Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://recouvrement-assurancesfr/LKeZL

Overview

General Information

Sample URL:https://recouvrement-assurancesfr/LKeZL
Analysis ID:1428131
Infos:
Errors
  • URL not reachable

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Stores files to the Windows start menu directory

Classification

Analysis Advice

Joe Sandbox was unable to browse the URL (domain or webserver down or HTTPS issue), try to browse the URL again later
Uses HTTPS for network communication, use the 'Proxy HTTPS (port 443) to read its encrypted data' cookbook for further analysis
  • System is w10x64
  • chrome.exe (PID: 2844 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6860 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2484 --field-trial-handle=2440,i,5327510045856274522,13032898827891415465,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6752 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://recouvrement-assurancesfr/LKeZL" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownHTTPS traffic detected: 23.206.229.226:443 -> 192.168.2.8:49703 version: TLS 1.2
Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownDNS traffic detected: queries for: google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49676 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownHTTPS traffic detected: 23.206.229.226:443 -> 192.168.2.8:49703 version: TLS 1.2
Source: classification engineClassification label: unknown0.win@19/6@4/3
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2484 --field-trial-handle=2440,i,5327510045856274522,13032898827891415465,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://recouvrement-assurancesfr/LKeZL"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2484 --field-trial-handle=2440,i,5327510045856274522,13032898827891415465,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Google Drive.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1428131 URL: https://recouvrement-assura... Startdate: 18/04/2024 Architecture: WINDOWS Score: 0 5 chrome.exe 8 2->5         started        8 chrome.exe 2->8         started        dnsIp3 13 192.168.2.8, 443, 49703, 49712 unknown unknown 5->13 15 239.255.255.250 unknown Reserved 5->15 10 chrome.exe 5->10         started        process4 dnsIp5 17 www.google.com 74.125.138.105, 443, 49712 GOOGLEUS United States 10->17 19 google.com 10->19

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
google.com
64.233.177.139
truefalse
    high
    www.google.com
    74.125.138.105
    truefalse
      high
      fp2e7a.wpc.phicdn.net
      192.229.211.108
      truefalse
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        74.125.138.105
        www.google.comUnited States
        15169GOOGLEUSfalse
        239.255.255.250
        unknownReserved
        unknownunknownfalse
        IP
        192.168.2.8
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1428131
        Start date and time:2024-04-18 15:39:58 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 2m 1s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:browseurl.jbs
        Sample URL:https://recouvrement-assurancesfr/LKeZL
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:8
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:UNKNOWN
        Classification:unknown0.win@19/6@4/3
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • URL browsing timeout or error
        • URL not reachable
        • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 172.217.215.113, 172.217.215.100, 172.217.215.101, 172.217.215.138, 172.217.215.139, 172.217.215.102, 74.125.136.94, 172.217.215.84, 34.104.35.123, 184.31.62.93, 52.165.165.26, 192.229.211.108, 20.3.187.198
        • Excluded domains from analysis (whitelisted): fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, clientservices.googleapis.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, ocsp.digicert.com, e16604.g.akamaiedge.net, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, clients.l.google.com, prod.fs.microsoft.com.akadns.net, glb.sls.prod.dcat.dsp.trafficmanager.net
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtSetInformationFile calls found.
        • VT rate limit hit for: https://recouvrement-assurancesfr/LKeZL
        No simulations
        No context
        No context
        No context
        No context
        No context
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 18 12:40:51 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2677
        Entropy (8bit):3.974581077258102
        Encrypted:false
        SSDEEP:48:8Tx0dITscvwHtidAKZdA1oehwiZUklqehvy+3:8NLfvvYy
        MD5:C5CF224052DA190945F791E7C7F0A3E3
        SHA1:F6A1CE7A4209838E1FA899FB1F514947479970EA
        SHA-256:4F8B33CF2F2B7DBCF00F931D68FB588446986458D63BCF86544FE3B89592B0E7
        SHA-512:2174F82D792CFB331B33DA2A23AF01E5CB7759E3E6AB70E632E1118150F6EA20E58E2FF10E27912BC1A8C1AAFC4F08974CC0BE23BB325118E60E0D2C57E2D7E9
        Malicious:false
        Reputation:low
        Preview:L..................F.@.. ...$+.,.....A1.....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW)C..PROGRA~1..t......O.I.X.m....B...............J.....V...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.m....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.m....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.m..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.m...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........S/.y.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 18 12:40:51 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2679
        Entropy (8bit):3.9899878060557175
        Encrypted:false
        SSDEEP:48:8I0dITscvwHtidAKZdA1leh/iZUkAQkqehIy+2:8ILfv19QNy
        MD5:9F5A5D5328A4B2BFE91D279DAD868ACE
        SHA1:DD258FF87BD18DD63EDF24ED80361BECF6BBE90B
        SHA-256:1D473AC8ED5038A10F083954A99F608ABDD1DB5979E4838BDBC1270935845AAF
        SHA-512:31F475F8DE6F90E61036341A738EF5E196104F0DA1C0A7C9541AE5E47FAAE888C57B7354BE613A47F31360C1017037ACE1DF2B5B0DA1CB4CD39278CABB3253BC
        Malicious:false
        Reputation:low
        Preview:L..................F.@.. ...$+.,.....V%.....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW)C..PROGRA~1..t......O.I.X.m....B...............J.....V...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.m....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.m....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.m..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.m...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........S/.y.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 07:00:51 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2693
        Entropy (8bit):4.002685618984723
        Encrypted:false
        SSDEEP:48:8h0dITscbHtidAKZdA14t5eh7sFiZUkmgqeh7sGy+BX:8hLfgncy
        MD5:8110EA08FA4C52A797F941CE19F61203
        SHA1:5B28600B76604F5BBCD1D1DB0EA548F6A3BE1B63
        SHA-256:4A487FBBB7989543FDD08CB3B5A717A1D3F468E9BA753D7EDDF6452203595342
        SHA-512:5B8F2ABEF532441CFC5C8FC823505B36F4A233DA1129DDE763B9BB854188F0873AF5ED986F9C7593D495EC92AAC62BF0E836EC0CD344B2E83DF36E8F0229D555
        Malicious:false
        Reputation:low
        Preview:L..................F.@.. ...$+.,.....C..b...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW)C..PROGRA~1..t......O.I.X.m....B...............J.....V...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.m....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.m....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.m..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VEW.@...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........S/.y.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 18 12:40:51 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2681
        Entropy (8bit):3.9905650939598734
        Encrypted:false
        SSDEEP:48:8s0dITscvwHtidAKZdA16ehDiZUkwqehUy+R:8sLfvmey
        MD5:45ADDF7D066202F467E82A9EF26128B5
        SHA1:95E4900AF1F6D6DB1F7F166C529FAA79B143BC30
        SHA-256:374CF46039B51FA59DBF2017A9AC46ABC1ACA624E4E5EC95DFE53D66AC459831
        SHA-512:59636649CAB178217FF721AD18622C33B3B5E2C5C11853DFD17ECE9EF785E3B81ED69D9D81872BB737D5367B239FB504B7F4E2511BE32EC7E7F03192AE95E4B0
        Malicious:false
        Reputation:low
        Preview:L..................F.@.. ...$+.,............N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW)C..PROGRA~1..t......O.I.X.m....B...............J.....V...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.m....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.m....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.m..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.m...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........S/.y.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 18 12:40:51 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2681
        Entropy (8bit):3.9813221922804387
        Encrypted:false
        SSDEEP:48:8g0dITscvwHtidAKZdA1UehBiZUk1W1qehay+C:8gLfvm96y
        MD5:7399C1519ED9E2502936D1CC2CB5C927
        SHA1:9D5EC610BDD607EA3EA8638E5F40A3590DFD1E24
        SHA-256:8E7D7B7D9CAE040CE773A25CE001BB4557581B266389829F69EE495F2586E00A
        SHA-512:F90479E3923B4413B27C0B3D046D0418125D87F4CCCF7E98786A62EFEB5540BE641D76E941FB68A34C416D321A565B1C0ED582DED44E3AF205F4E9A16E0C5DD8
        Malicious:false
        Reputation:low
        Preview:L..................F.@.. ...$+.,.....},.....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW)C..PROGRA~1..t......O.I.X.m....B...............J.....V...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.m....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.m....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.m..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.m...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........S/.y.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 18 12:40:51 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2683
        Entropy (8bit):3.989213982159957
        Encrypted:false
        SSDEEP:48:8HB0dITscvwHtidAKZdA1duTrehOuTbbiZUk5OjqehOuTbcy+yT+:8HBLfv3TYTbxWOvTbcy7T
        MD5:6E6ECF9FCDBD78CE66BC258598B5A2C3
        SHA1:B91C61D4A24B83F8E56CAE1CCA3CCBA31BFBFC0D
        SHA-256:90EB266FCEDC3734D7A138A8413BE4AE366C461466B94104B25D45AF1920E4D0
        SHA-512:649945822FE8D3E1DE3DB9E47AB6E2B32206F653EE22D63DBEDFED116D2FB23DA75652F710E9945E83E8776CA1C5D7D390B661A900BC8A3E384C9B3838598C45
        Malicious:false
        Reputation:low
        Preview:L..................F.@.. ...$+.,...........N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW)C..PROGRA~1..t......O.I.X.m....B...............J.....V...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.m....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.m....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.m..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.m...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........S/.y.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        No static file info
        TimestampSource PortDest PortSource IPDest IP
        Apr 18, 2024 15:40:41.960256100 CEST49676443192.168.2.852.182.143.211
        Apr 18, 2024 15:40:44.366487980 CEST49676443192.168.2.852.182.143.211
        Apr 18, 2024 15:40:44.866508961 CEST49673443192.168.2.823.206.229.226
        Apr 18, 2024 15:40:45.241492987 CEST49672443192.168.2.823.206.229.226
        Apr 18, 2024 15:40:49.178159952 CEST49676443192.168.2.852.182.143.211
        Apr 18, 2024 15:40:50.537157059 CEST49671443192.168.2.8204.79.197.203
        Apr 18, 2024 15:40:50.656932116 CEST4434970323.206.229.226192.168.2.8
        Apr 18, 2024 15:40:50.657023907 CEST49703443192.168.2.823.206.229.226
        Apr 18, 2024 15:40:53.361663103 CEST49712443192.168.2.874.125.138.105
        Apr 18, 2024 15:40:53.361706972 CEST4434971274.125.138.105192.168.2.8
        Apr 18, 2024 15:40:53.361785889 CEST49712443192.168.2.874.125.138.105
        Apr 18, 2024 15:40:53.362250090 CEST49712443192.168.2.874.125.138.105
        Apr 18, 2024 15:40:53.362265110 CEST4434971274.125.138.105192.168.2.8
        Apr 18, 2024 15:40:53.579252958 CEST4434971274.125.138.105192.168.2.8
        Apr 18, 2024 15:40:53.579962969 CEST49712443192.168.2.874.125.138.105
        Apr 18, 2024 15:40:53.579989910 CEST4434971274.125.138.105192.168.2.8
        Apr 18, 2024 15:40:53.581032038 CEST4434971274.125.138.105192.168.2.8
        Apr 18, 2024 15:40:53.581098080 CEST49712443192.168.2.874.125.138.105
        Apr 18, 2024 15:40:53.584382057 CEST49712443192.168.2.874.125.138.105
        Apr 18, 2024 15:40:53.584466934 CEST4434971274.125.138.105192.168.2.8
        Apr 18, 2024 15:40:53.625746012 CEST49712443192.168.2.874.125.138.105
        Apr 18, 2024 15:40:53.625777006 CEST4434971274.125.138.105192.168.2.8
        Apr 18, 2024 15:40:53.672636032 CEST49712443192.168.2.874.125.138.105
        Apr 18, 2024 15:40:54.469084978 CEST49673443192.168.2.823.206.229.226
        Apr 18, 2024 15:40:54.852778912 CEST49672443192.168.2.823.206.229.226
        Apr 18, 2024 15:40:58.781790972 CEST49676443192.168.2.852.182.143.211
        Apr 18, 2024 15:41:03.580899954 CEST4434971274.125.138.105192.168.2.8
        Apr 18, 2024 15:41:03.580982924 CEST4434971274.125.138.105192.168.2.8
        Apr 18, 2024 15:41:03.581068039 CEST49712443192.168.2.874.125.138.105
        Apr 18, 2024 15:41:04.530541897 CEST49712443192.168.2.874.125.138.105
        Apr 18, 2024 15:41:04.530607939 CEST4434971274.125.138.105192.168.2.8
        Apr 18, 2024 15:41:05.526165009 CEST49703443192.168.2.823.206.229.226
        Apr 18, 2024 15:41:05.676712036 CEST4434970323.206.229.226192.168.2.8
        Apr 18, 2024 15:41:05.677472115 CEST4434970323.206.229.226192.168.2.8
        Apr 18, 2024 15:41:05.677489996 CEST4434970323.206.229.226192.168.2.8
        Apr 18, 2024 15:41:05.677529097 CEST4434970323.206.229.226192.168.2.8
        Apr 18, 2024 15:41:05.677542925 CEST4434970323.206.229.226192.168.2.8
        Apr 18, 2024 15:41:05.677565098 CEST49703443192.168.2.823.206.229.226
        Apr 18, 2024 15:41:05.677941084 CEST49703443192.168.2.823.206.229.226
        Apr 18, 2024 15:41:07.441680908 CEST49703443192.168.2.823.206.229.226
        Apr 18, 2024 15:41:07.593081951 CEST4434970323.206.229.226192.168.2.8
        Apr 18, 2024 15:41:07.593166113 CEST49703443192.168.2.823.206.229.226
        Apr 18, 2024 15:41:07.636588097 CEST49703443192.168.2.823.206.229.226
        Apr 18, 2024 15:41:07.636588097 CEST49703443192.168.2.823.206.229.226
        Apr 18, 2024 15:41:07.639113903 CEST49703443192.168.2.823.206.229.226
        Apr 18, 2024 15:41:07.639113903 CEST49703443192.168.2.823.206.229.226
        Apr 18, 2024 15:41:07.787458897 CEST4434970323.206.229.226192.168.2.8
        Apr 18, 2024 15:41:07.789798021 CEST4434970323.206.229.226192.168.2.8
        Apr 18, 2024 15:41:07.789813995 CEST4434970323.206.229.226192.168.2.8
        Apr 18, 2024 15:41:07.789860964 CEST49703443192.168.2.823.206.229.226
        Apr 18, 2024 15:41:07.790157080 CEST49703443192.168.2.823.206.229.226
        Apr 18, 2024 15:41:07.834500074 CEST4434970323.206.229.226192.168.2.8
        Apr 18, 2024 15:41:07.834517956 CEST4434970323.206.229.226192.168.2.8
        Apr 18, 2024 15:41:07.834585905 CEST49703443192.168.2.823.206.229.226
        Apr 18, 2024 15:41:07.834585905 CEST49703443192.168.2.823.206.229.226
        TimestampSource PortDest PortSource IPDest IP
        Apr 18, 2024 15:40:50.310655117 CEST53593561.1.1.1192.168.2.8
        Apr 18, 2024 15:40:50.311574936 CEST53548241.1.1.1192.168.2.8
        Apr 18, 2024 15:40:50.913206100 CEST53530661.1.1.1192.168.2.8
        Apr 18, 2024 15:40:52.927037001 CEST5920153192.168.2.88.8.8.8
        Apr 18, 2024 15:40:52.928809881 CEST5041753192.168.2.81.1.1.1
        Apr 18, 2024 15:40:53.032866955 CEST53504171.1.1.1192.168.2.8
        Apr 18, 2024 15:40:53.032998085 CEST53592018.8.8.8192.168.2.8
        Apr 18, 2024 15:40:53.255239964 CEST6344953192.168.2.81.1.1.1
        Apr 18, 2024 15:40:53.255386114 CEST5253453192.168.2.81.1.1.1
        Apr 18, 2024 15:40:53.359927893 CEST53525341.1.1.1192.168.2.8
        Apr 18, 2024 15:40:53.359950066 CEST53634491.1.1.1192.168.2.8
        Apr 18, 2024 15:41:08.366724968 CEST53565731.1.1.1192.168.2.8
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Apr 18, 2024 15:40:52.927037001 CEST192.168.2.88.8.8.80x8c3aStandard query (0)google.comA (IP address)IN (0x0001)false
        Apr 18, 2024 15:40:52.928809881 CEST192.168.2.81.1.1.10x9a4dStandard query (0)google.comA (IP address)IN (0x0001)false
        Apr 18, 2024 15:40:53.255239964 CEST192.168.2.81.1.1.10xd42dStandard query (0)www.google.comA (IP address)IN (0x0001)false
        Apr 18, 2024 15:40:53.255386114 CEST192.168.2.81.1.1.10x9923Standard query (0)www.google.com65IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Apr 18, 2024 15:40:53.032866955 CEST1.1.1.1192.168.2.80x9a4dNo error (0)google.com64.233.177.139A (IP address)IN (0x0001)false
        Apr 18, 2024 15:40:53.032866955 CEST1.1.1.1192.168.2.80x9a4dNo error (0)google.com64.233.177.100A (IP address)IN (0x0001)false
        Apr 18, 2024 15:40:53.032866955 CEST1.1.1.1192.168.2.80x9a4dNo error (0)google.com64.233.177.102A (IP address)IN (0x0001)false
        Apr 18, 2024 15:40:53.032866955 CEST1.1.1.1192.168.2.80x9a4dNo error (0)google.com64.233.177.138A (IP address)IN (0x0001)false
        Apr 18, 2024 15:40:53.032866955 CEST1.1.1.1192.168.2.80x9a4dNo error (0)google.com64.233.177.101A (IP address)IN (0x0001)false
        Apr 18, 2024 15:40:53.032866955 CEST1.1.1.1192.168.2.80x9a4dNo error (0)google.com64.233.177.113A (IP address)IN (0x0001)false
        Apr 18, 2024 15:40:53.032998085 CEST8.8.8.8192.168.2.80x8c3aNo error (0)google.com64.233.177.138A (IP address)IN (0x0001)false
        Apr 18, 2024 15:40:53.032998085 CEST8.8.8.8192.168.2.80x8c3aNo error (0)google.com64.233.177.139A (IP address)IN (0x0001)false
        Apr 18, 2024 15:40:53.032998085 CEST8.8.8.8192.168.2.80x8c3aNo error (0)google.com64.233.177.102A (IP address)IN (0x0001)false
        Apr 18, 2024 15:40:53.032998085 CEST8.8.8.8192.168.2.80x8c3aNo error (0)google.com64.233.177.101A (IP address)IN (0x0001)false
        Apr 18, 2024 15:40:53.032998085 CEST8.8.8.8192.168.2.80x8c3aNo error (0)google.com64.233.177.100A (IP address)IN (0x0001)false
        Apr 18, 2024 15:40:53.032998085 CEST8.8.8.8192.168.2.80x8c3aNo error (0)google.com64.233.177.113A (IP address)IN (0x0001)false
        Apr 18, 2024 15:40:53.359927893 CEST1.1.1.1192.168.2.80x9923No error (0)www.google.com65IN (0x0001)false
        Apr 18, 2024 15:40:53.359950066 CEST1.1.1.1192.168.2.80xd42dNo error (0)www.google.com74.125.138.105A (IP address)IN (0x0001)false
        Apr 18, 2024 15:40:53.359950066 CEST1.1.1.1192.168.2.80xd42dNo error (0)www.google.com74.125.138.147A (IP address)IN (0x0001)false
        Apr 18, 2024 15:40:53.359950066 CEST1.1.1.1192.168.2.80xd42dNo error (0)www.google.com74.125.138.104A (IP address)IN (0x0001)false
        Apr 18, 2024 15:40:53.359950066 CEST1.1.1.1192.168.2.80xd42dNo error (0)www.google.com74.125.138.106A (IP address)IN (0x0001)false
        Apr 18, 2024 15:40:53.359950066 CEST1.1.1.1192.168.2.80xd42dNo error (0)www.google.com74.125.138.99A (IP address)IN (0x0001)false
        Apr 18, 2024 15:40:53.359950066 CEST1.1.1.1192.168.2.80xd42dNo error (0)www.google.com74.125.138.103A (IP address)IN (0x0001)false
        Apr 18, 2024 15:41:06.001022100 CEST1.1.1.1192.168.2.80x9d2dNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
        Apr 18, 2024 15:41:06.001022100 CEST1.1.1.1192.168.2.80x9d2dNo error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
        TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
        Apr 18, 2024 15:41:05.677529097 CEST23.206.229.226443192.168.2.849703CN=r.bing.com, O=Microsoft Corporation, L=Redmond, ST=WA, C=US CN=Microsoft Azure ECC TLS Issuing CA 05, O=Microsoft Corporation, C=USCN=Microsoft Azure ECC TLS Issuing CA 05, O=Microsoft Corporation, C=US CN=DigiCert Global Root G3, OU=www.digicert.com, O=DigiCert Inc, C=USWed Oct 18 22:32:40 CEST 2023 Wed Aug 12 02:00:00 CEST 2020Fri Jun 28 01:59:59 CEST 2024 Fri Jun 28 01:59:59 CEST 2024771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-5-10-11-13-35-16-23-65281,29-23-24,028a2c9bd18a11de089ef85a160da29e4
        CN=Microsoft Azure ECC TLS Issuing CA 05, O=Microsoft Corporation, C=USCN=DigiCert Global Root G3, OU=www.digicert.com, O=DigiCert Inc, C=USWed Aug 12 02:00:00 CEST 2020Fri Jun 28 01:59:59 CEST 2024

        Click to jump to process

        Click to jump to process

        Click to jump to process

        Target ID:0
        Start time:15:40:45
        Start date:18/04/2024
        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
        Imagebase:0x7ff678760000
        File size:3'242'272 bytes
        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        Target ID:2
        Start time:15:40:47
        Start date:18/04/2024
        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2484 --field-trial-handle=2440,i,5327510045856274522,13032898827891415465,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
        Imagebase:0x7ff678760000
        File size:3'242'272 bytes
        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        Target ID:3
        Start time:15:40:51
        Start date:18/04/2024
        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://recouvrement-assurancesfr/LKeZL"
        Imagebase:0x7ff678760000
        File size:3'242'272 bytes
        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        No disassembly