Windows
Analysis Report
https://u8411862.ct.sendgrid.net/ls/click?upn=u001.L4PK-2B0-2BuGt9pUFq-2FA3Op7Q-2F-2F9qb88t-2BRGAR6VDZa-2FLvCRsA1Ac7AajOPJIbQO7IP307a6xjNpvY8ZU7zRp9oyg-3D-3DE1Fg_CPebASiKsSpOAa3SLW44RsJxX9ZLglP0y4de2rxHefrHjZqY5SRIy9wKYZ9ERHf3zKK6o7ixiO4r4HIIwwj5RfSWrFWq-2FUbkZI-2FrBFl28oYsoQhEIuqeOt-2BjCiFlWuLC4rDo
Overview
General Information
Detection
Score: | 1 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
- System is w10x64_ra
- chrome.exe (PID: 6948 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 7128 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2144 --fi eld-trial- handle=194 8,i,143195 6949486948 433,148820 8781279655 2089,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- chrome.exe (PID: 6716 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://u8411 862.ct.sen dgrid.net/ ls/click?u pn=u001.L4 PK-2B0-2Bu Gt9pUFq-2F A3Op7Q-2F- 2F9qb88t-2 BRGAR6VDZa -2FLvCRsA1 Ac7AajOPJI bQO7IP307a 6xjNpvY8ZU 7zRp9oyg-3 D-3DE1Fg_C PebASiKsSp OAa3SLW44R sJxX9ZLglP 0y4de2rxHe frHjZqY5SR Iy9wKYZ9ER Hf3zKK6o7i xiO4r4HIIw wj5RfSWrFW q-2FUbkZI- 2FrBFl28oY soQhEIuqeO t-2BjCiFlW uLC4rDomVq HzNhdvSab- 2F-2Fw8d5I AtmQQI0BdC ul9u12mfWc V4mFdLlsTd v9empaAUbu FjvZWnyaUm 8GOERw44Mo jSA-3D-3D" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | File created: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Window detected: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
prod.ims.bentley.proofidcloud.com | 52.59.10.51 | true | false | unknown | |
www.google.com | 172.217.16.196 | true | false | high | |
u8411862.ct.sendgrid.net | 167.89.115.58 | true | false | unknown | |
sni1gl.wpc.nucdn.net | 152.199.21.175 | true | false | high | |
imsoidc.bentley.com | unknown | unknown | false | unknown | |
connect-cdn.bentley.com | unknown | unknown | false | unknown | |
usermanagement.bentley.com | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.250.185.99 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.185.206 | unknown | United States | 15169 | GOOGLEUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
142.250.186.163 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.186.174 | unknown | United States | 15169 | GOOGLEUS | false | |
167.89.115.58 | u8411862.ct.sendgrid.net | United States | 11377 | SENDGRIDUS | false | |
20.105.232.11 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
52.59.10.51 | prod.ims.bentley.proofidcloud.com | United States | 16509 | AMAZON-02US | false | |
172.217.18.106 | unknown | United States | 15169 | GOOGLEUS | false | |
152.199.21.175 | sni1gl.wpc.nucdn.net | United States | 15133 | EDGECASTUS | false | |
64.233.184.84 | unknown | United States | 15169 | GOOGLEUS | false | |
172.217.16.196 | www.google.com | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.16 |
192.168.2.5 |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1558824 |
Start date and time: | 2024-11-19 20:45:37 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | https://u8411862.ct.sendgrid.net/ls/click?upn=u001.L4PK-2B0-2BuGt9pUFq-2FA3Op7Q-2F-2F9qb88t-2BRGAR6VDZa-2FLvCRsA1Ac7AajOPJIbQO7IP307a6xjNpvY8ZU7zRp9oyg-3D-3DE1Fg_CPebASiKsSpOAa3SLW44RsJxX9ZLglP0y4de2rxHefrHjZqY5SRIy9wKYZ9ERHf3zKK6o7ixiO4r4HIIwwj5RfSWrFWq-2FUbkZI-2FrBFl28oYsoQhEIuqeOt-2BjCiFlWuLC4rDomVqHzNhdvSab-2F-2Fw8d5IAtmQQI0BdCul9u12mfWcV4mFdLlsTdv9empaAUbuFjvZWnyaUm8GOERw44MojSA-3D-3D |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 17 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean1.win@18/13@12/145 |
- Exclude process from analysis (whitelisted): svchost.exe
- Excluded IPs from analysis (whitelisted): 142.250.185.99, 142.250.185.206, 64.233.184.84, 34.104.35.123, 20.105.232.11, 172.217.18.106, 142.250.185.202, 142.250.184.202, 142.250.186.106, 142.250.181.234, 142.250.186.170, 142.250.185.234, 142.250.186.74, 142.250.185.170, 172.217.16.202, 142.250.186.42, 172.217.18.10, 142.250.74.202, 216.58.206.42, 142.250.186.138, 172.217.16.138
- Excluded domains from analysis (whitelisted): prod-usermanagement-tm.trafficmanager.net, clients2.google.com, accounts.google.com, edgedl.me.gvt1.com, storageprodcdnendpoint.azureedge.net, content-autofill.googleapis.com, clientservices.googleapis.com, clients.l.google.com, storageprodcdnendpoint.ec.azureedge.net, waws-prod-am2-561-7d76.westeurope.cloudapp.azure.com
- Not all processes where analyzed, report is missing behavior information
- VT rate limit hit for: https://u8411862.ct.sendgrid.net/ls/click?upn=u001.L4PK-2B0-2BuGt9pUFq-2FA3Op7Q-2F-2F9qb88t-2BRGAR6VDZa-2FLvCRsA1Ac7AajOPJIbQO7IP307a6xjNpvY8ZU7zRp9oyg-3D-3DE1Fg_CPebASiKsSpOAa3SLW44RsJxX9ZLglP0y4de2rxHefrHjZqY5SRIy9wKYZ9ERHf3zKK6o7ixiO4r4HIIwwj5RfSWrFWq-2FUbkZI-2FrBFl28oYsoQhEIuqeOt-2BjCiFlWuLC4rDomVqHzNhdvSab-2F-2Fw8d5IAtmQQI0BdCul9u12mfWcV4mFdLlsTdv9empaAUbuFjvZWnyaUm8GOERw44MojSA-3D-3D
Input | Output |
---|---|
URL: https://imsoidc.bentley.com/connect/authorize?client_id=user-management&redirect_uri=https%3A%2F%2Fusermanagement.bentley.com%2Fsignin-oidc&response_type=code%20id_token&scope=openid%20profile%20email%20user-management%20bentley-admin-api%20notification-s Model: Joe Sandbox AI | ```json { "contains_trigger_text": false, "trigger_text": "unknown", "prominent_button_name": "Next", "text_input_field_labels": [ "Email Address" ], "pdf_icon_visible": false, "has_visible_captcha": false, "has_urgent_text": false, "has_visible_qrcode": false } |
URL: https://imsoidc.bentley.com Model: Joe Sandbox AI | { "typosquatting": false, "unusual_query_string": false, "suspicious_tld": false, "ip_in_url": false, "long_subdomain": false, "malicious_keywords": false, "encoded_characters": false, "redirection": false, "contains_email_address": false, "known_domain": true, "brand_spoofing_attempt": false, "third_party_hosting": false } |
URL: https://imsoidc.bentley.com | |
URL: https://imsoidc.bentley.com/connect/authorize?client_id=user-management&redirect_uri=https%3A%2F%2Fusermanagement.bentley.com%2Fsignin-oidc&response_type=code%20id_token&scope=openid%20profile%20email%20user-management%20bentley-admin-api%20notification-s Model: Joe Sandbox AI | ```json { "brands": [ "Bentley" ] } |
URL: https://imsoidc.bentley.com/connect/authorize?client_id=user-management&redirect_uri=https%3A%2F%2Fusermanagement.bentley.com%2Fsignin-oidc&response_type=code%20id_token&scope=openid%20profile%20email%20user-management%20bentley-admin-api%20notification-s Model: Joe Sandbox AI | ```json{ "legit_domain": "bentley.com", "classification": "known", "reasons": [ "The domain 'bentley.com' matches the legitimate domain for Bentley Systems, a known software company.", "The URL 'imsoidc.bentley.com' is a subdomain of 'bentley.com', which is common for legitimate services and applications hosted by the company.", "The brand 'Bentley' is classified as 'known' due to its recognition in the software industry.", "The presence of a subdomain 'imsoidc' does not inherently indicate phishing, as companies often use subdomains for different services.", "No suspicious elements such as misspellings or unusual domain extensions were found in the URL." ], "riskscore": 2} |
URL: imsoidc.bentley.com Brands: Bentley Input Fields: Email Address | |
URL: https://bentley.com Model: Joe Sandbox AI | { "typosquatting": false, "unusual_query_string": false, "suspicious_tld": false, "ip_in_url": false, "long_subdomain": false, "malicious_keywords": false, "encoded_characters": false, "redirection": false, "contains_email_address": false, "known_domain": true, "brand_spoofing_attempt": false, "third_party_hosting": false } |
URL: https://bentley.com |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2673 |
Entropy (8bit): | 3.9880758583277838 |
Encrypted: | false |
SSDEEP: | |
MD5: | 7DA018B2B0EC18DA0EC5DD7685A3A0A7 |
SHA1: | D9E56B0A08CFE295944010AFB2F020D1EB292182 |
SHA-256: | 487DBDD3F0E212D2289375AE2D16384ED62956BD6622E1A2EC85C048CE516383 |
SHA-512: | E23CD79D6AD02863C2334AF219042A7F05ACC064C2D33534BF00F1EDB018DCB40A6165B63B2389B60875830B547E8E57439BDD24030500BF9C8A729380733D67 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2675 |
Entropy (8bit): | 4.005223451011353 |
Encrypted: | false |
SSDEEP: | |
MD5: | 1534D6CEA1362CE90F16D29EFF4EF964 |
SHA1: | 1D92E15D2B1D84D83EBD96425F6B09E102740C7E |
SHA-256: | 4BA15A59E5A84137014731B7A37F9A1D644443DC0157EBF8813984A997401F25 |
SHA-512: | 3E518B8C9A0CE9F3A311CFC8004A039C0FCDB37A56930890BD907C75ED479BB49BA023264262AA36EFE0B8EAA50E0E8DDF3F46FC44BFC8E5FF60771650C5DEC1 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2689 |
Entropy (8bit): | 4.011460438807137 |
Encrypted: | false |
SSDEEP: | |
MD5: | 975F6FDB3719FC0456193A03AE302D28 |
SHA1: | CE978BB020C7F3E391939995B4BA88257F8211BB |
SHA-256: | D8DC0CF069ABA501ECA693390A3B0FDA549C504E0288AFF6DF0D2BF577892629 |
SHA-512: | A2BDC96792439119A05AB76DE2FDCD590A8DB037100DB495C5F405A3B96976191131AE74A65A4973EE4681817DA3FA7086D3938FDDC2FA16443E79C304F746AD |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 4.000109364202331 |
Encrypted: | false |
SSDEEP: | |
MD5: | 1DC6EF0CAC795DABB2BAAD2ECF724186 |
SHA1: | 0CAB94AB087C3190D5AFB34F9E67A23438C166D3 |
SHA-256: | 8640648F14DEFA4C59F434681126474505724890EE6972D1992F82A545F9319D |
SHA-512: | 836D44FFEED72BC06DC50C30D6FDDCF977218A5C75525EC211DF2ADDBB120CDD26502E08C92A1400D58470BC97875D0CEE9A576B616A6A930F75DBC319CEEB5E |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.989929359959336 |
Encrypted: | false |
SSDEEP: | |
MD5: | CD8572D5DE4DC8DD04982AB8CA6F60ED |
SHA1: | F34F0A2036C3E8A10A7DD4EDEA75D2AFE81A963D |
SHA-256: | 31D051F0AD847DABFFC0A71F2CFD02EC60FA3F504F7235B32D1C06173CE64066 |
SHA-512: | D17DEEA5005B097565826AB6BF23B51C30F4D8F34DAEA491C1FFF24F503E12E001EB21593ED51A66D93C506859C79B0D80A1DFBCF91B5215ACF36AF988E238AF |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 4.001142426343063 |
Encrypted: | false |
SSDEEP: | |
MD5: | 2523D48F552C181664EC0CF85ECAD59C |
SHA1: | 443DDAE5961A0660719D83DEADEB4B0D0605DFB6 |
SHA-256: | 7A235D8C8FA7AC940A57E6733A96BF141E048E6804F8FC026FF6388E0C16D7B6 |
SHA-512: | F660C7FFD71394B16130C3E6E0416FD487DB072E65989D3553A0AF7F661905D015E97462980E8F11AD85F4F05137E8E6CF0B962C25DCAE99665FB871995B0352 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 20 |
Entropy (8bit): | 3.7464393446710154 |
Encrypted: | false |
SSDEEP: | |
MD5: | AE51FBC3D399F749B61F9BDF72563826 |
SHA1: | EC6F460E2F5743D38DD184B43CB3ED60B52F8110 |
SHA-256: | CCE094DF4D24E9B75D6329FE80DDF2BC29EEE4AAF1282D10EA173DE7F6A842CE |
SHA-512: | E6A8B3320F302164B80F86C7F2D2CD2100ECE8904B6530D5A76EB0313CF5639EDCEA01E590FD31113EC3C2666AE94B981FF1599CCBAB69171DF10688ECCCF829 |
Malicious: | false |
Reputation: | unknown |
URL: | https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISEAlUgwtl0ReM5BIFDXjbCXo=?alt=proto |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 6693 |
Entropy (8bit): | 5.1840767008408255 |
Encrypted: | false |
SSDEEP: | |
MD5: | 751ACB8BC400000AB915573523CE3AEC |
SHA1: | 41AF039A53702C10161BA9A526B68485ADD3E8DC |
SHA-256: | D766DB52A53ABBA4083FE9E4808926018A87E13291DE5A901C2686A6670134D1 |
SHA-512: | 051D3478E98CDE3AD4002B346E57F084B35BFB15357B3572FF5CCCDE14A4BE09253E6582C71EDAB4B5E5CD9519307AF36543A3E0C823EA831DBF12A4BB5298F4 |
Malicious: | false |
Reputation: | unknown |
URL: | https://imsoidc.bentley.com/assets/css/ims-overrides.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2822 |
Entropy (8bit): | 4.881916041767234 |
Encrypted: | false |
SSDEEP: | |
MD5: | 225DEEC88DD9EE4CCD1BD878F159050F |
SHA1: | F623190B386DEE074D4AD444F38AD46C1B9AE23C |
SHA-256: | EDF53B579279A1E8C6D76ED0720DD6F6397DE5551EB45D7CAA785D1086EDBF54 |
SHA-512: | D8602BE7A0A1B9D088096A8E4A0AF09DF2D67B5A76590D0858A7DBE53116D611AB3D106AD95A7C59BD65749E39610441159D20417DDBD47F88FB4FC6BFB1FA88 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 45468 |
Entropy (8bit): | 4.755598662562364 |
Encrypted: | false |
SSDEEP: | |
MD5: | 1A3A651FFED94057E873D07A03443381 |
SHA1: | 47F0CB3DAE634E453224F90A449B11164322B488 |
SHA-256: | 82FC24301A47A186C834EB5768AD3677E9A8E554ED6A5BA1BD23948D42EEF33C |
SHA-512: | 82C90771CB5C7980B0010AF469DC0CD009CC554388F32AF092492B11942B051A959A97F2F606907BB911E2ED67128E1CE82E93385CF2C4CAEE19EBA9DAA4650B |
Malicious: | false |
Reputation: | unknown |
URL: | https://imsoidc.bentley.com/assets/css/inputs.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 18236 |
Entropy (8bit): | 4.775654785242883 |
Encrypted: | false |
SSDEEP: | |
MD5: | 11869A7766C53E9BF26B1E5AFF87B642 |
SHA1: | 43B06942524741D0EFEDFDD63D77B449ECB52274 |
SHA-256: | 93111A91E20370B69963D9DA39FA922A2F32CF2C192E469E82ED72459FAA640D |
SHA-512: | A4B6F0AA09A4027F53311A0B10CEF4B213FBD5F269017B52E255C7E9CB42303F6A431C562AEA117D5F7F4DEBE1D98FE9959E29202805BF43894B1C96B277B6D5 |
Malicious: | false |
Reputation: | unknown |
URL: | https://imsoidc.bentley.com/assets/css/global.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 32038 |
Entropy (8bit): | 3.5700586343594214 |
Encrypted: | false |
SSDEEP: | |
MD5: | 87A3E2C2EB0FC326219DB1D093CA895A |
SHA1: | EB3D1E824F60D9BD67DD2FBCCA72AE4A744545DF |
SHA-256: | 508681DA935F3835C0006E8BF21D360EBE8611300C2B8ECBC88BB3D9CD5918C0 |
SHA-512: | 64F5A7963F8B3FFA1F6F254C6A9667A85C4C3678ACD25ADA6693FBE56B4CD318C4866B9A8ECCC21B64849D1A5F7E43B730C924A5F516E13D90596DCA973020C8 |
Malicious: | false |
Reputation: | unknown |
URL: | https://connect-cdn.bentley.com/cdn/en/favicon.ico |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 172471 |
Entropy (8bit): | 4.920197170534048 |
Encrypted: | false |
SSDEEP: | |
MD5: | 261BC00926ACBE4F634FA87B614E2A79 |
SHA1: | EA39A6435E1E9CB4FE32208B81B53C2C52921CA4 |
SHA-256: | FEC59CEA24FBCE3079E4FE268B7E57CF4B31222E1F8372331247CAA8B6589FC7 |
SHA-512: | 809901BAACC4BD6C95314122B6C54E588276B222A618BFAA7D4D7C56D4DF1D0C34AE2C22DA0F097DCF3AF8E84887F8D325200FCE2F57E443DB3B26580B536DB1 |
Malicious: | false |
Reputation: | unknown |
URL: | https://imsoidc.bentley.com/assets/css/main.css |
Preview: |