Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
http://5n7y4yihirccftc5.tor2web.org

Overview

General Information

Sample URL:http://5n7y4yihirccftc5.tor2web.org
Analysis ID:1512189
Infos:
Errors
  • URL not reachable

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Suricata IDS alerts for network traffic
Uses TOR for connection hidding

Classification

  • System is w10x64
  • chrome.exe (PID: 1928 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 3992 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2016 --field-trial-handle=1964,i,8065426057897108357,10531782828023946221,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6352 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://5n7y4yihirccftc5.tor2web.org" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-09-16T23:57:21.849240+020020230841A Network Trojan was detected192.168.2.4504741.1.1.153UDP
2024-09-16T23:57:21.849439+020020230841A Network Trojan was detected192.168.2.4616001.1.1.153UDP

Click to jump to signature section

Show All Signature Results

Networking

barindex
Source: Network trafficSuricata IDS: 2023084 - Severity 1 - ET MALWARE Ransomware Locky .onion Payment Domain (5n7y4yihirccftc5) : 192.168.2.4:50474 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2023084 - Severity 1 - ET MALWARE Ransomware Locky .onion Payment Domain (5n7y4yihirccftc5) : 192.168.2.4:61600 -> 1.1.1.1:53
Source: unknownDNS query: name: 5n7y4yihirccftc5.tor2web.org
Source: unknownDNS query: name: 5n7y4yihirccftc5.tor2web.org
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 5n7y4yihirccftc5.tor2web.orgConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 5n7y4yihirccftc5.tor2web.orgConnection: keep-aliveCache-Control: max-age=0Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficDNS traffic detected: DNS query: 5n7y4yihirccftc5.tor2web.org
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: classification engineClassification label: mal52.troj.win@18/0@4/4
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2016 --field-trial-handle=1964,i,8065426057897108357,10531782828023946221,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://5n7y4yihirccftc5.tor2web.org"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2016 --field-trial-handle=1964,i,8065426057897108357,10531782828023946221,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath Interception1
Process Injection
1
Process Injection
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Multi-hop Proxy
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsInternet Connection DiscoverySSHKeylogging1
Proxy
Scheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain CredentialsWi-Fi DiscoveryVNCGUI Input Capture1
Ingress Tool Transfer
Data Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
http://5n7y4yihirccftc5.tor2web.org0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://5n7y4yihirccftc5.tor2web.org/0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
5n7y4yihirccftc5.tor2web.org
103.198.0.111
truetrue
    unknown
    www.google.com
    172.217.16.196
    truefalse
      unknown
      fp2e7a.wpc.phicdn.net
      192.229.221.95
      truefalse
        unknown
        NameMaliciousAntivirus DetectionReputation
        http://5n7y4yihirccftc5.tor2web.org/false
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        239.255.255.250
        unknownReserved
        unknownunknownfalse
        103.198.0.111
        5n7y4yihirccftc5.tor2web.orgSingapore
        32780HOSTINGSERVICES-INCUStrue
        172.217.16.196
        www.google.comUnited States
        15169GOOGLEUSfalse
        IP
        192.168.2.4
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1512189
        Start date and time:2024-09-16 23:56:17 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 2m 13s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:browseurl.jbs
        Sample URL:http://5n7y4yihirccftc5.tor2web.org
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:7
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal52.troj.win@18/0@4/4
        Cookbook Comments:
        • URL browsing timeout or error
        • URL not reachable
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 142.250.186.131, 142.251.168.84, 142.250.185.142, 34.104.35.123, 184.28.90.27, 40.127.169.103, 93.184.221.240, 13.85.23.206, 192.229.221.95, 20.3.187.198
        • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, clientservices.googleapis.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wu.azureedge.net, clients2.google.com, ocsp.digicert.com, e16604.g.akamaiedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, glb.cws.prod.dcat.dsp.trafficmanager.net, ocsp.edge.digicert.com, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, fs.microsoft.com, accounts.google.com, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, edgedl.me.gvt1.com, clients.l.google.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtSetInformationFile calls found.
        • VT rate limit hit for: http://5n7y4yihirccftc5.tor2web.org
        No simulations
        No context
        No context
        No context
        No context
        No context
        No created / dropped files found
        No static file info
        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
        2024-09-16T23:57:21.849240+02002023084ET MALWARE Ransomware Locky .onion Payment Domain (5n7y4yihirccftc5)1192.168.2.4504741.1.1.153UDP
        2024-09-16T23:57:21.849439+02002023084ET MALWARE Ransomware Locky .onion Payment Domain (5n7y4yihirccftc5)1192.168.2.4616001.1.1.153UDP
        TimestampSource PortDest PortSource IPDest IP
        Sep 16, 2024 23:57:19.960623026 CEST49675443192.168.2.4173.222.162.32
        Sep 16, 2024 23:57:21.879050016 CEST4973580192.168.2.4103.198.0.111
        Sep 16, 2024 23:57:21.879369020 CEST4973680192.168.2.4103.198.0.111
        Sep 16, 2024 23:57:21.883945942 CEST8049735103.198.0.111192.168.2.4
        Sep 16, 2024 23:57:21.884016037 CEST4973580192.168.2.4103.198.0.111
        Sep 16, 2024 23:57:21.884157896 CEST4973580192.168.2.4103.198.0.111
        Sep 16, 2024 23:57:21.884218931 CEST8049736103.198.0.111192.168.2.4
        Sep 16, 2024 23:57:21.884416103 CEST4973680192.168.2.4103.198.0.111
        Sep 16, 2024 23:57:21.888947964 CEST8049735103.198.0.111192.168.2.4
        Sep 16, 2024 23:57:25.338571072 CEST49739443192.168.2.4172.217.16.196
        Sep 16, 2024 23:57:25.338679075 CEST44349739172.217.16.196192.168.2.4
        Sep 16, 2024 23:57:25.339348078 CEST49739443192.168.2.4172.217.16.196
        Sep 16, 2024 23:57:25.341140032 CEST49739443192.168.2.4172.217.16.196
        Sep 16, 2024 23:57:25.341187954 CEST44349739172.217.16.196192.168.2.4
        Sep 16, 2024 23:57:26.006726027 CEST44349739172.217.16.196192.168.2.4
        Sep 16, 2024 23:57:26.011313915 CEST49739443192.168.2.4172.217.16.196
        Sep 16, 2024 23:57:26.011351109 CEST44349739172.217.16.196192.168.2.4
        Sep 16, 2024 23:57:26.012914896 CEST44349739172.217.16.196192.168.2.4
        Sep 16, 2024 23:57:26.013144970 CEST49739443192.168.2.4172.217.16.196
        Sep 16, 2024 23:57:26.015319109 CEST49739443192.168.2.4172.217.16.196
        Sep 16, 2024 23:57:26.015427113 CEST44349739172.217.16.196192.168.2.4
        Sep 16, 2024 23:57:26.071300030 CEST49739443192.168.2.4172.217.16.196
        Sep 16, 2024 23:57:26.071337938 CEST44349739172.217.16.196192.168.2.4
        Sep 16, 2024 23:57:26.117902040 CEST49739443192.168.2.4172.217.16.196
        Sep 16, 2024 23:57:35.928793907 CEST44349739172.217.16.196192.168.2.4
        Sep 16, 2024 23:57:35.928865910 CEST44349739172.217.16.196192.168.2.4
        Sep 16, 2024 23:57:35.928972960 CEST49739443192.168.2.4172.217.16.196
        Sep 16, 2024 23:57:36.912561893 CEST49739443192.168.2.4172.217.16.196
        Sep 16, 2024 23:57:36.912626982 CEST44349739172.217.16.196192.168.2.4
        Sep 16, 2024 23:57:43.254842997 CEST8049736103.198.0.111192.168.2.4
        Sep 16, 2024 23:57:43.255496025 CEST4973680192.168.2.4103.198.0.111
        Sep 16, 2024 23:57:43.278341055 CEST8049735103.198.0.111192.168.2.4
        Sep 16, 2024 23:57:43.278424025 CEST4973580192.168.2.4103.198.0.111
        Sep 16, 2024 23:57:43.278861046 CEST4973580192.168.2.4103.198.0.111
        Sep 16, 2024 23:57:43.286359072 CEST8049735103.198.0.111192.168.2.4
        Sep 16, 2024 23:57:43.529833078 CEST4973680192.168.2.4103.198.0.111
        Sep 16, 2024 23:57:43.534779072 CEST8049736103.198.0.111192.168.2.4
        Sep 16, 2024 23:57:44.482562065 CEST4974980192.168.2.4103.198.0.111
        Sep 16, 2024 23:57:44.482578993 CEST4974880192.168.2.4103.198.0.111
        Sep 16, 2024 23:57:44.487700939 CEST8049749103.198.0.111192.168.2.4
        Sep 16, 2024 23:57:44.487736940 CEST8049748103.198.0.111192.168.2.4
        Sep 16, 2024 23:57:44.487828970 CEST4974980192.168.2.4103.198.0.111
        Sep 16, 2024 23:57:44.487839937 CEST4974880192.168.2.4103.198.0.111
        Sep 16, 2024 23:57:44.589359045 CEST4974880192.168.2.4103.198.0.111
        Sep 16, 2024 23:57:44.594461918 CEST8049748103.198.0.111192.168.2.4
        TimestampSource PortDest PortSource IPDest IP
        Sep 16, 2024 23:57:20.522303104 CEST53550231.1.1.1192.168.2.4
        Sep 16, 2024 23:57:20.583528042 CEST53602121.1.1.1192.168.2.4
        Sep 16, 2024 23:57:21.589267969 CEST53614231.1.1.1192.168.2.4
        Sep 16, 2024 23:57:21.849240065 CEST5047453192.168.2.41.1.1.1
        Sep 16, 2024 23:57:21.849438906 CEST6160053192.168.2.41.1.1.1
        Sep 16, 2024 23:57:21.859070063 CEST53616001.1.1.1192.168.2.4
        Sep 16, 2024 23:57:21.878494978 CEST53504741.1.1.1192.168.2.4
        Sep 16, 2024 23:57:25.284609079 CEST6333053192.168.2.41.1.1.1
        Sep 16, 2024 23:57:25.286693096 CEST5343553192.168.2.41.1.1.1
        Sep 16, 2024 23:57:25.291682005 CEST53633301.1.1.1192.168.2.4
        Sep 16, 2024 23:57:25.293416023 CEST53534351.1.1.1192.168.2.4
        Sep 16, 2024 23:57:30.703818083 CEST138138192.168.2.4192.168.2.255
        Sep 16, 2024 23:57:38.500605106 CEST53611251.1.1.1192.168.2.4
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Sep 16, 2024 23:57:21.849240065 CEST192.168.2.41.1.1.10x8af9Standard query (0)5n7y4yihirccftc5.tor2web.orgA (IP address)IN (0x0001)false
        Sep 16, 2024 23:57:21.849438906 CEST192.168.2.41.1.1.10x43a5Standard query (0)5n7y4yihirccftc5.tor2web.org65IN (0x0001)false
        Sep 16, 2024 23:57:25.284609079 CEST192.168.2.41.1.1.10x76b8Standard query (0)www.google.comA (IP address)IN (0x0001)false
        Sep 16, 2024 23:57:25.286693096 CEST192.168.2.41.1.1.10x6c9aStandard query (0)www.google.com65IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Sep 16, 2024 23:57:21.878494978 CEST1.1.1.1192.168.2.40x8af9No error (0)5n7y4yihirccftc5.tor2web.org103.198.0.111A (IP address)IN (0x0001)false
        Sep 16, 2024 23:57:25.291682005 CEST1.1.1.1192.168.2.40x76b8No error (0)www.google.com172.217.16.196A (IP address)IN (0x0001)false
        Sep 16, 2024 23:57:25.293416023 CEST1.1.1.1192.168.2.40x6c9aNo error (0)www.google.com65IN (0x0001)false
        Sep 16, 2024 23:57:36.482655048 CEST1.1.1.1192.168.2.40xa43cNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
        Sep 16, 2024 23:57:36.482655048 CEST1.1.1.1192.168.2.40xa43cNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
        Sep 16, 2024 23:57:53.626195908 CEST1.1.1.1192.168.2.40x951eNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
        Sep 16, 2024 23:57:53.626195908 CEST1.1.1.1192.168.2.40x951eNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
        • 5n7y4yihirccftc5.tor2web.org
        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        0192.168.2.449735103.198.0.111803992C:\Program Files\Google\Chrome\Application\chrome.exe
        TimestampBytes transferredDirectionData
        Sep 16, 2024 23:57:21.884157896 CEST443OUTGET / HTTP/1.1
        Host: 5n7y4yihirccftc5.tor2web.org
        Connection: keep-alive
        Upgrade-Insecure-Requests: 1
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
        Accept-Encoding: gzip, deflate
        Accept-Language: en-US,en;q=0.9


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        1192.168.2.449748103.198.0.111803992C:\Program Files\Google\Chrome\Application\chrome.exe
        TimestampBytes transferredDirectionData
        Sep 16, 2024 23:57:44.589359045 CEST469OUTGET / HTTP/1.1
        Host: 5n7y4yihirccftc5.tor2web.org
        Connection: keep-alive
        Cache-Control: max-age=0
        Upgrade-Insecure-Requests: 1
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
        Accept-Encoding: gzip, deflate
        Accept-Language: en-US,en;q=0.9


        Click to jump to process

        Click to jump to process

        Click to jump to process

        Target ID:0
        Start time:17:57:15
        Start date:16/09/2024
        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
        Imagebase:0x7ff76e190000
        File size:3'242'272 bytes
        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        Target ID:2
        Start time:17:57:19
        Start date:16/09/2024
        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2016 --field-trial-handle=1964,i,8065426057897108357,10531782828023946221,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
        Imagebase:0x7ff76e190000
        File size:3'242'272 bytes
        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        Target ID:3
        Start time:17:57:20
        Start date:16/09/2024
        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://5n7y4yihirccftc5.tor2web.org"
        Imagebase:0x7ff76e190000
        File size:3'242'272 bytes
        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        No disassembly