3, 2022 15:45:55.598644972 CEST49693443192.168.2.6142.250.203.109
                  Oct 3, 2022 15:45:55.598670006 CEST44349693142.250.203.109192.168.2.6
                  Oct 3, 2022 15:45:55.598809958 CEST44349693142.250.203.109192.168.2.6
                  Oct 3, 2022 15:45:55.598865986 CEST49693443192.168.2.6142.250.203.109
                  Oct 3, 2022 15:45:55.606863976 CEST49691443192.168.2.6142.250.203.110
                  Oct 3, 2022 15:45:55.613852978 CEST44349691142.250.203.110192.168.2.6
                  Oct 3, 2022 15:45:55.614083052 CEST44349691142.250.203.110192.168.2.6
                  Oct 3, 2022 15:45:55.614334106 CEST49691443192.168.2.6142.250.203.110
                  Oct 3, 2022 15:45:55.643161058 CEST49693443192.168.2.6142.250.203.109
                  Oct 3, 2022 15:45:55.643193007 CEST44349693142.250.203.109192.168.2.6
                  Oct 3, 2022 15:45:55.643973112 CEST49691443192.168.2.6142.250.203.110
                  Oct 3, 2022 15:45:55.644002914 CEST44349691142.250.203.110192.168.2.6
                  Oct 3, 2022 15:45:55.645345926 CEST44349697142.250.203.100192.168.2.6
                  Oct 3, 2022 15:45:55.651815891 CEST49695443192.168.2.6142.250.203.109
                  Oct 3, 2022 15:45:55.651851892 CEST44349695142.250.203.109192.168.2.6
                  Oct 3, 2022 15:45:55.651891947 CEST49696443192.168.2.6142.250.203.110
                  Oct 3, 2022 15:45:55.651904106 CEST44349696142.250.203.110192.168.2.6
                  Oct 3, 2022 15:45:55.660098076 CEST49697443192.168.2.6142.250.203.100
                  Oct 3, 2022 15:45:55.660151958 CEST44349697142.250.203.100192.168.2.6
                  Oct 3, 2022 15:45:55.663235903 CEST44349697142.250.203.100192.168.2.6
                  Oct 3, 2022 15:45:55.663568974 CEST49697443192.168.2.6142.250.203.100
                  Oct 3, 2022 15:45:55.751873970 CEST49695443192.168.2.6142.250.203.109
                  Oct 3, 2022 15:45:55.751935005 CEST49696443192.168.2.6142.250.203.110
                  Oct 3, 2022 15:45:55.855897903 CEST49697443192.168.2.6142.250.203.100
                  Oct 3, 2022 15:45:55.855950117 CEST44349697142.250.203.100192.168.2.6
                  Oct 3, 2022 15:45:55.856198072 CEST44349697142.250.203.100192.168.2.6
                  Oct 3, 2022 15:45:55.904952049 CEST49697443192.168.2.6142.250.203.100
                  Oct 3, 2022 15:45:55.905005932 CEST44349697142.250.203.100192.168.2.6
                  Oct 3, 2022 15:45:56.005920887 CEST49697443192.168.2.6142.250.203.100
                  Oct 3, 2022 15:46:05.634701967 CEST44349697142.250.203.100192.168.2.6
                  TimestampSource PortDest PortSource IPDest IP
                  Oct 3, 2022 15:45:51.985202074 CEST5768653192.168.2.68.8.8.8
                  Oct 3, 2022 15:45:51.985297918 CEST6438253192.168.2.68.8.8.8
                  Oct 3, 2022 15:45:52.010827065 CEST53643828.8.8.8192.168.2.6
                  Oct 3, 2022 15:45:52.012006044 CEST53576868.8.8.8192.168.2.6
                  Oct 3, 2022 15:45:54.848217964 CEST6438253192.168.2.68.8.8.8
                  Oct 3, 2022 15:45:54.865638018 CEST53643828.8.8.8192.168.2.6
                  Oct 3, 2022 15:45:55.461338043 CEST5310753192.168.2.68.8.8.8
                  Oct 3, 2022 15:45:55.487329006 CEST53531078.8.8.8192.168.2.6
                  Oct 3, 2022 15:45:55.542046070 CEST6460153192.168.2.68.8.8.8
                  Oct 3, 2022 15:45:55.561158895 CEST53646018.8.8.8192.168.2.6
                  Oct 3, 2022 15:45:55.585792065 CEST53595758.8.8.8192.168.2.6
                  Oct 3, 2022 15:47:55.458117962 CEST5988153192.168.2.68.8.8.8
                  Oct 3, 2022 15:47:55.477812052 CEST53598818.8.8.8192.168.2.6
                  Oct 3, 2022 15:47:55.483985901 CEST5891753192.168.2.68.8.8.8
                  Oct 3, 2022 15:47:55.509500980 CEST53589178.8.8.8192.168.2.6
                  TimestampSource IPDest IPChecksumCodeType
                  Oct 3, 2022 15:45:54.865792036 CEST192.168.2.68.8.8.8d009(Port unreachable)Destination Unreachable
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Oct 3, 2022 15:45:51.985202074 CEST192.168.2.68.8.8.80xf0c8Standard query (0)clients2.google.comA (IP address)IN (0x0001)false
                  Oct 3, 2022 15:45:51.985297918 CEST192.168.2.68.8.8.80x8eecStandard query (0)accounts.google.comA (IP address)IN (0x0001)false
                  Oct 3, 2022 15:45:54.848217964 CEST192.168.2.68.8.8.80x8eecStandard query (0)accounts.google.comA (IP address)IN (0x0001)false
                  Oct 3, 2022 15:45:55.461338043 CEST192.168.2.68.8.8.80xab04Standard query (0)www.google.comA (IP address)IN (0x0001)false
                  Oct 3, 2022 15:45:55.542046070 CEST192.168.2.68.8.8.80x27d2Standard query (0)www.google.comA (IP address)IN (0x0001)false
                  Oct 3, 2022 15:47:55.458117962 CEST192.168.2.68.8.8.80x965aStandard query (0)www.google.comA (IP address)IN (0x0001)false
                  Oct 3, 2022 15:47:55.483985901 CEST192.168.2.68.8.8.80x1472Standard query (0)www.google.comA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Oct 3, 2022 15:45:52.010827065 CEST8.8.8.8192.168.2.60x8eecNo error (0)accounts.google.com142.250.203.109A (IP address)IN (0x0001)false
                  Oct 3, 2022 15:45:52.012006044 CEST8.8.8.8192.168.2.60xf0c8No error (0)clients2.google.comclients.l.google.comCNAME (Canonical name)IN (0x0001)false
                  Oct 3, 2022 15:45:52.012006044 CEST8.8.8.8192.168.2.60xf0c8No error (0)clients.l.google.com142.250.203.110A (IP address)IN (0x0001)false
                  Oct 3, 2022 15:45:54.865638018 CEST8.8.8.8192.168.2.60x8eecNo error (0)accounts.google.com142.250.203.109A (IP address)IN (0x0001)false
                  Oct 3, 2022 15:45:55.487329006 CEST8.8.8.8192.168.2.60xab04No error (0)www.google.com142.250.203.100A (IP address)IN (0x0001)false
                  Oct 3, 2022 15:45:55.561158895 CEST8.8.8.8192.168.2.60x27d2No error (0)www.google.com142.250.203.100A (IP address)IN (0x0001)false
                  Oct 3, 2022 15:47:55.477812052 CEST8.8.8.8192.168.2.60x965aNo error (0)www.google.com142.250.203.100A (IP address)IN (0x0001)false
                  Oct 3, 2022 15:47:55.509500980 CEST8.8.8.8192.168.2.60x1472No error (0)www.google.com142.250.203.100A (IP address)IN (0x0001)false
                  • clients2.google.com
                  • accounts.google.com
                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  0192.168.2.649691142.250.203.110443C:\Program Files\Google\Chrome\Application\chrome.exe
                  TimestampkBytes transferredDirectionData
                  2022-10-03 13:45:55 UTC0OUTGET /service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=104.0.5112.81&lang=en-US&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1 HTTP/1.1
                  Host: clients2.google.com
                  Connection: keep-alive
                  X-Goog-Update-Interactivity: fg
                  X-Goog-Update-AppId: nmmhkkegccagdldgiimedpiccmgmieda
                  X-Goog-Update-Updater: chromecrx-104.0.5112.81
                  Sec-Fetch-Site: none
                  Sec-Fetch-Mode: no-cors
                  Sec-Fetch-Dest: empty
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36
                  Accept-Encoding: gzip, deflate, br
                  Accept-Language: en-US,en;q=0.9
                  2022-10-03 13:45:55 UTC3INHTTP/1.1 200 OK
                  Content-Security-Policy: script-src 'report-sample' 'nonce-fMO50DUDGZRLMsou00AjEw' 'unsafe-inline' 'strict-dynamic' https: http:;object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/clientupdate-aus/1
                  Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                  Pragma: no-cache
                  Expires: Mon, 01 Jan 1990 00:00:00 GMT
                  Date: Mon, 03 Oct 2022 13:45:55 GMT
                  Content-Type: text/xml; charset=UTF-8
                  X-Daynum: 5754
                  X-Daystart: 24355
                  X-Content-Type-Options: nosniff
                  X-Frame-Options: SAMEORIGIN
                  X-XSS-Protection: 1; mode=block
                  Server: GSE
                  Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
                  Accept-Ranges: none
                  Vary: Accept-Encoding
                  Connection: close
                  Transfer-Encoding: chunked
                  2022-10-03 13:45:55 UTC3INData Raw: 32 63 39 0d 0a 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 55 54 46 2d 38 22 3f 3e 3c 67 75 70 64 61 74 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 75 70 64 61 74 65 32 2f 72 65 73 70 6f 6e 73 65 22 20 70 72 6f 74 6f 63 6f 6c 3d 22 32 2e 30 22 20 73 65 72 76 65 72 3d 22 70 72 6f 64 22 3e 3c 64 61 79 73 74 61 72 74 20 65 6c 61 70 73 65 64 5f 64 61 79 73 3d 22 35 37 35 34 22 20 65 6c 61 70 73 65 64 5f 73 65 63 6f 6e 64 73 3d 22 32 34 33 35 35 22 2f 3e 3c 61 70 70 20 61 70 70 69 64 3d 22 6e 6d 6d 68 6b 6b 65 67 63 63 61 67 64 6c 64 67 69 69 6d 65 64 70 69 63 63 6d 67 6d 69 65 64 61 22 20 63 6f 68 6f 72 74 3d 22 31 3a 3a 22 20 63 6f 68 6f 72 74 6e 61 6d 65 3d 22 22
                  Data Ascii: 2c9<?xml version="1.0" encoding="UTF-8"?><gupdate xmlns="http://www.google.com/update2/response" protocol="2.0" server="prod"><daystart elapsed_days="5754" elapsed_seconds="24355"/><app appid="nmmhkkegccagdldgiimedpiccmgmieda" cohort="1::" cohortname=""
                  2022-10-03 13:45:55 UTC4INData Raw: 6d 78 76 59 6e 4d 76 4e 7a 49 30 51 55 46 58 4e 56 39 7a 54 32 52 76 64 55 77 79 4d 45 52 45 53 45 5a 47 56 6d 4a 6e 51 51 2f 31 2e 30 2e 30 2e 36 5f 6e 6d 6d 68 6b 6b 65 67 63 63 61 67 64 6c 64 67 69 69 6d 65 64 70 69 63 63 6d 67 6d 69 65 64 61 2e 63 72 78 22 20 66 70 3d 22 31 2e 38 31 65 33 61 34 64 34 33 61 37 33 36 39 39 65 31 62 37 37 38 31 37 32 33 66 35 36 62 38 37 31 37 31 37 35 63 35 33 36 36 38 35 63 35 34 35 30 31 32 32 62 33 30 37 38 39 34 36 34 61 64 38 32 22 20 68 61 73 68 5f 73 68 61 32 35 36 3d 22 38 31 65 33 61 34 64 34 33 61 37 33 36 39 39 65 31 62 37 37 38 31 37 32 33 66 35 36 62 38 37 31 37 31 37 35 63 35 33 36 36 38 35 63 35 34 35 30 31 32 32 62 33 30 37 38 39 34 36 34 61 64 38 32 22 20 70 72 6f 74 65 63 74 65 64 3d 22 30 22 20 73 69
                  Data Ascii: mxvYnMvNzI0QUFXNV9zT2RvdUwyMERESEZGVmJnQQ/1.0.0.6_nmmhkkegccagdldgiimedpiccmgmieda.crx" fp="1.81e3a4d43a73699e1b7781723f56b8717175c536685c5450122b30789464ad82" hash_sha256="81e3a4d43a73699e1b7781723f56b8717175c536685c5450122b30789464ad82" protected="0" si
                  2022-10-03 13:45:55 UTC4INData Raw: 30 0d 0a 0d 0a
                  Data Ascii: 0


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  1192.168.2.649693142.250.203.109443C:\Program Files\Google\Chrome\Application\chrome.exe
                  TimestampkBytes transferredDirectionData
                  2022-10-03 13:45:55 UTC0OUTPOST /ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard HTTP/1.1
                  Host: accounts.google.com
                  Connection: keep-alive
                  Content-Length: 1
                  Origin: https://www.google.com
                  Content-Type: application/x-www-form-urlencoded
                  Sec-Fetch-Site: none
                  Sec-Fetch-Mode: no-cors
                  Sec-Fetch-Dest: empty
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36
                  Accept-Encoding: gzip, deflate, br
                  Accept-Language: en-US,en;q=0.9
                  Cookie: __Secure-ENID=6.SE=Md0Ynyf9ahpkx1CxTGF0vY434NJ6ymH-gDI2Tl5Ly-NQYGPjnNfggtiFRMAwx4JRDOC_gavEPcD5cTBJzUgtbJobmBEuJ8xi2UuotxvOZgApoqSIg1b0RP47U08XG8Bz_SExSzKy0ETSsajbToDlYyFsxfI93p7AyRAd-OeIBA0; CONSENT=PENDING+070
                  2022-10-03 13:45:55 UTC1OUTData Raw: 20
                  Data Ascii:
                  2022-10-03 13:45:55 UTC1INHTTP/1.1 200 OK
                  Content-Type: application/json; charset=utf-8
                  Access-Control-Allow-Origin: https://www.google.com
                  Access-Control-Allow-Credentials: true
                  X-Content-Type-Options: nosniff
                  Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                  Pragma: no-cache
                  Expires: Mon, 01 Jan 1990 00:00:00 GMT
                  Date: Mon, 03 Oct 2022 13:45:55 GMT
                  Strict-Transport-Security: max-age=31536000; includeSubDomains
                  Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-platform=*, ch-ua-platform-version=*
                  Content-Security-Policy: script-src 'report-sample' 'nonce-TstWCeDkfcAsAGTij6MZkw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/IdentityListAccountsHttp/cspreport;worker-src 'self'
                  Content-Security-Policy: script-src 'unsafe-inline' 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/IdentityListAccountsHttp/cspreport/allowlist
                  Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/IdentityListAccountsHttp/cspreport
                  Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                  Cross-Origin-Opener-Policy: same-origin
                  Server: ESF
                  X-XSS-Protection: 0
                  Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
                  Accept-Ranges: none
                  Vary: Accept-Encoding
                  Connection: close
                  Transfer-Encoding: chunked
                  2022-10-03 13:45:55 UTC3INData Raw: 31 31 0d 0a 5b 22 67 61 69 61 2e 6c 2e 61 2e 72 22 2c 5b 5d 5d 0d 0a
                  Data Ascii: 11["gaia.l.a.r",[]]
                  2022-10-03 13:45:55 UTC3INData Raw: 30 0d 0a 0d 0a
                  Data Ascii: 0


                  Click to jump to process

                  Target ID:0
                  Start time:15:45:48
                  Start date:03/10/2022
                  Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank
                  Imagebase:0x7ff6f9750000
                  File size:2851656 bytes
                  MD5 hash:0FEC2748F363150DC54C1CAFFB1A9408
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:1
                  Start time:15:45:49
                  Start date:03/10/2022
                  Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1956 --field-trial-handle=1700,i,2030005579113327324,13011269261470832477,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8
                  Imagebase:0x7ff6f9750000
                  File size:2851656 bytes
                  MD5 hash:0FEC2748F363150DC54C1CAFFB1A9408
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:2
                  Start time:15:45:50
                  Start date:03/10/2022
                  Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Program Files\Google\Chrome\Application\chrome.exe" "C:\Users\user\Desktop\Milwaukeetool Payment.hTml
                  Imagebase:0x7ff6f9750000
                  File size:2851656 bytes
                  MD5 hash:0FEC2748F363150DC54C1CAFFB1A9408
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  No disassembly