Windows
Analysis Report
https://strateweldingsupply0-my.sharepoint.com/:b:/g/personal/strate12_strateweldingsupply_com/EaHsj_nVZgpMr2t8b0-EVz8BpoZn0bBYspJRPwo3do3fFw?e=4%3aeOZ6Ey&at=9
Overview
General Information
Detection
Score: | 2 |
Range: | 0 - 100 |
Confidence: | 80% |
Signatures
Classification
- System is w10x64_ra
chrome.exe (PID: 6276 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --s tart-maxim ized "abou t:blank" MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 6468 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --no-pre-r ead-main-d ll --field -trial-han dle=1992,i ,310877718 8001462109 ,354996495 3622845867 ,262144 -- disable-fe atures=Opt imizationG uideModelD ownloading ,Optimizat ionHints,O ptimizatio nHintsFetc hing,Optim izationTar getPredict ion --vari ations-see d-version --mojo-pla tform-chan nel-handle =2208 /pre fetch:3 MD5: E81F54E6C1129887AEA47E7D092680BF)
chrome.exe (PID: 1728 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://strat eweldingsu pply0-my.s harepoint. com/:b:/g/ personal/s trate12_st rateweldin gsupply_co m/EaHsj_nV ZgpMr2t8b0 -EVz8BpoZn 0bBYspJRPw o3do3fFw?e =4%3aeOZ6E y&at=9" MD5: E81F54E6C1129887AEA47E7D092680BF) MpCmdRun.exe (PID: 5596 cmdline:
"C:\Progra m Files\Wi ndows Defe nder\mpcmd run.exe" - wdenable MD5: B3676839B2EE96983F9ED735CD044159) conhost.exe (PID: 1940 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
- • Phishing
- • Compliance
- • Software Vulnerabilities
- • Networking
- • System Summary
- • Hooking and other Techniques for Hiding and Protection
- • Lowering of HIPS / PFW / Operating System Security Settings
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | Directory created: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Memory has grown: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | File created: |
Source: | Mutant created: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: |
Source: | Window detected: |
Source: | Directory created: |
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | 1 Scripting | Valid Accounts | 1 Windows Management Instrumentation | 1 Scripting | 1 Process Injection | 2 Masquerading | OS Credential Dumping | 1 Security Software Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 3 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 Extra Window Memory Injection | 1 DLL Side-Loading | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 4 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Extra Window Memory Injection | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 1 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
dual-spo-0005.spo-msedge.net | 13.107.136.10 | true | false | high | |
a726.dscd.akamai.net | 23.209.84.66 | true | false | high | |
www.google.com | 192.178.49.196 | true | false | high | |
a1894.dscb.akamai.net | 23.222.3.228 | true | false | high | |
strateweldingsupply0-my.sharepoint.com | unknown | unknown | false | high | |
m365cdn.nel.measure.office.net | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | unknown | ||
false |
| unknown | |
false |
| unknown | |
false |
| unknown | |
false |
| unknown | |
false |
| unknown | |
false |
| unknown | |
false |
| unknown | |
false |
| unknown | |
false | unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.250.69.3 | unknown | United States | 15169 | GOOGLEUS | false | |
23.209.84.29 | unknown | United States | 16625 | AKAMAI-ASUS | false | |
142.250.68.234 | unknown | United States | 15169 | GOOGLEUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
13.107.136.10 | dual-spo-0005.spo-msedge.net | United States | 8068 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
74.125.137.84 | unknown | United States | 15169 | GOOGLEUS | false | |
192.178.49.195 | unknown | United States | 15169 | GOOGLEUS | false | |
192.178.49.196 | www.google.com | United States | 15169 | GOOGLEUS | false | |
192.178.49.174 | unknown | United States | 15169 | GOOGLEUS | false | |
23.209.84.66 | a726.dscd.akamai.net | United States | 16625 | AKAMAI-ASUS | false | |
142.250.68.238 | unknown | United States | 15169 | GOOGLEUS | false | |
23.222.3.228 | a1894.dscb.akamai.net | United States | 8612 | TISCALI-IT | false |
IP |
---|
192.168.2.16 |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1672208 |
Start date and time: | 2025-04-23 17:21:09 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | https://strateweldingsupply0-my.sharepoint.com/:b:/g/personal/strate12_strateweldingsupply_com/EaHsj_nVZgpMr2t8b0-EVz8BpoZn0bBYspJRPwo3do3fFw?e=4%3aeOZ6Ey&at=9 |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 14 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean2.win@24/14@12/117 |
- Exclude process from analysis
(whitelisted): svchost.exe - Excluded IPs from analysis (wh
itelisted): 192.178.49.174, 19 2.178.49.195, 74.125.137.84, 1 42.250.68.238, 142.250.69.14, 142.250.68.234, 192.178.49.170 , 192.178.49.202, 142.250.69.1 0, 23.209.84.66 - Excluded domains from analysis
(whitelisted): clients2.googl e.com, accounts.google.com, re director.gvt1.com, content-aut ofill.googleapis.com, clientse rvices.googleapis.com, res-1.c dn.office.net, clients.l.googl e.com, res-stls-prod.edgesuite .net - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtOpenFile calls found . - Some HTTPS proxied raw data pa
ckets have been limited to 10 per session. Please view the P CAPs for the complete data. - VT rate limit hit for: https:
//strateweldingsupply0-my.shar epoint.com/:b:/g/personal/stra te12_strateweldingsupply_com/E aHsj_nVZgpMr2t8b0-EVz8BpoZn0bB YspJRPwo3do3fFw?e=4%3aeOZ6Ey&a mp;at=9
Process: | C:\Program Files\Windows Defender\MpCmdRun.exe |
File Type: | |
Category: | modified |
Size (bytes): | 7388 |
Entropy (8bit): | 3.243333765414888 |
Encrypted: | false |
SSDEEP: | |
MD5: | 2A2E90D39BA36529D65225AA5DB1F86E |
SHA1: | ACC8E666B95444F4DC53D4187B35FAB0CA9D3BC0 |
SHA-256: | 85A47F7A41E25550E1BC62C44F8AC68FD5D3A08CC07B6693F1F7E198FE5D43F6 |
SHA-512: | 65B0EF53F0B31DD8196A2129FB4745DAE2D156C86A28F4CD70B0A1691A1BAE07DE855504126B3CB8AC673CA350C18CAED1F3D508BF3449253EA33889E60D97BD |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 40326 |
Entropy (8bit): | 5.245555585297941 |
Encrypted: | false |
SSDEEP: | |
MD5: | DA9DC1C32E89C02FC1E9EEB7E5AAB91E |
SHA1: | 3EFB110EFA6068CE6B586A67F87DA5125310BC30 |
SHA-256: | 398CDF1B27EF247E5BC77805F266BB441E60355463FC3D1776F41AAE58B08CF1 |
SHA-512: | D4730EBC4CA62624B8300E292F27FD79D42A9277E409545DF7DC916189ED9DF13E46FAA37E3924B85A7C7EA8C76BF65A05ECA69B4029B550430536EC6DF8552A |
Malicious: | false |
Reputation: | unknown |
URL: | https://strateweldingsupply0-my.sharepoint.com/ScriptResource.axd?d=GzWV25QV8vPNhs705rgdHQQxNt24Q5ePhEvJcl-IdAmZKO4pefK8GDBzcBVRFrgSddNUiGhNdfG225JwEowhF_Xr_E_W10AEh9Ww6_e4fFk8LJ4UYvxi5ByRXJXe16_xouXXOXnQe0xzC9k0R6hlpI5kO33nDrCIHbUAb-m391LAYl3_GgSHxXjLVxfClvT90&t=2a9d95e3 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 69368 |
Entropy (8bit): | 5.669282675042478 |
Encrypted: | false |
SSDEEP: | |
MD5: | E4D1F5AE92E3ADA01AA35698E5ED7918 |
SHA1: | B373E291CE8E3DCF07D7A21A7ADA5C6E2FA10AC8 |
SHA-256: | 3250FF643C5D1E87ADEB962615CC1EAACCA87C608561BAB109DCCFA542B88CBB |
SHA-512: | 55AFF498666D354735C4D4D8FC5CD5D3C08D081F4A82D11FEBD4C222191DCACA9E73C01DF19D31B700962C70C888123257599892912FBB5125C727FCAF6C894F |
Malicious: | false |
Reputation: | unknown |
URL: | https://strateweldingsupply0-my.sharepoint.com/personal/strate12_strateweldingsupply_com/_layouts/15/guestaccess.aspx?e=4%3aeOZ6Ey&at=9&share=EaHsj_nVZgpMr2t8b0-EVz8BpoZn0bBYspJRPwo3do3fFw |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 69376 |
Entropy (8bit): | 5.670032892939586 |
Encrypted: | false |
SSDEEP: | |
MD5: | A0FCEFFF8A1503737EBA1864B18DA9AA |
SHA1: | E6BA7B480B91EA23DE731C22161E2D073E233F26 |
SHA-256: | E4E6D0F375E7D3D7B9A6B4E820096EFB9BDB3DA1CB17044E2999E65C9B7FB526 |
SHA-512: | 42AA92408CA23D76E22DF2F2C366A40D1B3CB6649A96182B1F06E16D0675F7FDF7C78358253885A1D1963FD84EADFE2A31A97F0C603BA7CD48BE8272B47F42B8 |
Malicious: | false |
Reputation: | unknown |
URL: | https://strateweldingsupply0-my.sharepoint.com/personal/strate12_strateweldingsupply_com/_layouts/15/guestaccess.aspx?e=4%3aeOZ6Ey&at=9&share=EaHsj_nVZgpMr2t8b0-EVz8BpoZn0bBYspJRPwo3do3fFw |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 102801 |
Entropy (8bit): | 5.336080509196147 |
Encrypted: | false |
SSDEEP: | |
MD5: | C89EAA5B28DF1E17376BE71D71649173 |
SHA1: | 2B34DF4C66BB57DE5A24A2EF0896271DFCA4F4CD |
SHA-256: | 66B804E7A96A87C11E1DD74EA04AC2285DF5AD9043F48046C3E5000114D39B1C |
SHA-512: | B73D56304986CD587DA17BEBF21341B450D41861824102CC53885D863B118F6FDF2456B20791B9A7AE56DF91403F342550AF9E46F7401429FBA1D4A15A6BD3C0 |
Malicious: | false |
Reputation: | unknown |
URL: | https://strateweldingsupply0-my.sharepoint.com/ScriptResource.axd?d=GQCmJqA4eYb2TSj214APFzQ5EqHp3NSyob8OyQH2vxnRwPZ7PlQBTRYUTxkgHfw930FVDteHks5LyOzPET6wUnzcNhFB84NsrrMckwzm4NHixroqL0G023Sv5v-tia5NzG1FQJ6b5iRoJj5NU_CNj4Ky8ACDkrLIGhVfuhfXr-Rj8BxCFKOVh4yD9ma2PG_s0&t=2a9d95e3 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 16 |
Entropy (8bit): | 3.702819531114783 |
Encrypted: | false |
SSDEEP: | |
MD5: | 858372DD32511CB4DD08E48A93B4F175 |
SHA1: | CE4555B7B2EFBBD644D8E34CF3453A0E8CAA3C43 |
SHA-256: | 3D18F3E1469C83D62CF3A39BA93F8EAA5B22447FE630E59F39DC1B7747635359 |
SHA-512: | 6A57E0D4A1C23CB693AA9312F6FDAA1FC4309B5BC91D1B2279B5792BEE3534749FD3693C19AA95E0768800472D11D438EC3116F337679A249C28BE0E038E6DE0 |
Malicious: | false |
Reputation: | unknown |
URL: | https://content-autofill.googleapis.com/v1/pages/ChRDaHJvbWUvMTM0LjAuNjk5OC4zNhIZCZJtfF1WN2xyEgUN9IJXIiHbWQnLEsP1zw==?alt=proto |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 26951 |
Entropy (8bit): | 4.514992390210281 |
Encrypted: | false |
SSDEEP: | |
MD5: | B3D7A123BE5203A1A3F0F10233ED373F |
SHA1: | F4C61F321D8F79A805B356C6EC94090C0D96215C |
SHA-256: | EF9453F74B2617D43DCEF4242CF5845101FCFB57289C81BCEB20042B0023A192 |
SHA-512: | A01BFE8546E59C8AF83280A795B3F56DFA23D556B992813A4EB70089E80621686C7B51EE87B3109502667CAF1F95CBCA074BF607E543A0390BF6F8BB3ECD992B |
Malicious: | false |
Reputation: | unknown |
URL: | https://strateweldingsupply0-my.sharepoint.com/ScriptResource.axd?d=6xb0mkx3Nd8Zsr209JxKxK23NhWrjYYSbzucpWroW7ohyBYMsUIuJF99Od9L2nWysT44x1B9dKBAJzhgGKl7ITTmoFzK06Uf1w27Ok8hitXsuDDT-1mXHqXqjFWmm7p_GbE7jyVkGUS2bBirgORbxWVyL57Dx1NEre1a7J1sIjw1&t=ffffffffc7a8e318 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 3331 |
Entropy (8bit): | 7.927896166439245 |
Encrypted: | false |
SSDEEP: | |
MD5: | EF884BDEDEF280DF97A4C5604058D8DB |
SHA1: | 6F04244B51AD2409659E267D308B97E09CE9062B |
SHA-256: | 825DE044D5AC6442A094FF95099F9F67E9249A8110A2FBD57128285776632ADB |
SHA-512: | A083381C53070B65B3B8A7A7293D5D2674D2F6EC69C0E19748823D3FDD6F527E8D3D31D311CCEF8E26FC531770F101CDAF95F23ECC990DB405B5EF48B0C91BA2 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 23063 |
Entropy (8bit): | 4.7535440881548165 |
Encrypted: | false |
SSDEEP: | |
MD5: | 90EA7274F19755002360945D54C2A0D7 |
SHA1: | 647B5D8BF7D119A2C97895363A07A0C6EB8CD284 |
SHA-256: | 40732E9DCFA704CF615E4691BB07AECFD1CC5E063220A46E4A7FF6560C77F5DB |
SHA-512: | 7474667800FF52A0031029CC338F81E1586F237EB07A49183008C8EC44A8F67B37E5E896573F089A50283DF96A1C8F185E53D667741331B647894532669E2C07 |
Malicious: | false |
Reputation: | unknown |
URL: | https://strateweldingsupply0-my.sharepoint.com/WebResource.axd?d=mfEtoIhNDztfYoPjQ9yuEhQJPmB22UXQljmZyA_ivVmL7b0_Yc5nOzvvlspJQOir_DiV-sNmoWu1NqKRV1Td1w03gmDQYyll1HijRPRsiZQ1&t=638768124586963462 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 215 |
Entropy (8bit): | 5.322320669499417 |
Encrypted: | false |
SSDEEP: | |
MD5: | CA365124FCEB28F608A353D8F02126D3 |
SHA1: | BF5456EEF84925F22738F2802C4768ACFD290DDD |
SHA-256: | 5EFB80157016B9D3F4D440FDDE1AFCF0B90BE9E41B854750F207E276EDB50C52 |
SHA-512: | 3CA23D9BB82BC8835C169907C6058C99ADE14BB789F6D754FE45165BE96669B3D82393265499277B3D669AE65213A55F4519AA7AB08C0412CCB3E7327C20E811 |
Malicious: | false |
Reputation: | unknown |
URL: | https://res-1.cdn.office.net/files/odsp-web-prod_2025-04-11.009/@uifabric/file-type-icons/lib/initializeFileTypeIcons.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 17672 |
Entropy (8bit): | 5.233316811547578 |
Encrypted: | false |
SSDEEP: | |
MD5: | 6EFDDF589864D2E146A55C01C6764A35 |
SHA1: | EFA8BBA46CB97877EEC5430C43F0AC32585B6B2F |
SHA-256: | 2D92F0CE8491D2F9A27EA16D261A15089C4A9BE879D1EEDCB6F4A3859E7F1999 |
SHA-512: | 1AFC735660AAE010C04EF89C732D08EBA1B87BE6048164F273BEAEBECA3F30062812B4CD141DDF0291A6AB54F730875D597678A3564C0EED2AAC11E5400F951A |
Malicious: | false |
Reputation: | unknown |
URL: | https://res-1.cdn.office.net/bld/_layouts/15/16.0.26002.12010/require.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 69551 |
Entropy (8bit): | 5.669234294686659 |
Encrypted: | false |
SSDEEP: | |
MD5: | 999D8465744E351472D480E510A361C3 |
SHA1: | 8EA780217F8983A0AF55A4B1E2374F8CDFF820ED |
SHA-256: | 40C52E2F7B51021D62AEC3247EBC82DE6AAB271DE49FCCDB7B4E80C6BE620FB4 |
SHA-512: | B0387D85E43B7E3D74F04A1315A683B1B0AC8C45F9F00C704C4315E662969EDA4BE610C8A6D00380FD02BDDA5B93CD86EA09F7D96A795C25EE64DD1E91463053 |
Malicious: | false |
Reputation: | unknown |
URL: | https://strateweldingsupply0-my.sharepoint.com/:b:/g/personal/strate12_strateweldingsupply_com/EaHsj_nVZgpMr2t8b0-EVz8BpoZn0bBYspJRPwo3do3fFw?e=4%3aeOZ6Ey&at=9 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 48261 |
Entropy (8bit): | 5.404731705082535 |
Encrypted: | false |
SSDEEP: | |
MD5: | F5E62C426483ADAA5EC8CAD01EA2D175 |
SHA1: | 5F7BD8E2C5E0CCD99D5727C5F4D06B1838887814 |
SHA-256: | 8A2A5156B743C44F307158E8692CAFB47E3DF1F485AEFBC9BF3E52C175AAEB92 |
SHA-512: | B0083B9B5B3DD5CD0F562B2CA747A295BCF4086F92BCDED5C6114F4534EA612C034C87C6D4B050099B31FF0ECFEA8481AC360D504E094E46BF57942A4175DA45 |
Malicious: | false |
Reputation: | unknown |
URL: | https://res-1.cdn.office.net/files/odsp-web-prod_2025-04-11.009/spoguestaccesswebpack/spoguestaccess.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 7886 |
Entropy (8bit): | 3.9482833105763633 |
Encrypted: | false |
SSDEEP: | |
MD5: | 0B60F3C9E4DA6E807E808DA7360F24F2 |
SHA1: | 9AFC7ABB910DE855EFB426206E547574A1E074B7 |
SHA-256: | ADDEEDEEEF393B6B1BE5BBB099B656DCD797334FF972C495CCB09CFCB1A78341 |
SHA-512: | 1328363987ABBAD1B927FC95F0A3D5646184EF69D66B42F32D1185EE06603AE1A574FAC64472FB6E349C2CE99F9B54407BA72B2908CA7AB01D023EC2F47E7E80 |
Malicious: | false |
Reputation: | unknown |
Preview: |