Edit tour

Windows Analysis Report
https://trk.mandowebservices.com/base.php?c=81&key=aa60d706cf6a16fbfeb01fa1bb38a0ef

Overview

General Information

Sample URL:https://trk.mandowebservices.com/base.php?c=81&key=aa60d706cf6a16fbfeb01fa1bb38a0ef
Analysis ID:1463481

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Detected non-DNS traffic on DNS port
Found iframes
Stores files to the Windows start menu directory

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64_ra
  • chrome.exe (PID: 6176 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://trk.mandowebservices.com/base.php?c=81&key=aa60d706cf6a16fbfeb01fa1bb38a0ef MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 544 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1960,i,4519562088517631176,9505256633430642395,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: https://debt-authority.com/?mbi=1531171339HTTP Parser: Iframe src: https://d2m2wsoho8qq12.cloudfront.net/iframe.html?token=9C128609-3307-27EE-0AC9-B3BF96D329A7&apiurl=https%3A%2F%2Fcreate.leadid.com%2F2.12.1&lck=D2FB0EC8-1E8C-A402-E4AC-9205FE98F622&lac=4B1F5928-2127-08FA-4EA5-F0DB210F6AAE
Source: https://debt-authority.com/?mbi=1531171339HTTP Parser: Iframe src: https://api.pushnami.com/scripts/v1/hub
Source: https://debt-authority.com/?mbi=1531171339HTTP Parser: Iframe src: https://d2m2wsoho8qq12.cloudfront.net/iframe.html?token=9C128609-3307-27EE-0AC9-B3BF96D329A7&apiurl=https%3A%2F%2Fcreate.leadid.com%2F2.12.1&lck=D2FB0EC8-1E8C-A402-E4AC-9205FE98F622&lac=4B1F5928-2127-08FA-4EA5-F0DB210F6AAE
Source: https://debt-authority.com/?mbi=1531171339HTTP Parser: Iframe src: https://api.pushnami.com/scripts/v1/hub
Source: https://api.pushnami.com/scripts/v1/hubHTTP Parser: No favicon
Source: https://deviceid.trueleadid.com/iframe.html?token=9C128609-3307-27EE-0AC9-B3BF96D329A7&apiurl=https%3A%2F%2Fcreate.leadid.com%2F2.12.1&lck=D2FB0EC8-1E8C-A402-E4AC-9205FE98F622&lac=4B1F5928-2127-08FA-4EA5-F0DB210F6AAEHTTP Parser: No favicon
Source: https://d2m2wsoho8qq12.cloudfront.net/iframe.html?token=9C128609-3307-27EE-0AC9-B3BF96D329A7&apiurl=https%3A%2F%2Fcreate.leadid.com%2F2.12.1&lck=D2FB0EC8-1E8C-A402-E4AC-9205FE98F622&lac=4B1F5928-2127-08FA-4EA5-F0DB210F6AAEHTTP Parser: No favicon
Source: https://debt-authority.com/?mbi=1531171339HTTP Parser: No <meta name="author".. found
Source: https://debt-authority.com/?mbi=1531171339HTTP Parser: No <meta name="author".. found
Source: https://debt-authority.com/?mbi=1531171339HTTP Parser: No <meta name="copyright".. found
Source: https://debt-authority.com/?mbi=1531171339HTTP Parser: No <meta name="copyright".. found
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49723 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49726 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.16:49733 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.16:49786 version: TLS 1.2
Source: global trafficTCP traffic: 192.168.2.16:49771 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49771 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49771 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49771 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49771 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49771 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49771 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49771 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49771 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49771 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49771 -> 1.1.1.1:53
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: global trafficHTTP traffic detected: GET /lnk.asp?o=26995&c=918277&a=574293&k=03D0E781B8A56980CD42EDFCD0957119&l=29175&s1=148&s2=a378d2bb6d1c4b519b4fcdae62cc9e26 HTTP/1.1Host: www.mb01.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficDNS traffic detected: DNS query: trk.mandowebservices.com
Source: global trafficDNS traffic detected: DNS query: a.nel.cloudflare.com
Source: global trafficDNS traffic detected: DNS query: www.trafficonlineleads.com
Source: global trafficDNS traffic detected: DNS query: nrjxf.faultlessconnect.com
Source: global trafficDNS traffic detected: DNS query: nrjxf.networklinksremote.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: www.dpvyw6trk.com
Source: global trafficDNS traffic detected: DNS query: www.mb01.com
Source: global trafficDNS traffic detected: DNS query: afflat3e1.com
Source: global trafficDNS traffic detected: DNS query: debt-authority.com
Source: global trafficDNS traffic detected: DNS query: av-api.com
Source: global trafficDNS traffic detected: DNS query: i.imgur.com
Source: global trafficDNS traffic detected: DNS query: create.lidstatic.com
Source: global trafficDNS traffic detected: DNS query: api.pushnami.com
Source: global trafficDNS traffic detected: DNS query: create.leadid.com
Source: global trafficDNS traffic detected: DNS query: d2m2wsoho8qq12.cloudfront.net
Source: global trafficDNS traffic detected: DNS query: cdn.pushnami.com
Source: global trafficDNS traffic detected: DNS query: trc.pushnami.com
Source: global trafficDNS traffic detected: DNS query: deviceid.trueleadid.com
Source: global trafficDNS traffic detected: DNS query: stun3.l.google.com
Source: global trafficDNS traffic detected: DNS query: stun4.l.google.com
Source: global trafficDNS traffic detected: DNS query: psp.pushnami.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49723 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49726 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.16:49733 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.16:49786 version: TLS 1.2
Source: classification engineClassification label: clean1.win@20/6@66/298
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://trk.mandowebservices.com/base.php?c=81&key=aa60d706cf6a16fbfeb01fa1bb38a0ef
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1960,i,4519562088517631176,9505256633430642395,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1960,i,4519562088517631176,9505256633430642395,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Drive-by Compromise
Windows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://trk.mandowebservices.com/base.php?c=81&key=aa60d706cf6a16fbfeb01fa1bb38a0ef0%Avira URL Cloudsafe
https://trk.mandowebservices.com/base.php?c=81&key=aa60d706cf6a16fbfeb01fa1bb38a0ef3%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
a.nel.cloudflare.com0%VirustotalBrowse
trk.mandowebservices.com2%VirustotalBrowse
nrjxf.networklinksremote.com1%VirustotalBrowse
nrjxf.faultlessconnect.com3%VirustotalBrowse
www.trafficonlineleads.com4%VirustotalBrowse
www.google.com0%VirustotalBrowse
debt-authority.com0%VirustotalBrowse
www.mb01.com0%VirustotalBrowse
afflat3e1.com0%VirustotalBrowse
stun4.l.google.com0%VirustotalBrowse
stun3.l.google.com0%VirustotalBrowse
trc.pushnami.com0%VirustotalBrowse
cdn.pushnami.com0%VirustotalBrowse
d2m2wsoho8qq12.cloudfront.net0%VirustotalBrowse
psp.pushnami.com0%VirustotalBrowse
av-api.com1%VirustotalBrowse
dw4luqp.ng.impervadns.net0%VirustotalBrowse
api.pushnami.com0%VirustotalBrowse
create.lidstatic.com1%VirustotalBrowse
zumbtn8.ng.impervadns.net0%VirustotalBrowse
i.imgur.com0%VirustotalBrowse
ipv4.imgur.map.fastly.net0%VirustotalBrowse
deviceid.trueleadid.com0%VirustotalBrowse
create.leadid.com0%VirustotalBrowse
SourceDetectionScannerLabelLink
http://www.mb01.com/lnk.asp?o=26995&c=918277&a=574293&k=03D0E781B8A56980CD42EDFCD0957119&l=29175&s1=148&s2=a378d2bb6d1c4b519b4fcdae62cc9e260%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
stun4.l.google.com
74.125.250.129
truefalseunknown
a.nel.cloudflare.com
35.190.80.1
truefalseunknown
debt-authority.com
69.172.201.115
truefalseunknown
nrjxf.networklinksremote.com
83.150.216.100
truefalseunknown
trk.mandowebservices.com
188.114.96.3
truefalseunknown
www.mb01.com
69.172.200.185
truefalseunknown
cdn.pushnami.com
18.244.18.36
truefalseunknown
stun3.l.google.com
74.125.250.129
truefalseunknown
trc.pushnami.com
44.205.88.98
truefalseunknown
psp.pushnami.com
54.221.240.249
truefalseunknown
afflat3e1.com
69.172.200.185
truefalseunknown
nrjxf.faultlessconnect.com
83.150.216.100
truefalseunknown
d2m2wsoho8qq12.cloudfront.net
13.32.23.8
truefalseunknown
create.lidstatic.com
104.22.39.182
truefalseunknown
www.dpvyw6trk.com
35.190.6.55
truefalse
    unknown
    av-api.com
    69.172.200.185
    truefalseunknown
    www.google.com
    142.250.185.132
    truefalseunknown
    zumbtn8.ng.impervadns.net
    45.223.19.68
    truefalseunknown
    dw4luqp.ng.impervadns.net
    45.223.19.68
    truefalseunknown
    api.pushnami.com
    13.32.99.54
    truefalseunknown
    www.trafficonlineleads.com
    45.56.113.121
    truefalseunknown
    ipv4.imgur.map.fastly.net
    199.232.192.193
    truefalseunknown
    create.leadid.com
    unknown
    unknownfalseunknown
    i.imgur.com
    unknown
    unknownfalseunknown
    deviceid.trueleadid.com
    unknown
    unknownfalseunknown
    NameMaliciousAntivirus DetectionReputation
    https://debt-authority.com/?mbi=1531171339false
      unknown
      https://api.pushnami.com/scripts/v1/hubfalse
        unknown
        https://d2m2wsoho8qq12.cloudfront.net/iframe.html?token=9C128609-3307-27EE-0AC9-B3BF96D329A7&apiurl=https%3A%2F%2Fcreate.leadid.com%2F2.12.1&lck=D2FB0EC8-1E8C-A402-E4AC-9205FE98F622&lac=4B1F5928-2127-08FA-4EA5-F0DB210F6AAEfalse
          unknown
          https://deviceid.trueleadid.com/iframe.html?token=9C128609-3307-27EE-0AC9-B3BF96D329A7&apiurl=https%3A%2F%2Fcreate.leadid.com%2F2.12.1&lck=D2FB0EC8-1E8C-A402-E4AC-9205FE98F622&lac=4B1F5928-2127-08FA-4EA5-F0DB210F6AAEfalse
            unknown
            http://www.mb01.com/lnk.asp?o=26995&c=918277&a=574293&k=03D0E781B8A56980CD42EDFCD0957119&l=29175&s1=148&s2=a378d2bb6d1c4b519b4fcdae62cc9e26false
            • Avira URL Cloud: safe
            unknown
            https://trk.mandowebservices.com/baseredirect.php?url=s%3A%2F%2Fwww.trafficonlineleads.com%2FEBXbBBgddE25s8t4_WCIgRf32jcpNigYOoqDOJ1fx6SmJisunr6Aa9PIJjJkgchCCoGH-irldFHyWaEs9yQVjA%7E%7E%2Fekmwpdty_81_92326false
              unknown
              https://trk.mandowebservices.com/base.php?c=81&key=aa60d706cf6a16fbfeb01fa1bb38a0effalse
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                44.205.88.98
                trc.pushnami.comUnited States
                14618AMAZON-AESUSfalse
                45.223.19.68
                zumbtn8.ng.impervadns.netUnited States
                19551INCAPSULAUSfalse
                199.232.196.193
                unknownUnited States
                54113FASTLYUSfalse
                142.250.185.202
                unknownUnited States
                15169GOOGLEUSfalse
                13.32.23.8
                d2m2wsoho8qq12.cloudfront.netUnited States
                7018ATT-INTERNET4USfalse
                54.221.240.249
                psp.pushnami.comUnited States
                14618AMAZON-AESUSfalse
                104.22.39.182
                create.lidstatic.comUnited States
                13335CLOUDFLARENETUSfalse
                142.250.186.110
                unknownUnited States
                15169GOOGLEUSfalse
                35.190.80.1
                a.nel.cloudflare.comUnited States
                15169GOOGLEUSfalse
                74.125.250.129
                stun4.l.google.comUnited States
                15169GOOGLEUSfalse
                142.250.186.99
                unknownUnited States
                15169GOOGLEUSfalse
                142.250.184.195
                unknownUnited States
                15169GOOGLEUSfalse
                142.250.186.78
                unknownUnited States
                15169GOOGLEUSfalse
                1.1.1.1
                unknownAustralia
                13335CLOUDFLARENETUSfalse
                18.244.18.36
                cdn.pushnami.comUnited States
                16509AMAZON-02USfalse
                74.125.133.84
                unknownUnited States
                15169GOOGLEUSfalse
                69.172.201.115
                debt-authority.comCanada
                19324DOSARRESTUSfalse
                199.232.192.193
                ipv4.imgur.map.fastly.netUnited States
                54113FASTLYUSfalse
                13.32.99.54
                api.pushnami.comUnited States
                16509AMAZON-02USfalse
                142.250.185.132
                www.google.comUnited States
                15169GOOGLEUSfalse
                44.214.228.253
                unknownUnited States
                14618AMAZON-AESUSfalse
                239.255.255.250
                unknownReserved
                unknownunknownfalse
                83.150.216.100
                nrjxf.networklinksremote.comBulgaria
                47872SOFIA-CONNECT-ASBGfalse
                188.114.96.3
                trk.mandowebservices.comEuropean Union
                13335CLOUDFLARENETUSfalse
                69.172.200.185
                www.mb01.comCanada
                19324DOSARRESTUSfalse
                45.56.113.121
                www.trafficonlineleads.comUnited States
                63949LINODE-APLinodeLLCUSfalse
                35.190.6.55
                www.dpvyw6trk.comUnited States
                15169GOOGLEUSfalse
                IP
                192.168.2.16
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1463481
                Start date and time:2024-06-27 09:04:02 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:defaultwindowsinteractivecookbook.jbs
                Sample URL:https://trk.mandowebservices.com/base.php?c=81&key=aa60d706cf6a16fbfeb01fa1bb38a0ef
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:15
                Number of new started drivers analysed:1
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • EGA enabled
                Analysis Mode:stream
                Analysis stop reason:Timeout
                Detection:CLEAN
                Classification:clean1.win@20/6@66/298
                • Exclude process from analysis (whitelisted): svchost.exe
                • Excluded IPs from analysis (whitelisted): 142.250.184.195, 142.250.186.78, 74.125.133.84, 34.104.35.123
                • Excluded domains from analysis (whitelisted): fs.microsoft.com, clients2.google.com, accounts.google.com, edgedl.me.gvt1.com, clientservices.googleapis.com, clients.l.google.com
                • Not all processes where analyzed, report is missing behavior information
                InputOutput
                URL: https://debt-authority.com/?mbi=1531171339 Model: Perplexity: mixtral-8x7b-instruct
                {"loginform": false,"urgency": false,"captcha": false,"reasons": ["The webpage does not contain a login form, as it does not request any sensitive information such as passwords, email addresses, usernames, phone numbers, or credit card numbers.","The text does not create a sense of urgency, as it does not use phrases such as 'Click here to view document', 'To view secured document click here', or 'Open the link to see your invoice'.","The webpage does not contain a CAPTCHA or any other anti-robot detection mechanism."]}
                Title: Debt Authority 2 OCR: AUTH8RlW Enter your name and email to begin viewing the best options tailored for you. QQ you have DEBT that you want erased? First Name Last Name Explore your options to find the best ways to reduce your debt while also gaining access to many other free financial programs designed to put cash in your bank account! Email Fix My Debt! 
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jun 27 06:04:34 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2673
                Entropy (8bit):3.987356200435375
                Encrypted:false
                SSDEEP:
                MD5:37B01B89C3111834EFDF0475701EFCBF
                SHA1:21F406856A2E5CE9DAB40637899E4C37D275C2E6
                SHA-256:2A314002F75275DBB6223EFEEFB5A432A569A5516CBE8D7623518FF466C8877B
                SHA-512:77F6EC413EAE69E26E00BDE44F627CB57EB79F4D30E75F0270BB3819D9F67E626F4180BD06CBA9BA9F9754C0E079B1C74A0DEEB3D76EFF23505E9C2BA3810A21
                Malicious:false
                Reputation:unknown
                Preview:L..................F.@.. ...$+.,......+D`...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.8....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.8....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.8....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.8..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.8...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............O.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jun 27 06:04:34 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2675
                Entropy (8bit):4.001785644051288
                Encrypted:false
                SSDEEP:
                MD5:94D32C1EAC6DF862FA9B967282ED566C
                SHA1:77C7C30B51E64431217ACEE20809B9A0D4EB822A
                SHA-256:064DE2433EC961200CA486FAE21B53B7DE1228AF7DE7762DA80A5269BE3F0393
                SHA-512:8E6F5A0516FB2B684EF2277DDF490131759BD3470FE1DAF13088431C6B1B453722EE44265240C4203FC36D0DB5D9183006FAEDC42824CFF8D6C3148EEE513ACC
                Malicious:false
                Reputation:unknown
                Preview:L..................F.@.. ...$+.,....p..D`...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.8....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.8....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.8....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.8..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.8...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............O.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2689
                Entropy (8bit):4.011963890459033
                Encrypted:false
                SSDEEP:
                MD5:3C239F5885B5C9A7B127F61010780F2B
                SHA1:9D4C6709F493F357F7221D9B7FCBB99E61D41D84
                SHA-256:919F505A7D8D9BB914A9A289676F8DF45072E08C3E644BE70EA44F590B90AE8C
                SHA-512:C26CDE6FDDFDD648A7371523430259F03387EB519D5B92CA7EC7F6CEF5DB7DD99A31479741C10D747530A968D5AB23931DE742DBEEF22801CA6DD1A484E17329
                Malicious:false
                Reputation:unknown
                Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.8....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.8....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.8....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.8..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............O.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jun 27 06:04:34 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2677
                Entropy (8bit):4.001526618307212
                Encrypted:false
                SSDEEP:
                MD5:A356EC9B3A1A5E3A8E57B4C037573D7E
                SHA1:21C9CD849696F370D778827ECE1BE4B934E9B24C
                SHA-256:A77989F97A9EA2972CD3DBB0FE73AD821016F8DFBEC3E72B710E15210DFCAF05
                SHA-512:E41B03DAA91682EE34348ADA15A916311CFBD4D7FBF0E8148116F64E17B9760DF192143873045BC5BE27A543AFD403D3D40B224299B3B8C4D4E66326D8B04783
                Malicious:false
                Reputation:unknown
                Preview:L..................F.@.. ...$+.,.......D`...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.8....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.8....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.8....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.8..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.8...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............O.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jun 27 06:04:34 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2677
                Entropy (8bit):3.990110889431685
                Encrypted:false
                SSDEEP:
                MD5:F4FE2914736B78ABE10E34015117B01D
                SHA1:2CFD0D6445BBAFAE2B2215D6F5AC6CFE52F30C11
                SHA-256:AB08F233E73F697C0C21961BD3648CFFF59B616EF82A0D8EB89DD08A3F3AFD19
                SHA-512:B3149F5FA490BA85A92D85CA30E9E4DBE8D38553D7EC7805AB2B20D8429A5868A1C32260E7950278636E4380D5D73F0319212200E1F61C428A413AAC27D3C29E
                Malicious:false
                Reputation:unknown
                Preview:L..................F.@.. ...$+.,....F.$D`...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.8....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.8....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.8....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.8..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.8...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............O.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jun 27 06:04:34 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2679
                Entropy (8bit):4.001625214749379
                Encrypted:false
                SSDEEP:
                MD5:3DBDAF406A43AC984CB6F0C5CE3A41E7
                SHA1:C5E10267F61D0E822C2B011457B0F66BA42EDDAD
                SHA-256:A1FE7DF32C697279DF3B23FF56A42325BC1D63B4F8B223546E460EA6508A424A
                SHA-512:C1497EEBA2A46AE01BB7CCA8522CA3154DE97FBC1E24A8979A7E0914630D034D2BA0EC8AEF3519DE0D6E890AF69BDC38F0CFD4B1628C0CA0D7D7F3311926A127
                Malicious:false
                Reputation:unknown
                Preview:L..................F.@.. ...$+.,.......D`...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.8....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.8....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.8....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.8..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.8...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............O.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                No static file info