Edit tour

Windows Analysis Report
http://passwordsleakcheck-pa.googleapis.com

Overview

General Information

Sample URL:http://passwordsleakcheck-pa.googleapis.com
Analysis ID:846232
Infos:

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

No high impact signatures.

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • chrome.exe (PID: 5900 cmdline: C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "http://passwordsleakcheck-pa.googleapis.com MD5: 0FEC2748F363150DC54C1CAFFB1A9408)
    • chrome.exe (PID: 2436 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=1964 --field-trial-handle=1744,i,18433832869702017972,3122426607111868884,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8 MD5: 0FEC2748F363150DC54C1CAFFB1A9408)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\GoogleUpdaterJump to behavior
Source: global trafficHTTP traffic detected: GET /service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=104.0.5112.81&lang=en-GB&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1 HTTP/1.1Host: clients2.google.comConnection: keep-aliveX-Goog-Update-Interactivity: fgX-Goog-Update-AppId: nmmhkkegccagdldgiimedpiccmgmiedaX-Goog-Update-Updater: chromecrx-104.0.5112.81Sec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en-US;q=0.9,en;q=0.8
Source: unknownDNS traffic detected: queries for: clients2.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
Source: unknownNetwork traffic detected: HTTP traffic on port 49694 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49694
Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49692
Source: unknownNetwork traffic detected: HTTP traffic on port 49692 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownHTTP traffic detected: POST /ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard HTTP/1.1Host: accounts.google.comConnection: keep-aliveContent-Length: 1Origin: https://www.google.comContent-Type: application/x-www-form-urlencodedSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en-US;q=0.9,en;q=0.8
Source: classification engineClassification label: clean0.win@21/0@6/6
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Program Files\Google\GoogleUpdaterJump to behavior
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "http://passwordsleakcheck-pa.googleapis.com
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=1964 --field-trial-handle=1744,i,18433832869702017972,3122426607111868884,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=1964 --field-trial-handle=1744,i,18433832869702017972,3122426607111868884,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\GoogleUpdaterJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath Interception1
Process Injection
2
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local SystemExfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth3
Non-Application Layer Protocol
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration4
Application Layer Protocol
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled Transfer1
Ingress Tool Transfer
SIM Card SwapCarrier Billing Fraud
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 846232 URL: http://passwordsleakcheck-p... Startdate: 13/04/2023 Architecture: WINDOWS Score: 0 5 chrome.exe 14 1 2->5         started        dnsIp3 11 192.168.2.1 unknown unknown 5->11 13 239.255.255.250 unknown Reserved 5->13 8 chrome.exe 5->8         started        process4 dnsIp5 15 www.google.com 142.250.203.100, 443, 49697, 49734 GOOGLEUS United States 8->15 17 clients.l.google.com 142.250.203.110, 443, 49694 GOOGLEUS United States 8->17 19 3 other IPs or domains 8->19

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
http://passwordsleakcheck-pa.googleapis.com0%VirustotalBrowse
http://passwordsleakcheck-pa.googleapis.com0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
accounts.google.com
216.58.215.237
truefalse
    high
    www.google.com
    142.250.203.100
    truefalse
      high
      clients.l.google.com
      142.250.203.110
      truefalse
        high
        clients2.google.com
        unknown
        unknownfalse
          high
          NameMaliciousAntivirus DetectionReputation
          https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=104.0.5112.81&lang=en-GB&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1false
            high
            https://accounts.google.com/ListAccounts?gpsia=1&source=ChromiumBrowser&json=standardfalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              239.255.255.250
              unknownReserved
              unknownunknownfalse
              216.58.215.237
              accounts.google.comUnited States
              15169GOOGLEUSfalse
              142.250.203.100
              www.google.comUnited States
              15169GOOGLEUSfalse
              142.250.203.110
              clients.l.google.comUnited States
              15169GOOGLEUSfalse
              IP
              192.168.2.1
              127.0.0.1
              Joe Sandbox Version:37.0.0 Beryl
              Analysis ID:846232
              Start date and time:2023-04-13 17:45:24 +02:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 4m 35s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:browseurl.jbs
              Sample URL:http://passwordsleakcheck-pa.googleapis.com
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:4
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:CLEAN
              Classification:clean0.win@21/0@6/6
              EGA Information:Failed
              HDC Information:Failed
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, conhost.exe
              • Excluded IPs from analysis (whitelisted): 142.250.203.99, 172.217.168.74, 142.250.203.106, 172.217.168.10, 34.104.35.123
              • Excluded domains from analysis (whitelisted): edgedl.me.gvt1.com, update.googleapis.com, ctldl.windowsupdate.com, clientservices.googleapis.com, passwordsleakcheck-pa.googleapis.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtWriteVirtualMemory calls found.
              No simulations
              No context
              No context
              No context
              No context
              No context
              No created / dropped files found
              No static file info

              Download Network PCAP: filteredfull

              • Total Packets: 47
              • 443 (HTTPS)
              • 53 (DNS)
              TimestampSource PortDest PortSource IPDest IP
              Apr 13, 2023 17:46:19.545777082 CEST49692443192.168.2.4216.58.215.237
              Apr 13, 2023 17:46:19.545850992 CEST44349692216.58.215.237192.168.2.4
              Apr 13, 2023 17:46:19.545983076 CEST49692443192.168.2.4216.58.215.237
              Apr 13, 2023 17:46:19.546816111 CEST49694443192.168.2.4142.250.203.110
              Apr 13, 2023 17:46:19.546869040 CEST44349694142.250.203.110192.168.2.4
              Apr 13, 2023 17:46:19.546950102 CEST49694443192.168.2.4142.250.203.110
              Apr 13, 2023 17:46:19.547373056 CEST49692443192.168.2.4216.58.215.237
              Apr 13, 2023 17:46:19.547410011 CEST44349692216.58.215.237192.168.2.4
              Apr 13, 2023 17:46:19.547966957 CEST49694443192.168.2.4142.250.203.110
              Apr 13, 2023 17:46:19.547997952 CEST44349694142.250.203.110192.168.2.4
              Apr 13, 2023 17:46:19.636746883 CEST44349694142.250.203.110192.168.2.4
              Apr 13, 2023 17:46:19.637339115 CEST49694443192.168.2.4142.250.203.110
              Apr 13, 2023 17:46:19.637409925 CEST44349694142.250.203.110192.168.2.4
              Apr 13, 2023 17:46:19.637897015 CEST44349694142.250.203.110192.168.2.4
              Apr 13, 2023 17:46:19.637978077 CEST49694443192.168.2.4142.250.203.110
              Apr 13, 2023 17:46:19.639134884 CEST44349694142.250.203.110192.168.2.4
              Apr 13, 2023 17:46:19.639213085 CEST49694443192.168.2.4142.250.203.110
              Apr 13, 2023 17:46:19.674841881 CEST44349692216.58.215.237192.168.2.4
              Apr 13, 2023 17:46:19.718619108 CEST49692443192.168.2.4216.58.215.237
              Apr 13, 2023 17:46:19.724652052 CEST49692443192.168.2.4216.58.215.237
              Apr 13, 2023 17:46:19.724674940 CEST44349692216.58.215.237192.168.2.4
              Apr 13, 2023 17:46:19.730119944 CEST44349692216.58.215.237192.168.2.4
              Apr 13, 2023 17:46:19.730206013 CEST49692443192.168.2.4216.58.215.237
              Apr 13, 2023 17:46:20.339734077 CEST49692443192.168.2.4216.58.215.237
              Apr 13, 2023 17:46:20.339876890 CEST49692443192.168.2.4216.58.215.237
              Apr 13, 2023 17:46:20.339907885 CEST44349692216.58.215.237192.168.2.4
              Apr 13, 2023 17:46:20.339993954 CEST44349692216.58.215.237192.168.2.4
              Apr 13, 2023 17:46:20.340048075 CEST49694443192.168.2.4142.250.203.110
              Apr 13, 2023 17:46:20.340332031 CEST49694443192.168.2.4142.250.203.110
              Apr 13, 2023 17:46:20.340358019 CEST44349694142.250.203.110192.168.2.4
              Apr 13, 2023 17:46:20.340399981 CEST44349694142.250.203.110192.168.2.4
              Apr 13, 2023 17:46:20.375207901 CEST44349694142.250.203.110192.168.2.4
              Apr 13, 2023 17:46:20.375382900 CEST49694443192.168.2.4142.250.203.110
              Apr 13, 2023 17:46:20.375494957 CEST44349694142.250.203.110192.168.2.4
              Apr 13, 2023 17:46:20.375619888 CEST44349694142.250.203.110192.168.2.4
              Apr 13, 2023 17:46:20.375812054 CEST49694443192.168.2.4142.250.203.110
              Apr 13, 2023 17:46:20.378449917 CEST49694443192.168.2.4142.250.203.110
              Apr 13, 2023 17:46:20.378484011 CEST44349694142.250.203.110192.168.2.4
              Apr 13, 2023 17:46:20.407033920 CEST49692443192.168.2.4216.58.215.237
              Apr 13, 2023 17:46:20.407058954 CEST44349692216.58.215.237192.168.2.4
              Apr 13, 2023 17:46:20.594507933 CEST49692443192.168.2.4216.58.215.237
              Apr 13, 2023 17:46:20.615953922 CEST44349692216.58.215.237192.168.2.4
              Apr 13, 2023 17:46:20.616061926 CEST49692443192.168.2.4216.58.215.237
              Apr 13, 2023 17:46:20.616106033 CEST44349692216.58.215.237192.168.2.4
              Apr 13, 2023 17:46:20.616511106 CEST44349692216.58.215.237192.168.2.4
              Apr 13, 2023 17:46:20.616599083 CEST49692443192.168.2.4216.58.215.237
              Apr 13, 2023 17:46:20.617228985 CEST49692443192.168.2.4216.58.215.237
              Apr 13, 2023 17:46:20.617263079 CEST44349692216.58.215.237192.168.2.4
              Apr 13, 2023 17:46:22.671333075 CEST49697443192.168.2.4142.250.203.100
              Apr 13, 2023 17:46:22.671410084 CEST44349697142.250.203.100192.168.2.4
              Apr 13, 2023 17:46:22.671511889 CEST49697443192.168.2.4142.250.203.100
              Apr 13, 2023 17:46:22.671830893 CEST49697443192.168.2.4142.250.203.100
              Apr 13, 2023 17:46:22.671860933 CEST44349697142.250.203.100192.168.2.4
              Apr 13, 2023 17:46:22.737412930 CEST44349697142.250.203.100192.168.2.4
              Apr 13, 2023 17:46:22.737807035 CEST49697443192.168.2.4142.250.203.100
              Apr 13, 2023 17:46:22.737854004 CEST44349697142.250.203.100192.168.2.4
              Apr 13, 2023 17:46:22.739192009 CEST44349697142.250.203.100192.168.2.4
              Apr 13, 2023 17:46:22.739293098 CEST49697443192.168.2.4142.250.203.100
              Apr 13, 2023 17:46:22.741609097 CEST49697443192.168.2.4142.250.203.100
              Apr 13, 2023 17:46:22.741744041 CEST44349697142.250.203.100192.168.2.4
              Apr 13, 2023 17:46:22.801099062 CEST49697443192.168.2.4142.250.203.100
              Apr 13, 2023 17:46:22.801120043 CEST44349697142.250.203.100192.168.2.4
              Apr 13, 2023 17:46:23.004384041 CEST49697443192.168.2.4142.250.203.100
              Apr 13, 2023 17:46:32.710321903 CEST44349697142.250.203.100192.168.2.4
              Apr 13, 2023 17:46:32.710494995 CEST44349697142.250.203.100192.168.2.4
              Apr 13, 2023 17:46:32.710572958 CEST49697443192.168.2.4142.250.203.100
              Apr 13, 2023 17:46:33.192238092 CEST49697443192.168.2.4142.250.203.100
              Apr 13, 2023 17:46:33.192282915 CEST44349697142.250.203.100192.168.2.4
              Apr 13, 2023 17:47:22.729007959 CEST49734443192.168.2.4142.250.203.100
              Apr 13, 2023 17:47:22.729096889 CEST44349734142.250.203.100192.168.2.4
              Apr 13, 2023 17:47:22.729186058 CEST49734443192.168.2.4142.250.203.100
              Apr 13, 2023 17:47:22.729831934 CEST49734443192.168.2.4142.250.203.100
              Apr 13, 2023 17:47:22.729865074 CEST44349734142.250.203.100192.168.2.4
              Apr 13, 2023 17:47:22.788428068 CEST44349734142.250.203.100192.168.2.4
              Apr 13, 2023 17:47:22.788912058 CEST49734443192.168.2.4142.250.203.100
              Apr 13, 2023 17:47:22.788980007 CEST44349734142.250.203.100192.168.2.4
              Apr 13, 2023 17:47:22.789834023 CEST44349734142.250.203.100192.168.2.4
              Apr 13, 2023 17:47:22.790263891 CEST49734443192.168.2.4142.250.203.100
              Apr 13, 2023 17:47:22.790414095 CEST44349734142.250.203.100192.168.2.4
              Apr 13, 2023 17:47:22.840318918 CEST49734443192.168.2.4142.250.203.100
              Apr 13, 2023 17:47:32.811983109 CEST44349734142.250.203.100192.168.2.4
              Apr 13, 2023 17:47:32.812133074 CEST44349734142.250.203.100192.168.2.4
              Apr 13, 2023 17:47:32.812241077 CEST49734443192.168.2.4142.250.203.100
              TimestampSource PortDest PortSource IPDest IP
              Apr 13, 2023 17:46:19.433160067 CEST5091153192.168.2.48.8.8.8
              Apr 13, 2023 17:46:19.433160067 CEST5657253192.168.2.48.8.8.8
              Apr 13, 2023 17:46:19.462323904 CEST53509118.8.8.8192.168.2.4
              Apr 13, 2023 17:46:19.462577105 CEST53565728.8.8.8192.168.2.4
              Apr 13, 2023 17:46:22.615081072 CEST5223953192.168.2.48.8.8.8
              Apr 13, 2023 17:46:22.635067940 CEST53522398.8.8.8192.168.2.4
              Apr 13, 2023 17:46:22.639281988 CEST5680753192.168.2.48.8.8.8
              Apr 13, 2023 17:46:22.657526016 CEST53568078.8.8.8192.168.2.4
              Apr 13, 2023 17:47:22.680500984 CEST5243753192.168.2.48.8.8.8
              Apr 13, 2023 17:47:22.700761080 CEST53524378.8.8.8192.168.2.4
              Apr 13, 2023 17:47:22.703927994 CEST5282553192.168.2.48.8.8.8
              Apr 13, 2023 17:47:22.727626085 CEST53528258.8.8.8192.168.2.4
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Apr 13, 2023 17:46:19.433160067 CEST192.168.2.48.8.8.80x6355Standard query (0)clients2.google.comA (IP address)IN (0x0001)false
              Apr 13, 2023 17:46:19.433160067 CEST192.168.2.48.8.8.80xafafStandard query (0)accounts.google.comA (IP address)IN (0x0001)false
              Apr 13, 2023 17:46:22.615081072 CEST192.168.2.48.8.8.80x7b72Standard query (0)www.google.comA (IP address)IN (0x0001)false
              Apr 13, 2023 17:46:22.639281988 CEST192.168.2.48.8.8.80x1a9aStandard query (0)www.google.comA (IP address)IN (0x0001)false
              Apr 13, 2023 17:47:22.680500984 CEST192.168.2.48.8.8.80xfad3Standard query (0)www.google.comA (IP address)IN (0x0001)false
              Apr 13, 2023 17:47:22.703927994 CEST192.168.2.48.8.8.80x2b23Standard query (0)www.google.comA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Apr 13, 2023 17:46:19.462323904 CEST8.8.8.8192.168.2.40x6355No error (0)clients2.google.comclients.l.google.comCNAME (Canonical name)IN (0x0001)false
              Apr 13, 2023 17:46:19.462323904 CEST8.8.8.8192.168.2.40x6355No error (0)clients.l.google.com142.250.203.110A (IP address)IN (0x0001)false
              Apr 13, 2023 17:46:19.462577105 CEST8.8.8.8192.168.2.40xafafNo error (0)accounts.google.com216.58.215.237A (IP address)IN (0x0001)false
              Apr 13, 2023 17:46:22.635067940 CEST8.8.8.8192.168.2.40x7b72No error (0)www.google.com142.250.203.100A (IP address)IN (0x0001)false
              Apr 13, 2023 17:46:22.657526016 CEST8.8.8.8192.168.2.40x1a9aNo error (0)www.google.com142.250.203.100A (IP address)IN (0x0001)false
              Apr 13, 2023 17:47:22.700761080 CEST8.8.8.8192.168.2.40xfad3No error (0)www.google.com142.250.203.100A (IP address)IN (0x0001)false
              Apr 13, 2023 17:47:22.727626085 CEST8.8.8.8192.168.2.40x2b23No error (0)www.google.com142.250.203.100A (IP address)IN (0x0001)false
              • accounts.google.com
              • clients2.google.com
              Session IDSource IPSource PortDestination IPDestination PortProcess
              0192.168.2.449692216.58.215.237443C:\Program Files\Google\Chrome\Application\chrome.exe
              TimestampkBytes transferredDirectionData
              2023-04-13 15:46:20 UTC0OUTPOST /ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard HTTP/1.1
              Host: accounts.google.com
              Connection: keep-alive
              Content-Length: 1
              Origin: https://www.google.com
              Content-Type: application/x-www-form-urlencoded
              Sec-Fetch-Site: none
              Sec-Fetch-Mode: no-cors
              Sec-Fetch-Dest: empty
              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36
              Accept-Encoding: gzip, deflate, br
              Accept-Language: en-GB,en-US;q=0.9,en;q=0.8
              2023-04-13 15:46:20 UTC0OUTData Raw: 20
              Data Ascii:
              2023-04-13 15:46:20 UTC2INHTTP/1.1 200 OK
              Content-Type: application/json; charset=utf-8
              Access-Control-Allow-Origin: https://www.google.com
              Access-Control-Allow-Credentials: true
              X-Content-Type-Options: nosniff
              Cache-Control: no-cache, no-store, max-age=0, must-revalidate
              Pragma: no-cache
              Expires: Mon, 01 Jan 1990 00:00:00 GMT
              Date: Thu, 13 Apr 2023 15:46:20 GMT
              Strict-Transport-Security: max-age=31536000; includeSubDomains
              Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-platform=*, ch-ua-platform-version=*
              Content-Security-Policy: script-src 'report-sample' 'nonce-fuTx2seL_EbKDKW3geVsOw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/IdentityListAccountsHttp/cspreport;worker-src 'self'
              Content-Security-Policy: script-src 'unsafe-inline' 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/IdentityListAccountsHttp/cspreport/allowlist
              Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/IdentityListAccountsHttp/cspreport
              Cross-Origin-Opener-Policy: same-origin
              Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
              Server: ESF
              X-XSS-Protection: 0
              Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
              Accept-Ranges: none
              Vary: Accept-Encoding
              Connection: close
              Transfer-Encoding: chunked
              2023-04-13 15:46:20 UTC4INData Raw: 31 31 0d 0a 5b 22 67 61 69 61 2e 6c 2e 61 2e 72 22 2c 5b 5d 5d 0d 0a
              Data Ascii: 11["gaia.l.a.r",[]]
              2023-04-13 15:46:20 UTC4INData Raw: 30 0d 0a 0d 0a
              Data Ascii: 0


              Session IDSource IPSource PortDestination IPDestination PortProcess
              1192.168.2.449694142.250.203.110443C:\Program Files\Google\Chrome\Application\chrome.exe
              TimestampkBytes transferredDirectionData
              2023-04-13 15:46:20 UTC0OUTGET /service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=104.0.5112.81&lang=en-GB&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1 HTTP/1.1
              Host: clients2.google.com
              Connection: keep-alive
              X-Goog-Update-Interactivity: fg
              X-Goog-Update-AppId: nmmhkkegccagdldgiimedpiccmgmieda
              X-Goog-Update-Updater: chromecrx-104.0.5112.81
              Sec-Fetch-Site: none
              Sec-Fetch-Mode: no-cors
              Sec-Fetch-Dest: empty
              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36
              Accept-Encoding: gzip, deflate, br
              Accept-Language: en-GB,en-US;q=0.9,en;q=0.8
              2023-04-13 15:46:20 UTC1INHTTP/1.1 200 OK
              Content-Security-Policy: script-src 'report-sample' 'nonce-jMIFbJnHNH-VhjqLrKOfHg' 'unsafe-inline' 'strict-dynamic' https: http:;object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/clientupdate-aus/1
              Cache-Control: no-cache, no-store, max-age=0, must-revalidate
              Pragma: no-cache
              Expires: Mon, 01 Jan 1990 00:00:00 GMT
              Date: Thu, 13 Apr 2023 15:46:20 GMT
              Content-Type: text/xml; charset=UTF-8
              X-Daynum: 5946
              X-Daystart: 31580
              X-Content-Type-Options: nosniff
              X-Frame-Options: SAMEORIGIN
              X-XSS-Protection: 1; mode=block
              Server: GSE
              Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
              Accept-Ranges: none
              Vary: Accept-Encoding
              Connection: close
              Transfer-Encoding: chunked
              2023-04-13 15:46:20 UTC1INData Raw: 32 63 39 0d 0a 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 55 54 46 2d 38 22 3f 3e 3c 67 75 70 64 61 74 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 75 70 64 61 74 65 32 2f 72 65 73 70 6f 6e 73 65 22 20 70 72 6f 74 6f 63 6f 6c 3d 22 32 2e 30 22 20 73 65 72 76 65 72 3d 22 70 72 6f 64 22 3e 3c 64 61 79 73 74 61 72 74 20 65 6c 61 70 73 65 64 5f 64 61 79 73 3d 22 35 39 34 36 22 20 65 6c 61 70 73 65 64 5f 73 65 63 6f 6e 64 73 3d 22 33 31 35 38 30 22 2f 3e 3c 61 70 70 20 61 70 70 69 64 3d 22 6e 6d 6d 68 6b 6b 65 67 63 63 61 67 64 6c 64 67 69 69 6d 65 64 70 69 63 63 6d 67 6d 69 65 64 61 22 20 63 6f 68 6f 72 74 3d 22 31 3a 3a 22 20 63 6f 68 6f 72 74 6e 61 6d 65 3d 22 22
              Data Ascii: 2c9<?xml version="1.0" encoding="UTF-8"?><gupdate xmlns="http://www.google.com/update2/response" protocol="2.0" server="prod"><daystart elapsed_days="5946" elapsed_seconds="31580"/><app appid="nmmhkkegccagdldgiimedpiccmgmieda" cohort="1::" cohortname=""
              2023-04-13 15:46:20 UTC2INData Raw: 37 32 33 66 35 36 62 38 37 31 37 31 37 35 63 35 33 36 36 38 35 63 35 34 35 30 31 32 32 62 33 30 37 38 39 34 36 34 61 64 38 32 22 20 68 61 73 68 5f 73 68 61 32 35 36 3d 22 38 31 65 33 61 34 64 34 33 61 37 33 36 39 39 65 31 62 37 37 38 31 37 32 33 66 35 36 62 38 37 31 37 31 37 35 63 35 33 36 36 38 35 63 35 34 35 30 31 32 32 62 33 30 37 38 39 34 36 34 61 64 38 32 22 20 70 72 6f 74 65 63 74 65 64 3d 22 30 22 20 73 69 7a 65 3d 22 32 34 38 35 33 31 22 20 73 74 61 74 75 73 3d 22 6f 6b 22 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 2e 30 2e 36 22 2f 3e 3c 2f 61 70 70 3e 3c 2f 67 75 70 64 61 74 65 3e 0d 0a
              Data Ascii: 723f56b8717175c536685c5450122b30789464ad82" hash_sha256="81e3a4d43a73699e1b7781723f56b8717175c536685c5450122b30789464ad82" protected="0" size="248531" status="ok" version="1.0.0.6"/></app></gupdate>
              2023-04-13 15:46:20 UTC2INData Raw: 30 0d 0a 0d 0a
              Data Ascii: 0


              020406080s020406080100

              Click to jump to process

              020406080s0.0020406080100MB

              Click to jump to process

              • File
              • Registry

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:17:46:16
              Start date:13/04/2023
              Path:C:\Program Files\Google\Chrome\Application\chrome.exe
              Wow64 process (32bit):false
              Commandline:C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "http://passwordsleakcheck-pa.googleapis.com
              Imagebase:0x7ff683680000
              File size:2851656 bytes
              MD5 hash:0FEC2748F363150DC54C1CAFFB1A9408
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low
              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

              Target ID:1
              Start time:17:46:17
              Start date:13/04/2023
              Path:C:\Program Files\Google\Chrome\Application\chrome.exe
              Wow64 process (32bit):false
              Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=1964 --field-trial-handle=1744,i,18433832869702017972,3122426607111868884,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8
              Imagebase:0x7ff683680000
              File size:2851656 bytes
              MD5 hash:0FEC2748F363150DC54C1CAFFB1A9408
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low

              No disassembly