Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
razer-partners.com.html

Overview

General Information

Sample name:razer-partners.com.html
Analysis ID:1592089
MD5:2b3a90534ef53c03b7e8ac359aa0f78c
SHA1:f2e80fd65fe6d858f06b3b06276321f1d3ca9b05
SHA256:2c4864c86db7b66f1410dbd57e7a94131659c32daba1e1daabb20eb1128e88e0
Tags:htmluser-lontze7
Infos:

Detection

Score:21
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Detected javascript redirector / loader
IP address seen in connection with other malware
Stores files to the Windows start menu directory

Classification

  • System is w10x64
  • chrome.exe (PID: 6900 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "C:\Users\user\Desktop\razer-partners.com.html" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
    • chrome.exe (PID: 4036 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1968,i,7308265894918338194,7020277294823495674,262144 /prefetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: razer-partners.com.htmlHTTP Parser: Low number of body elements: 0
Source: Joe Sandbox ViewIP Address: 239.255.255.250 239.255.255.250
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.55
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.55
Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.85
Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.85
Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.85
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.85
Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.85
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.55
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.55
Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.85
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.85
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49997 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49997
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49677 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: classification engineClassification label: sus21.phis.winHTML@32/6@2/3
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "C:\Users\user\Desktop\razer-partners.com.html"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1968,i,7308265894918338194,7020277294823495674,262144 /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1968,i,7308265894918338194,7020277294823495674,262144 /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Google Drive.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
razer-partners.com.html0%VirustotalBrowse
razer-partners.com.html0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
file:///C:/Users/user/Desktop/razer-partners.com.html0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
s-part-0017.t-0009.t-msedge.net
13.107.246.45
truefalse
    high
    www.google.com
    172.217.16.196
    truefalse
      high
      NameMaliciousAntivirus DetectionReputation
      file:///C:/Users/user/Desktop/razer-partners.com.htmltrue
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      239.255.255.250
      unknownReserved
      unknownunknownfalse
      172.217.16.196
      www.google.comUnited States
      15169GOOGLEUSfalse
      IP
      192.168.2.10
      Joe Sandbox version:42.0.0 Malachite
      Analysis ID:1592089
      Start date and time:2025-01-15 18:30:16 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 5m 28s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:defaultwindowshtmlcookbook.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:9
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:razer-partners.com.html
      Detection:SUS
      Classification:sus21.phis.winHTML@32/6@2/3
      EGA Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .html
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 142.250.185.67, 142.250.185.174, 108.177.15.84, 216.58.206.78, 142.250.185.206, 142.250.185.170, 142.250.185.106, 216.58.206.74, 142.250.186.42, 142.250.186.170, 142.250.185.202, 142.250.185.234, 142.250.186.138, 142.250.186.106, 172.217.18.10, 142.250.184.234, 172.217.16.202, 216.58.212.170, 142.250.185.138, 142.250.185.74, 142.250.186.74, 199.232.214.172, 142.250.184.238, 142.250.186.46, 142.250.184.206, 172.217.18.110, 142.250.186.78, 216.58.206.46, 142.250.185.142, 13.107.246.45, 2.23.242.162, 172.202.163.200
      • Excluded domains from analysis (whitelisted): clients1.google.com, fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, clientservices.googleapis.com, fe3cr.delivery.mp.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, redirector.gvt1.com, update.googleapis.com, azureedge-t-prod.trafficmanager.net, clients.l.google.com, optimizationguide-pa.googleapis.com
      • Not all processes where analyzed, report is missing behavior information
      No simulations
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      239.255.255.250oD2XngYscZ.ps1Get hashmaliciousUnknownBrowse
        https://login.ecoleterradeasltd.xyz/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638725581254870614.NzQzNDkzODMtOTc3Ni00MTk4LWEyOTgtNzcxOTE2NjUxYzRiMGVmZDU5N2MtN2U3NC00YjUwLTkxMzUtNTE5MGUwYzg1ZmQ2&ui_locales=en-US&mkt=en-US&client-request-id=36d4a1f6-7cba-45d1-a3ed-df92000d1eff&state=HfQ7BQGkYjqSuhdp0uw1pmK7OnWuMWuL6CrtRUQFTAqayUvi4HK2WHpRg3qXyBpviEzEkkPrHxRuxUPhbVJ6VT_z1Q4rknsdO1I1G8I0vvmCJKY1Jj17UvvXfl7rwwbByhZiSjZv4e0zjm8vBEwSjLmzdF29N_NteyY8M7drEpkBEAgCB0EoFXswqlG9707goDIQqjTpA0BHvdohyO5aj-tJFO1J-Wz2owkKr6bkCNZlxKE53oI2XKYpyD1GEC2x5jHgmT1f4Yrr9BPkhEeMCw&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0Get hashmaliciousUnknownBrowse
          DEEZI80S.pdfGet hashmaliciousUnknownBrowse
            https://docs.google.com/drawings/d/1Fix-5JDCTM2QJpjq3c_NOGTxMuhYRiEX3wdVSCqQc9w/preview?FwaxQGet hashmaliciousUnknownBrowse
              firstontario.docxGet hashmaliciousUnknownBrowse
                https://solve.lzmb.org/awjsx.captcha?u=a85c9e46-f1ff-475f-b74c-c23cf236a082Get hashmaliciousUnknownBrowse
                  https://solve.xfzz.org/awjsx.captcha?u=c56ed68e-fc67-4e24-b8ac-6adc700e0877%20#%20%E2%9C%85%20''I%20am%20not%20a%20robot%20-%20reCAPTCHA%20Verification%20ID:%203467''Get hashmaliciousUnknownBrowse
                    ACH REMITTANCE DOCUMENT 15.01.25.xlsbGet hashmaliciousUnknownBrowse
                      https://tinyurl.com/AmconconstructionGet hashmaliciousUnknownBrowse
                        Zohobooks Voip CaIIer left (4) voice message from +1 (___) ___-__92 [MSG ID-zNeaDpAKAIgeQjKGl].emlGet hashmaliciousHTMLPhisherBrowse
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          s-part-0017.t-0009.t-msedge.netOrder.xlsGet hashmaliciousUnknownBrowse
                          • 13.107.246.45
                          Order.xlsGet hashmaliciousUnknownBrowse
                          • 13.107.246.45
                          Order.xlsGet hashmaliciousUnknownBrowse
                          • 13.107.246.45
                          random.exeGet hashmaliciousLiteHTTP BotBrowse
                          • 13.107.246.45
                          ACH REMITTANCE DOCUMENT 15.01.25.xlsbGet hashmaliciousUnknownBrowse
                          • 13.107.246.45
                          https://tinyurl.com/AmconconstructionGet hashmaliciousUnknownBrowse
                          • 13.107.246.45
                          Zohobooks Voip CaIIer left (4) voice message from +1 (___) ___-__92 [MSG ID-zNeaDpAKAIgeQjKGl].emlGet hashmaliciousHTMLPhisherBrowse
                          • 13.107.246.45
                          https://u13762205.ct.sendgrid.net/ls/click?upn=u001.2N-2FFSd8Mh5tdTcK2pEXUToH0F5-2Fq3FDo8pnKFzcXMK24EOVQRPQXOzov3WP6TeQDbpOFMAzOhzk6g52qaRBXMg-3D-3DIjNL_PKcFXsnzduNOkTk1M1BuFSXBwpDtJ5JnfBBGS8mWfSDpSIzzZrzaRAqzsWn9I2SACyGbOCQAHofmU9ue-2Bfpl8m5UVDAXfATbU3zHgCM2w6TpOzhFbmwlUQoZzHTxRoJD6sBCzgzJz3SY7rmsp-2BquYHmL2DTOkQggmMFIfKhNPVaBf8NTmimDBPZdcr9YqjF8L6hryY10MBbjsSOUH778gw-3D-3DGet hashmaliciousUnknownBrowse
                          • 13.107.246.45
                          https://shunnarah.com/attorney/candace-t-brownGet hashmaliciousUnknownBrowse
                          • 13.107.246.45
                          https://www.databreachtoday.com/showOnDemand.php?webinarID=6054&rf=OD_REQUEST;Get hashmaliciousUnknownBrowse
                          • 13.107.246.45
                          No context
                          No context
                          No context
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jan 15 16:31:18 2025, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                          Category:dropped
                          Size (bytes):2673
                          Entropy (8bit):3.9832019159750094
                          Encrypted:false
                          SSDEEP:48:85wbd6T4ebH/ZidAKZdA1uehwiZUklqehYgy+3:85Nsesfgy
                          MD5:3EE83E0B305264980FC6B90BC52CAC0A
                          SHA1:7EC8371573DBFA4D9C1F111505F5B88E3E9DC0EF
                          SHA-256:0CD72246F9F1A0038309F87010575CB1DF70CB6D4EA79C6F99E7071796CF84C9
                          SHA-512:4F30BF02FE0DD7BD1E9F67CA9D3FC7A31C13D970CDBC544B7B97D29DD681553F46EC8E5CDC8BB71CFB52F5D2D24C291362FF8C866DB44B6F7B5FC7AD0264C671
                          Malicious:false
                          Reputation:low
                          Preview:L..................F.@.. ...$+.,.....qgIsg......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW$O..PROGRA~1..t......O.I/Z.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V/Z.....L.....................p+j.G.o.o.g.l.e.....T.1.....EW.L..Chrome..>......CW.V/Z.....M......................k..C.h.r.o.m.e.....`.1.....EW.L..APPLIC~1..H......CW.V/Z............................k..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V/Z.....N.......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........t..2.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jan 15 16:31:18 2025, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                          Category:dropped
                          Size (bytes):2675
                          Entropy (8bit):4.003601213528309
                          Encrypted:false
                          SSDEEP:48:8bwbd6T4ebH/ZidAKZdA1Heh/iZUkAQkqehPgy+2:8bNsey9Qagy
                          MD5:479254EBC98D5AD38867AE375B7D08FD
                          SHA1:8C8B8F750AE948448C320888F77BC040ABA2ED31
                          SHA-256:57A2BB73294B3ADCB47BEEDC658276F63175E51D2583BE6A34F57048C744DF5A
                          SHA-512:975A3C3C5A386920CEF7E04A8F6790638702EC185A3203B71062A0D9BF09D594C0741C09704F10D0CCD3B8CFEF31EAF8CE913AE6586FEF24076D623DFC3A3E92
                          Malicious:false
                          Reputation:low
                          Preview:L..................F.@.. ...$+.,.....[Isg......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW$O..PROGRA~1..t......O.I/Z.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V/Z.....L.....................p+j.G.o.o.g.l.e.....T.1.....EW.L..Chrome..>......CW.V/Z.....M......................k..C.h.r.o.m.e.....`.1.....EW.L..APPLIC~1..H......CW.V/Z............................k..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V/Z.....N.......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........t..2.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 08:59:33 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                          Category:dropped
                          Size (bytes):2689
                          Entropy (8bit):4.011008658842348
                          Encrypted:false
                          SSDEEP:48:8Fwbd6T4bH/ZidAKZdA149eh7sFiZUkmgqeh7sxgy+BX:8FNsGnDgy
                          MD5:047F30D55E9CFC39B4CAF997178C8E50
                          SHA1:301EFF2D402AFBC0F59D52F67B7298627D46F088
                          SHA-256:32139AF9911A45A55AD60ADEBCBCA61DC577745C3C71E5AF09C39C9F53301FFF
                          SHA-512:EFA17D0D1038E48F89D1D76F120D9DE9F9F70118B7BBA4CDD6C1261ED8F61D2ABACB1028AE57E5847BD284ECD2988EB55874A3C33C191DE6166C68FDBAA4BF44
                          Malicious:false
                          Reputation:low
                          Preview:L..................F.@.. ...$+.,....K..r.......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW$O..PROGRA~1..t......O.I/Z.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V/Z.....L.....................p+j.G.o.o.g.l.e.....T.1.....EW.L..Chrome..>......CW.V/Z.....M......................k..C.h.r.o.m.e.....`.1.....EW.L..APPLIC~1..H......CW.V/Z............................k..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VEW.L....N.......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........t..2.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jan 15 16:31:18 2025, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                          Category:dropped
                          Size (bytes):2677
                          Entropy (8bit):3.9982362199647907
                          Encrypted:false
                          SSDEEP:48:8xwbd6T4ebH/ZidAKZdA14ehDiZUkwqehbgy+R:8xNsepJgy
                          MD5:DCFC58F2461DEAA0EED162BCF17F2D82
                          SHA1:26487FFAC7C100F9B97596C2D424FEB142A4BB03
                          SHA-256:875C2315E976B9DF0330594B772C26D331EC31B87D60D9C7FD108A49EC1B1E48
                          SHA-512:A00DF32A863093C4CAEA13035E487DBEE8E1F72D0F331D76F9F8343973C2D6778244516FA56678A7DD516DE790D0E02F184A981623E6C3298D7BFD2E1C93A6AD
                          Malicious:false
                          Reputation:low
                          Preview:L..................F.@.. ...$+.,....".VIsg......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW$O..PROGRA~1..t......O.I/Z.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V/Z.....L.....................p+j.G.o.o.g.l.e.....T.1.....EW.L..Chrome..>......CW.V/Z.....M......................k..C.h.r.o.m.e.....`.1.....EW.L..APPLIC~1..H......CW.V/Z............................k..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V/Z.....N.......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........t..2.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jan 15 16:31:18 2025, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                          Category:dropped
                          Size (bytes):2677
                          Entropy (8bit):3.9881469636052476
                          Encrypted:false
                          SSDEEP:48:8Mwbd6T4ebH/ZidAKZdA1mehBiZUk1W1qeh1gy+C:8MNseJ9Vgy
                          MD5:99E848C14705107D0AC9E2CAF34816CF
                          SHA1:5E17E336016D38AF2315CBDF42A337E700F31AE4
                          SHA-256:17AB504EDC90756303FA0BC4FC8A5B577FF5FC7F9B813986A42DD8C9D566B6A9
                          SHA-512:BE30AE4FAE47553574DDE202FF9931241B62CC06CE7313F2BC6B2A557D0A20DC1557C22D31FE0AB5E68B278BD9AB5F09CDEB02E178A6D5C7E33EAE28CB97C572
                          Malicious:false
                          Reputation:low
                          Preview:L..................F.@.. ...$+.,.....J`Isg......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW$O..PROGRA~1..t......O.I/Z.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V/Z.....L.....................p+j.G.o.o.g.l.e.....T.1.....EW.L..Chrome..>......CW.V/Z.....M......................k..C.h.r.o.m.e.....`.1.....EW.L..APPLIC~1..H......CW.V/Z............................k..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V/Z.....N.......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........t..2.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jan 15 16:31:18 2025, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                          Category:dropped
                          Size (bytes):2679
                          Entropy (8bit):3.998678128939221
                          Encrypted:false
                          SSDEEP:48:8iwbd6T4ebH/ZidAKZdA1duT1ehOuTbbiZUk5OjqehOuTbDgy+yT+:8iNsegTyTbxWOvTbDgy7T
                          MD5:8E76D5657768E5B54F2719661914010D
                          SHA1:24571A721B802EB3A133D545962423ADD95E62F5
                          SHA-256:3C47282CE68485108A1D19C46B35A5782A8B7E9B79EC25E7CEE5758010A6B08C
                          SHA-512:A73CD01B62E9F434A0E90BF804D0359128ED4A9E32EE585C8DF9C5CA7F4B30BD21828B5E1493CA1FFCCE2A2DC88D024425871D1D054DFD4B58CA37E616BB9544
                          Malicious:false
                          Reputation:low
                          Preview:L..................F.@.. ...$+.,.....7MIsg......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW$O..PROGRA~1..t......O.I/Z.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V/Z.....L.....................p+j.G.o.o.g.l.e.....T.1.....EW.L..Chrome..>......CW.V/Z.....M......................k..C.h.r.o.m.e.....`.1.....EW.L..APPLIC~1..H......CW.V/Z............................k..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V/Z.....N.......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........t..2.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                          File type:data
                          Entropy (8bit):6.214102991925758
                          TrID:
                          • HyperText Markup Language (12001/1) 29.26%
                          • HyperText Markup Language (12001/1) 29.26%
                          • HyperText Markup Language (11001/1) 26.83%
                          • HyperText Markup Language (6006/1) 14.65%
                          File name:razer-partners.com.html
                          File size:11'800 bytes
                          MD5:2b3a90534ef53c03b7e8ac359aa0f78c
                          SHA1:f2e80fd65fe6d858f06b3b06276321f1d3ca9b05
                          SHA256:2c4864c86db7b66f1410dbd57e7a94131659c32daba1e1daabb20eb1128e88e0
                          SHA512:032f78f2a4d2139016a41143eb03c695d2a8f7ddd982b756c30120aaf2866511f7997dc9ab139a01f309607d0dfb4d208525e727280ca8b86948bb8a0f0cce83
                          SSDEEP:192:rgtXSLY6hR8MojFNpGnlt690kAj0XqcnHHBj8MPDX9stP8EAYunDhxvf5THP444B:rgtCLY6hJofUnC97Ain586hJhlxhHPYp
                          TLSH:E2326C20F397A4C0992394F3C6B92AAB91A8CD5DDFFAD684D10802C3393CE47B5117E6
                          File Content Preview:<html><head>.<meta http-equiv="content-type" content="text/html; charset=UTF-8"><script></script></head><body>................................................................</body>l1l=document.all;var .a8b9f=true;ll1=document.layers;lll=window.sidebar;a8
                          TimestampSource PortDest PortSource IPDest IP
                          Jan 15, 2025 18:31:05.956594944 CET49674443192.168.2.10173.222.162.55
                          Jan 15, 2025 18:31:05.956693888 CET49675443192.168.2.10173.222.162.55
                          Jan 15, 2025 18:31:07.941658974 CET49677443192.168.2.1020.42.65.85
                          Jan 15, 2025 18:31:08.253452063 CET49677443192.168.2.1020.42.65.85
                          Jan 15, 2025 18:31:08.862792969 CET49677443192.168.2.1020.42.65.85
                          Jan 15, 2025 18:31:09.019043922 CET49671443192.168.2.10204.79.197.203
                          Jan 15, 2025 18:31:10.065933943 CET49677443192.168.2.1020.42.65.85
                          Jan 15, 2025 18:31:12.472162008 CET49677443192.168.2.1020.42.65.85
                          Jan 15, 2025 18:31:15.564625978 CET49674443192.168.2.10173.222.162.55
                          Jan 15, 2025 18:31:15.564651012 CET49675443192.168.2.10173.222.162.55
                          Jan 15, 2025 18:31:17.346776009 CET49677443192.168.2.1020.42.65.85
                          Jan 15, 2025 18:31:18.751919031 CET49671443192.168.2.10204.79.197.203
                          Jan 15, 2025 18:31:21.276833057 CET49760443192.168.2.10172.217.16.196
                          Jan 15, 2025 18:31:21.276878119 CET44349760172.217.16.196192.168.2.10
                          Jan 15, 2025 18:31:21.276990891 CET49760443192.168.2.10172.217.16.196
                          Jan 15, 2025 18:31:21.277211905 CET49760443192.168.2.10172.217.16.196
                          Jan 15, 2025 18:31:21.277226925 CET44349760172.217.16.196192.168.2.10
                          Jan 15, 2025 18:31:21.919210911 CET44349760172.217.16.196192.168.2.10
                          Jan 15, 2025 18:31:21.919619083 CET49760443192.168.2.10172.217.16.196
                          Jan 15, 2025 18:31:21.919648886 CET44349760172.217.16.196192.168.2.10
                          Jan 15, 2025 18:31:21.920691967 CET44349760172.217.16.196192.168.2.10
                          Jan 15, 2025 18:31:21.920762062 CET49760443192.168.2.10172.217.16.196
                          Jan 15, 2025 18:31:21.922518015 CET49760443192.168.2.10172.217.16.196
                          Jan 15, 2025 18:31:21.922580004 CET44349760172.217.16.196192.168.2.10
                          Jan 15, 2025 18:31:21.970873117 CET49760443192.168.2.10172.217.16.196
                          Jan 15, 2025 18:31:21.970887899 CET44349760172.217.16.196192.168.2.10
                          Jan 15, 2025 18:31:22.017752886 CET49760443192.168.2.10172.217.16.196
                          Jan 15, 2025 18:31:26.955817938 CET49677443192.168.2.1020.42.65.85
                          Jan 15, 2025 18:31:31.837909937 CET44349760172.217.16.196192.168.2.10
                          Jan 15, 2025 18:31:31.838134050 CET44349760172.217.16.196192.168.2.10
                          Jan 15, 2025 18:31:31.838186026 CET49760443192.168.2.10172.217.16.196
                          Jan 15, 2025 18:31:32.304835081 CET49760443192.168.2.10172.217.16.196
                          Jan 15, 2025 18:31:32.304867983 CET44349760172.217.16.196192.168.2.10
                          Jan 15, 2025 18:32:21.332117081 CET49997443192.168.2.10172.217.16.196
                          Jan 15, 2025 18:32:21.332221031 CET44349997172.217.16.196192.168.2.10
                          Jan 15, 2025 18:32:21.332350969 CET49997443192.168.2.10172.217.16.196
                          Jan 15, 2025 18:32:21.332577944 CET49997443192.168.2.10172.217.16.196
                          Jan 15, 2025 18:32:21.332614899 CET44349997172.217.16.196192.168.2.10
                          Jan 15, 2025 18:32:21.981898069 CET44349997172.217.16.196192.168.2.10
                          Jan 15, 2025 18:32:21.982299089 CET49997443192.168.2.10172.217.16.196
                          Jan 15, 2025 18:32:21.982346058 CET44349997172.217.16.196192.168.2.10
                          Jan 15, 2025 18:32:21.982692957 CET44349997172.217.16.196192.168.2.10
                          Jan 15, 2025 18:32:21.983004093 CET49997443192.168.2.10172.217.16.196
                          Jan 15, 2025 18:32:21.983066082 CET44349997172.217.16.196192.168.2.10
                          Jan 15, 2025 18:32:22.034001112 CET49997443192.168.2.10172.217.16.196
                          Jan 15, 2025 18:32:31.886132956 CET44349997172.217.16.196192.168.2.10
                          Jan 15, 2025 18:32:31.886296034 CET44349997172.217.16.196192.168.2.10
                          Jan 15, 2025 18:32:31.886373043 CET49997443192.168.2.10172.217.16.196
                          Jan 15, 2025 18:32:32.301518917 CET49997443192.168.2.10172.217.16.196
                          Jan 15, 2025 18:32:32.301558018 CET44349997172.217.16.196192.168.2.10
                          TimestampSource PortDest PortSource IPDest IP
                          Jan 15, 2025 18:31:17.219038010 CET53619051.1.1.1192.168.2.10
                          Jan 15, 2025 18:31:17.252702951 CET53651741.1.1.1192.168.2.10
                          Jan 15, 2025 18:31:18.484987020 CET53536091.1.1.1192.168.2.10
                          Jan 15, 2025 18:31:21.268846989 CET5532453192.168.2.101.1.1.1
                          Jan 15, 2025 18:31:21.269254923 CET6208653192.168.2.101.1.1.1
                          Jan 15, 2025 18:31:21.275970936 CET53553241.1.1.1192.168.2.10
                          Jan 15, 2025 18:31:21.275985003 CET53620861.1.1.1192.168.2.10
                          Jan 15, 2025 18:31:21.964662075 CET53526291.1.1.1192.168.2.10
                          Jan 15, 2025 18:31:35.355043888 CET53499671.1.1.1192.168.2.10
                          Jan 15, 2025 18:31:54.074784994 CET53611791.1.1.1192.168.2.10
                          Jan 15, 2025 18:32:07.042399883 CET138138192.168.2.10192.168.2.255
                          Jan 15, 2025 18:32:16.702332020 CET53599111.1.1.1192.168.2.10
                          Jan 15, 2025 18:32:16.948734999 CET53569471.1.1.1192.168.2.10
                          Jan 15, 2025 18:32:47.637191057 CET53498371.1.1.1192.168.2.10
                          Jan 15, 2025 18:33:34.090060949 CET53626741.1.1.1192.168.2.10
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Jan 15, 2025 18:31:21.268846989 CET192.168.2.101.1.1.10x4a6eStandard query (0)www.google.comA (IP address)IN (0x0001)false
                          Jan 15, 2025 18:31:21.269254923 CET192.168.2.101.1.1.10x6c65Standard query (0)www.google.com65IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Jan 15, 2025 18:31:10.599148035 CET1.1.1.1192.168.2.100x4b32No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                          Jan 15, 2025 18:31:10.599148035 CET1.1.1.1192.168.2.100x4b32No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                          Jan 15, 2025 18:31:21.275970936 CET1.1.1.1192.168.2.100x4a6eNo error (0)www.google.com172.217.16.196A (IP address)IN (0x0001)false
                          Jan 15, 2025 18:31:21.275985003 CET1.1.1.1192.168.2.100x6c65No error (0)www.google.com65IN (0x0001)false

                          Click to jump to process

                          Click to jump to process

                          Click to jump to process

                          Target ID:0
                          Start time:12:31:12
                          Start date:15/01/2025
                          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "C:\Users\user\Desktop\razer-partners.com.html"
                          Imagebase:0x7ff6c5c30000
                          File size:3'242'272 bytes
                          MD5 hash:83395EAB5B03DEA9720F8D7AC0D15CAA
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:false

                          Target ID:2
                          Start time:12:31:15
                          Start date:15/01/2025
                          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1968,i,7308265894918338194,7020277294823495674,262144 /prefetch:8
                          Imagebase:0x7ff6c5c30000
                          File size:3'242'272 bytes
                          MD5 hash:83395EAB5B03DEA9720F8D7AC0D15CAA
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:false

                          No disassembly