Windows
Analysis Report
http://guard-x-tech.vercel.app/
Overview
Detection
Score: | 56 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64_ra
- chrome.exe (PID: 5296 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA) - chrome.exe (PID: 2568 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2044 --fi eld-trial- handle=192 4,i,159775 2487182286 5669,15847 5681088751 64128,2621 44 --disab le-feature s=Optimiza tionGuideM odelDownlo ading,Opti mizationHi nts,Optimi zationHint sFetching, Optimizati onTargetPr ediction / prefetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
- chrome.exe (PID: 7152 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt p://guard- x-tech.ver cel.app/" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_HtmlPhish_10 | Yara detected HtmlPhish_10 | Joe Security | ||
JoeSecurity_HtmlPhish_10 | Yara detected HtmlPhish_10 | Joe Security |
Click to jump to signature section
Phishing |
---|
Source: | Joe Sandbox AI: |
Source: | File source: | ||
Source: | File source: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Memory has grown: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | File created: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Window detected: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 Extra Window Memory Injection | 1 Extra Window Memory Injection | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 1 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
google.com | 172.217.18.110 | true | false | high | |
guard-x-tech.vercel.app | 64.29.17.65 | true | false | high | |
code.jquery.com | 151.101.194.137 | true | false | high | |
www.google.com | 142.250.185.100 | true | false | high | |
ipv4.imgur.map.fastly.net | 199.232.196.193 | true | false | high | |
www.none | unknown | unknown | false | high | |
i.imgur.com | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | unknown | ||
false | unknown | ||
true | unknown | ||
false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.250.185.99 | unknown | United States | 15169 | GOOGLEUS | false | |
216.198.79.193 | unknown | United States | 11696 | NBS11696US | false | |
142.250.185.67 | unknown | United States | 15169 | GOOGLEUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
216.58.212.138 | unknown | United States | 15169 | GOOGLEUS | false | |
2.16.168.120 | unknown | European Union | 20940 | AKAMAI-ASN1EU | false | |
199.232.192.193 | unknown | United States | 54113 | FASTLYUS | false | |
142.250.185.100 | www.google.com | United States | 15169 | GOOGLEUS | false | |
199.232.196.193 | ipv4.imgur.map.fastly.net | United States | 54113 | FASTLYUS | false | |
2.16.168.114 | unknown | European Union | 20940 | AKAMAI-ASN1EU | false | |
64.29.17.65 | guard-x-tech.vercel.app | Canada | 13768 | COGECO-PEER1CA | false | |
2.16.168.203 | unknown | European Union | 20940 | AKAMAI-ASN1EU | false | |
151.101.130.137 | unknown | United States | 54113 | FASTLYUS | false | |
8.8.8.8 | unknown | United States | 15169 | GOOGLEUS | false | |
64.233.167.84 | unknown | United States | 15169 | GOOGLEUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.251.40.174 | unknown | United States | 15169 | GOOGLEUS | false | |
151.101.194.137 | code.jquery.com | United States | 54113 | FASTLYUS | false | |
172.217.18.110 | google.com | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.7 |
192.168.2.18 |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1590942 |
Start date and time: | 2025-01-14 15:47:48 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | http://guard-x-tech.vercel.app/ |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 16 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal56.phis.win@27/14@45/152 |
- Exclude process from analysis (whitelisted): SIHClient.exe
- Excluded IPs from analysis (whitelisted): 142.250.185.67, 64.233.167.84, 142.251.40.174, 142.250.185.206, 142.250.184.206, 216.58.212.138, 142.250.186.106, 142.250.186.74, 142.250.185.170, 142.250.186.138, 172.217.23.106, 172.217.18.10, 142.250.181.234, 142.250.184.234, 142.250.184.202, 142.250.185.234, 142.250.185.106, 216.58.206.42, 142.250.185.202, 172.217.16.202, 142.250.186.170, 142.250.186.78
- Excluded domains from analysis (whitelisted): fs.microsoft.com, clients2.google.com, accounts.google.com, redirector.gvt1.com, content-autofill.googleapis.com, clientservices.googleapis.com, clients.l.google.com
- Not all processes where analyzed, report is missing behavior information
- VT rate limit hit for: http://guard-x-tech.vercel.app/
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2675 |
Entropy (8bit): | 3.9803425780208452 |
Encrypted: | false |
SSDEEP: | |
MD5: | EFCB7B31B022B83B06D89803C6D9A712 |
SHA1: | 7E57B8AED7FB9E68B7335473F8D4B33A2291DF19 |
SHA-256: | 4E55448B0AD4EC92B54682948FDF63D43C8044AC78827FCA3573517EF7551F70 |
SHA-512: | AC5128B047A7B75AC75C24FA8F123D0E4AA947678524F108E6083607CC7076D9A5DF5BC0769AB53DA273FDD68C8054BD51FDED3AD9CF77FF0E708BDDB53EA672 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9968957885816887 |
Encrypted: | false |
SSDEEP: | |
MD5: | F9FC77D0393AF89BDC38FCD68A4F4D6C |
SHA1: | A85A66A4AF2956EC2B25EF4808EDF47BFD538C61 |
SHA-256: | 46A58ADD03F032D08B7E28972E229EC2F647C27396FFCEDF9DA5A1C46070687B |
SHA-512: | A0169519519527CD2E9C75F7137D5D1E7B74A8A262BA86589B29968935BFEF940726E48AF1906824573B239E891FBE2D4DE5523887C2FA1FC6FE6ED45D12AA09 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2691 |
Entropy (8bit): | 4.002321526075859 |
Encrypted: | false |
SSDEEP: | |
MD5: | 6321F49C5D70E44B3077592EFD4907B6 |
SHA1: | D4414F45E1A8843310785FC8FD8F929B270FD351 |
SHA-256: | 5019EBA9136921FA88421E6AA616760218290EE4E92600F054445F022BA641F3 |
SHA-512: | 2EE471359790A0935CE097503CD6809FF832288F880CB209F11A198A8A020E2974EE5AACF4701FD90370AEAA069F9030B141FB5BDC020386FF8D4EC1365E6033 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.9932005358875093 |
Encrypted: | false |
SSDEEP: | |
MD5: | 25FFF4789C68ADF96C11085E0CA83761 |
SHA1: | B6F02E8929CB99E390DF359C6F3BE8B76DCCF807 |
SHA-256: | 3A2803AB86B776073616FF0848A6C869858133DCBDACB266E7143452B3916DF5 |
SHA-512: | E6B926902EBBD05FFCF20B119643EB7E828CD5AD0AC6CB4EC9CA52ABFC15CDBDCD5A5464D3AA0D1748FE93DDEA632B8A62D70F6E7FA4B680E64618D450ADA19C |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.980075986156075 |
Encrypted: | false |
SSDEEP: | |
MD5: | C5B60E54257C40BA4FF915C486D8BA4E |
SHA1: | EA2A337F29B82EA6163C4AB1B075F122D2FC6882 |
SHA-256: | 7DE8C1C17216B89D1F7DDD5A18B4FA8705323121A5590F091886FF9488123142 |
SHA-512: | 21EAD5E6148ADB251B13C37D8EA145F693A37A9552183C13A35CB8042E8136D883660403656A2D9D59FCE333454C4D9B71DB7585B2DC65EDB721200176E89B2E |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.9961310199841398 |
Encrypted: | false |
SSDEEP: | |
MD5: | 4FCE16E22B8F6F2D868D02A5B96A3C32 |
SHA1: | 93D2D2CDDBA330EE1F7A8F84BDA1DEB561ABAF44 |
SHA-256: | DC48A192B4F09577306FA4B4B458DA19D66E7F055BBF275690B335CD93DA6B10 |
SHA-512: | B69081DFEE0E445B7CF1B1A577E7461270481C91753262048B557A981510241FA4E2DE7166D44E09CDD5D0E23A7CE1E7B81EB454B59F61B390C6EAAA9D6347C9 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 95 |
Entropy (8bit): | 4.815967488697987 |
Encrypted: | false |
SSDEEP: | |
MD5: | 2268E0D4857C02BBAC83AEFAAF7108AF |
SHA1: | 84F5603AB37B3B8941D0284DB139332387334759 |
SHA-256: | 919CCBDF13AC3D6685243AD6F942A9DB7B80128576192E9CF086B370BEBA98E7 |
SHA-512: | FF470FEF2FD927B4270203D3C58F2CB7B9EEA2010CBE00E069D41AEB8C80D2041CB2161ECD9D8C6C20D286D8DDBA05602C0CC053D5CB4C275B6174D4BEC41E05 |
Malicious: | false |
Reputation: | unknown |
URL: | https://guard-x-tech.vercel.app/lasmop?web=None |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 86709 |
Entropy (8bit): | 5.367391365596119 |
Encrypted: | false |
SSDEEP: | |
MD5: | E071ABDA8FE61194711CFC2AB99FE104 |
SHA1: | F647A6D37DC4CA055CED3CF64BBC1F490070ACBA |
SHA-256: | 85556761A8800D14CED8FCD41A6B8B26BF012D44A318866C0D81A62092EFD9BF |
SHA-512: | 53A2B560B20551672FBB0E6E72632D4FD1C7E2DD2ECF7337EBAAAB179CB8BE7C87E9D803CE7765706BC7FCBCF993C34587CD1237DE5A279AEA19911D69067B65 |
Malicious: | false |
Reputation: | unknown |
URL: | https://code.jquery.com/jquery-3.1.1.min.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 15086 |
Entropy (8bit): | 2.1910541540651503 |
Encrypted: | false |
SSDEEP: | |
MD5: | BD8F64043432F6F433BC8732068AD7E1 |
SHA1: | 3853FE45E9855467D42D7640AEF1DD04B972F51F |
SHA-256: | 5EED69E764F1D40B943A19B4B36ACA72519B2626DD519891173D7728A74D821C |
SHA-512: | 66972179FA30F75C7D5935630B943B4550BEDA31496D0ED5E8E569DF4073D884B89479A8F85E9D9833743A9F1C1E328873807FA35755B83D0F84308E36E3082D |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 56 |
Entropy (8bit): | 4.809599511683906 |
Encrypted: | false |
SSDEEP: | |
MD5: | 6D84F0BFA479CD85B2DDFB7BC0E5F471 |
SHA1: | F2C680F5E2CBB82B8046A7AE12F85ACF0A23D93E |
SHA-256: | 70592EDEA509782B5422FC50CAC8CCD253DBAC2EE447E9A327927E7542D169F1 |
SHA-512: | EDFB5B25A1BB6AEDE6A41FF6F4E0262E2CF387569BE972C427260B794BC8077768079D9DFEAE9700CBDE3D0D0CE1C82AE0DCADD8DBEBF285C7BD2541A3A78FEC |
Malicious: | false |
Reputation: | unknown |
URL: | https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xNDkSHglvKljI4lqLGxIFDf4jPSkSBQ0dMJf8EgUNyIDUURIQCQpJY6zLvFlxEgUNQtq69w==?alt=proto |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 5613 |
Entropy (8bit): | 5.6416135478033596 |
Encrypted: | false |
SSDEEP: | |
MD5: | 693C7952878FC36E6C4F508351B3D090 |
SHA1: | 151DCA078149ED5E386BC91CED90291DD9A5E986 |
SHA-256: | 1CA01E7819EC29E01A2F9681BE46D17BEA8494FA0B20F3C12706CD722FC580E0 |
SHA-512: | 7CBB955F1FD4C6C53A18AC8E0174DD310596F52D05A8A94CC14AA1883B9AFCF46CC9EB3BBB05BB2E2105CBF11483909D1801967B0D1D84A3431B525AE5EE4B63 |
Malicious: | false |
Reputation: | unknown |
URL: | https://guard-x-tech.vercel.app/ |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 16 |
Entropy (8bit): | 3.625 |
Encrypted: | false |
SSDEEP: | |
MD5: | E32D2D8B1F6EDC77AC6FAE4CF8A026C1 |
SHA1: | 403E3983475A9D6F51A9837F0A4C68B24A9DFF19 |
SHA-256: | A5A7A3C76E23C5C39E8F85611F4079E1863ADE6AA0CFE78AFD8FB50DC3E4043F |
SHA-512: | 44EC405D1CDA3123F25BEBD4D425FF8EAB682328AD762AB6F2AC44D6CA08E6742103C3533E5129C024AADD4E079721FA75F35053CB78C874188135F86C5A2414 |
Malicious: | false |
Reputation: | unknown |
URL: | https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xNDkSEAmcRf9UxGslpxIFDXVfuUE=?alt=proto |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 48843 |
Entropy (8bit): | 7.824566865680682 |
Encrypted: | false |
SSDEEP: | |
MD5: | 47EB410E11EB45BEF6391D125B3DEC31 |
SHA1: | 15BD7D8AEBAB90339C879032E4D71C430C434C78 |
SHA-256: | 180F3BC8288F8F33B56133542536937DADECC33CEB27FCBA770739061A4F5F80 |
SHA-512: | 30C3F692E6C86FAE651F15B25A8903139B927401139B364E199E188B872D09D580FE11B01758383001A58001BD8D3993FE80C5DAFDE68005FA9E73AE5FAF6672 |
Malicious: | false |
Reputation: | unknown |
URL: | https://i.imgur.com/qLcPmYb.jpg |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 207 |
Entropy (8bit): | 4.730905401522706 |
Encrypted: | false |
SSDEEP: | |
MD5: | E46C4E5E1FBC64B1BAE9EBD9BCEF7FCF |
SHA1: | D767B3CB0AD66544C649E4165FC4B37E3C17E370 |
SHA-256: | E9639E3C4681CE85F852FBAC48E2EEEE5BA51296DBFEC57C200D59B76237AB80 |
SHA-512: | D82048FDCFF225197A7E9F0B7F22D470518420A4B10EA3327D604804D04D0D97EFADAFC84A0AAA23650146F59D94373438DC18BB822E26FD60283C384940DDB9 |
Malicious: | false |
Reputation: | unknown |
URL: | https://guard-x-tech.vercel.app/favicon.ico |
Preview: |