Edit tour

Windows Analysis Report
https://trinitycentermri.ramsoftpacs.com/powerreader/Login.aspx

Overview

General Information

Sample URL:https://trinitycentermri.ramsoftpacs.com/powerreader/Login.aspx
Analysis ID:1336780

Detection

Score:2
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Stores files to the Windows start menu directory
Detected clear text password fields (password is not hidden)
HTML body contains low number of good links
Creates files inside the system directory

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64_ra
  • chrome.exe (PID: 4960 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://trinitycentermri.ramsoftpacs.com/powerreader/Login.aspx MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
    • chrome.exe (PID: 6404 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 --field-trial-handle=2008,i,10758705735609428747,5383611793741358857,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
  • cleanup
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: https://trinitycentermri.ramsoftpacs.com/powerreader/Login.aspxHTTP Parser: <input type="text"... for password input
Source: https://trinitycentermri.ramsoftpacs.com/powerreader/Login.aspxHTTP Parser: Number of links: 0
Source: https://trinitycentermri.ramsoftpacs.com/powerreader/Login.aspxHTTP Parser: <input type="password" .../> found
Source: https://trinitycentermri.ramsoftpacs.com/powerreader/Login.aspxHTTP Parser: No <meta name="author".. found
Source: https://trinitycentermri.ramsoftpacs.com/powerreader/Login.aspxHTTP Parser: No <meta name="author".. found
Source: https://trinitycentermri.ramsoftpacs.com/powerreader/Login.aspxHTTP Parser: No <meta name="author".. found
Source: https://trinitycentermri.ramsoftpacs.com/powerreader/Login.aspxHTTP Parser: No <meta name="author".. found
Source: https://trinitycentermri.ramsoftpacs.com/powerreader/Login.aspxHTTP Parser: No <meta name="author".. found
Source: https://trinitycentermri.ramsoftpacs.com/powerreader/Login.aspxHTTP Parser: No <meta name="copyright".. found
Source: https://trinitycentermri.ramsoftpacs.com/powerreader/Login.aspxHTTP Parser: No <meta name="copyright".. found
Source: https://trinitycentermri.ramsoftpacs.com/powerreader/Login.aspxHTTP Parser: No <meta name="copyright".. found
Source: https://trinitycentermri.ramsoftpacs.com/powerreader/Login.aspxHTTP Parser: No <meta name="copyright".. found
Source: https://trinitycentermri.ramsoftpacs.com/powerreader/Login.aspxHTTP Parser: No <meta name="copyright".. found
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\Chrome\Application\Dictionaries
Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.17:49770 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.190.151.132:443 -> 192.168.2.17:49773 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.21.200:443 -> 192.168.2.17:49774 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.5.88:443 -> 192.168.2.17:49777 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.17:49778 version: TLS 1.2
Source: chrome.exeMemory has grown: Private usage: 12MB later: 26MB
Source: unknownDNS traffic detected: queries for: trinitycentermri.ramsoftpacs.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49684 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
Source: unknownNetwork traffic detected: HTTP traffic on port 49822 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49822
Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.84
Source: unknownTCP traffic detected without corresponding DNS query: 13.67.144.177
Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.84
Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.84
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.58
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.58
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 13.67.144.177
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.84
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 13.67.144.177
Source: unknownTCP traffic detected without corresponding DNS query: 104.66.243.145
Source: unknownTCP traffic detected without corresponding DNS query: 23.217.42.68
Source: unknownTCP traffic detected without corresponding DNS query: 104.66.243.145
Source: unknownTCP traffic detected without corresponding DNS query: 23.217.42.68
Source: unknownTCP traffic detected without corresponding DNS query: 23.217.42.68
Source: unknownTCP traffic detected without corresponding DNS query: 23.205.104.24
Source: unknownTCP traffic detected without corresponding DNS query: 23.205.104.24
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.151.132
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.151.132
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.151.132
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.151.132
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.151.132
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.151.132
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.151.132
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.151.132
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.151.132
Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.17:49770 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.190.151.132:443 -> 192.168.2.17:49773 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.21.200:443 -> 192.168.2.17:49774 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.5.88:443 -> 192.168.2.17:49777 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.17:49778 version: TLS 1.2
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_BITS_4960_549010576
Source: classification engineClassification label: clean2.win@14/13@12/117
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://trinitycentermri.ramsoftpacs.com/powerreader/Login.aspx
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 --field-trial-handle=2008,i,10758705735609428747,5383611793741358857,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 --field-trial-handle=2008,i,10758705735609428747,5383611793741358857,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Program Files\Google\Chrome\Application\Dictionaries
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\Chrome\Application\Dictionaries
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
13
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local SystemExfiltration Over Other Network Medium2
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Non-Application Layer Protocol
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)1
Extra Window Memory Injection
1
Extra Window Memory Injection
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
Application Layer Protocol
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://trinitycentermri.ramsoftpacs.com/powerreader/Login.aspx0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
accounts.google.com
142.251.16.84
truefalse
    high
    www.google.com
    142.251.167.106
    truefalse
      high
      clients.l.google.com
      142.251.163.113
      truefalse
        high
        clients1.google.com
        unknown
        unknownfalse
          high
          clients2.google.com
          unknown
          unknownfalse
            high
            trinitycentermri.ramsoftpacs.com
            unknown
            unknownfalse
              unknown
              NameMaliciousAntivirus DetectionReputation
              https://trinitycentermri.ramsoftpacs.com/powerreader/Login.aspxfalse
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                142.251.167.94
                unknownUnited States
                15169GOOGLEUSfalse
                52.247.199.7
                unknownUnited States
                8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                1.1.1.1
                unknownAustralia
                13335CLOUDFLARENETUSfalse
                239.255.255.250
                unknownReserved
                unknownunknownfalse
                142.251.111.95
                unknownUnited States
                15169GOOGLEUSfalse
                142.251.16.84
                accounts.google.comUnited States
                15169GOOGLEUSfalse
                142.251.111.94
                unknownUnited States
                15169GOOGLEUSfalse
                142.251.163.113
                clients.l.google.comUnited States
                15169GOOGLEUSfalse
                142.251.167.106
                www.google.comUnited States
                15169GOOGLEUSfalse
                172.253.63.113
                unknownUnited States
                15169GOOGLEUSfalse
                IP
                192.168.2.17
                192.168.2.4
                Joe Sandbox Version:38.0.0 Ammolite
                Analysis ID:1336780
                Start date and time:2023-11-03 16:28:48 +01:00
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:defaultwindowsinteractivecookbook.jbs
                Sample URL:https://trinitycentermri.ramsoftpacs.com/powerreader/Login.aspx
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:15
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • EGA enabled
                Analysis Mode:stream
                Analysis stop reason:Timeout
                Detection:CLEAN
                Classification:clean2.win@14/13@12/117
                • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe
                • Excluded IPs from analysis (whitelisted): 142.251.111.94, 52.247.199.7, 34.104.35.123, 142.251.111.95, 142.251.163.95, 142.250.31.95, 172.253.62.95, 172.253.63.95, 172.253.115.95, 142.251.167.95, 142.251.16.95, 172.253.122.95
                • Excluded domains from analysis (whitelisted): edgedl.me.gvt1.com, content-autofill.googleapis.com, clientservices.googleapis.com, vm-wus2-tc.westus2.cloudapp.azure.com
                • Not all processes where analyzed, report is missing behavior information
                • VT rate limit hit for: https://trinitycentermri.ramsoftpacs.com/powerreader/Login.aspx
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Nov 3 14:29:18 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2677
                Entropy (8bit):3.987793416899419
                Encrypted:false
                SSDEEP:
                MD5:F9E72DBCE364E43AB87934A6996271E6
                SHA1:F35409F403D9FD32B2E130D4A90720EA8067281D
                SHA-256:1514F25E7DD776C0D42B886E817362BE1AD9AB73F70B5F7D551FBF550E602F9F
                SHA-512:4191B8FF9095E909DA0E8F7B140F23FD09FA1EB29A7404DA125BD7699E6C6003479192C6972BD592F65AFE32F4C0D7A8F2DC5F47B598E792D3AFB0375E6FADB8
                Malicious:false
                Reputation:low
                Preview:L..................F.@.. ...$+.,......j.......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.IcW.{....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VcW.{....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.VcW.{....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.VcW.{...........................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VcW.{...........................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........a4.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Nov 3 14:29:18 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2679
                Entropy (8bit):4.00234472181907
                Encrypted:false
                SSDEEP:
                MD5:578D8DD0B9A65DE800AF5A5D5ECCC3C9
                SHA1:ECB9A5995BCA3646D91560840A55AC88FC907C44
                SHA-256:D6551CD77CBBDAD83242663B5F1FA01CB52056DDDDF4970B8F98D60A1DFECEC8
                SHA-512:B5C7F69BAF9C5D7C3AACA9A1B753FCAE56B5B0751B1CFA0F30ADAB77E76896133541972A4204923EE4CCB5CE09B377DA7910CED2F103B274B758F6B166B01ECA
                Malicious:false
                Reputation:low
                Preview:L..................F.@.. ...$+.,.....q.j.......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.IcW.{....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VcW.{....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.VcW.{....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.VcW.{...........................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VcW.{...........................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........a4.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:54:41 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2693
                Entropy (8bit):4.011477740108181
                Encrypted:false
                SSDEEP:
                MD5:CA4495255B083E09EE41D478582D0E14
                SHA1:36ADD6C408C5CF703243B9299115CBD12EAD8D93
                SHA-256:4F3DB7584CA02B07E46B6CF114E0F66B5C9D51173E477747C9428471F831972B
                SHA-512:471CDAC07D68F6192F9E28B7FF29787A2C78708C0E4C48935E10C2F1574A5499448DB1573E93B571D49B06BF0B9694D2B1E1F5AB38952BD8C35A399B0F90E9CE
                Malicious:false
                Reputation:low
                Preview:L..................F.@.. ...$+.,.....v. ;.......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.IcW.{....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VcW.{....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.VcW.{....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.VcW.{...........................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VFW.N...........................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........a4.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Nov 3 14:29:18 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2681
                Entropy (8bit):4.001360555256156
                Encrypted:false
                SSDEEP:
                MD5:5925DD114C8A32B5E79307F0059408E3
                SHA1:0E576F1B4EB91F6618768C9CD30669A5DB2E5833
                SHA-256:C2CF0D7F8BE5B0D7B99AD3D19420CFD43D2DA754AA1C721CA515021469C574EE
                SHA-512:A20CAD966C4B31B0EC1D5737632F5C815756CF3E4FAFD7EB9274846E4D142E9152ABECEADD12DDAFDF55BD60658F1F9768CD3430D1FE05D052ED5592D19477CE
                Malicious:false
                Reputation:low
                Preview:L..................F.@.. ...$+.,....F..j.......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.IcW.{....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VcW.{....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.VcW.{....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.VcW.{...........................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VcW.{...........................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........a4.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Nov 3 14:29:18 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2681
                Entropy (8bit):3.992629912599831
                Encrypted:false
                SSDEEP:
                MD5:D7B3BD38808C54889A31A982E276FE26
                SHA1:D547955C84FA046EC2879CA83012482335075346
                SHA-256:2BFA7ED234D80FBC3CD1520EF12DEA10CA4624DC5F8B96D1AEAD9D71430A1F2E
                SHA-512:3F74D87AE6F447E0C312202F28127A89E8D0685704B3D30E18EE72B7BC8FB9392B8974EB2DA9F62D47C237645F6BC86E0E338FBB7BFEB14E0C8EEE942BFC92A0
                Malicious:false
                Reputation:low
                Preview:L..................F.@.. ...$+.,.......j.......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.IcW.{....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VcW.{....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.VcW.{....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.VcW.{...........................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VcW.{...........................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........a4.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Nov 3 14:29:18 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2683
                Entropy (8bit):4.003510113992286
                Encrypted:false
                SSDEEP:
                MD5:4CA72C1F3892E1E2534C3C2244B49E60
                SHA1:64BC4F193CE85F7B3AB3EBF584A6C795BB5CCF29
                SHA-256:3C982692434BBF396880A42E80EFC0BEFCEF0B3E477050FAA0CE0E31C838310D
                SHA-512:4731CF4BB2F4B4497F90382A6A4D224700182F7D7061B8552AA958636D5C2B17A90D809C4BF5A6D049B37A6E7AF4CFA62FF98EEC201DE92D2714B41FD000B6A9
                Malicious:false
                Reputation:low
                Preview:L..................F.@.. ...$+.,....!..j.......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.IcW.{....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VcW.{....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.VcW.{....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.VcW.{...........................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VcW.{...........................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........a4.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with no line terminators
                Category:downloaded
                Size (bytes):64
                Entropy (8bit):4.958918898701708
                Encrypted:false
                SSDEEP:
                MD5:F06036CFC59F5EB66A1C99889CCCCEB9
                SHA1:8242C9556D50C44C6E433CEAD259BE0886E9FFDB
                SHA-256:33DF26F9146A66B0B7140905EBAE008D052302EC2BFC7E163D69912AD7821104
                SHA-512:A521FFFC5304D90B63F0C009328FF71683B0AA3C45616131D255F35A7D47260B8DBFE195EA95E0CB1E3E35B3C9668030442D9D6D9CBD3D708D3DB51604048A63
                Malicious:false
                Reputation:low
                URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xNDkSJQnnjHGag4N18xIFDT_LuO8SBQ2RYZVOEgUNOpa9ShIFDXQHbuk=?alt=proto
                Preview:CiwKCw0/y7jvGgQIVhgCCgcNkWGVThoACgsNOpa9ShoECEsYAgoHDXQHbukaAA==
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows icon resource - 1 icon, 32x32, 8 bits/pixel
                Category:dropped
                Size (bytes):2238
                Entropy (8bit):5.205305174949124
                Encrypted:false
                SSDEEP:
                MD5:5172D95FBC3B777E57BABE3C8220DA6E
                SHA1:7BDF6AE418915187BCF3AEF05C5560038CA56A84
                SHA-256:CFE6124C7586081E88DA8DDBF24852B44105ECE8BD358FFFDCA0EDDA64FAECBF
                SHA-512:2597B4EB5EE3098071C3D1851647B017B04B99F9DA49D9B168DC341C2A805540F2C060D57B0D75DC221AE5A68CD8758F0328982020F450387E3001C55138EEF0
                Malicious:false
                Reputation:low
                Preview:...... ..............(... ...@...................................................'%..97..86..?=..HF..EC..DB..CA..KI..RP..db..ec..fd..fd..db..fd..fd..fd..us..............................................#...#..."..."...!... ... ..........................."...#..."...!...!... ... ...................................................!...1,...*..,(..*'..)&..0-..0-..<8..=9..;8..96..63..JG..IF..IF..HE..HD..GD..FC..ZV..ZV..YV..XU..YV..XU..XU..WT..WT..WT..fc..gd..gd..eb..fc..^\..ec..db..vs..db..ec..db..ur..db..db..ca..tq..db..ca..b`..b`..ur..b`..om..nl...}...~..............}{............................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:TrueType Font data, 18 tables, 1st "FFTM", 8 names, Microsoft, language 0x409, Copyright (c) 2010-2011 by tyPoland Lukasz Dziedzic with Reserved Font Name "Lato". Licensed und
                Category:downloaded
                Size (bytes):45184
                Entropy (8bit):6.702692811783243
                Encrypted:false
                SSDEEP:
                MD5:60FB6FD17AEDB1CE90156C2F714851C3
                SHA1:71DA04DA7634CD0DA2700A6B24F2ECF8A2A7DE81
                SHA-256:D60ADAC573EB17F8D766FA704BCBAA91270144375B685109576CD0B1908F7A95
                SHA-512:E3282C991A523E0050D375F3D3E679DE37DA54BC47B9C215BF481922023548B1CABCE8A536C3266ACFA95F790334C41C41D9429C678C204CD4917DF8B7AC504C
                Malicious:false
                Reputation:low
                URL:https://trinitycentermri.ramsoftpacs.com/powerreader/fonts/lato/Lato-Reg-webfont.ttf
                Preview:........... FFTM`..S...,....GDEF.......H...,GPOS.O.....t....GSUB.......,...0OS/2..y...\...`cmap..K2........cvt .8.........:fpgm../........egasp.......D....glyf.Wd....L....head.......d...6hhea.|.........$hmtx.7R.........loca...L........maxp...E...h... name;FRN........posta........./prep.L.U...D...9.........o1.....................$.........................................0.>..DFLT..latn............................kern.............................k.........x.x.*...R.(...N...N.....".........*.p.N.......R.......Z...............(.....(.............N.N...N.....R.R.R.R.R.R.(...........................................................................x.....x.........E...F...F...........F.#...$.F.&...*...2...4...9.1.:.1.<...?.1.D...F...G...H...R...T...m.J.o.J.y.J.}.J...F...F...F...F...F...F...F...........................................................................................................................J...J...........J...J...J. .....#...&...*...2...4...F...G...H...R...T........
                No static file info