Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
http://Harmonie-mutuelle.q1-2024-fund-ii-statements-and-financial-reports.syneloboost.com#Y2xhdWRpZS5qYW91ZW5AaGFybW9uaWUtbXV0dWVsbGUuZnI=

Overview

General Information

Sample URL:http://Harmonie-mutuelle.q1-2024-fund-ii-statements-and-financial-reports.syneloboost.com#Y2xhdWRpZS5qYW91ZW5AaGFybW9uaWUtbXV0dWVsbGUuZnI=
Analysis ID:1431741

Detection

Score:22
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

HTML page contains suspicious base64 encoded javascript
HTML body contains low number of good links
HTML page contains hidden URLs or javascript code
HTML title does not match URL
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 7060 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://harmonie-mutuelle.q1-2024-fund-ii-statements-and-financial-reports.syneloboost.com/#Y2xhdWRpZS5qYW91ZW5AaGFybW9uaWUtbXV0dWVsbGUuZnI= MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6224 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1928,i,1462666322963492499,12443730653272204474,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: https://xljyqwlw.naqypqdi5u.su/?e=Y2xhdWRpZS5qYW91ZW5AaGFybW9uaWUtbXV0dWVsbGUuZnI=HTTP Parser: Base64 decoded: <script>
Source: https://xljyqwlw.naqypqdi5u.su/?e=Y2xhdWRpZS5qYW91ZW5AaGFybW9uaWUtbXV0dWVsbGUuZnI=HTTP Parser: Base64 decoded: <script>
Source: https://xljyqwlw.naqypqdi5u.su/VqHrEpInuFowSA/WZIvlHyOPMRrtxgs/HTTP Parser: Base64 decoded: <script>
Source: https://xljyqwlw.naqypqdi5u.su/SV/MCRS/?view=DINCASPMTFQYOVZJHWEBULmLhnpoBbNMAJfcPjdIivelwHFzyOXZraGEkRsQUDCtVSgqTxuKYWmsAHTXNgkLhOYWxefqMGQrwKZIBVdCuioRvlPJbntSDyc&load=hynfbFEvraStRUOwCWd&load=YlQxtImUvgLkPfoHTTP Parser: Number of links: 0
Source: https://xljyqwlw.naqypqdi5u.su/?e=Y2xhdWRpZS5qYW91ZW5AaGFybW9uaWUtbXV0dWVsbGUuZnI=HTTP Parser: Base64 decoded: <script>function createCustomHtmlStructure(){var _=document.createElement("style");_.innerHTML=`.mFPHKLuiknVbZaS { position: relative; width: 300px; height: 65px; }.SXWPQFBZIKCTHANEL { position: absolute; top: 0; left: 0; ...
Source: https://xljyqwlw.naqypqdi5u.su/SV/MCRS/?view=DINCASPMTFQYOVZJHWEBULmLhnpoBbNMAJfcPjdIivelwHFzyOXZraGEkRsQUDCtVSgqTxuKYWmsAHTXNgkLhOYWxefqMGQrwKZIBVdCuioRvlPJbntSDyc&load=hynfbFEvraStRUOwCWd&load=YlQxtImUvgLkPfoHTTP Parser: Title: Sgn in to your ccont does not match URL
Source: https://xljyqwlw.naqypqdi5u.su/?e=Y2xhdWRpZS5qYW91ZW5AaGFybW9uaWUtbXV0dWVsbGUuZnI=HTTP Parser: No favicon
Source: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/eiyp3/0x4AAAAAAAXu6AgWruVoDj5b/light/normalHTTP Parser: No favicon
Source: https://xljyqwlw.naqypqdi5u.su/?e=Y2xhdWRpZS5qYW91ZW5AaGFybW9uaWUtbXV0dWVsbGUuZnI=HTTP Parser: No favicon
Source: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/eiyp3/0x4AAAAAAAXu6AgWruVoDj5b/light/normalHTTP Parser: No favicon
Source: https://xljyqwlw.naqypqdi5u.su/VqHrEpInuFowSA/WZIvlHyOPMRrtxgs/HTTP Parser: No favicon
Source: https://xljyqwlw.naqypqdi5u.su/SV/MCRS/?view=DINCASPMTFQYOVZJHWEBULmLhnpoBbNMAJfcPjdIivelwHFzyOXZraGEkRsQUDCtVSgqTxuKYWmsAHTXNgkLhOYWxefqMGQrwKZIBVdCuioRvlPJbntSDyc&load=hynfbFEvraStRUOwCWd&load=YlQxtImUvgLkPfoHTTP Parser: No <meta name="author".. found
Source: https://xljyqwlw.naqypqdi5u.su/SV/MCRS/?view=DINCASPMTFQYOVZJHWEBULmLhnpoBbNMAJfcPjdIivelwHFzyOXZraGEkRsQUDCtVSgqTxuKYWmsAHTXNgkLhOYWxefqMGQrwKZIBVdCuioRvlPJbntSDyc&load=hynfbFEvraStRUOwCWd&load=YlQxtImUvgLkPfoHTTP Parser: No <meta name="author".. found
Source: https://xljyqwlw.naqypqdi5u.su/SV/MCRS/?view=DINCASPMTFQYOVZJHWEBULmLhnpoBbNMAJfcPjdIivelwHFzyOXZraGEkRsQUDCtVSgqTxuKYWmsAHTXNgkLhOYWxefqMGQrwKZIBVdCuioRvlPJbntSDyc&load=hynfbFEvraStRUOwCWd&load=YlQxtImUvgLkPfoHTTP Parser: No <meta name="author".. found
Source: https://xljyqwlw.naqypqdi5u.su/SV/MCRS/?view=DINCASPMTFQYOVZJHWEBULmLhnpoBbNMAJfcPjdIivelwHFzyOXZraGEkRsQUDCtVSgqTxuKYWmsAHTXNgkLhOYWxefqMGQrwKZIBVdCuioRvlPJbntSDyc&load=hynfbFEvraStRUOwCWd&load=YlQxtImUvgLkPfoHTTP Parser: No <meta name="copyright".. found
Source: https://xljyqwlw.naqypqdi5u.su/SV/MCRS/?view=DINCASPMTFQYOVZJHWEBULmLhnpoBbNMAJfcPjdIivelwHFzyOXZraGEkRsQUDCtVSgqTxuKYWmsAHTXNgkLhOYWxefqMGQrwKZIBVdCuioRvlPJbntSDyc&load=hynfbFEvraStRUOwCWd&load=YlQxtImUvgLkPfoHTTP Parser: No <meta name="copyright".. found
Source: https://xljyqwlw.naqypqdi5u.su/SV/MCRS/?view=DINCASPMTFQYOVZJHWEBULmLhnpoBbNMAJfcPjdIivelwHFzyOXZraGEkRsQUDCtVSgqTxuKYWmsAHTXNgkLhOYWxefqMGQrwKZIBVdCuioRvlPJbntSDyc&load=hynfbFEvraStRUOwCWd&load=YlQxtImUvgLkPfoHTTP Parser: No <meta name="copyright".. found
Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.16:49738 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.220.189.216:443 -> 192.168.2.16:49741 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.220.189.216:443 -> 192.168.2.16:49745 version: TLS 1.2
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: unknownTCP traffic detected without corresponding DNS query: 23.220.189.216
Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKConnection: Keep-AliveKeep-Alive: timeout=5, max=100content-type: text/html; charset=UTF-8content-length: 222content-encoding: gzipvary: Accept-Encodingdate: Thu, 25 Apr 2024 15:37:05 GMTData Raw: 1f 8b 08 00 00 00 00 00 00 03 35 90 3d 6f 02 31 0c 86 77 24 fe 83 15 06 40 ad 12 75 60 81 70 55 f7 0e 15 12 62 a8 2a 64 71 a6 09 4a 73 39 e2 e3 b8 7f 8f d3 13 9e fc f1 ea f1 6b 5b c7 7f a1 82 e9 c4 3a c2 ba 24 20 61 d9 73 a0 ea a3 63 47 91 fd 09 d9 c7 5f d0 12 f0 15 08 33 c1 01 3d 97 d2 9a 51 5a 08 f9 74 f5 89 81 87 44 5b c5 74 67 73 c1 1b 8e 5d 55 8d e4 1b 5e c1 61 76 b0 85 de c7 ba e9 75 68 0a be 89 ba b4 37 a2 2a 92 fd ee 53 14 a0 1c 73 ca 6b 63 ee e1 32 b4 7d e8 75 c4 76 48 6d ed 57 9d ce dd bb ec 81 97 7f 9e ce 29 78 5e cc 67 f3 e5 f7 db 4f c1 3c f9 4d a2 b8 10 de 2b a8 63 a6 70 56 4b 19 5a 33 da 12 57 62 dc 3c 6f 97 ac bc e3 01 fc 93 e5 4e 15 01 00 00 Data Ascii: 5=o1w$@u`pUb*dqJs9k[:$ ascG_3=QZtD[tgs]U^avuh7*Sskc2}uvHmW)x^gO<M+cpVKZ3Wb<oN
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: harmonie-mutuelle.q1-2024-fund-ii-statements-and-financial-reports.syneloboost.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficDNS traffic detected: DNS query: harmonie-mutuelle.q1-2024-fund-ii-statements-and-financial-reports.syneloboost.com
Source: global trafficDNS traffic detected: DNS query: xljyqwlw.naqypqdi5u.su
Source: global trafficDNS traffic detected: DNS query: challenges.cloudflare.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: a.nel.cloudflare.com
Source: global trafficDNS traffic detected: DNS query: aadcdn.msauthimages.net
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.16:49738 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.220.189.216:443 -> 192.168.2.16:49741 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.220.189.216:443 -> 192.168.2.16:49745 version: TLS 1.2
Source: classification engineClassification label: sus22.phis.win@16/6@20/46
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://harmonie-mutuelle.q1-2024-fund-ii-statements-and-financial-reports.syneloboost.com/#Y2xhdWRpZS5qYW91ZW5AaGFybW9uaWUtbXV0dWVsbGUuZnI=
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1928,i,1462666322963492499,12443730653272204474,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1928,i,1462666322963492499,12443730653272204474,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media3
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive4
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
Ingress Tool Transfer
Traffic DuplicationData Destruction

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
http://Harmonie-mutuelle.q1-2024-fund-ii-statements-and-financial-reports.syneloboost.com#Y2xhdWRpZS5qYW91ZW5AaGFybW9uaWUtbXV0dWVsbGUuZnI=0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://harmonie-mutuelle.q1-2024-fund-ii-statements-and-financial-reports.syneloboost.com/0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
harmonie-mutuelle.q1-2024-fund-ii-statements-and-financial-reports.syneloboost.com
45.152.243.94
truefalse
    unknown
    xljyqwlw.naqypqdi5u.su
    104.21.49.102
    truefalse
      unknown
      a.nel.cloudflare.com
      35.190.80.1
      truefalse
        high
        sni1gl.wpc.upsiloncdn.net
        152.195.19.97
        truefalse
          unknown
          challenges.cloudflare.com
          104.17.2.184
          truefalse
            high
            www.google.com
            142.250.9.104
            truefalse
              high
              aadcdn.msauthimages.net
              unknown
              unknownfalse
                unknown
                NameMaliciousAntivirus DetectionReputation
                https://xljyqwlw.naqypqdi5u.su/?e=Y2xhdWRpZS5qYW91ZW5AaGFybW9uaWUtbXV0dWVsbGUuZnI=true
                  unknown
                  https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/eiyp3/0x4AAAAAAAXu6AgWruVoDj5b/light/normalfalse
                    high
                    https://xljyqwlw.naqypqdi5u.su/SV/MCRS/?view=DINCASPMTFQYOVZJHWEBULmLhnpoBbNMAJfcPjdIivelwHFzyOXZraGEkRsQUDCtVSgqTxuKYWmsAHTXNgkLhOYWxefqMGQrwKZIBVdCuioRvlPJbntSDyc&load=hynfbFEvraStRUOwCWd&load=YlQxtImUvgLkPfofalse
                      unknown
                      http://harmonie-mutuelle.q1-2024-fund-ii-statements-and-financial-reports.syneloboost.com/false
                      • Avira URL Cloud: safe
                      unknown
                      https://xljyqwlw.naqypqdi5u.su/VqHrEpInuFowSA/WZIvlHyOPMRrtxgs/true
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        1.1.1.1
                        unknownAustralia
                        13335CLOUDFLARENETUSfalse
                        172.67.161.159
                        unknownUnited States
                        13335CLOUDFLARENETUSfalse
                        142.250.9.104
                        www.google.comUnited States
                        15169GOOGLEUSfalse
                        152.195.19.97
                        sni1gl.wpc.upsiloncdn.netUnited States
                        15133EDGECASTUSfalse
                        172.253.124.113
                        unknownUnited States
                        15169GOOGLEUSfalse
                        45.152.243.94
                        harmonie-mutuelle.q1-2024-fund-ii-statements-and-financial-reports.syneloboost.comLithuania
                        62240CLOUVIDERClouvider-GlobalASNGBfalse
                        239.255.255.250
                        unknownReserved
                        unknownunknownfalse
                        104.21.49.102
                        xljyqwlw.naqypqdi5u.suUnited States
                        13335CLOUDFLARENETUSfalse
                        64.233.185.94
                        unknownUnited States
                        15169GOOGLEUSfalse
                        142.251.15.84
                        unknownUnited States
                        15169GOOGLEUSfalse
                        35.190.80.1
                        a.nel.cloudflare.comUnited States
                        15169GOOGLEUSfalse
                        108.177.122.95
                        unknownUnited States
                        15169GOOGLEUSfalse
                        104.17.2.184
                        challenges.cloudflare.comUnited States
                        13335CLOUDFLARENETUSfalse
                        IP
                        192.168.2.16
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1431741
                        Start date and time:2024-04-25 17:36:37 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:defaultwindowsinteractivecookbook.jbs
                        Sample URL:http://Harmonie-mutuelle.q1-2024-fund-ii-statements-and-financial-reports.syneloboost.com#Y2xhdWRpZS5qYW91ZW5AaGFybW9uaWUtbXV0dWVsbGUuZnI=
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:12
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • EGA enabled
                        Analysis Mode:stream
                        Analysis stop reason:Timeout
                        Detection:SUS
                        Classification:sus22.phis.win@16/6@20/46
                        • Exclude process from analysis (whitelisted): svchost.exe
                        • Excluded IPs from analysis (whitelisted): 64.233.185.94, 142.251.15.84, 172.253.124.113, 172.253.124.102, 172.253.124.100, 172.253.124.101, 172.253.124.139, 172.253.124.138, 34.104.35.123
                        • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, edgedl.me.gvt1.com, clientservices.googleapis.com, clients.l.google.com
                        • Not all processes where analyzed, report is missing behavior information
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 14:37:06 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2673
                        Entropy (8bit):3.9899430277636934
                        Encrypted:false
                        SSDEEP:
                        MD5:ADDB3AB34F7042CD2CA4A042FF8420CE
                        SHA1:6B6D671B6EA19221E995B7EF8C1CEFFB56490D07
                        SHA-256:373E156D687234F42230E78A452E644D051B83A64431426B449856B688859797
                        SHA-512:4991EF95896ACA8ED83CD276DF7E35D67E873EF095A06EA37DF99778B56C0C2B904772893A39FE04B545B3AF7312EE4A96114FC4A325A73685F625D06E785526
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,....aA.m&...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.|....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.|....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.|....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.|..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.|...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 14:37:06 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2675
                        Entropy (8bit):4.007172568565925
                        Encrypted:false
                        SSDEEP:
                        MD5:71E8EEF611BEBA87D7E5C2328E7C2769
                        SHA1:3FA372975E7CB8D110E6D704A6DCB21AFA7863DA
                        SHA-256:8FA2D29A7134EEC473615213808E5F52603305773DD25E1C130549E461BC711D
                        SHA-512:20A2ACE1BC5E8DCC0108EE679814A07AEE108CE0C4B22985926FD89A78A7ABE4FD5D3F1C97CBC2A76C9911073E99851DBF1D74B589A421957F75D40F9C17617B
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,......sm&...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.|....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.|....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.|....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.|..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.|...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2689
                        Entropy (8bit):4.016506747793069
                        Encrypted:false
                        SSDEEP:
                        MD5:26828CE337BB2413BD31B6F489C6B9E5
                        SHA1:2A7555794CAABFC9CF60CCE3B3D2B37802345C54
                        SHA-256:51D4140CE62A9B60D052751BCCD3A3155CBAEE9FEAA6D669FA09D3FF92A1990F
                        SHA-512:8B5ECA082DEA5A6E228EF96F3A4AD13E538466A7BB56E2027D8375E45F460D485300D62DF2700F69405765D66A7194B5ABC3ACF821517545CFAA88C832FA65AE
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.|....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.|....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.|....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.|..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 14:37:06 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2677
                        Entropy (8bit):4.003554064022857
                        Encrypted:false
                        SSDEEP:
                        MD5:C6C2FD2EF1FB4C89EDE2F26950ED30AB
                        SHA1:7332838E8CA8129D07FCF74EAEA995BE8582735D
                        SHA-256:19FBAF4DF01BD89D40C14AD780D8242A918ABA674B9518085D329CDEB885770C
                        SHA-512:CB638EB13FA71FE5B1207ECF18DDC34D329A457CC18B303BF3B55F1FFE4E2F8E8846B0FEEE27C8F5A08ED7DD9688AAAE56D27369536070EC4711C8B2C18F46CC
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,....P.nm&...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.|....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.|....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.|....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.|..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.|...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 14:37:06 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2677
                        Entropy (8bit):3.9949544326308066
                        Encrypted:false
                        SSDEEP:
                        MD5:804CAE7E9BB29B826F7073A8154E8DF1
                        SHA1:6ED4683DD94EBBC3B6412F5EF05B652A0AA7EC29
                        SHA-256:6CBCC12A44174C25715209AC10CEEC7A86CC3CB856BFC5645761A966DC764AC5
                        SHA-512:44BEF6AFD07E5CFF20D535C61E293F60D42A0EFB9C4D531A863B98E10F08E9ED2A293042C4A9348352A28B317D4CE71A7A80BE0BD4A2AB610B98B714CFC8B822
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,......ym&...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.|....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.|....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.|....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.|..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.|...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 14:37:06 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2679
                        Entropy (8bit):4.003477916786025
                        Encrypted:false
                        SSDEEP:
                        MD5:CD22B9C298CFFAC5E684C6F6FAF8A533
                        SHA1:934D794BE100B9D854177DA28E1EF6ECC791A5C3
                        SHA-256:99C97DFA1EDB270EE3A537C45C469EB8A8E2D5E768F6C5A71C3A47405D00C142
                        SHA-512:D221CC3CECF38E23E1531F8DE27220B78F6B42BDBF68BCC01FA68C1D9647F7EC7EC4CDA9348F985B1DC62BA9206434718BFAF7D9C43EE45C38EFDF2D1F023D56
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,......dm&...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.|....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.|....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.|....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.|..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.|...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        No static file info