Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://www.google.com/url?q=https%3A%2F%2F52.xg4ken.com%2Fmedia%2Fredir.php%3Fprof%3D278%26camp%3D37380%26affcode%3Dkw160664%26cid%3D28061376556%26networkType%3Dsearch%26kdv%3Dc%26url%5B%5D%3Dhttps%253A%252F%252Fstandardwardbank.com%2Fpolicy%2F&sa=D&sntz=1&usg=AOvVaw3KzedoeC0zntt6DX7WAxNN

Overview

General Information

Sample URL:https://www.google.com/url?q=https%3A%2F%2F52.xg4ken.com%2Fmedia%2Fredir.php%3Fprof%3D278%26camp%3D37380%26affcode%3Dkw160664%26cid%3D28061376556%26networkType%3Dsearch%26kdv%3Dc%26url%5B%5D%3Dhttps%2
Analysis ID:1624189
Infos:

Detection

Score:64
Range:0 - 100
Confidence:100%

Signatures

AI detected phishing page
AI detected landing page (webpage, office document or email)
AI detected suspicious Javascript
AI detected suspicious URL
HTML page contains obfuscated onload event
Detected suspicious crossdomain redirect
HTML body contains low number of good links
HTML title does not match URL
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 2932 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6992 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=1984,i,188220168390454790,1020988708466126393,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6648 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.google.com/url?q=https%3A%2F%2F52.xg4ken.com%2Fmedia%2Fredir.php%3Fprof%3D278%26camp%3D37380%26affcode%3Dkw160664%26cid%3D28061376556%26networkType%3Dsearch%26kdv%3Dc%26url%5B%5D%3Dhttps%253A%252F%252Fstandardwardbank.com%2Fpolicy%2F&sa=D&sntz=1&usg=AOvVaw3KzedoeC0zntt6DX7WAxNN" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: https://standardwardbank.com/policy/Joe Sandbox AI: Score: 7 Reasons: The brand 'Microsoft' is well-known and typically associated with the domain 'microsoft.com'., The URL 'standardwardbank.com' does not match the legitimate domain for Microsoft., The URL does not contain any recognizable association with Microsoft, which is suspicious., The input field requests an Outlook email, which is a Microsoft service, but the domain does not match Microsoft's domain., The domain 'standardwardbank.com' could be attempting to impersonate a legitimate bank or service, adding to the suspicion. DOM: 2.1.pages.csv
Source: https://standardwardbank.com/policy/Joe Sandbox AI: Page contains button: 'Continue' Source: '2.1.pages.csv'
Source: 1.1.id.script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: https://standardwardbank.com/policy/... This script demonstrates several high-risk behaviors, including data exfiltration, obfuscated URLs, and the use of a forbidden email domain list. The script collects the user's email address, encodes it in base64, and then redirects the user to a suspicious, obfuscated URL with the encoded email as a query parameter. This behavior is highly suspicious and indicates a potential phishing or malicious activity.
Source: https://standardwardbank.comJoe Sandbox AI: The URL 'https://standardwardbank.com' closely resembles the legitimate URL 'https://standardbank.com'. The addition of 'ward' in the domain name is a minor structural change that could easily be overlooked by users, leading to potential confusion. The legitimate brand, Standard Bank, is a well-known financial institution, and the similarity score is high due to the minimal difference in the domain name. The likelihood of this being a typosquatting attempt is significant, as the added word 'ward' does not suggest a different legitimate purpose and could be intended to deceive users into thinking they are visiting the official Standard Bank website.
Source: https://www.google.com/url?q=https%3A%2F%2F52.xg4ken.com%2Fmedia%2Fredir.php%3Fprof%3D278%26camp%3D37380%26affcode%3Dkw160664%26cid%3D28061376556%26networkType%3Dsearch%26kdv%3Dc%26url%5B%5D%3Dhttps%253A%252F%252Fstandardwardbank.com%2Fpolicy%2F&sa=D&sntz=1&usg=AOvVaw3KzedoeC0zntt6DX7WAxNNHTTP Parser: <body onload="location.replace('https://52.xg4ken.com/media/redir.php?prof\x3d278\x26camp\x3d37380\x
Source: https://standardwardbank.com/policy/HTTP Parser: Number of links: 0
Source: https://standardwardbank.com/policy/HTTP Parser: Title: Authentication does not match URL
Source: https://standardwardbank.com/policy/HTTP Parser: No <meta name="author".. found
Source: https://standardwardbank.com/policy/HTTP Parser: No <meta name="copyright".. found
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\Chrome\Application\Dictionaries
Source: C:\Program Files\Google\Chrome\Application\chrome.exeHTTP traffic: Redirect from: old-mode-b95a-activityenergyrichh.corychase092.workers.dev to https://apoo.rbetqxxbc.ru/v94b/#aglab3v0bg9vay5jb20%3d
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 184.30.131.245
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 199.232.214.172
Source: unknownTCP traffic detected without corresponding DNS query: 199.232.214.172
Source: unknownTCP traffic detected without corresponding DNS query: 199.232.214.172
Source: unknownTCP traffic detected without corresponding DNS query: 199.232.214.172
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /url?q=https%3A%2F%2F52.xg4ken.com%2Fmedia%2Fredir.php%3Fprof%3D278%26camp%3D37380%26affcode%3Dkw160664%26cid%3D28061376556%26networkType%3Dsearch%26kdv%3Dc%26url%5B%5D%3Dhttps%253A%252F%252Fstandardwardbank.com%2Fpolicy%2F&sa=D&sntz=1&usg=AOvVaw3KzedoeC0zntt6DX7WAxNN HTTP/1.1Host: www.google.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CIu2yQEIprbJAQipncoBCLbgygEIkqHLAQj2mM0BCIWgzQEI3L3NAQiRys0BCLnKzQEIx9HNAQiJ080BCNzTzQEIy9bNAQj01s0BCIrXzQEIp9jNAQj5wNQVGLrSzQEYy9jNARjrjaUXSec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /media/redir.php?prof=278&camp=37380&affcode=kw160664&cid=28061376556&networkType=search&kdv=c&url[]=https%3A%2F%2Fstandardwardbank.com/policy/ HTTP/1.1Host: 52.xg4ken.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-Dest: documentReferer: https://www.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /policy/ HTTP/1.1Host: standardwardbank.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-Dest: documentsec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Referer: https://www.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /wikipedia/commons/d/df/Microsoft_Office_Outlook_%282018%E2%80%93present%29.svg HTTP/1.1Host: upload.wikimedia.orgConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://standardwardbank.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /wikipedia/commons/d/df/Microsoft_Office_Outlook_%282018%E2%80%93present%29.svg HTTP/1.1Host: upload.wikimedia.orgConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /?email=aGlAb3V0bG9vay5jb20%3D HTTP/1.1Host: old-mode-b95a-activityenergyrichh.corychase092.workers.devConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentReferer: https://standardwardbank.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: 52.xg4ken.com
Source: global trafficDNS traffic detected: DNS query: standardwardbank.com
Source: global trafficDNS traffic detected: DNS query: upload.wikimedia.org
Source: global trafficDNS traffic detected: DNS query: old-mode-b95a-activityenergyrichh.corychase092.workers.dev
Source: global trafficDNS traffic detected: DNS query: apoo.rbetqxxbc.ru
Source: global trafficDNS traffic detected: DNS query: google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 49992 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49998
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49996
Source: unknownNetwork traffic detected: HTTP traffic on port 49998 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49994
Source: unknownNetwork traffic detected: HTTP traffic on port 49996 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49993
Source: unknownNetwork traffic detected: HTTP traffic on port 49994 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49992
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49991
Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownNetwork traffic detected: HTTP traffic on port 49991 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49993 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
Source: classification engineClassification label: mal64.phis.win@29/6@46/151
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Program Files\Google\Chrome\Application\Dictionaries
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=1984,i,188220168390454790,1020988708466126393,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.google.com/url?q=https%3A%2F%2F52.xg4ken.com%2Fmedia%2Fredir.php%3Fprof%3D278%26camp%3D37380%26affcode%3Dkw160664%26cid%3D28061376556%26networkType%3Dsearch%26kdv%3Dc%26url%5B%5D%3Dhttps%253A%252F%252Fstandardwardbank.com%2Fpolicy%2F&sa=D&sntz=1&usg=AOvVaw3KzedoeC0zntt6DX7WAxNN"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=1984,i,188220168390454790,1020988708466126393,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\Chrome\Application\Dictionaries
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation3
Browser Extensions
1
Process Injection
3
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Registry Run Keys / Startup Folder
1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://www.google.com/url?q=https%3A%2F%2F52.xg4ken.com%2Fmedia%2Fredir.php%3Fprof%3D278%26camp%3D37380%26affcode%3Dkw160664%26cid%3D28061376556%26networkType%3Dsearch%26kdv%3Dc%26url%5B%5D%3Dhttps%253A%252F%252Fstandardwardbank.com%2Fpolicy%2F&sa=D&sntz=1&usg=AOvVaw3KzedoeC0zntt6DX7WAxNN0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://standardwardbank.com/policy/0%Avira URL Cloudsafe
https://52.xg4ken.com/media/redir.php?prof=278&camp=37380&affcode=kw160664&cid=28061376556&networkType=search&kdv=c&url[]=https%3A%2F%2Fstandardwardbank.com/policy/0%Avira URL Cloudsafe
https://upload.wikimedia.org/wikipedia/commons/d/df/Microsoft_Office_Outlook_%282018%E2%80%93present%29.svg0%Avira URL Cloudsafe
https://old-mode-b95a-activityenergyrichh.corychase092.workers.dev/?email=aGlAb3V0bG9vay5jb20%3D0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
google.com
142.250.185.110
truefalse
    high
    www.google.com
    172.217.16.196
    truefalse
      high
      external-euw1-kproxy-1-918085366.eu-west-1.elb.amazonaws.com
      54.246.136.93
      truefalse
        unknown
        upload.wikimedia.org
        185.15.59.240
        truefalse
          high
          standardwardbank.com
          162.215.15.12
          truetrue
            unknown
            old-mode-b95a-activityenergyrichh.corychase092.workers.dev
            188.114.96.3
            truefalse
              unknown
              52.xg4ken.com
              unknown
              unknowntrue
                unknown
                apoo.rbetqxxbc.ru
                unknown
                unknownfalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  https://old-mode-b95a-activityenergyrichh.corychase092.workers.dev/?email=aGlAb3V0bG9vay5jb20%3Dfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://52.xg4ken.com/media/redir.php?prof=278&camp=37380&affcode=kw160664&cid=28061376556&networkType=search&kdv=c&url[]=https%3A%2F%2Fstandardwardbank.com/policy/false
                  • Avira URL Cloud: safe
                  unknown
                  https://upload.wikimedia.org/wikipedia/commons/d/df/Microsoft_Office_Outlook_%282018%E2%80%93present%29.svgfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://standardwardbank.com/policy/true
                  • Avira URL Cloud: safe
                  unknown
                  https://www.google.com/url?q=https%3A%2F%2F52.xg4ken.com%2Fmedia%2Fredir.php%3Fprof%3D278%26camp%3D37380%26affcode%3Dkw160664%26cid%3D28061376556%26networkType%3Dsearch%26kdv%3Dc%26url%5B%5D%3Dhttps%253A%252F%252Fstandardwardbank.com%2Fpolicy%2F&sa=D&sntz=1&usg=AOvVaw3KzedoeC0zntt6DX7WAxNNtrue
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    1.1.1.1
                    unknownAustralia
                    13335CLOUDFLARENETUSfalse
                    162.215.15.12
                    standardwardbank.comUnited States
                    46606UNIFIEDLAYER-AS-1UStrue
                    54.246.136.93
                    external-euw1-kproxy-1-918085366.eu-west-1.elb.amazonaws.comUnited States
                    16509AMAZON-02USfalse
                    216.58.206.36
                    unknownUnited States
                    15169GOOGLEUSfalse
                    216.58.206.46
                    unknownUnited States
                    15169GOOGLEUSfalse
                    74.125.206.84
                    unknownUnited States
                    15169GOOGLEUSfalse
                    8.8.8.8
                    unknownUnited States
                    15169GOOGLEUSfalse
                    239.255.255.250
                    unknownReserved
                    unknownunknownfalse
                    142.250.185.163
                    unknownUnited States
                    15169GOOGLEUSfalse
                    185.15.59.240
                    upload.wikimedia.orgNetherlands
                    14907WIKIMEDIAUSfalse
                    142.250.185.142
                    unknownUnited States
                    15169GOOGLEUSfalse
                    188.114.96.3
                    old-mode-b95a-activityenergyrichh.corychase092.workers.devEuropean Union
                    13335CLOUDFLARENETUSfalse
                    172.217.16.196
                    www.google.comUnited States
                    15169GOOGLEUSfalse
                    142.250.186.42
                    unknownUnited States
                    15169GOOGLEUSfalse
                    172.217.16.195
                    unknownUnited States
                    15169GOOGLEUSfalse
                    IP
                    192.168.2.16
                    Joe Sandbox version:42.0.0 Malachite
                    Analysis ID:1624189
                    Start date and time:2025-02-25 23:18:14 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:defaultwindowsinteractivecookbook.jbs
                    Sample URL:https://www.google.com/url?q=https%3A%2F%2F52.xg4ken.com%2Fmedia%2Fredir.php%3Fprof%3D278%26camp%3D37380%26affcode%3Dkw160664%26cid%3D28061376556%26networkType%3Dsearch%26kdv%3Dc%26url%5B%5D%3Dhttps%253A%252F%252Fstandardwardbank.com%2Fpolicy%2F&sa=D&sntz=1&usg=AOvVaw3KzedoeC0zntt6DX7WAxNN
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:13
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • EGA enabled
                    Analysis Mode:stream
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal64.phis.win@29/6@46/151
                    • Exclude process from analysis (whitelisted): svchost.exe
                    • Excluded IPs from analysis (whitelisted): 142.250.185.163, 142.250.185.142, 74.125.206.84, 142.250.186.174
                    • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, redirector.gvt1.com, clientservices.googleapis.com, clients.l.google.com
                    • Not all processes where analyzed, report is missing behavior information
                    • VT rate limit hit for: https://www.google.com/url?q=https%3A%2F%2F52.xg4ken.com%2Fmedia%2Fredir.php%3Fprof%3D278%26camp%3D37380%26affcode%3Dkw160664%26cid%3D28061376556%26networkType%3Dsearch%26kdv%3Dc%26url%5B%5D%3Dhttps%253A%252F%252Fstandardwardbank.com%2Fpolicy%2F&sa=D&sntz=1&usg=AOvVaw3KzedoeC0zntt6DX7WAxNN
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Feb 25 21:18:47 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2673
                    Entropy (8bit):3.984737453602493
                    Encrypted:false
                    SSDEEP:
                    MD5:3EC67419F12F06B77837D253B25AE062
                    SHA1:7BAE345F1AF106886EB15F6FA62ABE6FF7BB580A
                    SHA-256:3B3283DF7D5BD7FACB2E536BE4330860101A3DDEFC406D28F9958ADDB611A219
                    SHA-512:E821743C5CB198425A45F0EB0A78B040B62D1307BF8070D443FE3ECA64BD2904F9F952CA0576DBA3A21D135BF9C0266F18F88B0372CEF2647A27A56677AB391B
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,......Q=...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IYZL.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VYZW.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VYZW.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VYZW............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VYZX............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............O.u.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Feb 25 21:18:47 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2675
                    Entropy (8bit):3.999020099964841
                    Encrypted:false
                    SSDEEP:
                    MD5:DB9CB2FB503B35E709521983057D9A0D
                    SHA1:51196CF3634639AEC2230A64CFEFFEDB660ADC95
                    SHA-256:C85A21EA983587C6E2AE2BF83E7C9F35863BF3ACB5675916E4F9D385506C0614
                    SHA-512:880DCCBA76F5FB392D086D88CB1F61F62E7CDB63E16C7C7D5CCB40D06258F64579912700B0021740B4E2262F0DB268389DB358C925D5893A8E3E09AA66B3774A
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,....'.F=...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IYZL.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VYZW.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VYZW.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VYZW............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VYZX............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............O.u.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2689
                    Entropy (8bit):4.006643622309698
                    Encrypted:false
                    SSDEEP:
                    MD5:E63451139DBF2D24296F0DE933DAE832
                    SHA1:EE897CB81B83E496396730779BF106AD80C14CC9
                    SHA-256:384552538F414BD144ED08E278E3BC8E01E873DE359601A4D1FC84FB9C477907
                    SHA-512:170ED798079FED89F57C74ED3A5EA8556FA73C1156A31D96B738FAE6F20C36C1F20F7F54262704D60A27135DB2370831B9AE62B3AF32D73412FDE998534F2438
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IYZL.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VYZW.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VYZW.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VYZW............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............O.u.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Feb 25 21:18:47 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2677
                    Entropy (8bit):3.9946827694862743
                    Encrypted:false
                    SSDEEP:
                    MD5:2489DEEF186BE32859A81F9E3650D75E
                    SHA1:BFB09D55F33049F6B9BED6F302346AFCBB3A4EA6
                    SHA-256:1F5603B085982E0B560842FF7545A07F8CA46B3008776952FFE32782F134CA0E
                    SHA-512:CF87AC0E908DE8D1B835ECAFD81F2B217BEE61FCB7FC4AB00ABB8F958709C0A658182F0AA096E033A1B6BC92AF8919BE9B533FBE154FA6E8D62048BB158D29B8
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,......A=...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IYZL.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VYZW.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VYZW.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VYZW............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VYZX............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............O.u.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Feb 25 21:18:47 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2677
                    Entropy (8bit):3.986349631697388
                    Encrypted:false
                    SSDEEP:
                    MD5:8F98A04E9AA3F7587DCF6107192BD09E
                    SHA1:C600FE029FEF130A85A06C7CE6A5BC292A2EE6DA
                    SHA-256:DFFBB622E56A4A3D6C7569F0D9F4F4B78A054E7DF7304ADAD17F7C7D0044111A
                    SHA-512:C6443183F268257D47DE9ABCEE43B359FA58640A5316F1C013B5D31D24BBA1B8D76EAAEC18D16CA6071B9E6F7658F148389A225096A316DE4510F8EB1E44BA3E
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,......L=...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IYZL.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VYZW.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VYZW.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VYZW............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VYZX............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............O.u.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Feb 25 21:18:47 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2679
                    Entropy (8bit):3.9912476533448267
                    Encrypted:false
                    SSDEEP:
                    MD5:8462C84B8DB6613065B8025E039A8A3D
                    SHA1:1342C21F552F0A12DEBED45429CA2D7018C1DEC9
                    SHA-256:501341C5393D6626C0690ADD8B7B6726E5E5C472322DE6CD6BE9454B3F0509F6
                    SHA-512:9E4914B87BE2643E91DA3B5A5191E9FFA429CFE83C7BEE15EB6E7AAE90C2AD8A5BE96ACFF49F0457C91632C7DB18BA6ACB30BA20F4021C18591AEB5BAC2EC7BE
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,....e09=...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IYZL.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VYZW.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VYZW.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VYZW............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VYZX............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............O.u.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    No static file info