Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://railrent.pexrayitech.com/

Overview

General Information

Sample URL:https://railrent.pexrayitech.com/
Analysis ID:1633587
Infos:

Detection

HTMLPhisher
Score:60
Range:0 - 100
Confidence:100%

Signatures

AI detected phishing page
Yara detected HtmlPhish77
HTML page contains obfuscated javascript
Creates files inside the system directory
Deletes files inside the Windows folder
HTML body contains low number of good links
HTML body contains password input but no form action
HTML body with high number of embedded images detected
HTML title does not match URL
Invalid 'forgot password' link found
Invalid T&C link found

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 6904 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: E81F54E6C1129887AEA47E7D092680BF)
    • chrome.exe (PID: 7096 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1952,i,2781325685772639910,18418971442839582622,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2212 /prefetch:3 MD5: E81F54E6C1129887AEA47E7D092680BF)
  • chrome.exe (PID: 2340 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://railrent.pexrayitech.com/" MD5: E81F54E6C1129887AEA47E7D092680BF)
  • cleanup
SourceRuleDescriptionAuthorStrings
2.8.pages.csvJoeSecurity_HtmlPhish_77Yara detected HtmlPhish_77Joe Security
    2.9.pages.csvJoeSecurity_HtmlPhish_77Yara detected HtmlPhish_77Joe Security
      2.7.pages.csvJoeSecurity_HtmlPhish_77Yara detected HtmlPhish_77Joe Security
        No Sigma rule has matched
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        Phishing

        barindex
        Source: https://railrent.pexrayitech.com/01uSZbr4fxIHOvaI1vs1nMkQGKBWGW2NKDRAzBy5y5NdF50qqU0DZXIVdYeICcwuk9snFEJSzJfizQxUd1XFIWRNLE7leOefE7gcYJHt3FUGSiiPPpVWeYXAadJ6zwPqU1jML4oCWraHHOnpfZMljH/indexJoe Sandbox AI: Score: 9 Reasons: The brand 'Microsoft' is classified as 'wellknown'., The URL 'railrent.pexrayitech.com' does not match the legitimate domain 'microsoft.com'., The domain 'pexrayitech.com' is not associated with Microsoft., The presence of a subdomain 'railrent' and the main domain 'pexrayitech.com' suggests a third-party site, which is suspicious., The input fields 'Email, phone, or Skype' are commonly used in phishing attempts targeting Microsoft accounts. DOM: 2.7.pages.csv
        Source: https://railrent.pexrayitech.com/01uSZbr4fxIHOvaI1vs1nMkQGKBWGW2NKDRAzBy5y5NdF50qqU0DZXIVdYeICcwuk9snFEJSzJfizQxUd1XFIWRNLE7leOefE7gcYJHt3FUGSiiPPpVWeYXAadJ6zwPqU1jML4oCWraHHOnpfZMljH/indexJoe Sandbox AI: Score: 9 Reasons: The brand 'Microsoft' is well-known and typically associated with the domain 'microsoft.com'., The URL 'railrent.pexrayitech.com' does not match the legitimate domain 'microsoft.com'., The domain 'pexrayitech.com' does not have any known association with Microsoft., The presence of input fields for 'Email, phone, or Skype' is typical for Microsoft services, but the domain mismatch is suspicious., The use of a subdomain 'railrent' and the main domain 'pexrayitech.com' suggests a potential phishing attempt, as it does not align with Microsoft's typical domain structure. DOM: 2.8.pages.csv
        Source: Yara matchFile source: 2.8.pages.csv, type: HTML
        Source: Yara matchFile source: 2.9.pages.csv, type: HTML
        Source: Yara matchFile source: 2.7.pages.csv, type: HTML
        Source: https://railrent.pexrayitech.com/01uSZbr4fxIHOvaI1vs1nMkQGKBWGW2NKDRAzBy5y5NdF50qqU0DZXIVdYeICcwuk9snFEJSzJfizQxUd1XFIWRNLE7leOefE7gcYJHt3FUGSiiPPpVWeYXAadJ6zwPqU1jML4oCWraHHOnpfZMljH/indexHTTP Parser: var captchaChecked = false; if (captchaChecked) { fullz = "Y2FwdGNoYQ=
        Source: https://railrent.pexrayitech.com/C9dRL0sdRAP50gP5F0ff2rDIlktm6T75Akqu1v32LRBq3UG3v6KOj0Dhy69E9zkTpIppPpuyY1jMDSpmYlCbxzCk5AEOnTdsjNnM6mA1AoxmFrjM4qNnzgHtLYrLzHeSXviQZRj9ySLaWGkJGhDerb/indexHTTP Parser: var captchaChecked = false; if (captchaChecked) { fullz = "Y2FwdGNoYQ=
        Source: https://railrent.pexrayitech.com/01uSZbr4fxIHOvaI1vs1nMkQGKBWGW2NKDRAzBy5y5NdF50qqU0DZXIVdYeICcwuk9snFEJSzJfizQxUd1XFIWRNLE7leOefE7gcYJHt3FUGSiiPPpVWeYXAadJ6zwPqU1jML4oCWraHHOnpfZMljH/indexHTTP Parser: Number of links: 0
        Source: https://railrent.pexrayitech.com/01uSZbr4fxIHOvaI1vs1nMkQGKBWGW2NKDRAzBy5y5NdF50qqU0DZXIVdYeICcwuk9snFEJSzJfizQxUd1XFIWRNLE7leOefE7gcYJHt3FUGSiiPPpVWeYXAadJ6zwPqU1jML4oCWraHHOnpfZMljH/indexHTTP Parser: <input type="password" .../> found but no <form action="...
        Source: https://railrent.pexrayitech.com/01uSZbr4fxIHOvaI1vs1nMkQGKBWGW2NKDRAzBy5y5NdF50qqU0DZXIVdYeICcwuk9snFEJSzJfizQxUd1XFIWRNLE7leOefE7gcYJHt3FUGSiiPPpVWeYXAadJ6zwPqU1jML4oCWraHHOnpfZMljH/indexHTTP Parser: Total embedded image size: 24704
        Source: https://railrent.pexrayitech.com/01uSZbr4fxIHOvaI1vs1nMkQGKBWGW2NKDRAzBy5y5NdF50qqU0DZXIVdYeICcwuk9snFEJSzJfizQxUd1XFIWRNLE7leOefE7gcYJHt3FUGSiiPPpVWeYXAadJ6zwPqU1jML4oCWraHHOnpfZMljH/indexHTTP Parser: Title: Verify your credentials does not match URL
        Source: https://railrent.pexrayitech.com/01uSZbr4fxIHOvaI1vs1nMkQGKBWGW2NKDRAzBy5y5NdF50qqU0DZXIVdYeICcwuk9snFEJSzJfizQxUd1XFIWRNLE7leOefE7gcYJHt3FUGSiiPPpVWeYXAadJ6zwPqU1jML4oCWraHHOnpfZMljH/indexHTTP Parser: Invalid link: Forgot password?
        Source: https://railrent.pexrayitech.com/01uSZbr4fxIHOvaI1vs1nMkQGKBWGW2NKDRAzBy5y5NdF50qqU0DZXIVdYeICcwuk9snFEJSzJfizQxUd1XFIWRNLE7leOefE7gcYJHt3FUGSiiPPpVWeYXAadJ6zwPqU1jML4oCWraHHOnpfZMljH/indexHTTP Parser: Invalid link: Terms of use
        Source: https://railrent.pexrayitech.com/01uSZbr4fxIHOvaI1vs1nMkQGKBWGW2NKDRAzBy5y5NdF50qqU0DZXIVdYeICcwuk9snFEJSzJfizQxUd1XFIWRNLE7leOefE7gcYJHt3FUGSiiPPpVWeYXAadJ6zwPqU1jML4oCWraHHOnpfZMljH/indexHTTP Parser: Invalid link: Privacy & cookies
        Source: https://railrent.pexrayitech.com/01uSZbr4fxIHOvaI1vs1nMkQGKBWGW2NKDRAzBy5y5NdF50qqU0DZXIVdYeICcwuk9snFEJSzJfizQxUd1XFIWRNLE7leOefE7gcYJHt3FUGSiiPPpVWeYXAadJ6zwPqU1jML4oCWraHHOnpfZMljH/indexHTTP Parser: Invalid link: Terms of use
        Source: https://railrent.pexrayitech.com/01uSZbr4fxIHOvaI1vs1nMkQGKBWGW2NKDRAzBy5y5NdF50qqU0DZXIVdYeICcwuk9snFEJSzJfizQxUd1XFIWRNLE7leOefE7gcYJHt3FUGSiiPPpVWeYXAadJ6zwPqU1jML4oCWraHHOnpfZMljH/indexHTTP Parser: Invalid link: Privacy & cookies
        Source: https://railrent.pexrayitech.com/01uSZbr4fxIHOvaI1vs1nMkQGKBWGW2NKDRAzBy5y5NdF50qqU0DZXIVdYeICcwuk9snFEJSzJfizQxUd1XFIWRNLE7leOefE7gcYJHt3FUGSiiPPpVWeYXAadJ6zwPqU1jML4oCWraHHOnpfZMljH/indexHTTP Parser: Invalid link: Terms of use
        Source: https://railrent.pexrayitech.com/01uSZbr4fxIHOvaI1vs1nMkQGKBWGW2NKDRAzBy5y5NdF50qqU0DZXIVdYeICcwuk9snFEJSzJfizQxUd1XFIWRNLE7leOefE7gcYJHt3FUGSiiPPpVWeYXAadJ6zwPqU1jML4oCWraHHOnpfZMljH/indexHTTP Parser: Invalid link: Privacy & cookies
        Source: https://railrent.pexrayitech.com/01uSZbr4fxIHOvaI1vs1nMkQGKBWGW2NKDRAzBy5y5NdF50qqU0DZXIVdYeICcwuk9snFEJSzJfizQxUd1XFIWRNLE7leOefE7gcYJHt3FUGSiiPPpVWeYXAadJ6zwPqU1jML4oCWraHHOnpfZMljH/indexHTTP Parser: <input type="password" .../> found
        Source: https://railrent.pexrayitech.com/HTTP Parser: No favicon
        Source: https://railrent.pexrayitech.com/01uSZbr4fxIHOvaI1vs1nMkQGKBWGW2NKDRAzBy5y5NdF50qqU0DZXIVdYeICcwuk9snFEJSzJfizQxUd1XFIWRNLE7leOefE7gcYJHt3FUGSiiPPpVWeYXAadJ6zwPqU1jML4oCWraHHOnpfZMljH/indexHTTP Parser: No favicon
        Source: https://railrent.pexrayitech.com/01uSZbr4fxIHOvaI1vs1nMkQGKBWGW2NKDRAzBy5y5NdF50qqU0DZXIVdYeICcwuk9snFEJSzJfizQxUd1XFIWRNLE7leOefE7gcYJHt3FUGSiiPPpVWeYXAadJ6zwPqU1jML4oCWraHHOnpfZMljH/indexHTTP Parser: No favicon
        Source: https://railrent.pexrayitech.com/01uSZbr4fxIHOvaI1vs1nMkQGKBWGW2NKDRAzBy5y5NdF50qqU0DZXIVdYeICcwuk9snFEJSzJfizQxUd1XFIWRNLE7leOefE7gcYJHt3FUGSiiPPpVWeYXAadJ6zwPqU1jML4oCWraHHOnpfZMljH/indexHTTP Parser: No favicon
        Source: https://railrent.pexrayitech.com/01uSZbr4fxIHOvaI1vs1nMkQGKBWGW2NKDRAzBy5y5NdF50qqU0DZXIVdYeICcwuk9snFEJSzJfizQxUd1XFIWRNLE7leOefE7gcYJHt3FUGSiiPPpVWeYXAadJ6zwPqU1jML4oCWraHHOnpfZMljH/indexHTTP Parser: No favicon
        Source: https://railrent.pexrayitech.com/01uSZbr4fxIHOvaI1vs1nMkQGKBWGW2NKDRAzBy5y5NdF50qqU0DZXIVdYeICcwuk9snFEJSzJfizQxUd1XFIWRNLE7leOefE7gcYJHt3FUGSiiPPpVWeYXAadJ6zwPqU1jML4oCWraHHOnpfZMljH/indexHTTP Parser: No favicon
        Source: https://railrent.pexrayitech.com/01uSZbr4fxIHOvaI1vs1nMkQGKBWGW2NKDRAzBy5y5NdF50qqU0DZXIVdYeICcwuk9snFEJSzJfizQxUd1XFIWRNLE7leOefE7gcYJHt3FUGSiiPPpVWeYXAadJ6zwPqU1jML4oCWraHHOnpfZMljH/indexHTTP Parser: No <meta name="author".. found
        Source: https://railrent.pexrayitech.com/01uSZbr4fxIHOvaI1vs1nMkQGKBWGW2NKDRAzBy5y5NdF50qqU0DZXIVdYeICcwuk9snFEJSzJfizQxUd1XFIWRNLE7leOefE7gcYJHt3FUGSiiPPpVWeYXAadJ6zwPqU1jML4oCWraHHOnpfZMljH/indexHTTP Parser: No <meta name="author".. found
        Source: https://railrent.pexrayitech.com/01uSZbr4fxIHOvaI1vs1nMkQGKBWGW2NKDRAzBy5y5NdF50qqU0DZXIVdYeICcwuk9snFEJSzJfizQxUd1XFIWRNLE7leOefE7gcYJHt3FUGSiiPPpVWeYXAadJ6zwPqU1jML4oCWraHHOnpfZMljH/indexHTTP Parser: No <meta name="author".. found
        Source: https://railrent.pexrayitech.com/01uSZbr4fxIHOvaI1vs1nMkQGKBWGW2NKDRAzBy5y5NdF50qqU0DZXIVdYeICcwuk9snFEJSzJfizQxUd1XFIWRNLE7leOefE7gcYJHt3FUGSiiPPpVWeYXAadJ6zwPqU1jML4oCWraHHOnpfZMljH/indexHTTP Parser: No <meta name="copyright".. found
        Source: https://railrent.pexrayitech.com/01uSZbr4fxIHOvaI1vs1nMkQGKBWGW2NKDRAzBy5y5NdF50qqU0DZXIVdYeICcwuk9snFEJSzJfizQxUd1XFIWRNLE7leOefE7gcYJHt3FUGSiiPPpVWeYXAadJ6zwPqU1jML4oCWraHHOnpfZMljH/indexHTTP Parser: No <meta name="copyright".. found
        Source: https://railrent.pexrayitech.com/01uSZbr4fxIHOvaI1vs1nMkQGKBWGW2NKDRAzBy5y5NdF50qqU0DZXIVdYeICcwuk9snFEJSzJfizQxUd1XFIWRNLE7leOefE7gcYJHt3FUGSiiPPpVWeYXAadJ6zwPqU1jML4oCWraHHOnpfZMljH/indexHTTP Parser: No <meta name="copyright".. found
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\Chrome\Application\Dictionaries
        Source: chrome.exeMemory has grown: Private usage: 9MB later: 38MB
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
        Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
        Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
        Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
        Source: unknownTCP traffic detected without corresponding DNS query: 2.23.227.208
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
        Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
        Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
        Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
        Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
        Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET /turnstile/v0/api.js?onload=onloadTurnstileCallback HTTP/1.1Host: challenges.cloudflare.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptSec-Fetch-Storage-Access: activeReferer: https://railrent.pexrayitech.com/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
        Source: global trafficHTTP traffic detected: GET /turnstile/v0/g/f3b948d8acb8/api.js HTTP/1.1Host: challenges.cloudflare.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptSec-Fetch-Storage-Access: activeReferer: https://railrent.pexrayitech.com/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
        Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv/f1dns/0x4AAAAAAA_vKal06V3CUU21/auto/fbE/new/normal/auto/ HTTP/1.1Host: challenges.cloudflare.comConnection: keep-alivesec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-Dest: iframeSec-Fetch-Storage-Access: activeReferer: https://railrent.pexrayitech.com/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
        Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/g/orchestrate/chl_api/v1?ray=91e2942f2ff11437&lang=auto HTTP/1.1Host: challenges.cloudflare.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptSec-Fetch-Storage-Access: activeReferer: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv/f1dns/0x4AAAAAAA_vKal06V3CUU21/auto/fbE/new/normal/auto/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
        Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/g/cmg/1 HTTP/1.1Host: challenges.cloudflare.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageSec-Fetch-Storage-Access: activeReferer: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv/f1dns/0x4AAAAAAA_vKal06V3CUU21/auto/fbE/new/normal/auto/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
        Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/g/cmg/1 HTTP/1.1Host: challenges.cloudflare.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptySec-Fetch-Storage-Access: activeAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
        Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/g/flow/ov1/1174521486:1741605308:VxmY7XukrB36ajGcazjwr4HqOdYarkLAcvqNNox8xgo/91e2942f2ff11437/MHrXFH_8q_aLiT_plZ_UOIMvpV.8eoaf5CgMQh4.nAU-1741607262-1.1.1.1-nd_19XwCL.x9eYGBgOnZoIU9dqAvOi8_qHU0zyLOc_hharV6ywtC1mtSSDdTe3kx HTTP/1.1Host: challenges.cloudflare.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptySec-Fetch-Storage-Access: activeAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
        Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/g/d/91e2942f2ff11437/1741607268750/sf41YbdZqnIx9Qx HTTP/1.1Host: challenges.cloudflare.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageSec-Fetch-Storage-Access: activeReferer: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv/f1dns/0x4AAAAAAA_vKal06V3CUU21/auto/fbE/new/normal/auto/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
        Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/g/d/91e2942f2ff11437/1741607268750/sf41YbdZqnIx9Qx HTTP/1.1Host: challenges.cloudflare.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptySec-Fetch-Storage-Access: activeAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
        Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/g/pat/91e2942f2ff11437/1741607268754/aadee68d36bcc7684985409485150157ec44d021db7d6402940329e314e29489/O-e7xUgFbeTZi8b HTTP/1.1Host: challenges.cloudflare.comConnection: keep-aliveCache-Control: max-age=0sec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: same-originSec-Fetch-Mode: corsSec-Fetch-Dest: emptySec-Fetch-Storage-Access: activeReferer: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv/f1dns/0x4AAAAAAA_vKal06V3CUU21/auto/fbE/new/normal/auto/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
        Source: global trafficHTTP traffic detected: GET /complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyA2KlwBX3mkFo30om9LUFYQhpqLoa_BNhE HTTP/1.1Host: www.google.comConnection: keep-aliveX-Client-Data: CLbgygE=Sec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
        Source: global trafficHTTP traffic detected: GET /async/ddljson?async=ntp:2 HTTP/1.1Host: www.google.comConnection: keep-aliveSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
        Source: global trafficHTTP traffic detected: GET /async/newtab_ogb?hl=en-US&async=fixed:0 HTTP/1.1Host: www.google.comConnection: keep-aliveX-Client-Data: CLbgygE=Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
        Source: global trafficHTTP traffic detected: GET /async/newtab_promos HTTP/1.1Host: www.google.comConnection: keep-aliveSec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptySec-Fetch-Storage-Access: activeUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
        Source: global trafficHTTP traffic detected: GET /complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyA2KlwBX3mkFo30om9LUFYQhpqLoa_BNhE HTTP/1.1Host: www.google.comConnection: keep-aliveX-Client-Data: CLbgygE=Sec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
        Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/g/flow/ov1/1174521486:1741605308:VxmY7XukrB36ajGcazjwr4HqOdYarkLAcvqNNox8xgo/91e2942f2ff11437/MHrXFH_8q_aLiT_plZ_UOIMvpV.8eoaf5CgMQh4.nAU-1741607262-1.1.1.1-nd_19XwCL.x9eYGBgOnZoIU9dqAvOi8_qHU0zyLOc_hharV6ywtC1mtSSDdTe3kx HTTP/1.1Host: challenges.cloudflare.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptySec-Fetch-Storage-Access: activeAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
        Source: global trafficHTTP traffic detected: GET /complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyA2KlwBX3mkFo30om9LUFYQhpqLoa_BNhE HTTP/1.1Host: www.google.comConnection: keep-aliveX-Client-Data: CLbgygE=Sec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
        Source: global trafficHTTP traffic detected: GET /async/ddljson?async=ntp:2 HTTP/1.1Host: www.google.comConnection: keep-aliveSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
        Source: global trafficHTTP traffic detected: GET /async/newtab_ogb?hl=en-US&async=fixed:0 HTTP/1.1Host: www.google.comConnection: keep-aliveX-Client-Data: CLbgygE=Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
        Source: global trafficHTTP traffic detected: GET /async/newtab_promos HTTP/1.1Host: www.google.comConnection: keep-aliveSec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptySec-Fetch-Storage-Access: activeUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
        Source: global trafficHTTP traffic detected: GET /jquery-3.6.0.min.js HTTP/1.1Host: code.jquery.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptSec-Fetch-Storage-Access: activeReferer: https://railrent.pexrayitech.com/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
        Source: global trafficHTTP traffic detected: GET /gh/syntaxerror019/HTML-STO/ld.min.js HTTP/1.1Host: cdn.jsdelivr.netConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptSec-Fetch-Storage-Access: activeReferer: https://railrent.pexrayitech.com/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
        Source: global trafficDNS traffic detected: DNS query: railrent.pexrayitech.com
        Source: global trafficDNS traffic detected: DNS query: www.google.com
        Source: global trafficDNS traffic detected: DNS query: challenges.cloudflare.com
        Source: global trafficDNS traffic detected: DNS query: a.nel.cloudflare.com
        Source: global trafficDNS traffic detected: DNS query: beacons.gcp.gvt2.com
        Source: global trafficDNS traffic detected: DNS query: code.jquery.com
        Source: global trafficDNS traffic detected: DNS query: cdn.jsdelivr.net
        Source: global trafficDNS traffic detected: DNS query: beacons.gvt2.com
        Source: unknownHTTP traffic detected: POST /cdn-cgi/challenge-platform/h/g/flow/ov1/1174521486:1741605308:VxmY7XukrB36ajGcazjwr4HqOdYarkLAcvqNNox8xgo/91e2942f2ff11437/MHrXFH_8q_aLiT_plZ_UOIMvpV.8eoaf5CgMQh4.nAU-1741607262-1.1.1.1-nd_19XwCL.x9eYGBgOnZoIU9dqAvOi8_qHU0zyLOc_hharV6ywtC1mtSSDdTe3kx HTTP/1.1Host: challenges.cloudflare.comConnection: keep-aliveContent-Length: 3366sec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"Content-Type: text/plain;charset=UTF-8cf-chl: MHrXFH_8q_aLiT_plZ_UOIMvpV.8eoaf5CgMQh4.nAU-1741607262-1.1.1.1-nd_19XwCL.x9eYGBgOnZoIU9dqAvOi8_qHU0zyLOc_hharV6ywtC1mtSSDdTe3kxcf-chl-ra: 0sec-ch-ua-mobile: ?0Accept: */*Origin: https://challenges.cloudflare.comSec-Fetch-Site: same-originSec-Fetch-Mode: corsSec-Fetch-Dest: emptySec-Fetch-Storage-Access: activeReferer: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv/f1dns/0x4AAAAAAA_vKal06V3CUU21/auto/fbE/new/normal/auto/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
        Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
        Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
        Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
        Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49679 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
        Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
        Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
        Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
        Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
        Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
        Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
        Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
        Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
        Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
        Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
        Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
        Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49673
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
        Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
        Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\scoped_dir6904_1173942963
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile deleted: C:\Windows\SystemTemp\scoped_dir6904_1173942963
        Source: classification engineClassification label: mal60.phis.win@30/0@44/129
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Program Files\Google\Chrome\Application\Dictionaries
        Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1952,i,2781325685772639910,18418971442839582622,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2212 /prefetch:3
        Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://railrent.pexrayitech.com/"
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1952,i,2781325685772639910,18418971442839582622,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2212 /prefetch:3
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\Chrome\Application\Dictionaries
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath Interception1
        Process Injection
        12
        Masquerading
        OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        Extra Window Memory Injection
        1
        Process Injection
        LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media3
        Non-Application Layer Protocol
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
        File Deletion
        Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive4
        Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
        Extra Window Memory Injection
        NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
        Ingress Tool Transfer
        Traffic DuplicationData Destruction

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        https://railrent.pexrayitech.com/0%Avira URL Cloudsafe
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        https://challenges.cloudflare.com/turnstile/v0/api.js?onload=onloadTurnstileCallback0%Avira URL Cloudsafe
        https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv/f1dns/0x4AAAAAAA_vKal06V3CUU21/auto/fbE/new/normal/auto/0%Avira URL Cloudsafe
        https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/orchestrate/chl_api/v1?ray=91e2942f2ff11437&lang=auto0%Avira URL Cloudsafe
        https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/d/91e2942f2ff11437/1741607268750/sf41YbdZqnIx9Qx0%Avira URL Cloudsafe
        https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/flow/ov1/1174521486:1741605308:VxmY7XukrB36ajGcazjwr4HqOdYarkLAcvqNNox8xgo/91e2942f2ff11437/MHrXFH_8q_aLiT_plZ_UOIMvpV.8eoaf5CgMQh4.nAU-1741607262-1.1.1.1-nd_19XwCL.x9eYGBgOnZoIU9dqAvOi8_qHU0zyLOc_hharV6ywtC1mtSSDdTe3kx0%Avira URL Cloudsafe
        https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/pat/91e2942f2ff11437/1741607268754/aadee68d36bcc7684985409485150157ec44d021db7d6402940329e314e29489/O-e7xUgFbeTZi8b0%Avira URL Cloudsafe
        https://a.nel.cloudflare.com/report/v4?s=1oL6fQubufTEmfMM03v5gFaXgeV0dmCOez45OYsu%2FUvTQ3Re13GsQA22dFgtFis7dHXYmlm47mAE2fwrJt2ZWD0jOlaQi4ibxuambCWmIv9DQ9yCDXOPBZfbOsefG4d8iB%2FyQ9I%2BEKc7ypM%3D0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        railrent.pexrayitech.com
        104.21.56.102
        truefalse
          high
          a.nel.cloudflare.com
          35.190.80.1
          truefalse
            high
            cdn.jsdelivr.net.cdn.cloudflare.net
            104.18.187.31
            truefalse
              high
              code.jquery.com
              151.101.2.137
              truefalse
                high
                beacons-handoff.gcp.gvt2.com
                142.251.143.35
                truefalse
                  high
                  challenges.cloudflare.com
                  104.18.95.41
                  truefalse
                    high
                    gce-beacons.gcp.gvt2.com
                    35.190.68.134
                    truefalse
                      high
                      www.google.com
                      142.250.184.196
                      truefalse
                        high
                        beacons.gvt2.com
                        142.250.184.195
                        truefalse
                          high
                          beacons6.gvt2.com
                          142.250.185.195
                          truefalse
                            high
                            cdn.jsdelivr.net
                            unknown
                            unknownfalse
                              high
                              beacons.gcp.gvt2.com
                              unknown
                              unknownfalse
                                high
                                NameMaliciousAntivirus DetectionReputation
                                https://www.google.com/async/ddljson?async=ntp:2false
                                  high
                                  https://code.jquery.com/jquery-3.6.0.min.jsfalse
                                    high
                                    https://cdn.jsdelivr.net/gh/syntaxerror019/HTML-STO/ld.min.jsfalse
                                      high
                                      https://challenges.cloudflare.com/turnstile/v0/g/f3b948d8acb8/api.jsfalse
                                        high
                                        https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/cmg/1false
                                          high
                                          https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/flow/ov1/1174521486:1741605308:VxmY7XukrB36ajGcazjwr4HqOdYarkLAcvqNNox8xgo/91e2942f2ff11437/MHrXFH_8q_aLiT_plZ_UOIMvpV.8eoaf5CgMQh4.nAU-1741607262-1.1.1.1-nd_19XwCL.x9eYGBgOnZoIU9dqAvOi8_qHU0zyLOc_hharV6ywtC1mtSSDdTe3kxfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/d/91e2942f2ff11437/1741607268750/sf41YbdZqnIx9Qxfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv/f1dns/0x4AAAAAAA_vKal06V3CUU21/auto/fbE/new/normal/auto/false
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://www.google.com/async/newtab_promosfalse
                                            high
                                            https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0false
                                              high
                                              https://railrent.pexrayitech.com/01uSZbr4fxIHOvaI1vs1nMkQGKBWGW2NKDRAzBy5y5NdF50qqU0DZXIVdYeICcwuk9snFEJSzJfizQxUd1XFIWRNLE7leOefE7gcYJHt3FUGSiiPPpVWeYXAadJ6zwPqU1jML4oCWraHHOnpfZMljH/indextrue
                                                unknown
                                                https://a.nel.cloudflare.com/report/v4?s=1oL6fQubufTEmfMM03v5gFaXgeV0dmCOez45OYsu%2FUvTQ3Re13GsQA22dFgtFis7dHXYmlm47mAE2fwrJt2ZWD0jOlaQi4ibxuambCWmIv9DQ9yCDXOPBZfbOsefG4d8iB%2FyQ9I%2BEKc7ypM%3Dfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://railrent.pexrayitech.com/false
                                                  unknown
                                                  https://challenges.cloudflare.com/turnstile/v0/api.js?onload=onloadTurnstileCallbackfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyA2KlwBX3mkFo30om9LUFYQhpqLoa_BNhEfalse
                                                    high
                                                    https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/orchestrate/chl_api/v1?ray=91e2942f2ff11437&lang=autofalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/pat/91e2942f2ff11437/1741607268754/aadee68d36bcc7684985409485150157ec44d021db7d6402940329e314e29489/O-e7xUgFbeTZi8bfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs
                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    142.250.184.195
                                                    beacons.gvt2.comUnited States
                                                    15169GOOGLEUSfalse
                                                    142.250.184.196
                                                    www.google.comUnited States
                                                    15169GOOGLEUSfalse
                                                    142.250.186.67
                                                    unknownUnited States
                                                    15169GOOGLEUSfalse
                                                    1.1.1.1
                                                    unknownAustralia
                                                    13335CLOUDFLARENETUSfalse
                                                    104.21.56.102
                                                    railrent.pexrayitech.comUnited States
                                                    13335CLOUDFLARENETUSfalse
                                                    104.18.187.31
                                                    cdn.jsdelivr.net.cdn.cloudflare.netUnited States
                                                    13335CLOUDFLARENETUSfalse
                                                    74.125.71.84
                                                    unknownUnited States
                                                    15169GOOGLEUSfalse
                                                    104.18.95.41
                                                    challenges.cloudflare.comUnited States
                                                    13335CLOUDFLARENETUSfalse
                                                    142.250.185.202
                                                    unknownUnited States
                                                    15169GOOGLEUSfalse
                                                    151.101.2.137
                                                    code.jquery.comUnited States
                                                    54113FASTLYUSfalse
                                                    142.250.181.227
                                                    unknownUnited States
                                                    15169GOOGLEUSfalse
                                                    142.250.185.142
                                                    unknownUnited States
                                                    15169GOOGLEUSfalse
                                                    142.250.186.131
                                                    unknownUnited States
                                                    15169GOOGLEUSfalse
                                                    35.190.80.1
                                                    a.nel.cloudflare.comUnited States
                                                    15169GOOGLEUSfalse
                                                    142.250.184.238
                                                    unknownUnited States
                                                    15169GOOGLEUSfalse
                                                    IP
                                                    192.168.2.16
                                                    192.168.2.24
                                                    Joe Sandbox version:42.0.0 Malachite
                                                    Analysis ID:1633587
                                                    Start date and time:2025-03-10 12:46:51 +01:00
                                                    Joe Sandbox product:CloudBasic
                                                    Overall analysis duration:
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:full
                                                    Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                                    Sample URL:https://railrent.pexrayitech.com/
                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                    Number of analysed new started processes analysed:16
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • EGA enabled
                                                    Analysis Mode:stream
                                                    Analysis stop reason:Timeout
                                                    Detection:MAL
                                                    Classification:mal60.phis.win@30/0@44/129
                                                    • Exclude process from analysis (whitelisted): SIHClient.exe, svchost.exe
                                                    • Excluded IPs from analysis (whitelisted): 142.250.185.142, 142.250.186.67, 74.125.71.84, 142.250.186.110, 142.250.186.78, 142.250.186.174
                                                    • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, redirector.gvt1.com, slscr.update.microsoft.com, clientservices.googleapis.com, clients.l.google.com
                                                    • Not all processes where analyzed, report is missing behavior information
                                                    • Report size getting too big, too many NtOpenFile calls found.
                                                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                    • VT rate limit hit for: https://railrent.pexrayitech.com/
                                                    No created / dropped files found
                                                    No static file info