Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://steaemcoonmmunnltly.com/g-friend/golo/gifts-50

Overview

General Information

Sample URL:https://steaemcoonmmunnltly.com/g-friend/golo/gifts-50
Analysis ID:1467911
Infos:
Errors
  • URL not reachable

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Stores files to the Windows start menu directory

Classification

  • System is w10x64
  • chrome.exe (PID: 6108 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 4464 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=2020,i,13463992082652097780,16142965064800232614,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6104 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://steaemcoonmmunnltly.com/g-friend/golo/gifts-50" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: https://steaemcoonmmunnltly.com/g-friend/golo/gifts-50Avira URL Cloud: detection malicious, Label: phishing
Source: https://steaemcoonmmunnltly.com/g-friend/golo/gifts-50SlashNext: detection malicious, Label: Fraudulent Website type: Phishing & Social Engineering
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: steaemcoonmmunnltly.com
Source: global trafficDNS traffic detected: DNS query: google.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: classification engineClassification label: mal48.win@19/6@12/3
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=2020,i,13463992082652097780,16142965064800232614,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://steaemcoonmmunnltly.com/g-friend/golo/gifts-50"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=2020,i,13463992082652097780,16142965064800232614,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Google Drive.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://steaemcoonmmunnltly.com/g-friend/golo/gifts-50100%Avira URL Cloudphishing
https://steaemcoonmmunnltly.com/g-friend/golo/gifts-50100%SlashNextFraudulent Website type: Phishing & Social Engineering
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
google.com
172.217.16.206
truefalse
    unknown
    www.google.com
    142.250.186.164
    truefalse
      unknown
      fp2e7a.wpc.phicdn.net
      192.229.221.95
      truefalse
        unknown
        steaemcoonmmunnltly.com
        unknown
        unknownfalse
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          239.255.255.250
          unknownReserved
          unknownunknownfalse
          142.250.186.164
          www.google.comUnited States
          15169GOOGLEUSfalse
          IP
          192.168.2.5
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1467911
          Start date and time:2024-07-05 00:55:41 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 1m 49s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:browseurl.jbs
          Sample URL:https://steaemcoonmmunnltly.com/g-friend/golo/gifts-50
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:6
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal48.win@19/6@12/3
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • URL browsing timeout or error
          • URL not reachable
          • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 142.250.185.99, 142.250.74.206, 74.125.133.84, 34.104.35.123, 23.53.114.19, 20.12.23.50, 93.184.221.240, 192.229.221.95
          • Excluded domains from analysis (whitelisted): fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, clientservices.googleapis.com, ctldl.windowsupdate.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wu.azureedge.net, clients2.google.com, edgedl.me.gvt1.com, ocsp.digicert.com, e16604.g.akamaiedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, ocsp.edge.digicert.com, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, clients.l.google.com, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtSetInformationFile calls found.
          • VT rate limit hit for: https://steaemcoonmmunnltly.com/g-friend/golo/gifts-50
          No simulations
          No context
          No context
          No context
          No context
          No context
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jul 4 21:56:30 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2677
          Entropy (8bit):3.9826833955477023
          Encrypted:false
          SSDEEP:48:8VdKJTqxWS/+HlidAKZdA19ehwiZUklqehTy+3:8SJGEiEIy
          MD5:BC1364E44233C65399474B7CFE416DCC
          SHA1:5C365AAA4D528623160C773A7AA8493371C0C8DA
          SHA-256:62F7BB8AD486632F5ECE87EBE59AF2B874FB6BC86B361BF069AD972BDDC9E21C
          SHA-512:88C7BF262400FDB60D11735B61E306499A5F0B4FBC3240FBF0E3833A37D0BDFDBCA95BE77EDE56415AD3BA69E773F2C82E2350EE0A6BA1D82E76F282F898675C
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,....3X.he...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........].`......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jul 4 21:56:30 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2679
          Entropy (8bit):3.998466373640647
          Encrypted:false
          SSDEEP:48:8hdKJTqxWS/+HlidAKZdA1weh/iZUkAQkqeh4y+2:8WJGEi29Q1y
          MD5:8A9158005DE78A4A4A783BA9298A092D
          SHA1:4CC67D6D4998664CB2B74D313828A40F810A3545
          SHA-256:32E0492489FBAC2865A62DA5F06A825B9FACCC918B6D8FED31063F862BA406A6
          SHA-512:9124F8817AA47840927486F6CCFDB8D150621D2D7A68BE39FBF58DC4D35BE74A451FC8A004CB4C0FA3CC711F7E0571554855ADE53481EAE49EA9954A43248B99
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,......the...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........].`......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2693
          Entropy (8bit):4.011181888035425
          Encrypted:false
          SSDEEP:48:8xndKJTqxWsHlidAKZdA14tseh7sFiZUkmgqeh7s6y+BX:8xMJGEYnUy
          MD5:CE2E427534CB5F6A6CF0B064A22D843B
          SHA1:EB65DC99B93CDF44441F7BF1122D44ED25D22C82
          SHA-256:3F3E45D0F7566DBBEF9A5F87F68D59F9AD608C340A6ECC55491118EFE06967EC
          SHA-512:C66724B06C4F461A6DF031FF497455D8B09EFFA507F07CE0283FFA29B3FA57D3D70E9FEDC76A33CD35835ABB5F9EF435125EF381C99A0F6171C8DAE76626F3EF
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,......e>....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VDW.n...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........].`......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jul 4 21:56:29 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2681
          Entropy (8bit):3.994555697394688
          Encrypted:false
          SSDEEP:48:8qdKJTqxWS/+HlidAKZdA1vehDiZUkwqeh8y+R:8BJGEidCy
          MD5:541BDD41398800EB98D906FF53E8AF6E
          SHA1:770E6AB09C06496D69826E6C14EA289E1C928FAD
          SHA-256:CE058AF549BA55C3584CD21599F550696730D4E5B07D1A7D10110D5A7E085FDD
          SHA-512:B1A7930BC99949C693790C65A5D306C6DC8713C18D6558DAE509CF2179D1053940AAC4BEF5B9B6CF1CA80336639627F07F36FA2D9492366B273802BF8BECB0E4
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,....dEohe...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........].`......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jul 4 21:56:30 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2681
          Entropy (8bit):3.98600618510937
          Encrypted:false
          SSDEEP:48:8odKJTqxWS/+HlidAKZdA1hehBiZUk1W1qehGy+C:8vJGEi99my
          MD5:F5C93A2084E279380D62946081F7AA42
          SHA1:F27D8F7435D815B96EC02CB95EC3841CBFBC7286
          SHA-256:E9A81EF3B7162F5A1DD5BEB843B8BBDFDB7B46A9CA832BEBD7050364D5E1C52C
          SHA-512:574A691AA3161DD7C12545D87A2252724ED01E5395AD2230A4090356B6718B7712DFC5B3CE6CB3C34D1D60D7AA18F7593B14379AC416D6BEF9CB82CB9EBEC8BD
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,......xhe...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........].`......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jul 4 21:56:29 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2683
          Entropy (8bit):3.996892152801792
          Encrypted:false
          SSDEEP:48:8ydKJTqxWS/+HlidAKZdA1duT+ehOuTbbiZUk5OjqehOuTbUy+yT+:8JJGEiBT/TbxWOvTbUy7T
          MD5:9713D3658599DDA33B0B156B9BF65714
          SHA1:5A83CB13ABD8383364BE30F50BD278A923594ACF
          SHA-256:0D4EF8D301DF1799128C0EAC3DB47D1140F31EA8FA15B3DAC05C560028BFD7FD
          SHA-512:61AEB957F24F79C114AFA649925133F75B10F4E1160CEB38C72E0390C05324DDB9AB912209A89ECE24993F7E77311FA780FF1085FB1E7BE51A386BCE20E9EBFA
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,....f.hhe...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........].`......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          No static file info
          TimestampSource PortDest PortSource IPDest IP
          Jul 5, 2024 00:56:24.179565907 CEST49675443192.168.2.523.1.237.91
          Jul 5, 2024 00:56:24.179569006 CEST49674443192.168.2.523.1.237.91
          Jul 5, 2024 00:56:24.288933039 CEST49673443192.168.2.523.1.237.91
          Jul 5, 2024 00:56:32.618498087 CEST49711443192.168.2.5142.250.186.164
          Jul 5, 2024 00:56:32.618540049 CEST44349711142.250.186.164192.168.2.5
          Jul 5, 2024 00:56:32.618668079 CEST49711443192.168.2.5142.250.186.164
          Jul 5, 2024 00:56:32.619250059 CEST49711443192.168.2.5142.250.186.164
          Jul 5, 2024 00:56:32.619271994 CEST44349711142.250.186.164192.168.2.5
          Jul 5, 2024 00:56:33.301269054 CEST44349711142.250.186.164192.168.2.5
          Jul 5, 2024 00:56:33.301626921 CEST49711443192.168.2.5142.250.186.164
          Jul 5, 2024 00:56:33.301650047 CEST44349711142.250.186.164192.168.2.5
          Jul 5, 2024 00:56:33.302639961 CEST44349711142.250.186.164192.168.2.5
          Jul 5, 2024 00:56:33.302705050 CEST49711443192.168.2.5142.250.186.164
          Jul 5, 2024 00:56:33.304749966 CEST49711443192.168.2.5142.250.186.164
          Jul 5, 2024 00:56:33.304817915 CEST44349711142.250.186.164192.168.2.5
          Jul 5, 2024 00:56:33.358314037 CEST49711443192.168.2.5142.250.186.164
          Jul 5, 2024 00:56:33.358333111 CEST44349711142.250.186.164192.168.2.5
          Jul 5, 2024 00:56:33.405191898 CEST49711443192.168.2.5142.250.186.164
          Jul 5, 2024 00:56:33.780217886 CEST49674443192.168.2.523.1.237.91
          Jul 5, 2024 00:56:33.795840025 CEST49675443192.168.2.523.1.237.91
          Jul 5, 2024 00:56:33.889609098 CEST49673443192.168.2.523.1.237.91
          Jul 5, 2024 00:56:35.610879898 CEST4434970323.1.237.91192.168.2.5
          Jul 5, 2024 00:56:35.610999107 CEST49703443192.168.2.523.1.237.91
          Jul 5, 2024 00:56:43.244648933 CEST44349711142.250.186.164192.168.2.5
          Jul 5, 2024 00:56:43.244721889 CEST44349711142.250.186.164192.168.2.5
          Jul 5, 2024 00:56:43.244887114 CEST49711443192.168.2.5142.250.186.164
          Jul 5, 2024 00:56:43.398581028 CEST49711443192.168.2.5142.250.186.164
          Jul 5, 2024 00:56:43.398610115 CEST44349711142.250.186.164192.168.2.5
          TimestampSource PortDest PortSource IPDest IP
          Jul 5, 2024 00:56:28.702450991 CEST53523911.1.1.1192.168.2.5
          Jul 5, 2024 00:56:28.725361109 CEST53557221.1.1.1192.168.2.5
          Jul 5, 2024 00:56:29.738411903 CEST53558251.1.1.1192.168.2.5
          Jul 5, 2024 00:56:30.008627892 CEST5610453192.168.2.51.1.1.1
          Jul 5, 2024 00:56:30.008857965 CEST5958153192.168.2.51.1.1.1
          Jul 5, 2024 00:56:30.018479109 CEST53561041.1.1.1192.168.2.5
          Jul 5, 2024 00:56:30.019340992 CEST53595811.1.1.1192.168.2.5
          Jul 5, 2024 00:56:30.020035028 CEST5511553192.168.2.51.1.1.1
          Jul 5, 2024 00:56:30.030452967 CEST53551151.1.1.1192.168.2.5
          Jul 5, 2024 00:56:30.098331928 CEST5950853192.168.2.58.8.8.8
          Jul 5, 2024 00:56:30.098583937 CEST4979353192.168.2.51.1.1.1
          Jul 5, 2024 00:56:30.105715990 CEST53497931.1.1.1192.168.2.5
          Jul 5, 2024 00:56:30.106583118 CEST53595088.8.8.8192.168.2.5
          Jul 5, 2024 00:56:31.105195999 CEST6122553192.168.2.51.1.1.1
          Jul 5, 2024 00:56:31.105336905 CEST5536953192.168.2.51.1.1.1
          Jul 5, 2024 00:56:31.113310099 CEST53553691.1.1.1192.168.2.5
          Jul 5, 2024 00:56:31.115351915 CEST53612251.1.1.1192.168.2.5
          Jul 5, 2024 00:56:32.609401941 CEST5096753192.168.2.51.1.1.1
          Jul 5, 2024 00:56:32.609643936 CEST5824453192.168.2.51.1.1.1
          Jul 5, 2024 00:56:32.616280079 CEST53509671.1.1.1192.168.2.5
          Jul 5, 2024 00:56:32.617038965 CEST53582441.1.1.1192.168.2.5
          Jul 5, 2024 00:56:36.140095949 CEST5243553192.168.2.51.1.1.1
          Jul 5, 2024 00:56:36.140522003 CEST5461253192.168.2.51.1.1.1
          Jul 5, 2024 00:56:36.150743961 CEST53524351.1.1.1192.168.2.5
          Jul 5, 2024 00:56:36.154359102 CEST53546121.1.1.1192.168.2.5
          Jul 5, 2024 00:56:36.176914930 CEST5072753192.168.2.51.1.1.1
          Jul 5, 2024 00:56:36.187822104 CEST53507271.1.1.1192.168.2.5
          Jul 5, 2024 00:56:46.746073008 CEST53566641.1.1.1192.168.2.5
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Jul 5, 2024 00:56:30.008627892 CEST192.168.2.51.1.1.10x7796Standard query (0)steaemcoonmmunnltly.comA (IP address)IN (0x0001)false
          Jul 5, 2024 00:56:30.008857965 CEST192.168.2.51.1.1.10xc2d9Standard query (0)steaemcoonmmunnltly.com65IN (0x0001)false
          Jul 5, 2024 00:56:30.020035028 CEST192.168.2.51.1.1.10xb496Standard query (0)steaemcoonmmunnltly.comA (IP address)IN (0x0001)false
          Jul 5, 2024 00:56:30.098331928 CEST192.168.2.58.8.8.80xf41dStandard query (0)google.comA (IP address)IN (0x0001)false
          Jul 5, 2024 00:56:30.098583937 CEST192.168.2.51.1.1.10x6bdeStandard query (0)google.comA (IP address)IN (0x0001)false
          Jul 5, 2024 00:56:31.105195999 CEST192.168.2.51.1.1.10xde49Standard query (0)steaemcoonmmunnltly.comA (IP address)IN (0x0001)false
          Jul 5, 2024 00:56:31.105336905 CEST192.168.2.51.1.1.10x6de9Standard query (0)steaemcoonmmunnltly.com65IN (0x0001)false
          Jul 5, 2024 00:56:32.609401941 CEST192.168.2.51.1.1.10xc0caStandard query (0)www.google.comA (IP address)IN (0x0001)false
          Jul 5, 2024 00:56:32.609643936 CEST192.168.2.51.1.1.10x33acStandard query (0)www.google.com65IN (0x0001)false
          Jul 5, 2024 00:56:36.140095949 CEST192.168.2.51.1.1.10xa335Standard query (0)steaemcoonmmunnltly.comA (IP address)IN (0x0001)false
          Jul 5, 2024 00:56:36.140522003 CEST192.168.2.51.1.1.10x493fStandard query (0)steaemcoonmmunnltly.com65IN (0x0001)false
          Jul 5, 2024 00:56:36.176914930 CEST192.168.2.51.1.1.10xb0beStandard query (0)steaemcoonmmunnltly.comA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Jul 5, 2024 00:56:30.018479109 CEST1.1.1.1192.168.2.50x7796Name error (3)steaemcoonmmunnltly.comnonenoneA (IP address)IN (0x0001)false
          Jul 5, 2024 00:56:30.019340992 CEST1.1.1.1192.168.2.50xc2d9Name error (3)steaemcoonmmunnltly.comnonenone65IN (0x0001)false
          Jul 5, 2024 00:56:30.030452967 CEST1.1.1.1192.168.2.50xb496Name error (3)steaemcoonmmunnltly.comnonenoneA (IP address)IN (0x0001)false
          Jul 5, 2024 00:56:30.105715990 CEST1.1.1.1192.168.2.50x6bdeNo error (0)google.com172.217.16.206A (IP address)IN (0x0001)false
          Jul 5, 2024 00:56:30.106583118 CEST8.8.8.8192.168.2.50xf41dNo error (0)google.com172.217.168.14A (IP address)IN (0x0001)false
          Jul 5, 2024 00:56:31.113310099 CEST1.1.1.1192.168.2.50x6de9Name error (3)steaemcoonmmunnltly.comnonenone65IN (0x0001)false
          Jul 5, 2024 00:56:31.115351915 CEST1.1.1.1192.168.2.50xde49Name error (3)steaemcoonmmunnltly.comnonenoneA (IP address)IN (0x0001)false
          Jul 5, 2024 00:56:32.616280079 CEST1.1.1.1192.168.2.50xc0caNo error (0)www.google.com142.250.186.164A (IP address)IN (0x0001)false
          Jul 5, 2024 00:56:32.617038965 CEST1.1.1.1192.168.2.50x33acNo error (0)www.google.com65IN (0x0001)false
          Jul 5, 2024 00:56:36.150743961 CEST1.1.1.1192.168.2.50xa335Name error (3)steaemcoonmmunnltly.comnonenoneA (IP address)IN (0x0001)false
          Jul 5, 2024 00:56:36.154359102 CEST1.1.1.1192.168.2.50x493fName error (3)steaemcoonmmunnltly.comnonenone65IN (0x0001)false
          Jul 5, 2024 00:56:36.187822104 CEST1.1.1.1192.168.2.50xb0beName error (3)steaemcoonmmunnltly.comnonenoneA (IP address)IN (0x0001)false
          Jul 5, 2024 00:56:46.890048027 CEST1.1.1.1192.168.2.50x3035No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
          Jul 5, 2024 00:56:46.890048027 CEST1.1.1.1192.168.2.50x3035No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false

          Click to jump to process

          Click to jump to process

          Click to jump to process

          Target ID:0
          Start time:18:56:24
          Start date:04/07/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
          Imagebase:0x7ff715980000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:2
          Start time:18:56:26
          Start date:04/07/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=2020,i,13463992082652097780,16142965064800232614,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
          Imagebase:0x7ff715980000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:3
          Start time:18:56:29
          Start date:04/07/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://steaemcoonmmunnltly.com/g-friend/golo/gifts-50"
          Imagebase:0x7ff715980000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          No disassembly