Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
http://sp.26skins.com/steamstore/category/action_run_jump/?snr=1_1530_4__12

Overview

General Information

Sample URL:http://sp.26skins.com/steamstore/category/action_run_jump/?snr=1_1530_4__12
Analysis ID:1467878
Infos:
Errors
  • URL not reachable

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Stores files to the Windows start menu directory

Classification

  • System is w10x64
  • chrome.exe (PID: 6192 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 2920 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 --field-trial-handle=2020,i,4603995177747123620,11767189431819424161,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 2624 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://sp.26skins.com/steamstore/category/action_run_jump/?snr=1_1530_4__12" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://sp.26skins.com/steamstore/category/action_run_jump/?snr=1_1530_4__12Avira URL Cloud: detection malicious, Label: phishing
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: sp.26skins.com
Source: global trafficDNS traffic detected: DNS query: google.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: classification engineClassification label: mal48.win@19/6@12/3
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 --field-trial-handle=2020,i,4603995177747123620,11767189431819424161,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://sp.26skins.com/steamstore/category/action_run_jump/?snr=1_1530_4__12"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 --field-trial-handle=2020,i,4603995177747123620,11767189431819424161,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Google Drive.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
http://sp.26skins.com/steamstore/category/action_run_jump/?snr=1_1530_4__12100%Avira URL Cloudphishing
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
google.com
172.217.168.14
truefalse
    unknown
    www.google.com
    142.250.186.164
    truefalse
      unknown
      fp2e7a.wpc.phicdn.net
      192.229.221.95
      truefalse
        unknown
        sp.26skins.com
        unknown
        unknownfalse
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          239.255.255.250
          unknownReserved
          unknownunknownfalse
          142.250.186.164
          www.google.comUnited States
          15169GOOGLEUSfalse
          IP
          192.168.2.5
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1467878
          Start date and time:2024-07-05 00:23:22 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 1m 51s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:browseurl.jbs
          Sample URL:http://sp.26skins.com/steamstore/category/action_run_jump/?snr=1_1530_4__12
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:6
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal48.win@19/6@12/3
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • URL browsing timeout or error
          • URL not reachable
          • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 216.58.206.35, 142.250.185.174, 142.250.110.84, 34.104.35.123, 184.28.90.27, 40.127.169.103, 2.19.126.137, 2.19.126.163, 192.229.221.95, 20.242.39.171
          • Excluded domains from analysis (whitelisted): fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, clientservices.googleapis.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, download.windowsupdate.com.edgesuite.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, ocsp.digicert.com, e16604.g.akamaiedge.net, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, clients.l.google.com, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtSetInformationFile calls found.
          • VT rate limit hit for: http://sp.26skins.com/steamstore/category/action_run_jump/?snr=1_1530_4__12
          No simulations
          No context
          No context
          No context
          No context
          No context
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jul 4 21:24:17 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2677
          Entropy (8bit):3.986739520929577
          Encrypted:false
          SSDEEP:48:8VodwlQTQl0vlbgEHzidAKZdA19ehwiZUklqeh+y+3:8VlQkYbP9y
          MD5:8A169A183E08D6F3C9CEC47AF79A6D77
          SHA1:311AE8D89D8B6B8537B839C475385D8D131BF91A
          SHA-256:7B0B490B75033B7BD41B2D25D317FEAB33E53776CCC54D7669DEC640F6A5DBB3
          SHA-512:CA43C755F511A43AAC65AB2290BCECC85448AE9436B25EF2252D21F89662E9E020FA30A3A0AC3D62766DAEDAD7E7B55A5B0357E2F02F34B13A6429248059E43F
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,......s.`...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jul 4 21:24:17 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2679
          Entropy (8bit):3.997787977154984
          Encrypted:false
          SSDEEP:48:8QodwlQTQl0vlbgEHzidAKZdA1weh/iZUkAQkqehty+2:8QlQkYb19QAy
          MD5:2F85EA887B02A1ACAD6E658A33FB823B
          SHA1:37189C0C8988F84F32CD6EDC07B95D0C49B8F8E0
          SHA-256:2AC7B7889AB758FD19423C67F02C45CA5350F6675E77B0E01F91B012AFC1F52F
          SHA-512:FB6A3FFC2A3799115E791D49F7E3B28006B001DE18573A1BDCF0B103DE23F6E168A1007853BB7312F44177A0ADCC2EC5B3EF22E32C979ABB9127A1C0D9C89DBC
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,....C.c.`...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2693
          Entropy (8bit):4.011887470853802
          Encrypted:false
          SSDEEP:48:8xpodwlQTQl0vlbsHzidAKZdA14tseh7sFiZUkmgqeh7sHy+BX:8xplQkYb6nBy
          MD5:DE9CD270BFF04F72A0389AF9B5D06B34
          SHA1:71E547E73EC709CD8187E463BD2B20D82AFA1C3D
          SHA-256:E5C97A76C4F1E733EBD2AA2BEF8DB0EBBC371A215CC540DDC862831FA5DD2097
          SHA-512:D324C6A20CDE6DE54FB613F8DBF00F8E79A16B982DD4BD09E73D9861CA0F3698E86C963EF1C27FDE6E1ACB6E4223D2A37E5A9A54F1230049BB2C998367D7CBD2
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,......e>....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VDW.n...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jul 4 21:24:17 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2681
          Entropy (8bit):4.000456308655759
          Encrypted:false
          SSDEEP:48:8c2odwlQTQl0vlbgEHzidAKZdA1vehDiZUkwqehZy+R:8c2lQkYbWfy
          MD5:2EC5F9C88401D9DB46D7B8FE46A172D6
          SHA1:F409D3D9D0A5F4080351F8878ECC1F234CF21C70
          SHA-256:77AF88307A9841BCAFF5A8FA1169697225A705A8D6787DCE1D8779920FB9BCC5
          SHA-512:EB21B108C8E0E86F15B3CC1BB4924399E019B2DE05185B5749715C887FAD56F147548828F3507561C729C4797B1CC1B4352ED63CAEBB06F83FC33BDBC7988FC2
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,......[.`...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jul 4 21:24:17 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2681
          Entropy (8bit):3.9885203835674865
          Encrypted:false
          SSDEEP:48:8xodwlQTQl0vlbgEHzidAKZdA1hehBiZUk1W1qehLy+C:8xlQkYb29ry
          MD5:65D5E61BCF36A4B723F002C5B635A354
          SHA1:E0F9DD87A47EB677892D0612C7CF47230B45ACD8
          SHA-256:C7A5B13F2A163A6530AC1F0C1DD59CF07218D04E01D2CEC3A5CF1B44C3BC9296
          SHA-512:3E673A3A6F8FEC0E2564BBEB8F96ABCCCC307E0F50CA2C6E3C0D70EF66456F7B6B9488C1171AEA422673E28933F9748A7F26CCDFAB0663450692215AB3791A85
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,.....Bj.`...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jul 4 21:24:17 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2683
          Entropy (8bit):3.999737793129329
          Encrypted:false
          SSDEEP:48:8RodwlQTQl0vlbgEHzidAKZdA1duT+ehOuTbbiZUk5OjqehOuTbBy+yT+:8RlQkYbIT/TbxWOvTbBy7T
          MD5:0FB8F156C2C7726412FF8593CEE856F4
          SHA1:8CB6BBF2D3A704BC1DC7D8DCE1C19D88815E6ADB
          SHA-256:AEA222079BB6D95662C91069C107830F46E720C6FA5DAB2D482D6412EA87980D
          SHA-512:D54E904456B55DBAB73FA9E2F2AF30AE37F99F644A322D7DEF15D4A78DC89927D804604EA4313064597CC39A7AC90A7A37071B849DC2F527BF4690701DCF5A0C
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,.....RR.`...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          No static file info
          TimestampSource PortDest PortSource IPDest IP
          Jul 5, 2024 00:24:07.671072006 CEST49674443192.168.2.523.1.237.91
          Jul 5, 2024 00:24:07.671073914 CEST49675443192.168.2.523.1.237.91
          Jul 5, 2024 00:24:07.780417919 CEST49673443192.168.2.523.1.237.91
          Jul 5, 2024 00:24:17.362268925 CEST49675443192.168.2.523.1.237.91
          Jul 5, 2024 00:24:17.409216881 CEST49674443192.168.2.523.1.237.91
          Jul 5, 2024 00:24:17.492799044 CEST49673443192.168.2.523.1.237.91
          Jul 5, 2024 00:24:19.087567091 CEST4434970323.1.237.91192.168.2.5
          Jul 5, 2024 00:24:19.087642908 CEST49703443192.168.2.523.1.237.91
          Jul 5, 2024 00:24:20.635689974 CEST49711443192.168.2.5142.250.186.164
          Jul 5, 2024 00:24:20.635729074 CEST44349711142.250.186.164192.168.2.5
          Jul 5, 2024 00:24:20.635899067 CEST49711443192.168.2.5142.250.186.164
          Jul 5, 2024 00:24:20.636862040 CEST49711443192.168.2.5142.250.186.164
          Jul 5, 2024 00:24:20.636871099 CEST44349711142.250.186.164192.168.2.5
          Jul 5, 2024 00:24:21.304145098 CEST44349711142.250.186.164192.168.2.5
          Jul 5, 2024 00:24:21.304543018 CEST49711443192.168.2.5142.250.186.164
          Jul 5, 2024 00:24:21.304579020 CEST44349711142.250.186.164192.168.2.5
          Jul 5, 2024 00:24:21.305632114 CEST44349711142.250.186.164192.168.2.5
          Jul 5, 2024 00:24:21.305699110 CEST49711443192.168.2.5142.250.186.164
          Jul 5, 2024 00:24:21.388375998 CEST49711443192.168.2.5142.250.186.164
          Jul 5, 2024 00:24:21.388561010 CEST44349711142.250.186.164192.168.2.5
          Jul 5, 2024 00:24:21.440922022 CEST49711443192.168.2.5142.250.186.164
          Jul 5, 2024 00:24:21.440936089 CEST44349711142.250.186.164192.168.2.5
          Jul 5, 2024 00:24:21.487787962 CEST49711443192.168.2.5142.250.186.164
          Jul 5, 2024 00:24:31.216553926 CEST44349711142.250.186.164192.168.2.5
          Jul 5, 2024 00:24:31.216667891 CEST44349711142.250.186.164192.168.2.5
          Jul 5, 2024 00:24:31.216777086 CEST49711443192.168.2.5142.250.186.164
          Jul 5, 2024 00:24:32.442158937 CEST49711443192.168.2.5142.250.186.164
          Jul 5, 2024 00:24:32.442193985 CEST44349711142.250.186.164192.168.2.5
          TimestampSource PortDest PortSource IPDest IP
          Jul 5, 2024 00:24:16.072186947 CEST53621861.1.1.1192.168.2.5
          Jul 5, 2024 00:24:16.110712051 CEST53537061.1.1.1192.168.2.5
          Jul 5, 2024 00:24:17.121036053 CEST53555511.1.1.1192.168.2.5
          Jul 5, 2024 00:24:17.507400036 CEST6510353192.168.2.51.1.1.1
          Jul 5, 2024 00:24:17.507474899 CEST6214153192.168.2.51.1.1.1
          Jul 5, 2024 00:24:17.517337084 CEST53651031.1.1.1192.168.2.5
          Jul 5, 2024 00:24:17.529134035 CEST4961653192.168.2.51.1.1.1
          Jul 5, 2024 00:24:17.540568113 CEST53621411.1.1.1192.168.2.5
          Jul 5, 2024 00:24:17.560569048 CEST53496161.1.1.1192.168.2.5
          Jul 5, 2024 00:24:17.759556055 CEST6217253192.168.2.58.8.8.8
          Jul 5, 2024 00:24:17.759707928 CEST5052653192.168.2.51.1.1.1
          Jul 5, 2024 00:24:17.766480923 CEST53621728.8.8.8192.168.2.5
          Jul 5, 2024 00:24:17.766505957 CEST53505261.1.1.1192.168.2.5
          Jul 5, 2024 00:24:18.764060974 CEST6378753192.168.2.51.1.1.1
          Jul 5, 2024 00:24:18.764498949 CEST5553053192.168.2.51.1.1.1
          Jul 5, 2024 00:24:18.775732994 CEST53555301.1.1.1192.168.2.5
          Jul 5, 2024 00:24:18.922331095 CEST53637871.1.1.1192.168.2.5
          Jul 5, 2024 00:24:20.626333952 CEST5330053192.168.2.51.1.1.1
          Jul 5, 2024 00:24:20.626976013 CEST5665253192.168.2.51.1.1.1
          Jul 5, 2024 00:24:20.633322954 CEST53533001.1.1.1192.168.2.5
          Jul 5, 2024 00:24:20.634388924 CEST53566521.1.1.1192.168.2.5
          Jul 5, 2024 00:24:23.954252958 CEST6525153192.168.2.51.1.1.1
          Jul 5, 2024 00:24:23.954667091 CEST4939153192.168.2.51.1.1.1
          Jul 5, 2024 00:24:23.962127924 CEST53652511.1.1.1192.168.2.5
          Jul 5, 2024 00:24:23.965136051 CEST53493911.1.1.1192.168.2.5
          Jul 5, 2024 00:24:23.970988989 CEST5205753192.168.2.51.1.1.1
          Jul 5, 2024 00:24:23.978527069 CEST53520571.1.1.1192.168.2.5
          TimestampSource IPDest IPChecksumCodeType
          Jul 5, 2024 00:24:17.543241978 CEST192.168.2.51.1.1.1c22e(Port unreachable)Destination Unreachable
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Jul 5, 2024 00:24:17.507400036 CEST192.168.2.51.1.1.10xf5edStandard query (0)sp.26skins.comA (IP address)IN (0x0001)false
          Jul 5, 2024 00:24:17.507474899 CEST192.168.2.51.1.1.10xc897Standard query (0)sp.26skins.com65IN (0x0001)false
          Jul 5, 2024 00:24:17.529134035 CEST192.168.2.51.1.1.10x6e5eStandard query (0)sp.26skins.comA (IP address)IN (0x0001)false
          Jul 5, 2024 00:24:17.759556055 CEST192.168.2.58.8.8.80x2f72Standard query (0)google.comA (IP address)IN (0x0001)false
          Jul 5, 2024 00:24:17.759707928 CEST192.168.2.51.1.1.10xea50Standard query (0)google.comA (IP address)IN (0x0001)false
          Jul 5, 2024 00:24:18.764060974 CEST192.168.2.51.1.1.10xe34bStandard query (0)sp.26skins.comA (IP address)IN (0x0001)false
          Jul 5, 2024 00:24:18.764498949 CEST192.168.2.51.1.1.10x8e45Standard query (0)sp.26skins.com65IN (0x0001)false
          Jul 5, 2024 00:24:20.626333952 CEST192.168.2.51.1.1.10x3569Standard query (0)www.google.comA (IP address)IN (0x0001)false
          Jul 5, 2024 00:24:20.626976013 CEST192.168.2.51.1.1.10x3882Standard query (0)www.google.com65IN (0x0001)false
          Jul 5, 2024 00:24:23.954252958 CEST192.168.2.51.1.1.10x812fStandard query (0)sp.26skins.comA (IP address)IN (0x0001)false
          Jul 5, 2024 00:24:23.954667091 CEST192.168.2.51.1.1.10xfa7dStandard query (0)sp.26skins.com65IN (0x0001)false
          Jul 5, 2024 00:24:23.970988989 CEST192.168.2.51.1.1.10x3d85Standard query (0)sp.26skins.comA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Jul 5, 2024 00:24:17.517337084 CEST1.1.1.1192.168.2.50xf5edName error (3)sp.26skins.comnonenoneA (IP address)IN (0x0001)false
          Jul 5, 2024 00:24:17.540568113 CEST1.1.1.1192.168.2.50xc897Name error (3)sp.26skins.comnonenone65IN (0x0001)false
          Jul 5, 2024 00:24:17.560569048 CEST1.1.1.1192.168.2.50x6e5eName error (3)sp.26skins.comnonenoneA (IP address)IN (0x0001)false
          Jul 5, 2024 00:24:17.766480923 CEST8.8.8.8192.168.2.50x2f72No error (0)google.com172.217.168.14A (IP address)IN (0x0001)false
          Jul 5, 2024 00:24:17.766505957 CEST1.1.1.1192.168.2.50xea50No error (0)google.com142.250.184.238A (IP address)IN (0x0001)false
          Jul 5, 2024 00:24:18.775732994 CEST1.1.1.1192.168.2.50x8e45Name error (3)sp.26skins.comnonenone65IN (0x0001)false
          Jul 5, 2024 00:24:18.922331095 CEST1.1.1.1192.168.2.50xe34bName error (3)sp.26skins.comnonenoneA (IP address)IN (0x0001)false
          Jul 5, 2024 00:24:20.633322954 CEST1.1.1.1192.168.2.50x3569No error (0)www.google.com142.250.186.164A (IP address)IN (0x0001)false
          Jul 5, 2024 00:24:20.634388924 CEST1.1.1.1192.168.2.50x3882No error (0)www.google.com65IN (0x0001)false
          Jul 5, 2024 00:24:23.962127924 CEST1.1.1.1192.168.2.50x812fName error (3)sp.26skins.comnonenoneA (IP address)IN (0x0001)false
          Jul 5, 2024 00:24:23.965136051 CEST1.1.1.1192.168.2.50xfa7dName error (3)sp.26skins.comnonenone65IN (0x0001)false
          Jul 5, 2024 00:24:23.978527069 CEST1.1.1.1192.168.2.50x3d85Name error (3)sp.26skins.comnonenoneA (IP address)IN (0x0001)false
          Jul 5, 2024 00:24:29.075643063 CEST1.1.1.1192.168.2.50x350aNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
          Jul 5, 2024 00:24:29.075643063 CEST1.1.1.1192.168.2.50x350aNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false

          Click to jump to process

          Click to jump to process

          Click to jump to process

          Target ID:0
          Start time:18:24:08
          Start date:04/07/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
          Imagebase:0x7ff715980000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:2
          Start time:18:24:14
          Start date:04/07/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 --field-trial-handle=2020,i,4603995177747123620,11767189431819424161,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
          Imagebase:0x7ff715980000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:3
          Start time:18:24:16
          Start date:04/07/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://sp.26skins.com/steamstore/category/action_run_jump/?snr=1_1530_4__12"
          Imagebase:0x7ff715980000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          No disassembly