Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://www.google.tm/url?url=https://edyrquqyplqymd%5Cu0026dyxo=tzkpleyb%5Cu0026dyxo=tzkpleyb%5Cu0026erktodq=qleabbwuod%5Cu0026ejdlct=erktodq%5Cu0026erktodq=qleabbwuod%5Cu0026%5Cu0026dyxo=tzkpleyb%5Cu0026dyxo=tzkpleyb%5Cu0026erktodq=qleabbwuod%5Cu0026ejdlct=erktodq%5Cu0026erktodq=qleabbwuod%5Cu0026

Overview

General Information

Sample URL:https://www.google.tm/url?url=https://edyrquqyplqymd%5Cu0026dyxo=tzkpleyb%5Cu0026dyxo=tzkpleyb%5Cu0026erktodq=qleabbwuod%5Cu0026ejdlct=erktodq%5Cu0026erktodq=qleabbwuod%5Cu0026%5Cu0026dyxo=tzkpleyb%5C
Analysis ID:1543873

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 6904 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
    • chrome.exe (PID: 7092 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 --field-trial-handle=1972,i,16296698535902802480,1268325547989347944,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
  • chrome.exe (PID: 2644 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.google.tm/url?url=https://edyrquqyplqymd%5Cu0026dyxo=tzkpleyb%5Cu0026dyxo=tzkpleyb%5Cu0026erktodq=qleabbwuod%5Cu0026ejdlct=erktodq%5Cu0026erktodq=qleabbwuod%5Cu0026%5Cu0026dyxo=tzkpleyb%5Cu0026dyxo=tzkpleyb%5Cu0026erktodq=qleabbwuod%5Cu0026ejdlct=erktodq%5Cu0026erktodq=qleabbwuod%5Cu0026ejdlct=erktodq%5Cu0026lqymd=edyrquqyp%5Cu0026q=amp/kevigax.kdbnwzopcoxlczbw.com/vww9mnc7f%5Cu0026dyxo=tzkpleyb%5Cu0026dyxo=tzkpleyb%5C" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
  • cleanup
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: https://www.google.tm/url?url=https://edyrquqyplqymd%5Cu0026dyxo=tzkpleyb%5Cu0026dyxo=tzkpleyb%5Cu0026erktodq=qleabbwuod%5Cu0026ejdlct=erktodq%5Cu0026erktodq=qleabbwuod%5Cu0026%5Cu0026dyxo=tzkpleyb%5Cu0026dyxo=tzkpleyb%5Cu0026erktodq=qleabbwuod%5Cu0026ejdlct=erktodq%5Cu0026erktodq=qleabbwuod%5Cu0026ejdlct=erktodq%5Cu0026lqymd=edyrquqyp%5Cu0026q=amp/kevigax.kdbnwzopcoxlczbw.com/vww9mnc7f%5Cu0026dyxo=tzkpleyb%5Cu0026dyxo=tzkpleyb%5CHTTP Parser: No favicon
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.17:49711 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.17:49718 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.17:49719 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.5.88:443 -> 192.168.2.17:49722 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.23.209.183:443 -> 192.168.2.17:49723 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.17:49724 version: TLS 1.2
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
Source: global trafficDNS traffic detected: DNS query: www.google.tm
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 49676 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49691 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 49680 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49677 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49691
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.17:49711 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.17:49718 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.17:49719 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.5.88:443 -> 192.168.2.17:49722 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.23.209.183:443 -> 192.168.2.17:49723 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.17:49724 version: TLS 1.2
Source: classification engineClassification label: clean0.win@16/9@6/40
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 --field-trial-handle=1972,i,16296698535902802480,1268325547989347944,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.google.tm/url?url=https://edyrquqyplqymd%5Cu0026dyxo=tzkpleyb%5Cu0026dyxo=tzkpleyb%5Cu0026erktodq=qleabbwuod%5Cu0026ejdlct=erktodq%5Cu0026erktodq=qleabbwuod%5Cu0026%5Cu0026dyxo=tzkpleyb%5Cu0026dyxo=tzkpleyb%5Cu0026erktodq=qleabbwuod%5Cu0026ejdlct=erktodq%5Cu0026erktodq=qleabbwuod%5Cu0026ejdlct=erktodq%5Cu0026lqymd=edyrquqyp%5Cu0026q=amp/kevigax.kdbnwzopcoxlczbw.com/vww9mnc7f%5Cu0026dyxo=tzkpleyb%5Cu0026dyxo=tzkpleyb%5C"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 --field-trial-handle=1972,i,16296698535902802480,1268325547989347944,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
www.google.tm
142.250.185.195
truefalse
    unknown
    www.google.com
    172.217.18.4
    truefalse
      unknown
      NameMaliciousAntivirus DetectionReputation
      https://www.google.tm/url?url=https://edyrquqyplqymd%5Cu0026dyxo=tzkpleyb%5Cu0026dyxo=tzkpleyb%5Cu0026erktodq=qleabbwuod%5Cu0026ejdlct=erktodq%5Cu0026erktodq=qleabbwuod%5Cu0026%5Cu0026dyxo=tzkpleyb%5Cu0026dyxo=tzkpleyb%5Cu0026erktodq=qleabbwuod%5Cu0026ejdlct=erktodq%5Cu0026erktodq=qleabbwuod%5Cu0026ejdlct=erktodq%5Cu0026lqymd=edyrquqyp%5Cu0026q=amp/kevigax.kdbnwzopcoxlczbw.com/vww9mnc7f%5Cu0026dyxo=tzkpleyb%5Cu0026dyxo=tzkpleyb%5Cfalse
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        64.233.167.84
        unknownUnited States
        15169GOOGLEUSfalse
        1.1.1.1
        unknownAustralia
        13335CLOUDFLARENETUSfalse
        239.255.255.250
        unknownReserved
        unknownunknownfalse
        142.250.185.142
        unknownUnited States
        15169GOOGLEUSfalse
        142.250.186.163
        unknownUnited States
        15169GOOGLEUSfalse
        142.250.185.195
        www.google.tmUnited States
        15169GOOGLEUSfalse
        172.217.18.4
        www.google.comUnited States
        15169GOOGLEUSfalse
        IP
        192.168.2.17
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1543873
        Start date and time:2024-10-28 15:30:12 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:defaultwindowsinteractivecookbook.jbs
        Sample URL:https://www.google.tm/url?url=https://edyrquqyplqymd%5Cu0026dyxo=tzkpleyb%5Cu0026dyxo=tzkpleyb%5Cu0026erktodq=qleabbwuod%5Cu0026ejdlct=erktodq%5Cu0026erktodq=qleabbwuod%5Cu0026%5Cu0026dyxo=tzkpleyb%5Cu0026dyxo=tzkpleyb%5Cu0026erktodq=qleabbwuod%5Cu0026ejdlct=erktodq%5Cu0026erktodq=qleabbwuod%5Cu0026ejdlct=erktodq%5Cu0026lqymd=edyrquqyp%5Cu0026q=amp/kevigax.kdbnwzopcoxlczbw.com/vww9mnc7f%5Cu0026dyxo=tzkpleyb%5Cu0026dyxo=tzkpleyb%5C
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:18
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • EGA enabled
        Analysis Mode:stream
        Analysis stop reason:Timeout
        Detection:CLEAN
        Classification:clean0.win@16/9@6/40
        • Exclude process from analysis (whitelisted): TextInputHost.exe
        • Excluded IPs from analysis (whitelisted): 142.250.185.195, 142.250.185.142, 64.233.167.84, 34.104.35.123
        • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, edgedl.me.gvt1.com, clientservices.googleapis.com, clients.l.google.com
        • Not all processes where analyzed, report is missing behavior information
        • VT rate limit hit for: https://www.google.tm/url?url=https://edyrquqyplqymd%5Cu0026dyxo=tzkpleyb%5Cu0026dyxo=tzkpleyb%5Cu0026erktodq=qleabbwuod%5Cu0026ejdlct=erktodq%5Cu0026erktodq=qleabbwuod%5Cu0026%5Cu0026dyxo=tzkpleyb%5Cu0026dyxo=tzkpleyb%5Cu0026erktodq=qleabbwuod%5Cu0026ejdlct=erktodq%5Cu0026erktodq=qleabbwuod%5Cu0026ejdlct=erktodq%5Cu0026lqymd=edyrquqyp%5Cu0026q=amp/kevigax.kdbnwzopcoxlczbw.com/vww9mnc7f%5Cu0026dyxo=tzkpleyb%5Cu0026dyxo=tzkpleyb%5C
        InputOutput
        URL: Model: claude-3-5-sonnet-latest
        {
            "typosquatting": false,
            "unusual_query_string": false,
            "suspicious_tld": true,
            "ip_in_url": false,
            "long_subdomain": false,
            "malicious_keywords": false,
            "encoded_characters": false,
            "redirection": false,
            "contains_email_address": false,
            "known_domain": true,
            "brand_spoofing_attempt": false,
            "third_party_hosting": false
        }
        URL: URL: https://www.google.tm
        URL: https://www.google.tm/url?url=https://edyrquqyplqymd%5Cu0026dyxo=tzkpleyb%5Cu0026dyxo=tzkpleyb%5Cu0026erktodq=qleabbwuod%5Cu0026ejdlct=erktodq%5Cu0026erktodq=qleabbwuod%5Cu0026%5Cu0026dyxo=tzkpleyb%5Cu0026dyxo=tzkpleyb%5Cu0026erktodq=qleabbwuod%5Cu0026ejd Model: claude-3-haiku-20240307
        ```json
        {
          "contains_trigger_text": true,
          "trigger_text": "If you do not want to visit that page, you can return to the previous page.",
          "prominent_button_name": "return to the previous page",
          "text_input_field_labels": "unknown",
          "pdf_icon_visible": false,
          "has_visible_captcha": false,
          "has_urgent_text": false,
          "has_visible_qrcode": false
        }
        URL: https://www.google.tm/url?url=https://edyrquqyplqymd%5Cu0026dyxo=tzkpleyb%5Cu0026dyxo=tzkpleyb%5Cu0026erktodq=qleabbwuod%5Cu0026ejdlct=erktodq%5Cu0026erktodq=qleabbwuod%5Cu0026%5Cu0026dyxo=tzkpleyb%5Cu0026dyxo=tzkpleyb%5Cu0026erktodq=qleabbwuod%5Cu0026ejd Model: claude-3-haiku-20240307
        ```json
        {
          "brands": []
        }
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 28 13:30:47 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2677
        Entropy (8bit):3.9826553161382496
        Encrypted:false
        SSDEEP:
        MD5:3DC8E8BB997AF5F039CD8AADEB83BD73
        SHA1:BA20E2EF8DC0E68133F411ADE25302B5F058E3F7
        SHA-256:F6E1714E7BFC9801C9459E1BB8694967A5FDB9573178B5FDFBD4499B96D77B63
        SHA-512:C6D45E3A89A89E1E9A9DAA2E94D802C1C6DFD2AA053B1087CCDE335E50687407A7E7EE0241A8E10C26E16873747FAB0B893EACFC5F018414D7B73D74479E156F
        Malicious:false
        Reputation:unknown
        Preview:L..................F.@.. ...$+.,.....}..E)......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I\Y.s....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V\Y.s....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V\Y.s....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V\Y.s...........................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V\Y.s...........................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............t.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 28 13:30:47 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2679
        Entropy (8bit):3.99871837808705
        Encrypted:false
        SSDEEP:
        MD5:EE803DED99C9D7E2315BD120F97C2FB3
        SHA1:E5D6EB979AFFE55206A9363E38A1C2839B207EB7
        SHA-256:E5071764B18C5E669A39F9AEE2E102C65DC2CD3AF2A749DC6FFF0FE6BED809DD
        SHA-512:9EE2E1199A737BA34B6202B949FDE0287986EEE5AEDEC8CC36E9F42658343CF297C8CB835A6B06D7EFBEF7807A21775893F4B6B8556966A4C7A810DB9EAABEA9
        Malicious:false
        Reputation:unknown
        Preview:L..................F.@.. ...$+.,.....^..E)......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I\Y.s....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V\Y.s....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V\Y.s....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V\Y.s...........................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V\Y.s...........................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............t.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:54:41 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2693
        Entropy (8bit):4.009287989012226
        Encrypted:false
        SSDEEP:
        MD5:0823B9BEA0A84226AAD4A3FC4EDD797F
        SHA1:33447DA552A041D7758708D514CA4A8C72B53025
        SHA-256:DB6B4A915D7C67213E9357B5B91F16EB420CD7E41FF97128C8527CB6934284AB
        SHA-512:26D3CE153460C7D14704C1457794C41238ADC8F79F3CC657045B6F0F2267254D79EC7ACDCC19D021EE3B86AC77715E32BB76506E8F61AB1FC2EA118830D6803C
        Malicious:false
        Reputation:unknown
        Preview:L..................F.@.. ...$+.,.....v. ;.......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I\Y.s....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V\Y.s....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V\Y.s....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V\Y.s...........................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VFW.N...........................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............t.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 28 13:30:47 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2681
        Entropy (8bit):3.9934274463961144
        Encrypted:false
        SSDEEP:
        MD5:1DDF7366F4D672ED43B9C74EB66A7FF7
        SHA1:1D30225119DD724808F21CBD060E977E0B9E3655
        SHA-256:D9BF6E1C90938126C5378F7B8B2A78E721B1B2CA77DE63A16DBE13E2EB7091E5
        SHA-512:48EBFBBE49A71BEF2391EF9E6910C8872153E81EF14CFB52E49A439BCC2AAB53C0A2ABC4A664848B924DAFF5DF6B422BAE92A77D197965BF2199F2D943416F55
        Malicious:false
        Reputation:unknown
        Preview:L..................F.@.. ...$+.,....e...E)......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I\Y.s....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V\Y.s....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V\Y.s....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V\Y.s...........................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V\Y.s...........................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............t.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 28 13:30:47 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2681
        Entropy (8bit):3.9848582883373527
        Encrypted:false
        SSDEEP:
        MD5:02EE177A063615E63215D3A8A3556A68
        SHA1:46A345C305BBB25325A71CCC706AF5D06D497A7B
        SHA-256:FDC055B3935EE2A847AB3045D4FE6E2D37727B8522EFAAE8B79BF4F82F367916
        SHA-512:04FFA7A95FC61D2D390286F877BA5ABBF1E07840377E9B5DC84AE546228586420E10DA9BFA38630C8E6A208BD42AF9CE644660FB28126DF231DF1FFA90AE4D99
        Malicious:false
        Reputation:unknown
        Preview:L..................F.@.. ...$+.,........E)......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I\Y.s....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V\Y.s....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V\Y.s....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V\Y.s...........................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V\Y.s...........................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............t.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 28 13:30:47 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2683
        Entropy (8bit):3.996362380358086
        Encrypted:false
        SSDEEP:
        MD5:36636340D5D1821DBA6DE4BD1C821714
        SHA1:A55D19D002880ED5E9CD33D49B4C870687C9ED4B
        SHA-256:D110CB6138A3D71AFFF773B2E2F9B44D6484BB1E3AA16ADA001248C886DC5DBB
        SHA-512:4C59392DE093EAA0418F45F741810500A3EB218CB4AB114C65475C2816CCCEC7673E0D5CB3B147673E283970615FA4EFA2FFFDFD2DDFBF43B42F2E19A502EAFB
        Malicious:false
        Reputation:unknown
        Preview:L..................F.@.. ...$+.,........E)......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I\Y.s....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V\Y.s....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V\Y.s....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V\Y.s...........................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V\Y.s...........................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............t.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:HTML document, ASCII text, with very long lines (1473), with no line terminators
        Category:downloaded
        Size (bytes):1473
        Entropy (8bit):5.532050192128988
        Encrypted:false
        SSDEEP:
        MD5:8F27443A5992ED2CAD265CF7316F9022
        SHA1:277924410696438ABCF52D708E6EEB0B2A1E4908
        SHA-256:9A88B435549BF863095C169A28CF3935781C05452F5D618F63EE5AB1337D5D34
        SHA-512:ABBA7BD8358EE76A1A9CB029390460F4B39DD618D38B28B0FA74EB8B700AB89C309346B0222FA1B86FEE6DD4D848763A3644777F58A9F8FD6F2CF6A3254B80CB
        Malicious:false
        Reputation:unknown
        URL:https://www.google.tm/url?url=https://edyrquqyplqymd%5Cu0026dyxo=tzkpleyb%5Cu0026dyxo=tzkpleyb%5Cu0026erktodq=qleabbwuod%5Cu0026ejdlct=erktodq%5Cu0026erktodq=qleabbwuod%5Cu0026%5Cu0026dyxo=tzkpleyb%5Cu0026dyxo=tzkpleyb%5Cu0026erktodq=qleabbwuod%5Cu0026ejdlct=erktodq%5Cu0026erktodq=qleabbwuod%5Cu0026ejdlct=erktodq%5Cu0026lqymd=edyrquqyp%5Cu0026q=amp/kevigax.kdbnwzopcoxlczbw.com/vww9mnc7f%5Cu0026dyxo=tzkpleyb%5Cu0026dyxo=tzkpleyb%5C
        Preview:<html lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><title>Redirect Notice</title><style>body,div,a{font-family:Roboto,Arial,sans-serif}body{background-color:#fff;margin-top:3px}div{color:#000}a:link{color:#681da8}a:visited{color:#681da8}a:active{color:#ea4335}div.mymGo{border-top:1px solid var(--gS5jXb);border-bottom:1px solid var(--gS5jXb);background:#f8f9fa;margin-top:1em;width:100%}div.aXgaGb{padding:0.5em 0;margin-left:10px}div.fTk7vd{margin-left:35px;margin-top:35px}</style></head><body><div class="mymGo"><div class="aXgaGb"><font style="font-size:larger"><b>Redirect Notice</b></font></div></div><div class="fTk7vd">&nbsp;The previous page is sending you to an invalid url.<br><br>&nbsp;If you do not want to visit that page, you can <a href="#" id="tsuid_GKAfZ9yRA__Ai-gPmp7q0AQ_1">return to the previous page</a>.<script nonce="t-tfGLz5PLpsy0TORgefMg">(function(){var id='tsuid_GKAfZ9yRA__Ai-gPmp7q0AQ_1';(function(){document.getElementById(id).onc
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with very long lines (836)
        Category:downloaded
        Size (bytes):841
        Entropy (8bit):5.1515774687087585
        Encrypted:false
        SSDEEP:
        MD5:0014C653D085179CD84D326E5E04BC27
        SHA1:FE120A4121879F626F41CBDDDD3A7846338D62F0
        SHA-256:E572FD9C476176E99D5678DDB2A17847D189F264B8D48FDEDDC9697EAB16DAA7
        SHA-512:6B546716FCD3216AE62F01AA0921D2314A335EB76C784D5BEE9A014FBD7CF85960607D557DEFC23E0B1E5FC234A70A37CCF0D4B4FA70809D28006C5C861D42D6
        Malicious:false
        Reputation:unknown
        URL:https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
        Preview:)]}'.["",["ironman kona world championship","tracker season 2 episode 3 cast","stimulus checks ssi ssdi va benefits","nintendo switch 2 reveal","bold and beautiful spoilers october 28","college football rankings week 9","northern lights aurora forecast","monster hunter wilds open beta test"],["","","","","","","",""],[],{"google:clientdata":{"bpc":false,"tlw":false},"google:groupsinfo":"ChgIkk4SEwoRVHJlbmRpbmcgc2VhcmNoZXM\u003d","google:suggestdetail":[{"zl":10002},{"zl":10002},{"zl":10002},{"zl":10002},{"zl":10002},{"zl":10002},{"zl":10002},{"zl":10002}],"google:suggestrelevance":[1257,1256,1255,1254,1253,1252,1251,1250],"google:suggestsubtypes":[[3,143,362],[3,143,362],[3,143,362],[3,143,362],[3,143,362],[3,143,362],[3,143,362],[3,143,362]],"google:suggesttype":["QUERY","QUERY","QUERY","QUERY","QUERY","QUERY","QUERY","QUERY"]}]
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
        Category:dropped
        Size (bytes):5430
        Entropy (8bit):3.6534652184263736
        Encrypted:false
        SSDEEP:
        MD5:F3418A443E7D841097C714D69EC4BCB8
        SHA1:49263695F6B0CDD72F45CF1B775E660FDC36C606
        SHA-256:6DA5620880159634213E197FAFCA1DDE0272153BE3E4590818533FAB8D040770
        SHA-512:82D017C4B7EC8E0C46E8B75DA0CA6A52FD8BCE7FCF4E556CBDF16B49FC81BE9953FE7E25A05F63ECD41C7272E8BB0A9FD9AEDF0AC06CB6032330B096B3702563
        Malicious:false
        Reputation:unknown
        Preview:............ .h...&... .... .........(....... ..... ............................................0...................................................................................................................................v.].X.:.X.:.r.Y........................................q.X.S.4.S.4.S.4.S.4.S.4.S.4...X....................0........q.W.S.4.X.:.................J...A...g.........................K.H.V.8..........................F..B.....................,.......................................B..............................................B..B..B..B..B...u..........................................B..B..B..B..B...{.................5.......k...........................................................7R..8F.................................................2........Vb..5C..;I..................R^.....................0................Xc..5C..5C..5C..5C..5C..5C..lv..........................................]i..<J..:G..Zf....................................................
        No static file info