Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://us-usps-owwhaa.xyz/update/

Overview

General Information

Sample URL:https://us-usps-owwhaa.xyz/update/
Analysis ID:1526977
Tags:openphish
Infos:
Errors
  • URL not reachable

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Performs DNS queries to domains with low reputation

Classification

  • System is w10x64
  • chrome.exe (PID: 2412 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 4588 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2564 --field-trial-handle=2532,i,17960821180999279464,17669087296056885979,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6268 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://us-usps-owwhaa.xyz/update/" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: https://us-usps-owwhaa.xyz/update/SlashNext: detection malicious, Label: Fraudulent Website type: Phishing & Social Engineering

Networking

barindex
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDNS query: us-usps-owwhaa.xyz
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDNS query: us-usps-owwhaa.xyz
Source: DNS query: us-usps-owwhaa.xyz
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDNS query: us-usps-owwhaa.xyz
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDNS query: us-usps-owwhaa.xyz
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDNS query: us-usps-owwhaa.xyz
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDNS query: us-usps-owwhaa.xyz
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDNS query: us-usps-owwhaa.xyz
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDNS query: us-usps-owwhaa.xyz
Source: DNS query: us-usps-owwhaa.xyz
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: us-usps-owwhaa.xyz
Source: global trafficDNS traffic detected: DNS query: google.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: classification engineClassification label: mal52.troj.win@19/0@14/3
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2564 --field-trial-handle=2532,i,17960821180999279464,17669087296056885979,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://us-usps-owwhaa.xyz/update/"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2564 --field-trial-handle=2532,i,17960821180999279464,17669087296056885979,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath Interception1
Process Injection
1
Process Injection
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://us-usps-owwhaa.xyz/update/100%SlashNextFraudulent Website type: Phishing & Social Engineering
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
google.com
142.250.184.206
truefalse
    unknown
    www.google.com
    142.250.186.36
    truefalse
      unknown
      fp2e7a.wpc.phicdn.net
      192.229.221.95
      truefalse
        unknown
        us-usps-owwhaa.xyz
        unknown
        unknowntrue
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          142.250.186.36
          www.google.comUnited States
          15169GOOGLEUSfalse
          239.255.255.250
          unknownReserved
          unknownunknownfalse
          IP
          192.168.2.4
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1526977
          Start date and time:2024-10-06 18:46:07 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 1m 59s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:browseurl.jbs
          Sample URL:https://us-usps-owwhaa.xyz/update/
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:7
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal52.troj.win@19/0@14/3
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • URL browsing timeout or error
          • URL not reachable
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 142.250.184.195, 172.217.18.110, 108.177.15.84, 34.104.35.123, 184.28.90.27, 172.202.163.200, 93.184.221.240, 13.95.31.18, 192.229.221.95
          • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, clientservices.googleapis.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wu.azureedge.net, clients2.google.com, ocsp.digicert.com, e16604.g.akamaiedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, glb.cws.prod.dcat.dsp.trafficmanager.net, ocsp.edge.digicert.com, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, fs.microsoft.com, accounts.google.com, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, edgedl.me.gvt1.com, clients.l.google.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtSetInformationFile calls found.
          • VT rate limit hit for: https://us-usps-owwhaa.xyz/update/
          No simulations
          No context
          No context
          No context
          No context
          No context
          No created / dropped files found
          No static file info
          TimestampSource PortDest PortSource IPDest IP
          Oct 6, 2024 18:47:02.844372988 CEST49675443192.168.2.4173.222.162.32
          Oct 6, 2024 18:47:07.516967058 CEST49737443192.168.2.4142.250.186.36
          Oct 6, 2024 18:47:07.517075062 CEST44349737142.250.186.36192.168.2.4
          Oct 6, 2024 18:47:07.517519951 CEST49737443192.168.2.4142.250.186.36
          Oct 6, 2024 18:47:07.519823074 CEST49737443192.168.2.4142.250.186.36
          Oct 6, 2024 18:47:07.519864082 CEST44349737142.250.186.36192.168.2.4
          Oct 6, 2024 18:47:08.159723043 CEST44349737142.250.186.36192.168.2.4
          Oct 6, 2024 18:47:08.160763979 CEST49737443192.168.2.4142.250.186.36
          Oct 6, 2024 18:47:08.160797119 CEST44349737142.250.186.36192.168.2.4
          Oct 6, 2024 18:47:08.162368059 CEST44349737142.250.186.36192.168.2.4
          Oct 6, 2024 18:47:08.162599087 CEST49737443192.168.2.4142.250.186.36
          Oct 6, 2024 18:47:08.164745092 CEST49737443192.168.2.4142.250.186.36
          Oct 6, 2024 18:47:08.164859056 CEST44349737142.250.186.36192.168.2.4
          Oct 6, 2024 18:47:08.218312025 CEST49737443192.168.2.4142.250.186.36
          Oct 6, 2024 18:47:08.218329906 CEST44349737142.250.186.36192.168.2.4
          Oct 6, 2024 18:47:08.265187979 CEST49737443192.168.2.4142.250.186.36
          Oct 6, 2024 18:47:18.095613956 CEST44349737142.250.186.36192.168.2.4
          Oct 6, 2024 18:47:18.095761061 CEST44349737142.250.186.36192.168.2.4
          Oct 6, 2024 18:47:18.095940113 CEST49737443192.168.2.4142.250.186.36
          Oct 6, 2024 18:47:19.992503881 CEST49737443192.168.2.4142.250.186.36
          Oct 6, 2024 18:47:19.992575884 CEST44349737142.250.186.36192.168.2.4
          Oct 6, 2024 18:47:20.423921108 CEST4972380192.168.2.488.221.110.91
          Oct 6, 2024 18:47:20.429383039 CEST804972388.221.110.91192.168.2.4
          Oct 6, 2024 18:47:20.429431915 CEST4972380192.168.2.488.221.110.91
          TimestampSource PortDest PortSource IPDest IP
          Oct 6, 2024 18:47:03.511321068 CEST53607541.1.1.1192.168.2.4
          Oct 6, 2024 18:47:03.656388044 CEST53607591.1.1.1192.168.2.4
          Oct 6, 2024 18:47:04.630825996 CEST53593201.1.1.1192.168.2.4
          Oct 6, 2024 18:47:05.005367994 CEST5658753192.168.2.41.1.1.1
          Oct 6, 2024 18:47:05.006952047 CEST6469053192.168.2.41.1.1.1
          Oct 6, 2024 18:47:05.014944077 CEST53565871.1.1.1192.168.2.4
          Oct 6, 2024 18:47:05.029931068 CEST53646901.1.1.1192.168.2.4
          Oct 6, 2024 18:47:05.031451941 CEST6035453192.168.2.41.1.1.1
          Oct 6, 2024 18:47:05.041817904 CEST53603541.1.1.1192.168.2.4
          Oct 6, 2024 18:47:05.085972071 CEST5676353192.168.2.48.8.8.8
          Oct 6, 2024 18:47:05.086070061 CEST6434553192.168.2.41.1.1.1
          Oct 6, 2024 18:47:05.094695091 CEST53567638.8.8.8192.168.2.4
          Oct 6, 2024 18:47:05.094933033 CEST53643451.1.1.1192.168.2.4
          Oct 6, 2024 18:47:06.093625069 CEST4955953192.168.2.41.1.1.1
          Oct 6, 2024 18:47:06.100410938 CEST6341953192.168.2.41.1.1.1
          Oct 6, 2024 18:47:06.105307102 CEST53495591.1.1.1192.168.2.4
          Oct 6, 2024 18:47:06.118251085 CEST53634191.1.1.1192.168.2.4
          Oct 6, 2024 18:47:06.131937027 CEST6209053192.168.2.41.1.1.1
          Oct 6, 2024 18:47:06.132159948 CEST5037853192.168.2.41.1.1.1
          Oct 6, 2024 18:47:06.141063929 CEST53620901.1.1.1192.168.2.4
          Oct 6, 2024 18:47:06.145036936 CEST53503781.1.1.1192.168.2.4
          Oct 6, 2024 18:47:07.479706049 CEST5687253192.168.2.41.1.1.1
          Oct 6, 2024 18:47:07.480149031 CEST5646353192.168.2.41.1.1.1
          Oct 6, 2024 18:47:07.487185955 CEST53568721.1.1.1192.168.2.4
          Oct 6, 2024 18:47:07.487412930 CEST53564631.1.1.1192.168.2.4
          Oct 6, 2024 18:47:11.295475006 CEST5193453192.168.2.41.1.1.1
          Oct 6, 2024 18:47:11.295902967 CEST5448353192.168.2.41.1.1.1
          Oct 6, 2024 18:47:11.304842949 CEST53519341.1.1.1192.168.2.4
          Oct 6, 2024 18:47:11.307544947 CEST53544831.1.1.1192.168.2.4
          Oct 6, 2024 18:47:11.324882030 CEST5133053192.168.2.41.1.1.1
          Oct 6, 2024 18:47:11.385229111 CEST53513301.1.1.1192.168.2.4
          Oct 6, 2024 18:47:20.834613085 CEST138138192.168.2.4192.168.2.255
          Oct 6, 2024 18:47:21.680238008 CEST53606151.1.1.1192.168.2.4
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Oct 6, 2024 18:47:05.005367994 CEST192.168.2.41.1.1.10x3c5fStandard query (0)us-usps-owwhaa.xyzA (IP address)IN (0x0001)false
          Oct 6, 2024 18:47:05.006952047 CEST192.168.2.41.1.1.10x80abStandard query (0)us-usps-owwhaa.xyz65IN (0x0001)false
          Oct 6, 2024 18:47:05.031451941 CEST192.168.2.41.1.1.10xae67Standard query (0)us-usps-owwhaa.xyzA (IP address)IN (0x0001)false
          Oct 6, 2024 18:47:05.085972071 CEST192.168.2.48.8.8.80xa3d2Standard query (0)google.comA (IP address)IN (0x0001)false
          Oct 6, 2024 18:47:05.086070061 CEST192.168.2.41.1.1.10x1807Standard query (0)google.comA (IP address)IN (0x0001)false
          Oct 6, 2024 18:47:06.093625069 CEST192.168.2.41.1.1.10x8165Standard query (0)us-usps-owwhaa.xyzA (IP address)IN (0x0001)false
          Oct 6, 2024 18:47:06.100410938 CEST192.168.2.41.1.1.10xb39Standard query (0)us-usps-owwhaa.xyz65IN (0x0001)false
          Oct 6, 2024 18:47:06.131937027 CEST192.168.2.41.1.1.10xe175Standard query (0)us-usps-owwhaa.xyzA (IP address)IN (0x0001)false
          Oct 6, 2024 18:47:06.132159948 CEST192.168.2.41.1.1.10x31aaStandard query (0)us-usps-owwhaa.xyz65IN (0x0001)false
          Oct 6, 2024 18:47:07.479706049 CEST192.168.2.41.1.1.10x8050Standard query (0)www.google.comA (IP address)IN (0x0001)false
          Oct 6, 2024 18:47:07.480149031 CEST192.168.2.41.1.1.10x6c77Standard query (0)www.google.com65IN (0x0001)false
          Oct 6, 2024 18:47:11.295475006 CEST192.168.2.41.1.1.10xfba3Standard query (0)us-usps-owwhaa.xyzA (IP address)IN (0x0001)false
          Oct 6, 2024 18:47:11.295902967 CEST192.168.2.41.1.1.10x762dStandard query (0)us-usps-owwhaa.xyz65IN (0x0001)false
          Oct 6, 2024 18:47:11.324882030 CEST192.168.2.41.1.1.10xf6faStandard query (0)us-usps-owwhaa.xyzA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Oct 6, 2024 18:47:05.014944077 CEST1.1.1.1192.168.2.40x3c5fName error (3)us-usps-owwhaa.xyznonenoneA (IP address)IN (0x0001)false
          Oct 6, 2024 18:47:05.029931068 CEST1.1.1.1192.168.2.40x80abName error (3)us-usps-owwhaa.xyznonenone65IN (0x0001)false
          Oct 6, 2024 18:47:05.041817904 CEST1.1.1.1192.168.2.40xae67Name error (3)us-usps-owwhaa.xyznonenoneA (IP address)IN (0x0001)false
          Oct 6, 2024 18:47:05.094695091 CEST8.8.8.8192.168.2.40xa3d2No error (0)google.com142.250.184.206A (IP address)IN (0x0001)false
          Oct 6, 2024 18:47:05.094933033 CEST1.1.1.1192.168.2.40x1807No error (0)google.com142.250.184.206A (IP address)IN (0x0001)false
          Oct 6, 2024 18:47:06.105307102 CEST1.1.1.1192.168.2.40x8165Name error (3)us-usps-owwhaa.xyznonenoneA (IP address)IN (0x0001)false
          Oct 6, 2024 18:47:06.118251085 CEST1.1.1.1192.168.2.40xb39Name error (3)us-usps-owwhaa.xyznonenone65IN (0x0001)false
          Oct 6, 2024 18:47:06.141063929 CEST1.1.1.1192.168.2.40xe175Name error (3)us-usps-owwhaa.xyznonenoneA (IP address)IN (0x0001)false
          Oct 6, 2024 18:47:06.145036936 CEST1.1.1.1192.168.2.40x31aaName error (3)us-usps-owwhaa.xyznonenone65IN (0x0001)false
          Oct 6, 2024 18:47:07.487185955 CEST1.1.1.1192.168.2.40x8050No error (0)www.google.com142.250.186.36A (IP address)IN (0x0001)false
          Oct 6, 2024 18:47:07.487412930 CEST1.1.1.1192.168.2.40x6c77No error (0)www.google.com65IN (0x0001)false
          Oct 6, 2024 18:47:11.304842949 CEST1.1.1.1192.168.2.40xfba3Name error (3)us-usps-owwhaa.xyznonenoneA (IP address)IN (0x0001)false
          Oct 6, 2024 18:47:11.307544947 CEST1.1.1.1192.168.2.40x762dName error (3)us-usps-owwhaa.xyznonenone65IN (0x0001)false
          Oct 6, 2024 18:47:11.385229111 CEST1.1.1.1192.168.2.40xf6faName error (3)us-usps-owwhaa.xyznonenoneA (IP address)IN (0x0001)false
          Oct 6, 2024 18:47:20.984508038 CEST1.1.1.1192.168.2.40x569dNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
          Oct 6, 2024 18:47:20.984508038 CEST1.1.1.1192.168.2.40x569dNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false

          Click to jump to process

          Click to jump to process

          Click to jump to process

          Target ID:0
          Start time:12:46:57
          Start date:06/10/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
          Imagebase:0x7ff76e190000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:2
          Start time:12:47:01
          Start date:06/10/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2564 --field-trial-handle=2532,i,17960821180999279464,17669087296056885979,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
          Imagebase:0x7ff76e190000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:3
          Start time:12:47:03
          Start date:06/10/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://us-usps-owwhaa.xyz/update/"
          Imagebase:0x7ff76e190000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          No disassembly