Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
http://52.111.236.26

Overview

General Information

Sample URL:http://52.111.236.26
Analysis ID:1447252
Infos:
Errors
  • URL not reachable

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Stores files to the Windows start menu directory

Classification

  • System is w10x64
  • chrome.exe (PID: 6156 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6536 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 --field-trial-handle=2160,i,7926519452760729957,9077178389548215060,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6340 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://52.111.236.26" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 52.111.236.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.111.236.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.111.236.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.111.236.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.111.236.26
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 52.111.236.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.111.236.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.111.236.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.111.236.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.111.236.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.111.236.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.111.236.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.111.236.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.111.236.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.111.236.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.111.236.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.111.236.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.111.236.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.111.236.26
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 52.111.236.26Connection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 52.111.236.26Connection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 52.111.236.26Connection: keep-aliveCache-Control: max-age=0Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: classification engineClassification label: unknown0.win@18/6@2/4
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 --field-trial-handle=2160,i,7926519452760729957,9077178389548215060,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://52.111.236.26"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 --field-trial-handle=2160,i,7926519452760729957,9077178389548215060,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Google Drive.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
http://52.111.236.260%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://52.111.236.26/0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
www.google.com
142.250.186.68
truefalse
    unknown
    fp2e7a.wpc.phicdn.net
    192.229.221.95
    truefalse
      unknown
      NameMaliciousAntivirus DetectionReputation
      http://52.111.236.26/false
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      142.250.186.68
      www.google.comUnited States
      15169GOOGLEUSfalse
      239.255.255.250
      unknownReserved
      unknownunknownfalse
      52.111.236.26
      unknownUnited States
      8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
      IP
      192.168.2.5
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1447252
      Start date and time:2024-05-24 17:34:46 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 2m 42s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:browseurl.jbs
      Sample URL:http://52.111.236.26
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:8
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:UNKNOWN
      Classification:unknown0.win@18/6@2/4
      EGA Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • URL browsing timeout or error
      • URL not reachable
      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 142.250.185.163, 108.177.15.84, 142.250.186.78, 34.104.35.123, 184.28.90.27, 52.165.165.26, 93.184.221.240, 192.229.221.95, 13.95.31.18, 13.85.23.206
      • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, clientservices.googleapis.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wu.azureedge.net, clients2.google.com, ocsp.digicert.com, e16604.g.akamaiedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, fs.microsoft.com, accounts.google.com, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, edgedl.me.gvt1.com, clients.l.google.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtSetInformationFile calls found.
      • VT rate limit hit for: http://52.111.236.26
      No simulations
      No context
      No context
      No context
      No context
      No context
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri May 24 14:35:38 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
      Category:dropped
      Size (bytes):2677
      Entropy (8bit):3.979409587200149
      Encrypted:false
      SSDEEP:48:8BsdcTgkJHxidAKZdA19ehwiZUklqehKlxy+3:8J/Brxy
      MD5:D58952610EA712BFBBE92BBCF430ACE1
      SHA1:1D2B1EB74F502E57677D29835AF1F335ACC655CF
      SHA-256:1AB93F376DFDA39274E9F55C77F0C98B43EF8EFE9739DDA7F282D60BA9E20EF1
      SHA-512:BC17B279345F1AA9ADDD03D997EB96D4FBBB783604C887698C19621072211D39D8593AC09953C264674D5CB30E75E7DBB0B3EE4C8D57178D10FA214FD7639ACC
      Malicious:false
      Reputation:low
      Preview:L..................F.@.. ...$+.,......l....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.Xq|....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xq|....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xq|....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xq|..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Xt|...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........e..m.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri May 24 14:35:38 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
      Category:dropped
      Size (bytes):2679
      Entropy (8bit):3.9917659075431557
      Encrypted:false
      SSDEEP:48:8isdcTgkJHxidAKZdA1weh/iZUkAQkqehZlxy+2:8C/z9Q4xy
      MD5:8E7DDF7DC1FEAC54B8A28B4DD2E2610F
      SHA1:E666F927DF5418743DF1D2A0C5EDAFDCE5A8B5B5
      SHA-256:A2058A06CEA18042C95AD19660052D29767D0AE7456D07F0A74FBB73F0C1F567
      SHA-512:240FFADA67FA32E44BCB24FADC72B03D6CA08B114119484883E93F02E019FB252658761A01D159EF9A72E2657055A1DF10408F690AE3B4CB400C40898451F1EB
      Malicious:false
      Reputation:low
      Preview:L..................F.@.. ...$+.,.....lc....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.Xq|....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xq|....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xq|....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xq|..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Xt|...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........e..m.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
      Category:dropped
      Size (bytes):2693
      Entropy (8bit):4.007033732855791
      Encrypted:false
      SSDEEP:48:8x1dcTgksHxidAKZdA14tseh7sFiZUkmgqeh7sPlxy+BX:8xE/4nfxy
      MD5:B7CCCE9869246F1F0101AA6B62FE82B4
      SHA1:25D5FDE95FFB78A9C14354C2270265CFB1AEABBC
      SHA-256:8168E685B4B5537819EB0DA24160DCE9A82EB0140F1150A217C16389D0F54822
      SHA-512:3377DEE139BFDE586A22B75EF5A58C8F1C04B81C86AD7DED2E3ABEC1B21348E143D28C21A91685FFB46509BB0654C731D4F3C0B3789096CB01D42ED07A5A18DD
      Malicious:false
      Reputation:low
      Preview:L..................F.@.. ...$+.,......e>....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.Xq|....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xq|....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xq|....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xq|..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VDW.n...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........e..m.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri May 24 14:35:38 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
      Category:dropped
      Size (bytes):2681
      Entropy (8bit):3.9943155116028994
      Encrypted:false
      SSDEEP:48:8+sdcTgkJHxidAKZdA1vehDiZUkwqehNlxy+R:8e/wVxy
      MD5:136BBD6F64F798702E6A3CACA1F3C1B0
      SHA1:9A2816296E79B872040D1A7DC9D36619C6E4225C
      SHA-256:967A2EC032AD439B418ECE03BF68B7095AC954E0BC4C21B3A4463F3E60FB16B2
      SHA-512:B19798F3462047CF5D5F0952D73AD93DCEDBBA3EA0B9DBAFDFA49C91047223B387B905E8F9754A3440B07038EDEBA395D4C760877CB17B183200A09503B4C079
      Malicious:false
      Reputation:low
      Preview:L..................F.@.. ...$+.,....w.[....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.Xq|....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xq|....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xq|....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xq|..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Xt|...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........e..m.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri May 24 14:35:38 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
      Category:dropped
      Size (bytes):2681
      Entropy (8bit):3.9815525326046353
      Encrypted:false
      SSDEEP:48:8UsdcTgkJHxidAKZdA1hehBiZUk1W1qehblxy+C:8w/w9hxy
      MD5:8757E67FA4C8BE558F6376FD83598E86
      SHA1:4583DCD6D8795243B9F637D9069DAEC6B59CEB4D
      SHA-256:4172022D47DC3D82E7288331A9F06BD8E8B57CB6036950E6CB6350351062AA67
      SHA-512:269C358B23AF97F2F7BB80B6954F923709EA874046FBEF85E5255B2FFB29E8DC16F678306818ED20B41146FD167DAF2918E4EED4E41CC9C295A785807EF480CC
      Malicious:false
      Reputation:low
      Preview:L..................F.@.. ...$+.,......h....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.Xq|....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xq|....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xq|....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xq|..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Xt|...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........e..m.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri May 24 14:35:38 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
      Category:dropped
      Size (bytes):2683
      Entropy (8bit):3.9942827971338315
      Encrypted:false
      SSDEEP:48:8GsdcTgkJHxidAKZdA1duT+ehOuTbbiZUk5OjqehOuTbFlxy+yT+:8G/+T/TbxWOvTbfxy7T
      MD5:13E56A6E91E99047229B26DF53E79B73
      SHA1:7E0CD908254E335E515439B32BF8837CF6101D7D
      SHA-256:48A5F2410145B64B1C0B58FBD5EE1933B3BA56FED22B2A26F6B7393ACE83122D
      SHA-512:1F9B2A232D600590A10B2CFA7BF3354BCEFC7F17399EE47C3BA6A802E55556436E31A1A0C57A28F18AFAC73DD124A2BB63193428808AF2AAB7A1D1EDC91C5113
      Malicious:false
      Reputation:low
      Preview:L..................F.@.. ...$+.,......S....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.Xq|....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xq|....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xq|....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xq|..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Xt|...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........e..m.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
      No static file info
      TimestampSource PortDest PortSource IPDest IP
      May 24, 2024 17:35:29.131268978 CEST49675443192.168.2.523.1.237.91
      May 24, 2024 17:35:29.131268978 CEST49674443192.168.2.523.1.237.91
      May 24, 2024 17:35:29.256263018 CEST49673443192.168.2.523.1.237.91
      May 24, 2024 17:35:38.755703926 CEST49674443192.168.2.523.1.237.91
      May 24, 2024 17:35:38.896343946 CEST49675443192.168.2.523.1.237.91
      May 24, 2024 17:35:38.896343946 CEST49673443192.168.2.523.1.237.91
      May 24, 2024 17:35:39.131890059 CEST4970980192.168.2.552.111.236.26
      May 24, 2024 17:35:39.131992102 CEST4971080192.168.2.552.111.236.26
      May 24, 2024 17:35:39.136842012 CEST804970952.111.236.26192.168.2.5
      May 24, 2024 17:35:39.136926889 CEST4970980192.168.2.552.111.236.26
      May 24, 2024 17:35:39.139544964 CEST4970980192.168.2.552.111.236.26
      May 24, 2024 17:35:39.187413931 CEST804971052.111.236.26192.168.2.5
      May 24, 2024 17:35:39.187511921 CEST4971080192.168.2.552.111.236.26
      May 24, 2024 17:35:39.192609072 CEST804970952.111.236.26192.168.2.5
      May 24, 2024 17:35:39.891567945 CEST49712443192.168.2.5142.250.186.68
      May 24, 2024 17:35:39.891611099 CEST44349712142.250.186.68192.168.2.5
      May 24, 2024 17:35:39.891673088 CEST49712443192.168.2.5142.250.186.68
      May 24, 2024 17:35:39.892267942 CEST49712443192.168.2.5142.250.186.68
      May 24, 2024 17:35:39.892290115 CEST44349712142.250.186.68192.168.2.5
      May 24, 2024 17:35:40.523655891 CEST4434970323.1.237.91192.168.2.5
      May 24, 2024 17:35:40.523763895 CEST49703443192.168.2.523.1.237.91
      May 24, 2024 17:35:40.597290039 CEST44349712142.250.186.68192.168.2.5
      May 24, 2024 17:35:40.626419067 CEST49712443192.168.2.5142.250.186.68
      May 24, 2024 17:35:40.626440048 CEST44349712142.250.186.68192.168.2.5
      May 24, 2024 17:35:40.630284071 CEST44349712142.250.186.68192.168.2.5
      May 24, 2024 17:35:40.630353928 CEST49712443192.168.2.5142.250.186.68
      May 24, 2024 17:35:40.637638092 CEST49712443192.168.2.5142.250.186.68
      May 24, 2024 17:35:40.637830019 CEST44349712142.250.186.68192.168.2.5
      May 24, 2024 17:35:40.681075096 CEST49712443192.168.2.5142.250.186.68
      May 24, 2024 17:35:40.681093931 CEST44349712142.250.186.68192.168.2.5
      May 24, 2024 17:35:40.729326010 CEST49712443192.168.2.5142.250.186.68
      May 24, 2024 17:35:50.496320009 CEST44349712142.250.186.68192.168.2.5
      May 24, 2024 17:35:50.496503115 CEST44349712142.250.186.68192.168.2.5
      May 24, 2024 17:35:50.496555090 CEST49712443192.168.2.5142.250.186.68
      May 24, 2024 17:35:51.869973898 CEST49712443192.168.2.5142.250.186.68
      May 24, 2024 17:35:51.869993925 CEST44349712142.250.186.68192.168.2.5
      May 24, 2024 17:36:00.574594021 CEST804971052.111.236.26192.168.2.5
      May 24, 2024 17:36:00.574657917 CEST4971080192.168.2.552.111.236.26
      May 24, 2024 17:36:00.580631018 CEST804970952.111.236.26192.168.2.5
      May 24, 2024 17:36:00.580691099 CEST4970980192.168.2.552.111.236.26
      May 24, 2024 17:36:00.580873966 CEST4970980192.168.2.552.111.236.26
      May 24, 2024 17:36:00.581060886 CEST4971080192.168.2.552.111.236.26
      May 24, 2024 17:36:00.581336021 CEST4972380192.168.2.552.111.236.26
      May 24, 2024 17:36:00.631772041 CEST804970952.111.236.26192.168.2.5
      May 24, 2024 17:36:00.638540030 CEST804971052.111.236.26192.168.2.5
      May 24, 2024 17:36:00.638556957 CEST804972352.111.236.26192.168.2.5
      May 24, 2024 17:36:00.638681889 CEST4972380192.168.2.552.111.236.26
      May 24, 2024 17:36:00.639148951 CEST4972380192.168.2.552.111.236.26
      May 24, 2024 17:36:00.691359997 CEST804972352.111.236.26192.168.2.5
      May 24, 2024 17:36:22.030940056 CEST804972352.111.236.26192.168.2.5
      May 24, 2024 17:36:22.031105042 CEST4972380192.168.2.552.111.236.26
      May 24, 2024 17:36:22.038274050 CEST4972380192.168.2.552.111.236.26
      May 24, 2024 17:36:22.086626053 CEST804972352.111.236.26192.168.2.5
      May 24, 2024 17:36:23.212857962 CEST4972480192.168.2.552.111.236.26
      May 24, 2024 17:36:23.213114023 CEST4972580192.168.2.552.111.236.26
      May 24, 2024 17:36:23.217888117 CEST804972452.111.236.26192.168.2.5
      May 24, 2024 17:36:23.217971087 CEST4972480192.168.2.552.111.236.26
      May 24, 2024 17:36:23.222815990 CEST804972552.111.236.26192.168.2.5
      May 24, 2024 17:36:23.222980976 CEST4972580192.168.2.552.111.236.26
      May 24, 2024 17:36:23.224365950 CEST4972480192.168.2.552.111.236.26
      May 24, 2024 17:36:23.275223017 CEST804972452.111.236.26192.168.2.5
      TimestampSource PortDest PortSource IPDest IP
      May 24, 2024 17:35:37.571455956 CEST53591541.1.1.1192.168.2.5
      May 24, 2024 17:35:37.571465015 CEST53516651.1.1.1192.168.2.5
      May 24, 2024 17:35:38.633553982 CEST53542091.1.1.1192.168.2.5
      May 24, 2024 17:35:39.876470089 CEST6532353192.168.2.51.1.1.1
      May 24, 2024 17:35:39.876638889 CEST6028153192.168.2.51.1.1.1
      May 24, 2024 17:35:39.883445024 CEST53653231.1.1.1192.168.2.5
      May 24, 2024 17:35:39.891138077 CEST53602811.1.1.1192.168.2.5
      May 24, 2024 17:35:55.899527073 CEST53513711.1.1.1192.168.2.5
      May 24, 2024 17:36:15.011893988 CEST53635831.1.1.1192.168.2.5
      TimestampSource IPDest IPChecksumCodeType
      May 24, 2024 17:35:37.571649075 CEST192.168.2.51.1.1.1c22d(Port unreachable)Destination Unreachable
      May 24, 2024 17:35:39.891331911 CEST192.168.2.51.1.1.1c1fe(Port unreachable)Destination Unreachable
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      May 24, 2024 17:35:39.876470089 CEST192.168.2.51.1.1.10xd9c7Standard query (0)www.google.comA (IP address)IN (0x0001)false
      May 24, 2024 17:35:39.876638889 CEST192.168.2.51.1.1.10xd414Standard query (0)www.google.com65IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      May 24, 2024 17:35:39.883445024 CEST1.1.1.1192.168.2.50xd9c7No error (0)www.google.com142.250.186.68A (IP address)IN (0x0001)false
      May 24, 2024 17:35:39.891138077 CEST1.1.1.1192.168.2.50xd414No error (0)www.google.com65IN (0x0001)false
      May 24, 2024 17:35:50.678016901 CEST1.1.1.1192.168.2.50xd32cNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
      May 24, 2024 17:35:50.678016901 CEST1.1.1.1192.168.2.50xd32cNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
      May 24, 2024 17:36:04.442761898 CEST1.1.1.1192.168.2.50x5223No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
      May 24, 2024 17:36:04.442761898 CEST1.1.1.1192.168.2.50x5223No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
      May 24, 2024 17:36:30.101501942 CEST1.1.1.1192.168.2.50x3f7dNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
      May 24, 2024 17:36:30.101501942 CEST1.1.1.1192.168.2.50x3f7dNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
      • 52.111.236.26
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.54970952.111.236.26806536C:\Program Files\Google\Chrome\Application\chrome.exe
      TimestampBytes transferredDirectionData
      May 24, 2024 17:35:39.139544964 CEST428OUTGET / HTTP/1.1
      Host: 52.111.236.26
      Connection: keep-alive
      Upgrade-Insecure-Requests: 1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
      Accept-Encoding: gzip, deflate
      Accept-Language: en-US,en;q=0.9


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      1192.168.2.54972352.111.236.26806536C:\Program Files\Google\Chrome\Application\chrome.exe
      TimestampBytes transferredDirectionData
      May 24, 2024 17:36:00.639148951 CEST428OUTGET / HTTP/1.1
      Host: 52.111.236.26
      Connection: keep-alive
      Upgrade-Insecure-Requests: 1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
      Accept-Encoding: gzip, deflate
      Accept-Language: en-US,en;q=0.9


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      2192.168.2.54972452.111.236.26806536C:\Program Files\Google\Chrome\Application\chrome.exe
      TimestampBytes transferredDirectionData
      May 24, 2024 17:36:23.224365950 CEST454OUTGET / HTTP/1.1
      Host: 52.111.236.26
      Connection: keep-alive
      Cache-Control: max-age=0
      Upgrade-Insecure-Requests: 1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
      Accept-Encoding: gzip, deflate
      Accept-Language: en-US,en;q=0.9


      Click to jump to process

      Click to jump to process

      Click to jump to process

      Target ID:0
      Start time:11:35:30
      Start date:24/05/2024
      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
      Imagebase:0x7ff715980000
      File size:3'242'272 bytes
      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:1
      Start time:11:35:34
      Start date:24/05/2024
      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 --field-trial-handle=2160,i,7926519452760729957,9077178389548215060,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
      Imagebase:0x7ff715980000
      File size:3'242'272 bytes
      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:3
      Start time:11:35:38
      Start date:24/05/2024
      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://52.111.236.26"
      Imagebase:0x7ff715980000
      File size:3'242'272 bytes
      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      No disassembly