Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://u8411862.ct.sendgrid.net/ls/click?upn=u001.L4PK-2B0-2BuGt9pUFq-2FA3Op7Q-2F-2F9qb88t-2BRGAR6VDZa-2FLvCRsA1Ac7AajOPJIbQO7IP307a6xjNpvY8ZU7zRp9oyg-3D-3DE1Fg_CPebASiKsSpOAa3SLW44RsJxX9ZLglP0y4de2rxHefrHjZqY5SRIy9wKYZ9ERHf3zKK6o7ixiO4r4HIIwwj5RfSWrFWq-2FUbkZI-2FrBFl28oYsoQhEIuqeOt-2BjCiFlWuLC4rDo

Overview

General Information

Sample URL:https://u8411862.ct.sendgrid.net/ls/click?upn=u001.L4PK-2B0-2BuGt9pUFq-2FA3Op7Q-2F-2F9qb88t-2BRGAR6VDZa-2FLvCRsA1Ac7AajOPJIbQO7IP307a6xjNpvY8ZU7zRp9oyg-3D-3DE1Fg_CPebASiKsSpOAa3SLW44RsJxX9ZLglP0y4de2r
Analysis ID:1558832

Detection

Score:2
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Detected non-DNS traffic on DNS port
HTML body contains low number of good links
HTML page contains hidden javascript code
HTML title does not match URL
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 1472 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6832 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1960,i,3742538601927572042,17691553218836612508,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6472 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://u8411862.ct.sendgrid.net/ls/click?upn=u001.L4PK-2B0-2BuGt9pUFq-2FA3Op7Q-2F-2F9qb88t-2BRGAR6VDZa-2FLvCRsA1Ac7AajOPJIbQO7IP307a6xjNpvY8ZU7zRp9oyg-3D-3DE1Fg_CPebASiKsSpOAa3SLW44RsJxX9ZLglP0y4de2rxHefrHjZqY5SRIy9wKYZ9ERHf3zKK6o7ixiO4r4HIIwwj5RfSWrFWq-2FUbkZI-2FrBFl28oYsoQhEIuqeOt-2BjCiFlWuLC4rDomVqHzNhdvSab-2F-2Fw8d5IAtmQQI0BdCul9u12mfWcV4mFdLlsTdv9empaAUbuFjvZWnyaUm8GOERw44MojSA-3D-3D" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: https://imsoidc.bentley.com/connect/authorize?client_id=user-management&redirect_uri=https%3A%2F%2Fusermanagement.bentley.com%2Fsignin-oidc&response_type=code%20id_token&scope=openid%20profile%20email%20user-management%20bentley-admin-api%20notification-service-20%20entitlement-search-service-2576%20ulas-product-information-2727%20agreements-2354&response_mode=form_post&nonce=638676432446464491.YmFkZmFhY2UtYmU1NC00ZjY3LThhZGYtODBlMDJhZWQwYTczZTY4NTEwYjAtM2NmMi00MmViLTgyOGItNGVkNjMwNjQyMmVh&state=CfDJ8MKYeJ71b-9CueOVG07N9ivkk654DnU8_ToBsp41vINZlG9-FkWmB2bVtsDDqCROMDooA8OXWbIHfICL5YcfgafGkgdX0oSCqxq1DyINzkAzwKKoUWJIoZ_gTgT9xBqv6lUUVaYDK7EnzpCNRSk4nvcFJrI9G87rZjJIFk-wEi4euqVyY3y8kLKPpfP0m-dl0FBXHnImlxu7HVzxJj42A0Y_bMqLlgOIwxo4Kgi2G0C9SMI4ImjoWWajJn2SQAffb3ckBanhbjwwl9gu8CsZ6ZbDUTRj-exnF-xSf4z-T0_2onDJH6_0_dGbZs-YtdB2pg&x-client-SKU=ID_NETSTANDARD2_0&x-client-ver=5.6.0.0HTTP Parser: Number of links: 0
Source: https://imsoidc.bentley.com/as/gMxxa/resume/as/authorization.pingHTTP Parser: Number of links: 1
Source: https://imsoidc.bentley.com/as/gMxxa/resume/as/authorization.pingHTTP Parser: Base64 decoded: badfaace-be54-4f67-8adf-80e02aed0a73e68510b0-3cf2-42eb-828b-4ed6306422ea
Source: https://imsoidc.bentley.com/connect/authorize?client_id=user-management&redirect_uri=https%3A%2F%2Fusermanagement.bentley.com%2Fsignin-oidc&response_type=code%20id_token&scope=openid%20profile%20email%20user-management%20bentley-admin-api%20notification-service-20%20entitlement-search-service-2576%20ulas-product-information-2727%20agreements-2354&response_mode=form_post&nonce=638676432446464491.YmFkZmFhY2UtYmU1NC00ZjY3LThhZGYtODBlMDJhZWQwYTczZTY4NTEwYjAtM2NmMi00MmViLTgyOGItNGVkNjMwNjQyMmVh&state=CfDJ8MKYeJ71b-9CueOVG07N9ivkk654DnU8_ToBsp41vINZlG9-FkWmB2bVtsDDqCROMDooA8OXWbIHfICL5YcfgafGkgdX0oSCqxq1DyINzkAzwKKoUWJIoZ_gTgT9xBqv6lUUVaYDK7EnzpCNRSk4nvcFJrI9G87rZjJIFk-wEi4euqVyY3y8kLKPpfP0m-dl0FBXHnImlxu7HVzxJj42A0Y_bMqLlgOIwxo4Kgi2G0C9SMI4ImjoWWajJn2SQAffb3ckBanhbjwwl9gu8CsZ6ZbDUTRj-exnF-xSf4z-T0_2onDJH6_0_dGbZs-YtdB2pg&x-client-SKU=ID_NETSTANDARD2_0&x-client-ver=5.6.0.0HTTP Parser: Title: Sign In does not match URL
Source: https://imsoidc.bentley.com/as/gMxxa/resume/as/authorization.pingHTTP Parser: Title: Sign In does not match URL
Source: https://imsoidc.bentley.com/as/gMxxa/resume/as/authorization.pingHTTP Parser: <input type="password" .../> found
Source: https://imsoidc.bentley.com/as/gMxxa/resume/as/authorization.pingHTTP Parser: No favicon
Source: https://imsoidc.bentley.com/as/gMxxa/resume/as/authorization.pingHTTP Parser: No favicon
Source: https://imsoidc.bentley.com/connect/authorize?client_id=user-management&redirect_uri=https%3A%2F%2Fusermanagement.bentley.com%2Fsignin-oidc&response_type=code%20id_token&scope=openid%20profile%20email%20user-management%20bentley-admin-api%20notification-service-20%20entitlement-search-service-2576%20ulas-product-information-2727%20agreements-2354&response_mode=form_post&nonce=638676432446464491.YmFkZmFhY2UtYmU1NC00ZjY3LThhZGYtODBlMDJhZWQwYTczZTY4NTEwYjAtM2NmMi00MmViLTgyOGItNGVkNjMwNjQyMmVh&state=CfDJ8MKYeJ71b-9CueOVG07N9ivkk654DnU8_ToBsp41vINZlG9-FkWmB2bVtsDDqCROMDooA8OXWbIHfICL5YcfgafGkgdX0oSCqxq1DyINzkAzwKKoUWJIoZ_gTgT9xBqv6lUUVaYDK7EnzpCNRSk4nvcFJrI9G87rZjJIFk-wEi4euqVyY3y8kLKPpfP0m-dl0FBXHnImlxu7HVzxJj42A0Y_bMqLlgOIwxo4Kgi2G0C9SMI4ImjoWWajJn2SQAffb3ckBanhbjwwl9gu8CsZ6ZbDUTRj-exnF-xSf4z-T0_2onDJH6_0_dGbZs-YtdB2pg&x-client-SKU=ID_NETSTANDARD2_0&x-client-ver=5.6.0.0HTTP Parser: No <meta name="author".. found
Source: https://imsoidc.bentley.com/as/gMxxa/resume/as/authorization.pingHTTP Parser: No <meta name="author".. found
Source: https://imsoidc.bentley.com/as/gMxxa/resume/as/authorization.pingHTTP Parser: No <meta name="author".. found
Source: https://imsoidc.bentley.com/connect/authorize?client_id=user-management&redirect_uri=https%3A%2F%2Fusermanagement.bentley.com%2Fsignin-oidc&response_type=code%20id_token&scope=openid%20profile%20email%20user-management%20bentley-admin-api%20notification-service-20%20entitlement-search-service-2576%20ulas-product-information-2727%20agreements-2354&response_mode=form_post&nonce=638676432446464491.YmFkZmFhY2UtYmU1NC00ZjY3LThhZGYtODBlMDJhZWQwYTczZTY4NTEwYjAtM2NmMi00MmViLTgyOGItNGVkNjMwNjQyMmVh&state=CfDJ8MKYeJ71b-9CueOVG07N9ivkk654DnU8_ToBsp41vINZlG9-FkWmB2bVtsDDqCROMDooA8OXWbIHfICL5YcfgafGkgdX0oSCqxq1DyINzkAzwKKoUWJIoZ_gTgT9xBqv6lUUVaYDK7EnzpCNRSk4nvcFJrI9G87rZjJIFk-wEi4euqVyY3y8kLKPpfP0m-dl0FBXHnImlxu7HVzxJj42A0Y_bMqLlgOIwxo4Kgi2G0C9SMI4ImjoWWajJn2SQAffb3ckBanhbjwwl9gu8CsZ6ZbDUTRj-exnF-xSf4z-T0_2onDJH6_0_dGbZs-YtdB2pg&x-client-SKU=ID_NETSTANDARD2_0&x-client-ver=5.6.0.0HTTP Parser: No <meta name="copyright".. found
Source: https://imsoidc.bentley.com/as/gMxxa/resume/as/authorization.pingHTTP Parser: No <meta name="copyright".. found
Source: https://imsoidc.bentley.com/as/gMxxa/resume/as/authorization.pingHTTP Parser: No <meta name="copyright".. found
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\Chrome\Application\Dictionaries
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:64189 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:64190 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.16:64191 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.16:64192 version: TLS 1.2
Source: global trafficTCP traffic: 192.168.2.16:64181 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:64181 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:64181 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:64181 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:64181 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:64181 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:64181 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:64181 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:64181 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:64181 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:64181 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:64181 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:64181 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:64181 -> 1.1.1.1:53
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: global trafficDNS traffic detected: DNS query: u8411862.ct.sendgrid.net
Source: global trafficDNS traffic detected: DNS query: usermanagement.bentley.com
Source: global trafficDNS traffic detected: DNS query: imsoidc.bentley.com
Source: global trafficDNS traffic detected: DNS query: connect-cdn.bentley.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
Source: unknownNetwork traffic detected: HTTP traffic on port 64211 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64183
Source: unknownNetwork traffic detected: HTTP traffic on port 64209 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64185
Source: unknownNetwork traffic detected: HTTP traffic on port 64205 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64183 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64211
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64210
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64197 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64192
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64191
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64194
Source: unknownNetwork traffic detected: HTTP traffic on port 64208 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64196
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64195
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64198
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64197
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64190
Source: unknownNetwork traffic detected: HTTP traffic on port 64189 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64200 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64189
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64188
Source: unknownNetwork traffic detected: HTTP traffic on port 64192 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64196 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64207 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64185 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64203 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64191 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64195 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64199
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 64199 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64210 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64206 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64202 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64188 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64208
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64207
Source: unknownNetwork traffic detected: HTTP traffic on port 64190 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64209
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64200
Source: unknownNetwork traffic detected: HTTP traffic on port 64194 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64202
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64203
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64206
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
Source: unknownNetwork traffic detected: HTTP traffic on port 64198 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64205
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:64189 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:64190 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.16:64191 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.16:64192 version: TLS 1.2
Source: classification engineClassification label: clean2.win@23/6@16/162
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Program Files\Google\Chrome\Application\Dictionaries
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1960,i,3742538601927572042,17691553218836612508,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://u8411862.ct.sendgrid.net/ls/click?upn=u001.L4PK-2B0-2BuGt9pUFq-2FA3Op7Q-2F-2F9qb88t-2BRGAR6VDZa-2FLvCRsA1Ac7AajOPJIbQO7IP307a6xjNpvY8ZU7zRp9oyg-3D-3DE1Fg_CPebASiKsSpOAa3SLW44RsJxX9ZLglP0y4de2rxHefrHjZqY5SRIy9wKYZ9ERHf3zKK6o7ixiO4r4HIIwwj5RfSWrFWq-2FUbkZI-2FrBFl28oYsoQhEIuqeOt-2BjCiFlWuLC4rDomVqHzNhdvSab-2F-2Fw8d5IAtmQQI0BdCul9u12mfWcV4mFdLlsTdv9empaAUbuFjvZWnyaUm8GOERw44MojSA-3D-3D"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1960,i,3742538601927572042,17691553218836612508,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\Chrome\Application\Dictionaries
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
3
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://u8411862.ct.sendgrid.net/ls/click?upn=u001.L4PK-2B0-2BuGt9pUFq-2FA3Op7Q-2F-2F9qb88t-2BRGAR6VDZa-2FLvCRsA1Ac7AajOPJIbQO7IP307a6xjNpvY8ZU7zRp9oyg-3D-3DE1Fg_CPebASiKsSpOAa3SLW44RsJxX9ZLglP0y4de2rxHefrHjZqY5SRIy9wKYZ9ERHf3zKK6o7ixiO4r4HIIwwj5RfSWrFWq-2FUbkZI-2FrBFl28oYsoQhEIuqeOt-2BjCiFlWuLC4rDomVqHzNhdvSab-2F-2Fw8d5IAtmQQI0BdCul9u12mfWcV4mFdLlsTdv9empaAUbuFjvZWnyaUm8GOERw44MojSA-3D-3D0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
prod.ims.bentley.proofidcloud.com
52.59.10.51
truefalse
    unknown
    www.google.com
    142.250.184.228
    truefalse
      high
      u8411862.ct.sendgrid.net
      167.89.115.66
      truefalse
        unknown
        sni1gl.wpc.nucdn.net
        152.199.21.175
        truefalse
          high
          imsoidc.bentley.com
          unknown
          unknownfalse
            unknown
            connect-cdn.bentley.com
            unknown
            unknownfalse
              high
              usermanagement.bentley.com
              unknown
              unknownfalse
                unknown
                NameMaliciousAntivirus DetectionReputation
                https://imsoidc.bentley.com/as/gMxxa/resume/as/authorization.pingfalse
                  unknown
                  https://imsoidc.bentley.com/connect/authorize?client_id=user-management&redirect_uri=https%3A%2F%2Fusermanagement.bentley.com%2Fsignin-oidc&response_type=code%20id_token&scope=openid%20profile%20email%20user-management%20bentley-admin-api%20notification-service-20%20entitlement-search-service-2576%20ulas-product-information-2727%20agreements-2354&response_mode=form_post&nonce=638676432446464491.YmFkZmFhY2UtYmU1NC00ZjY3LThhZGYtODBlMDJhZWQwYTczZTY4NTEwYjAtM2NmMi00MmViLTgyOGItNGVkNjMwNjQyMmVh&state=CfDJ8MKYeJ71b-9CueOVG07N9ivkk654DnU8_ToBsp41vINZlG9-FkWmB2bVtsDDqCROMDooA8OXWbIHfICL5YcfgafGkgdX0oSCqxq1DyINzkAzwKKoUWJIoZ_gTgT9xBqv6lUUVaYDK7EnzpCNRSk4nvcFJrI9G87rZjJIFk-wEi4euqVyY3y8kLKPpfP0m-dl0FBXHnImlxu7HVzxJj42A0Y_bMqLlgOIwxo4Kgi2G0C9SMI4ImjoWWajJn2SQAffb3ckBanhbjwwl9gu8CsZ6ZbDUTRj-exnF-xSf4z-T0_2onDJH6_0_dGbZs-YtdB2pg&x-client-SKU=ID_NETSTANDARD2_0&x-client-ver=5.6.0.0false
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    142.250.186.67
                    unknownUnited States
                    15169GOOGLEUSfalse
                    34.104.35.123
                    unknownUnited States
                    15169GOOGLEUSfalse
                    1.1.1.1
                    unknownAustralia
                    13335CLOUDFLARENETUSfalse
                    108.177.15.84
                    unknownUnited States
                    15169GOOGLEUSfalse
                    142.250.185.106
                    unknownUnited States
                    15169GOOGLEUSfalse
                    167.89.115.66
                    u8411862.ct.sendgrid.netUnited States
                    11377SENDGRIDUSfalse
                    142.250.185.202
                    unknownUnited States
                    15169GOOGLEUSfalse
                    3.64.183.67
                    unknownUnited States
                    16509AMAZON-02USfalse
                    216.58.206.46
                    unknownUnited States
                    15169GOOGLEUSfalse
                    142.250.181.227
                    unknownUnited States
                    15169GOOGLEUSfalse
                    20.105.232.11
                    unknownUnited States
                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                    239.255.255.250
                    unknownReserved
                    unknownunknownfalse
                    52.59.10.51
                    prod.ims.bentley.proofidcloud.comUnited States
                    16509AMAZON-02USfalse
                    142.250.185.174
                    unknownUnited States
                    15169GOOGLEUSfalse
                    152.199.21.175
                    sni1gl.wpc.nucdn.netUnited States
                    15133EDGECASTUSfalse
                    142.250.184.228
                    www.google.comUnited States
                    15169GOOGLEUSfalse
                    IP
                    192.168.2.16
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1558832
                    Start date and time:2024-11-19 21:00:14 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:defaultwindowsinteractivecookbook.jbs
                    Sample URL:https://u8411862.ct.sendgrid.net/ls/click?upn=u001.L4PK-2B0-2BuGt9pUFq-2FA3Op7Q-2F-2F9qb88t-2BRGAR6VDZa-2FLvCRsA1Ac7AajOPJIbQO7IP307a6xjNpvY8ZU7zRp9oyg-3D-3DE1Fg_CPebASiKsSpOAa3SLW44RsJxX9ZLglP0y4de2rxHefrHjZqY5SRIy9wKYZ9ERHf3zKK6o7ixiO4r4HIIwwj5RfSWrFWq-2FUbkZI-2FrBFl28oYsoQhEIuqeOt-2BjCiFlWuLC4rDomVqHzNhdvSab-2F-2Fw8d5IAtmQQI0BdCul9u12mfWcV4mFdLlsTdv9empaAUbuFjvZWnyaUm8GOERw44MojSA-3D-3D
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:13
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • EGA enabled
                    Analysis Mode:stream
                    Analysis stop reason:Timeout
                    Detection:CLEAN
                    Classification:clean2.win@23/6@16/162
                    • Exclude process from analysis (whitelisted): svchost.exe
                    • Excluded IPs from analysis (whitelisted): 142.250.186.67, 142.250.185.174, 108.177.15.84, 34.104.35.123, 20.105.232.11, 199.232.214.172, 142.250.185.202, 142.250.185.106, 142.250.186.74, 142.250.185.234, 142.250.186.42, 142.250.186.170, 216.58.206.42, 142.250.185.74, 172.217.18.10, 142.250.186.138, 142.250.181.234, 142.250.186.106, 142.250.184.202, 172.217.16.202, 142.250.185.170, 142.250.185.138
                    • Excluded domains from analysis (whitelisted): prod-usermanagement-tm.trafficmanager.net, fs.microsoft.com, clients2.google.com, accounts.google.com, edgedl.me.gvt1.com, storageprodcdnendpoint.azureedge.net, content-autofill.googleapis.com, ctldl.windowsupdate.com, clientservices.googleapis.com, clients.l.google.com, storageprodcdnendpoint.ec.azureedge.net, waws-prod-am2-561-7d76.westeurope.cloudapp.azure.com
                    • Not all processes where analyzed, report is missing behavior information
                    • VT rate limit hit for: https://u8411862.ct.sendgrid.net/ls/click?upn=u001.L4PK-2B0-2BuGt9pUFq-2FA3Op7Q-2F-2F9qb88t-2BRGAR6VDZa-2FLvCRsA1Ac7AajOPJIbQO7IP307a6xjNpvY8ZU7zRp9oyg-3D-3DE1Fg_CPebASiKsSpOAa3SLW44RsJxX9ZLglP0y4de2rxHefrHjZqY5SRIy9wKYZ9ERHf3zKK6o7ixiO4r4HIIwwj5RfSWrFWq-2FUbkZI-2FrBFl28oYsoQhEIuqeOt-2BjCiFlWuLC4rDomVqHzNhdvSab-2F-2Fw8d5IAtmQQI0BdCul9u12mfWcV4mFdLlsTdv9empaAUbuFjvZWnyaUm8GOERw44MojSA-3D-3D
                    InputOutput
                    URL: https://imsoidc.bentley.com/connect/authorize?client_id=user-management&redirect_uri=https%3A%2F%2Fusermanagement.bentley.com%2Fsignin-oidc&response_type=code%20id_token&scope=openid%20profile%20email%20user-management%20bentley-admin-api%20notification-s Model: Joe Sandbox AI
                    ```json
                    {
                      "contains_trigger_text": false,
                      "trigger_text": "unknown",
                      "prominent_button_name": "Next",
                      "text_input_field_labels": [
                        "Email Address"
                      ],
                      "pdf_icon_visible": false,
                      "has_visible_captcha": false,
                      "has_urgent_text": false,
                      "has_visible_qrcode": false
                    }
                    URL: https://imsoidc.bentley.com Model: Joe Sandbox AI
                    {
                        "typosquatting": false,
                        "unusual_query_string": false,
                        "suspicious_tld": false,
                        "ip_in_url": false,
                        "long_subdomain": false,
                        "malicious_keywords": false,
                        "encoded_characters": false,
                        "redirection": false,
                        "contains_email_address": false,
                        "known_domain": true,
                        "brand_spoofing_attempt": false,
                        "third_party_hosting": false
                    }
                    URL: https://imsoidc.bentley.com
                    URL: https://imsoidc.bentley.com/connect/authorize?client_id=user-management&redirect_uri=https%3A%2F%2Fusermanagement.bentley.com%2Fsignin-oidc&response_type=code%20id_token&scope=openid%20profile%20email%20user-management%20bentley-admin-api%20notification-s Model: Joe Sandbox AI
                    ```json
                    {
                      "brands": [
                        "Bentley"
                      ]
                    }
                    URL: https://imsoidc.bentley.com/connect/authorize?client_id=user-management&redirect_uri=https%3A%2F%2Fusermanagement.bentley.com%2Fsignin-oidc&response_type=code%20id_token&scope=openid%20profile%20email%20user-management%20bentley-admin-api%20notification-s Model: Joe Sandbox AI
                    ```json{  "legit_domain": "bentley.com",  "classification": "known",  "reasons": [    "The brand 'Bentley' is associated with the domain 'bentley.com'.",    "The URL 'imsoidc.bentley.com' is a subdomain of 'bentley.com', which is the legitimate domain for Bentley.",    "There are no suspicious elements in the URL such as misspellings or unusual domain extensions.",    "The presence of a subdomain is common for legitimate services and does not inherently indicate phishing."  ],  "riskscore": 2}
                    URL: imsoidc.bentley.com
                                Brands: Bentley
                                Input Fields: Email Address
                    URL: https://imsoidc.bentley.com/as/gMxxa/resume/as/authorization.ping Model: Joe Sandbox AI
                    ```json
                    {
                      "contains_trigger_text": false,
                      "trigger_text": "unknown",
                      "prominent_button_name": "Sign In",
                      "text_input_field_labels": [
                        "Email Address",
                        "Password"
                      ],
                      "pdf_icon_visible": false,
                      "has_visible_captcha": false,
                      "has_urgent_text": false,
                      "has_visible_qrcode": false
                    }
                    URL: https://imsoidc.bentley.com/as/gMxxa/resume/as/authorization.ping Model: Joe Sandbox AI
                    ```json
                    {
                      "contains_trigger_text": false,
                      "trigger_text": "unknown",
                      "prominent_button_name": "Sign In",
                      "text_input_field_labels": [
                        "Email Address",
                        "Password"
                      ],
                      "pdf_icon_visible": false,
                      "has_visible_captcha": false,
                      "has_urgent_text": false,
                      "has_visible_qrcode": false
                    }
                    URL: https://imsoidc.bentley.com/as/gMxxa/resume/as/authorization.ping Model: Joe Sandbox AI
                    ```json
                    {
                      "brands": [
                        "Bentley"
                      ]
                    }
                    URL: https://imsoidc.bentley.com/as/gMxxa/resume/as/authorization.ping Model: Joe Sandbox AI
                    ```json
                    {
                      "brands": [
                        "Bentley"
                      ]
                    }
                    URL: https://imsoidc.bentley.com/as/gMxxa/resume/as/authorization.ping Model: Joe Sandbox AI
                    ```json{  "legit_domain": "bentley.com",  "classification": "known",  "reasons": [    "The URL 'imsoidc.bentley.com' is a subdomain of 'bentley.com', which is the legitimate domain for Bentley.",    "Bentley is a known brand, primarily associated with engineering software and solutions.",    "The domain 'bentley.com' matches fully with the legitimate domain name associated with the Bentley brand.",    "The presence of a subdomain 'imsoidc' is not inherently suspicious as it could be used for specific services or applications by Bentley.",    "No suspicious elements such as misspellings or unusual domain extensions were found in the URL."  ],  "riskscore": 2}
                    URL: imsoidc.bentley.com
                                Brands: Bentley
                                Input Fields: Email Address, Password
                    URL: https://imsoidc.bentley.com/as/gMxxa/resume/as/authorization.ping Model: Joe Sandbox AI
                    ```json{  "legit_domain": "bentley.com",  "classification": "known",  "reasons": [    "The URL 'imsoidc.bentley.com' is a subdomain of 'bentley.com', which is the legitimate domain for Bentley.",    "Bentley is a known brand, primarily associated with engineering software and solutions.",    "The domain 'bentley.com' matches fully with the legitimate domain name associated with the Bentley brand.",    "The presence of a subdomain 'imsoidc' is not inherently suspicious as it could be used for specific services or applications within the Bentley ecosystem.",    "No suspicious elements such as misspellings or unusual domain extensions were found in the URL."  ],  "riskscore": 2}
                    URL: imsoidc.bentley.com
                                Brands: Bentley
                                Input Fields: Email Address, Password
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Nov 19 19:00:43 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2673
                    Entropy (8bit):3.9856363505817933
                    Encrypted:false
                    SSDEEP:
                    MD5:15E3F4FA32F57500F9560346EA39A85F
                    SHA1:48E6A5BE76C8DE6592283FCC33587AEB9643DFF1
                    SHA-256:3BA26FC72DE1980D7A23127C9EB83E42B03B763E92CFBB4FDD1A3F99A5AFAF63
                    SHA-512:2531B2C486E7D309AAC9EDD34BB89E9DE68BC04C52F7EA65F3603996158A1AF6977E99C32023FF5E948789FE58DB672E0A714D999D6D87EA0B804248FBCF1DCC
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,.........:..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IsY......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VsY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VsY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VsY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VsY.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............G.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Nov 19 19:00:42 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2675
                    Entropy (8bit):4.0021522269741086
                    Encrypted:false
                    SSDEEP:
                    MD5:CD22B6F695FE40B717FD29548A49A469
                    SHA1:805F89491F5BD2B85E8B4B1C2DC0D168CDD05340
                    SHA-256:91F4EEC03C553A3ADABB1CE49A0CC8F5F348AE4A6A0A438B948F234B5E6B4D11
                    SHA-512:F611C72CFFE8F4BCCB816C387ED43E4D3E780DF2B002BDACB808B2D7E6E7B277ECF5EA261032300404922B61ACF369480A102094C54C24BCCD4B97A69918E285
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,......:..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IsY......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VsY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VsY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VsY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VsY.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............G.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2689
                    Entropy (8bit):4.008570201329287
                    Encrypted:false
                    SSDEEP:
                    MD5:7FB6EBE3189BC6ABA30A198703BFA792
                    SHA1:2890FF0F4B75840BD2E3174FD62F0A733D4B3F6E
                    SHA-256:867F0F57CD832F128533377F8B8CC2CFE47B13D73FABB06034340D3075ECC004
                    SHA-512:0D1B950890A18E27AC737264EB4A0C80AC294797AE7B50FA08C4C4DAE77B9D9F2335B0015F9FFD55C8A55DADA117AB6E420EC22C349179349060D937C45D8F34
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IsY......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VsY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VsY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VsY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............G.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Nov 19 19:00:42 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2677
                    Entropy (8bit):3.998547137983147
                    Encrypted:false
                    SSDEEP:
                    MD5:FB7089B925841ED8B33099A51500AA37
                    SHA1:AB4157B4D99BD622B29F0F850B191BB2940DDEE2
                    SHA-256:F3AD1BFD0584C8A19EC18E378FD228B8B4A25D2699A1DA474DF6773C9C1E0E3E
                    SHA-512:BC820C7DC4A011D3631D7A8F932A2A3EA6D6D2AE8691CFC9F339BBDCD6D76150ABA7B740EBA558F088D06EE6192D49AF93468FB9682402B5EB3E1798BA9250B9
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,....F..:..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IsY......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VsY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VsY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VsY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VsY.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............G.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Nov 19 19:00:42 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2677
                    Entropy (8bit):3.984337370977211
                    Encrypted:false
                    SSDEEP:
                    MD5:413206C6F118AA4ED4961EAA894950E8
                    SHA1:BE8B90BAB80DB1780BE6F2D2A9D412BB5A31CB31
                    SHA-256:40737AF05C25841A4748EE1DFFDBB607C407E246C4431FF1724CAEF7432A30D2
                    SHA-512:C9F8A3A067ACC2ED046E413B9984D1648D0DAEF697ACD718FB3E9C5DA3F3343673C8B5F04A440675651F349834C094B0C6D67E840345052F1D6CFD6ABF6EB652
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,....n..:..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IsY......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VsY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VsY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VsY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VsY.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............G.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Nov 19 19:00:42 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2679
                    Entropy (8bit):3.9941636257620825
                    Encrypted:false
                    SSDEEP:
                    MD5:0AF934537EF87E9A77F48D8189BA92D7
                    SHA1:5D3FC4090DBD449B313FDDC25C6D9F9C15DF8DC2
                    SHA-256:7DD04B03A0894915D58273D7642EEE6275E7D48C087646F4FDF2753F1FEBEC16
                    SHA-512:2C5520DFB9D44BA572D65A8A5168DE2320D927997BB12780BCC0044164F6CD735A8CAA1BB337F9D21B6CD1F8C7B09849A8294008E8740746AC83CCE183026F28
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,....cD..:..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IsY......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VsY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VsY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VsY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VsY.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............G.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    No static file info