Windows Analysis Report
http://url3262.oprgfinancialfr.com/ls/click?upn=u001.Py-2FcVSQndQw6RxCcuXKZAkIbpg7veTyaATDA9WyQ-2BdfnQOlJCAtyxyM2LttobGTTREAa6DvWt93aw7r4mI6XcQ-3D-3DTVLG_EGP3Au5Nd4wfZMjv-2FVYS-2BosKPTjHXLlZHo7VlqcFpGwrGYOCSKztVMysWQjzbar-2FW1ZxqaQBwpOnANmz2l7JQKHQNGYc1yVpGOUUIOhLNVhBMqy8-2Fd4EoLg7IvzeeyZw-2FUdwXjU9

Overview

General Information

Sample URL: http://url3262.oprgfinancialfr.com/ls/click?upn=u001.Py-2FcVSQndQw6RxCcuXKZAkIbpg7veTyaATDA9WyQ-2BdfnQOlJCAtyxyM2LttobGTTREAa6DvWt93aw7r4mI6XcQ-3D-3DTVLG_EGP3Au5Nd4wfZMjv-2FVYS-2BosKPTjHXLlZHo7VlqcFpG
Analysis ID: 1445893
Infos:

Detection

Score: 1
Range: 0 - 100
Whitelisted: false
Confidence: 80%

Signatures

Detected non-DNS traffic on DNS port
Stores files to the Windows start menu directory

Classification

Source: http://url3262.oprgfinancialfr.com/ls/click?upn=u001.Py-2FcVSQndQw6RxCcuXKZAkIbpg7veTyaATDA9WyQ-2BdfnQOlJCAtyxyM2LttobGTTREAa6DvWt93aw7r4mI6XcQ-3D-3DTVLG_EGP3Au5Nd4wfZMjv-2FVYS-2BosKPTjHXLlZHo7VlqcFpGwrGYOCSKztVMysWQjzbar-2FW1ZxqaQBwpOnANmz2l7JQKHQNGYc1yVpGOUUIOhLNVhBMqy8-2Fd4EoLg7IvzeeyZw-2FUdwXjU94n8-2FTf0-2FFo33LjLQaiihW9sQ3an1FgOeUjqrZz8iiGEsS6BVYN84-2FmGbNtr1ZzP40rSq7xxOIoo1VngJcAQlyKXVIrnsbnHbpvaWrSKP0jVoim9e3R9PnSfJSfbZfL02CYHvU0L1ebgTrAYuW8NsfK8a3G-2Fx9drvUNNk1IYefkGAgTMR5ua2V6bl-2FkqyESUn1byM70hrAq5PFfoTUMiCCWa5-2FLl4XAuHhjNR4wum-2BrSftAezak8Lq2oLiRHsjT7RQDxTH14wtM-2B9R7iUOm-2Bkcyy8LPYroW7SXfNcBmfOph2Zvc4Q5ftrDt7pZjh-2BQChohaWS6mT3P8xYHtIqkH1gx1ZFF9mWSa-2B-2Bf5jnWT69wrfUgcqKmN3qZ0VKezSA-2F-2FJSsr9gQl4k5zyl4g4yoesf3GXM4oeMP0h9cVXyHUP-2Fl5RIkXdB8d82yNNHWceJuJWHGGkwmnhn0Pdu8tLhXeF4AJnwk7IdCNgRFEKP3qHo285DpHw3gtIASMRv8wdwDh4-2FuqeGddAIR-2B8nT6KgUsddU-2Ba-2FNkqAiYW-2FGwQEYWEKjr0gnp6kI1d0vIBgS1cs7aXXaDXWr4maA25bPLzQQxxoj04UjQUZXM4n3nfE2AmrBHYhZBSATFkaXuJRvPVO5ugje2FNLeI-2BbGAXKEvt9kgSOPazAt2u5-2FbEBDjppVON... HTTP Parser: No favicon
Source: unknown HTTPS traffic detected: 2.18.97.153:443 -> 192.168.2.5:49714 version: TLS 1.2
Source: unknown HTTPS traffic detected: 2.18.97.153:443 -> 192.168.2.5:49715 version: TLS 1.2
Source: global traffic TCP traffic: 192.168.2.5:53735 -> 1.1.1.1:53
Source: unknown TCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknown TCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknown TCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknown TCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknown TCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknown TCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknown TCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknown TCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknown TCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknown TCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknown TCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknown TCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknown TCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknown TCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknown TCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknown TCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknown TCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknown TCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknown TCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknown TCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknown TCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknown TCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknown TCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknown TCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknown TCP traffic detected without corresponding DNS query: 2.18.97.153
Source: unknown TCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown TCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown TCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown TCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown TCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic HTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
Source: global traffic HTTP traffic detected: GET /ls/click?upn=u001.Py-2FcVSQndQw6RxCcuXKZAkIbpg7veTyaATDA9WyQ-2BdfnQOlJCAtyxyM2LttobGTTREAa6DvWt93aw7r4mI6XcQ-3D-3DTVLG_EGP3Au5Nd4wfZMjv-2FVYS-2BosKPTjHXLlZHo7VlqcFpGwrGYOCSKztVMysWQjzbar-2FW1ZxqaQBwpOnANmz2l7JQKHQNGYc1yVpGOUUIOhLNVhBMqy8-2Fd4EoLg7IvzeeyZw-2FUdwXjU94n8-2FTf0-2FFo33LjLQaiihW9sQ3an1FgOeUjqrZz8iiGEsS6BVYN84-2FmGbNtr1ZzP40rSq7xxOIoo1VngJcAQlyKXVIrnsbnHbpvaWrSKP0jVoim9e3R9PnSfJSfbZfL02CYHvU0L1ebgTrAYuW8NsfK8a3G-2Fx9drvUNNk1IYefkGAgTMR5ua2V6bl-2FkqyESUn1byM70hrAq5PFfoTUMiCCWa5-2FLl4XAuHhjNR4wum-2BrSftAezak8Lq2oLiRHsjT7RQDxTH14wtM-2B9R7iUOm-2Bkcyy8LPYroW7SXfNcBmfOph2Zvc4Q5ftrDt7pZjh-2BQChohaWS6mT3P8xYHtIqkH1gx1ZFF9mWSa-2B-2Bf5jnWT69wrfUgcqKmN3qZ0VKezSA-2F-2FJSsr9gQl4k5zyl4g4yoesf3GXM4oeMP0h9cVXyHUP-2Fl5RIkXdB8d82yNNHWceJuJWHGGkwmnhn0Pdu8tLhXeF4AJnwk7IdCNgRFEKP3qHo285DpHw3gtIASMRv8wdwDh4-2FuqeGddAIR-2B8nT6KgUsddU-2Ba-2FNkqAiYW-2FGwQEYWEKjr0gnp6kI1d0vIBgS1cs7aXXaDXWr4maA25bPLzQQxxoj04UjQUZXM4n3nfE2AmrBHYhZBSATFkaXuJRvPVO5ugje2FNLeI-2BbGAXKEvt9kgSOPazAt2u5-2FbEBDjppVONo6611YUN8vFYIohCKNXMkHyIHKNMqkkXjxcqF3xBphbVw7wDcATGRIdNZJY-3D HTTP/1.1Host: url3262.oprgfinancialfr.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /favicon.ico HTTP/1.1Host: url3262.oprgfinancialfr.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Referer: http://url3262.oprgfinancialfr.com/ls/click?upn=u001.Py-2FcVSQndQw6RxCcuXKZAkIbpg7veTyaATDA9WyQ-2BdfnQOlJCAtyxyM2LttobGTTREAa6DvWt93aw7r4mI6XcQ-3D-3DTVLG_EGP3Au5Nd4wfZMjv-2FVYS-2BosKPTjHXLlZHo7VlqcFpGwrGYOCSKztVMysWQjzbar-2FW1ZxqaQBwpOnANmz2l7JQKHQNGYc1yVpGOUUIOhLNVhBMqy8-2Fd4EoLg7IvzeeyZw-2FUdwXjU94n8-2FTf0-2FFo33LjLQaiihW9sQ3an1FgOeUjqrZz8iiGEsS6BVYN84-2FmGbNtr1ZzP40rSq7xxOIoo1VngJcAQlyKXVIrnsbnHbpvaWrSKP0jVoim9e3R9PnSfJSfbZfL02CYHvU0L1ebgTrAYuW8NsfK8a3G-2Fx9drvUNNk1IYefkGAgTMR5ua2V6bl-2FkqyESUn1byM70hrAq5PFfoTUMiCCWa5-2FLl4XAuHhjNR4wum-2BrSftAezak8Lq2oLiRHsjT7RQDxTH14wtM-2B9R7iUOm-2Bkcyy8LPYroW7SXfNcBmfOph2Zvc4Q5ftrDt7pZjh-2BQChohaWS6mT3P8xYHtIqkH1gx1ZFF9mWSa-2B-2Bf5jnWT69wrfUgcqKmN3qZ0VKezSA-2F-2FJSsr9gQl4k5zyl4g4yoesf3GXM4oeMP0h9cVXyHUP-2Fl5RIkXdB8d82yNNHWceJuJWHGGkwmnhn0Pdu8tLhXeF4AJnwk7IdCNgRFEKP3qHo285DpHw3gtIASMRv8wdwDh4-2FuqeGddAIR-2B8nT6KgUsddU-2Ba-2FNkqAiYW-2FGwQEYWEKjr0gnp6kI1d0vIBgS1cs7aXXaDXWr4maA25bPLzQQxxoj04UjQUZXM4n3nfE2AmrBHYhZBSATFkaXuJRvPVO5ugje2FNLeI-2BbGAXKEvt9kgSOPazAt2u5-2FbEBDjppVONo6611YUN8vFYIohCKNXMkHyIHKNMqkkXjxcqF3xBphbVw7wDcATGRIdNZJY-3DAccept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global traffic DNS traffic detected: DNS query: url3262.oprgfinancialfr.com
Source: global traffic DNS traffic detected: DNS query: www.google.com
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 22 May 2024 16:04:07 GMTContent-Type: text/htmlContent-Length: 564Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body bgcolor="white"><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
Source: unknown Network traffic detected: HTTP traffic on port 49674 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49675 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49673 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49703 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 53740
Source: unknown Network traffic detected: HTTP traffic on port 53740 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49713 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49714 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49715 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49715
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49714
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49703
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49713
Source: unknown HTTPS traffic detected: 2.18.97.153:443 -> 192.168.2.5:49714 version: TLS 1.2
Source: unknown HTTPS traffic detected: 2.18.97.153:443 -> 192.168.2.5:49715 version: TLS 1.2
Source: classification engine Classification label: clean1.win@21/10@4/5
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps Jump to behavior
Source: unknown Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 --field-trial-handle=2192,i,2516542292744883314,14553751070343600966,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknown Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://url3262.oprgfinancialfr.com/ls/click?upn=u001.Py-2FcVSQndQw6RxCcuXKZAkIbpg7veTyaATDA9WyQ-2BdfnQOlJCAtyxyM2LttobGTTREAa6DvWt93aw7r4mI6XcQ-3D-3DTVLG_EGP3Au5Nd4wfZMjv-2FVYS-2BosKPTjHXLlZHo7VlqcFpGwrGYOCSKztVMysWQjzbar-2FW1ZxqaQBwpOnANmz2l7JQKHQNGYc1yVpGOUUIOhLNVhBMqy8-2Fd4EoLg7IvzeeyZw-2FUdwXjU94n8-2FTf0-2FFo33LjLQaiihW9sQ3an1FgOeUjqrZz8iiGEsS6BVYN84-2FmGbNtr1ZzP40rSq7xxOIoo1VngJcAQlyKXVIrnsbnHbpvaWrSKP0jVoim9e3R9PnSfJSfbZfL02CYHvU0L1ebgTrAYuW8NsfK8a3G-2Fx9drvUNNk1IYefkGAgTMR5ua2V6bl-2FkqyESUn1byM70hrAq5PFfoTUMiCCWa5-2FLl4XAuHhjNR4wum-2BrSftAezak8Lq2oLiRHsjT7RQDxTH14wtM-2B9R7iUOm-2Bkcyy8LPYroW7SXfNcBmfOph2Zvc4Q5ftrDt7pZjh-2BQChohaWS6mT3P8xYHtIqkH1gx1ZFF9mWSa-2B-2Bf5jnWT69wrfUgcqKmN3qZ0VKezSA-2F-2FJSsr9gQl4k5zyl4g4yoesf3GXM4oeMP0h9cVXyHUP-2Fl5RIkXdB8d82yNNHWceJuJWHGGkwmnhn0Pdu8tLhXeF4AJnwk7IdCNgRFEKP3qHo285DpHw3gtIASMRv8wdwDh4-2FuqeGddAIR-2B8nT6KgUsddU-2Ba-2FNkqAiYW-2FGwQEYWEKjr0gnp6kI1d0vIBgS1cs7aXXaDXWr4maA25bPLzQQxxoj04UjQUZXM4n3nfE2AmrBHYhZBSATFkaXuJRvPVO5ugje2FNLeI-2BbGAXKEvt9kgSOPazAt2u5-2FbEBDjppVONo6611YUN8vFYIohCKNXMkHyIHKNMqkkXjxcqF3xBphbVw7wDcATGRIdNZJY-3D"
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 --field-trial-handle=2192,i,2516542292744883314,14553751070343600966,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: Google Drive.lnk.0.dr LNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.0.dr LNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.0.dr LNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.0.dr LNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.0.dr LNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.0.dr LNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs