Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://pvypal.uk-14.top/myaccount/

Overview

General Information

Sample URL:https://pvypal.uk-14.top/myaccount/
Analysis ID:1520165
Infos:
Errors
  • URL not reachable

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Stores files to the Windows start menu directory

Classification

  • System is w10x64
  • chrome.exe (PID: 2964 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 5356 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 --field-trial-handle=2252,i,4354539721115803335,6599055617566679276,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 2764 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://pvypal.uk-14.top/myaccount/" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: https://pvypal.uk-14.top/myaccount/Avira URL Cloud: detection malicious, Label: phishing
Source: https://pvypal.uk-14.top/myaccount/SlashNext: detection malicious, Label: Credential Stealing type: Phishing & Social Engineering
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: pvypal.uk-14.top
Source: global trafficDNS traffic detected: DNS query: google.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: classification engineClassification label: mal48.win@19/6@12/3
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 --field-trial-handle=2252,i,4354539721115803335,6599055617566679276,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://pvypal.uk-14.top/myaccount/"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 --field-trial-handle=2252,i,4354539721115803335,6599055617566679276,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Google Drive.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://pvypal.uk-14.top/myaccount/100%Avira URL Cloudphishing
https://pvypal.uk-14.top/myaccount/100%SlashNextCredential Stealing type: Phishing & Social Engineering
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
google.com
142.250.185.206
truefalse
    unknown
    www.google.com
    216.58.206.36
    truefalse
      unknown
      fp2e7a.wpc.phicdn.net
      192.229.221.95
      truefalse
        unknown
        pvypal.uk-14.top
        unknown
        unknownfalse
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          239.255.255.250
          unknownReserved
          unknownunknownfalse
          216.58.206.36
          www.google.comUnited States
          15169GOOGLEUSfalse
          IP
          192.168.2.5
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1520165
          Start date and time:2024-09-27 05:58:39 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 1m 56s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:browseurl.jbs
          Sample URL:https://pvypal.uk-14.top/myaccount/
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:6
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal48.win@19/6@12/3
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • URL browsing timeout or error
          • URL not reachable
          • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 142.250.184.195, 142.250.185.174, 66.102.1.84, 34.104.35.123, 184.28.90.27, 20.114.59.183, 93.184.221.240, 192.229.221.95, 13.95.31.18
          • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, clientservices.googleapis.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wu.azureedge.net, clients2.google.com, ocsp.digicert.com, e16604.g.akamaiedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, fs.microsoft.com, accounts.google.com, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, edgedl.me.gvt1.com, clients.l.google.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtSetInformationFile calls found.
          • VT rate limit hit for: https://pvypal.uk-14.top/myaccount/
          No simulations
          No context
          No context
          No context
          No context
          No context
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Sep 27 02:59:38 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2677
          Entropy (8bit):3.9783752417740446
          Encrypted:false
          SSDEEP:48:8YdzT733HCidAKZdA19ehwiZUklqehjy+3:8cnooy
          MD5:48B4439C32AC7DB49B93C0090A9EC1C8
          SHA1:88579082ABADE0C6DF516EF501D6107453C08F78
          SHA-256:50F3BA6F254CFDFD5FD39E8EEBA4F66180B1F34EACB60C5A5618F5732E023FB4
          SHA-512:F353CD0FDCBBC41E8B25D985E34291CDB322D4926940D292F74B6315161E373A97A8A7DD26617CA0D66FD72DE01D5EF9943B6B718D8F23F83D6ECB149EAEBE0E
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,....MF......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I;Yq.....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V;Yq.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V;Yq.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V;Yq............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V;Ys............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........tF......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Sep 27 02:59:37 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2679
          Entropy (8bit):3.992933183912988
          Encrypted:false
          SSDEEP:48:8RdzT733HCidAKZdA1weh/iZUkAQkqehYy+2:8fni9Qpy
          MD5:12E4186B7407435FEAA7AF0C4EA3824A
          SHA1:7D3A4F50218BA8B2CE18000DC84707D350190CD4
          SHA-256:2A90E626F8B2A625ECE7A70D91E9C18B4DF54E8E7183FF5CE4C69BB56B07A159
          SHA-512:25DAD689FF78D0EC969E479A9363B9295AA9640C95A4A2BBAC7B04C7E5A0202539A77C2ECF50693EC7137BC70DA108F05851A1C11F52E1AF786D6696B8B7C9C2
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,.....q......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I;Yq.....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V;Yq.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V;Yq.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V;Yq............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V;Ys............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........tF......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2693
          Entropy (8bit):4.00512368533848
          Encrypted:false
          SSDEEP:48:8xQdzT73sHCidAKZdA14tseh7sFiZUkmgqeh7s2y+BX:8xUnbn0y
          MD5:715441EB4E864A25350CA1FE6BF19AB0
          SHA1:DABDC7DE0B495A9054F29C64BC8CBB53183399CC
          SHA-256:AA27E634AA515197190690C818C98041BD824666DD57C0E1F0FD90C2334B9731
          SHA-512:636220A048B046C857E15DFFCE03FC22C33CA53674359D4B24C569BED820F965B193068ACFE1E63B74811C6E4B0F1BB7828AB934BC70E560F73DF81184740195
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,......e>....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I;Yq.....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V;Yq.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V;Yq.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V;Yq............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VDW.n...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........tF......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Sep 27 02:59:37 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2681
          Entropy (8bit):3.99486756734142
          Encrypted:false
          SSDEEP:48:8K+dzT733HCidAKZdA1vehDiZUkwqehMy+R:8Kinpuy
          MD5:83EE480A78BE984A304D6B315E6695C4
          SHA1:7E4612A825707E4ACBBEAB90540504C8E6A47DFE
          SHA-256:DD0462A5CB2921925EEE80E1A98A03E62E1E5A36AA95B467A436C800E2B42C28
          SHA-512:209CD6E8327EB918AC4ECCBBDDAC973272D74D1916AAA0D23C039916BC45A929901DF9E566C235230B0AA73E6851BF2C540690096CE100A788F6FD47C9CDBBEA
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,.....J......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I;Yq.....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V;Yq.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V;Yq.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V;Yq............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V;Ys............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........tF......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Sep 27 02:59:38 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2681
          Entropy (8bit):3.979845953375611
          Encrypted:false
          SSDEEP:48:81KUdzT733HCidAKZdA1hehBiZUk1W1qehCy+C:81KQnZ9iy
          MD5:1EE48CC1EB88F88D53631FFF1F27BF00
          SHA1:F483E598CD639697F3819B26D3A86096E01398FE
          SHA-256:7408A6799C6408A2D486233662EFDE8D84F836D94E2382AA0602BC629BA97E87
          SHA-512:A27C261E58108C7C28D082B19105D6BF5AC57BA4B5D24D66B9507705F4BB98FCC1485C84F708C05462D4E665DF8C3F288FAAD97A4E187FBDA1FA23814E789748
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,....,-......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I;Yq.....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V;Yq.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V;Yq.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V;Yq............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V;Ys............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........tF......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Sep 27 02:59:37 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2683
          Entropy (8bit):3.9917824170321765
          Encrypted:false
          SSDEEP:48:8z/dzT733HCidAKZdA1duT+ehOuTbbiZUk5OjqehOuTb0y+yT+:8ZnlT/TbxWOvTb0y7T
          MD5:F3693E5CDC0B49E44FA1F1A31E28B094
          SHA1:57114B50E08718ED776F985281D2664215089673
          SHA-256:7A01C8E6DA963368A009B4B3882DBD74DEEA815ABBC89AC1E10EE8356CF1374C
          SHA-512:940E9C0BA730B8DCE861D1CCB4E55E2B6F4A0F837A40EE169C74E6815D2B5D368419FEE2D6678CA450D334A5012905D5411437CA8C6DD3DD0D3446D016D57038
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,....`.....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I;Yq.....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V;Yq.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V;Yq.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V;Yq............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V;Ys............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........tF......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          No static file info
          TimestampSource PortDest PortSource IPDest IP
          Sep 27, 2024 05:59:26.278826952 CEST49675443192.168.2.523.1.237.91
          Sep 27, 2024 05:59:26.279050112 CEST49674443192.168.2.523.1.237.91
          Sep 27, 2024 05:59:26.388299942 CEST49673443192.168.2.523.1.237.91
          Sep 27, 2024 05:59:35.966259003 CEST49674443192.168.2.523.1.237.91
          Sep 27, 2024 05:59:35.970771074 CEST49675443192.168.2.523.1.237.91
          Sep 27, 2024 05:59:36.091272116 CEST49673443192.168.2.523.1.237.91
          Sep 27, 2024 05:59:37.679517031 CEST4434970323.1.237.91192.168.2.5
          Sep 27, 2024 05:59:37.679915905 CEST49703443192.168.2.523.1.237.91
          Sep 27, 2024 05:59:40.719341040 CEST49711443192.168.2.5216.58.206.36
          Sep 27, 2024 05:59:40.719391108 CEST44349711216.58.206.36192.168.2.5
          Sep 27, 2024 05:59:40.719455957 CEST49711443192.168.2.5216.58.206.36
          Sep 27, 2024 05:59:40.720087051 CEST49711443192.168.2.5216.58.206.36
          Sep 27, 2024 05:59:40.720104933 CEST44349711216.58.206.36192.168.2.5
          Sep 27, 2024 05:59:41.380273104 CEST44349711216.58.206.36192.168.2.5
          Sep 27, 2024 05:59:41.384943008 CEST49711443192.168.2.5216.58.206.36
          Sep 27, 2024 05:59:41.384980917 CEST44349711216.58.206.36192.168.2.5
          Sep 27, 2024 05:59:41.386420965 CEST44349711216.58.206.36192.168.2.5
          Sep 27, 2024 05:59:41.387003899 CEST49711443192.168.2.5216.58.206.36
          Sep 27, 2024 05:59:41.402842999 CEST49711443192.168.2.5216.58.206.36
          Sep 27, 2024 05:59:41.403008938 CEST44349711216.58.206.36192.168.2.5
          Sep 27, 2024 05:59:41.447238922 CEST49711443192.168.2.5216.58.206.36
          Sep 27, 2024 05:59:41.447253942 CEST44349711216.58.206.36192.168.2.5
          Sep 27, 2024 05:59:41.494111061 CEST49711443192.168.2.5216.58.206.36
          Sep 27, 2024 05:59:51.286614895 CEST44349711216.58.206.36192.168.2.5
          Sep 27, 2024 05:59:51.286675930 CEST44349711216.58.206.36192.168.2.5
          Sep 27, 2024 05:59:51.286747932 CEST49711443192.168.2.5216.58.206.36
          Sep 27, 2024 05:59:53.074026108 CEST49711443192.168.2.5216.58.206.36
          Sep 27, 2024 05:59:53.074064970 CEST44349711216.58.206.36192.168.2.5
          TimestampSource PortDest PortSource IPDest IP
          Sep 27, 2024 05:59:36.798810005 CEST53537781.1.1.1192.168.2.5
          Sep 27, 2024 05:59:36.812154055 CEST53558341.1.1.1192.168.2.5
          Sep 27, 2024 05:59:37.887964010 CEST53530721.1.1.1192.168.2.5
          Sep 27, 2024 05:59:37.923767090 CEST5956453192.168.2.51.1.1.1
          Sep 27, 2024 05:59:37.924199104 CEST5586253192.168.2.51.1.1.1
          Sep 27, 2024 05:59:38.011868000 CEST53595641.1.1.1192.168.2.5
          Sep 27, 2024 05:59:38.013768911 CEST53558621.1.1.1192.168.2.5
          Sep 27, 2024 05:59:38.015003920 CEST5976553192.168.2.51.1.1.1
          Sep 27, 2024 05:59:38.102546930 CEST53597651.1.1.1192.168.2.5
          Sep 27, 2024 05:59:38.148014069 CEST5447853192.168.2.58.8.8.8
          Sep 27, 2024 05:59:38.148334026 CEST6347653192.168.2.51.1.1.1
          Sep 27, 2024 05:59:38.155292988 CEST53634761.1.1.1192.168.2.5
          Sep 27, 2024 05:59:38.156451941 CEST53544788.8.8.8192.168.2.5
          Sep 27, 2024 05:59:39.166754007 CEST6517753192.168.2.51.1.1.1
          Sep 27, 2024 05:59:39.166914940 CEST6482753192.168.2.51.1.1.1
          Sep 27, 2024 05:59:39.258831024 CEST53651771.1.1.1192.168.2.5
          Sep 27, 2024 05:59:39.504746914 CEST53648271.1.1.1192.168.2.5
          Sep 27, 2024 05:59:40.704294920 CEST5664553192.168.2.51.1.1.1
          Sep 27, 2024 05:59:40.704971075 CEST5375353192.168.2.51.1.1.1
          Sep 27, 2024 05:59:40.712718010 CEST53566451.1.1.1192.168.2.5
          Sep 27, 2024 05:59:40.712730885 CEST53537531.1.1.1192.168.2.5
          Sep 27, 2024 05:59:44.443502903 CEST5655153192.168.2.51.1.1.1
          Sep 27, 2024 05:59:44.443798065 CEST5628453192.168.2.51.1.1.1
          Sep 27, 2024 05:59:44.533338070 CEST53562841.1.1.1192.168.2.5
          Sep 27, 2024 05:59:44.784033060 CEST53565511.1.1.1192.168.2.5
          Sep 27, 2024 05:59:44.784708023 CEST6040353192.168.2.51.1.1.1
          Sep 27, 2024 05:59:44.791678905 CEST53604031.1.1.1192.168.2.5
          Sep 27, 2024 05:59:55.033225060 CEST53590901.1.1.1192.168.2.5
          TimestampSource IPDest IPChecksumCodeType
          Sep 27, 2024 05:59:39.504862070 CEST192.168.2.51.1.1.1c22d(Port unreachable)Destination Unreachable
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Sep 27, 2024 05:59:37.923767090 CEST192.168.2.51.1.1.10x3fadStandard query (0)pvypal.uk-14.topA (IP address)IN (0x0001)false
          Sep 27, 2024 05:59:37.924199104 CEST192.168.2.51.1.1.10x7339Standard query (0)pvypal.uk-14.top65IN (0x0001)false
          Sep 27, 2024 05:59:38.015003920 CEST192.168.2.51.1.1.10x2873Standard query (0)pvypal.uk-14.topA (IP address)IN (0x0001)false
          Sep 27, 2024 05:59:38.148014069 CEST192.168.2.58.8.8.80xb466Standard query (0)google.comA (IP address)IN (0x0001)false
          Sep 27, 2024 05:59:38.148334026 CEST192.168.2.51.1.1.10xc30cStandard query (0)google.comA (IP address)IN (0x0001)false
          Sep 27, 2024 05:59:39.166754007 CEST192.168.2.51.1.1.10x160bStandard query (0)pvypal.uk-14.topA (IP address)IN (0x0001)false
          Sep 27, 2024 05:59:39.166914940 CEST192.168.2.51.1.1.10x6d3aStandard query (0)pvypal.uk-14.top65IN (0x0001)false
          Sep 27, 2024 05:59:40.704294920 CEST192.168.2.51.1.1.10x76bStandard query (0)www.google.comA (IP address)IN (0x0001)false
          Sep 27, 2024 05:59:40.704971075 CEST192.168.2.51.1.1.10x2ab8Standard query (0)www.google.com65IN (0x0001)false
          Sep 27, 2024 05:59:44.443502903 CEST192.168.2.51.1.1.10x328Standard query (0)pvypal.uk-14.topA (IP address)IN (0x0001)false
          Sep 27, 2024 05:59:44.443798065 CEST192.168.2.51.1.1.10xfd9bStandard query (0)pvypal.uk-14.top65IN (0x0001)false
          Sep 27, 2024 05:59:44.784708023 CEST192.168.2.51.1.1.10x352dStandard query (0)pvypal.uk-14.topA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Sep 27, 2024 05:59:38.011868000 CEST1.1.1.1192.168.2.50x3fadName error (3)pvypal.uk-14.topnonenoneA (IP address)IN (0x0001)false
          Sep 27, 2024 05:59:38.013768911 CEST1.1.1.1192.168.2.50x7339Name error (3)pvypal.uk-14.topnonenone65IN (0x0001)false
          Sep 27, 2024 05:59:38.102546930 CEST1.1.1.1192.168.2.50x2873Name error (3)pvypal.uk-14.topnonenoneA (IP address)IN (0x0001)false
          Sep 27, 2024 05:59:38.155292988 CEST1.1.1.1192.168.2.50xc30cNo error (0)google.com142.250.185.206A (IP address)IN (0x0001)false
          Sep 27, 2024 05:59:38.156451941 CEST8.8.8.8192.168.2.50xb466No error (0)google.com142.250.184.206A (IP address)IN (0x0001)false
          Sep 27, 2024 05:59:39.258831024 CEST1.1.1.1192.168.2.50x160bName error (3)pvypal.uk-14.topnonenoneA (IP address)IN (0x0001)false
          Sep 27, 2024 05:59:39.504746914 CEST1.1.1.1192.168.2.50x6d3aName error (3)pvypal.uk-14.topnonenone65IN (0x0001)false
          Sep 27, 2024 05:59:40.712718010 CEST1.1.1.1192.168.2.50x76bNo error (0)www.google.com216.58.206.36A (IP address)IN (0x0001)false
          Sep 27, 2024 05:59:40.712730885 CEST1.1.1.1192.168.2.50x2ab8No error (0)www.google.com65IN (0x0001)false
          Sep 27, 2024 05:59:44.533338070 CEST1.1.1.1192.168.2.50xfd9bName error (3)pvypal.uk-14.topnonenone65IN (0x0001)false
          Sep 27, 2024 05:59:44.784033060 CEST1.1.1.1192.168.2.50x328Name error (3)pvypal.uk-14.topnonenoneA (IP address)IN (0x0001)false
          Sep 27, 2024 05:59:44.791678905 CEST1.1.1.1192.168.2.50x352dName error (3)pvypal.uk-14.topnonenoneA (IP address)IN (0x0001)false
          Sep 27, 2024 05:59:47.747406006 CEST1.1.1.1192.168.2.50x2931No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
          Sep 27, 2024 05:59:47.747406006 CEST1.1.1.1192.168.2.50x2931No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false

          Click to jump to process

          Click to jump to process

          Click to jump to process

          Target ID:0
          Start time:23:59:29
          Start date:26/09/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
          Imagebase:0x7ff715980000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:2
          Start time:23:59:34
          Start date:26/09/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 --field-trial-handle=2252,i,4354539721115803335,6599055617566679276,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
          Imagebase:0x7ff715980000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:3
          Start time:23:59:36
          Start date:26/09/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://pvypal.uk-14.top/myaccount/"
          Imagebase:0x7ff715980000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          No disassembly