Edit tour

Windows Analysis Report
https://web1.zixmail.net/s/e?b=mnbsf&

Overview

General Information

Sample URL:https://web1.zixmail.net/s/e?b=mnbsf&
Analysis ID:1368993

Detection

Score:2
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Creates files inside the system directory
HTML body contains low number of good links
HTML title does not match URL
Stores files to the Windows start menu directory
Uses insecure TLS / SSL version for HTTPS connection

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64_ra
  • chrome.exe (PID: 6728 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://web1.zixmail.net/s/e?b=mnbsf& MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
    • chrome.exe (PID: 6052 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1956,i,16294679716487930389,17745455621146004636,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
  • cleanup
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: https://web1.zixmail.net/s/e?b=mnbsf&HTTP Parser: Number of links: 0
Source: https://web1.zixmail.net/s/e?b=mnbsf&HTTP Parser: Title: Mission National Bank Password Authorization does not match URL
Source: https://web1.zixmail.net/s/e?b=mnbsf&HTTP Parser: <input type="password" .../> found
Source: https://web1.zixmail.net/s/e?b=mnbsf&HTTP Parser: No favicon
Source: https://web1.zixmail.net/s/e?b=mnbsf&HTTP Parser: No <meta name="author".. found
Source: https://web1.zixmail.net/s/e?b=mnbsf&HTTP Parser: No <meta name="copyright".. found
Source: unknownHTTPS traffic detected: 173.222.162.7:443 -> 192.168.2.18:49759 version: TLS 1.0
Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.18:49756 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.18:49760 version: TLS 1.2
Source: unknownHTTPS traffic detected: 173.222.162.7:443 -> 192.168.2.18:49759 version: TLS 1.0
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.7
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.7
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.7
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.7
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.7
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.7
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.7
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.7
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.7
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.7
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.7
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 23.40.70.2
Source: unknownTCP traffic detected without corresponding DNS query: 23.40.70.2
Source: unknownTCP traffic detected without corresponding DNS query: 23.40.70.2
Source: unknownDNS traffic detected: queries for: web1.zixmail.net
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.18:49756 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.18:49760 version: TLS 1.2
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_BITS_6728_304014683
Source: classification engineClassification label: clean2.win@14/64@12/113
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://web1.zixmail.net/s/e?b=mnbsf&
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1956,i,16294679716487930389,17745455621146004636,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1956,i,16294679716487930389,17745455621146004636,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
Valid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
11
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local SystemExfiltration Over Other Network Medium2
Encrypted Channel
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Non-Application Layer Protocol
SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
Domain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
Application Layer Protocol
Data Encrypted for ImpactDNS ServerEmail Addresses

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://web1.zixmail.net/s/e?b=mnbsf&0%Avira URL Cloudsafe
https://web1.zixmail.net/s/e?b=mnbsf&0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
accounts.google.com
142.250.138.84
truefalse
    high
    web1.zixmail.net
    63.71.15.50
    truefalse
      high
      www.google.com
      142.250.114.106
      truefalse
        high
        clients.l.google.com
        142.250.138.113
        truefalse
          high
          clients1.google.com
          unknown
          unknownfalse
            high
            clients2.google.com
            unknown
            unknownfalse
              high
              NameMaliciousAntivirus DetectionReputation
              https://web1.zixmail.net/s/e?b=mnbsf&false
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                142.251.116.100
                unknownUnited States
                15169GOOGLEUSfalse
                1.1.1.1
                unknownAustralia
                13335CLOUDFLARENETUSfalse
                239.255.255.250
                unknownReserved
                unknownunknownfalse
                63.71.15.50
                web1.zixmail.netUnited States
                13380ASN-CUSTUSfalse
                142.250.138.113
                clients.l.google.comUnited States
                15169GOOGLEUSfalse
                142.250.114.106
                www.google.comUnited States
                15169GOOGLEUSfalse
                142.250.138.94
                unknownUnited States
                15169GOOGLEUSfalse
                142.250.115.94
                unknownUnited States
                15169GOOGLEUSfalse
                142.251.116.95
                unknownUnited States
                15169GOOGLEUSfalse
                142.250.138.84
                accounts.google.comUnited States
                15169GOOGLEUSfalse
                IP
                192.168.2.14
                192.168.2.18
                Joe Sandbox version:38.0.0 Ammolite
                Analysis ID:1368993
                Start date and time:2024-01-02 20:51:57 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:defaultwindowsinteractivecookbook.jbs
                Sample URL:https://web1.zixmail.net/s/e?b=mnbsf&
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:5
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • EGA enabled
                Analysis Mode:stream
                Analysis stop reason:Timeout
                Detection:CLEAN
                Classification:clean2.win@14/64@12/113
                • Exclude process from analysis (whitelisted): SIHClient.exe
                • Excluded IPs from analysis (whitelisted): 72.21.81.200, 142.250.138.94, 34.104.35.123, 142.251.116.95, 142.250.113.95, 142.250.114.95, 142.250.138.95, 142.250.115.95
                • Excluded domains from analysis (whitelisted): wildcardtlu.azureedge.net, cdp-tlu-shim.trafficmanager.net, edgedl.me.gvt1.com, content-autofill.googleapis.com, msedge.b.tlu.dl.delivery.mp.microsoft.com, clientservices.googleapis.com, wildcardtlu.ec.azureedge.net, dns.msftncsi.com, cs9.wpc.v0cdn.net
                • Not all processes where analyzed, report is missing behavior information
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jan 2 18:52:26 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2675
                Entropy (8bit):3.979162247943638
                Encrypted:false
                SSDEEP:
                MD5:7834607A5E9B4D63258E46BE03D7BB33
                SHA1:3E52981BD49FCBC1FC29CF90025816E5A8E6387D
                SHA-256:0AACC150CB9FB78CBABB603E6F54AA748213DC546D3361FC00140F06829A6724
                SHA-512:76B91298A2C2FD0D77F3D16EE435F8E2919FA7F27D40A9538299CFF2D3E993710F00180C86978AFC048CE8693815F8CB4022358D87CB21414B3EEC75F3B9CA22
                Malicious:false
                Reputation:low
                Preview:L..................F.@.. ...$+.,......)6.=......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.R..PROGRA~1..t......O.I"X......B...............J......Y..P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V"X......L.....................p+j.G.o.o.g.l.e.....T.1.....FW.R..Chrome..>......CW.V"X......M......................pd.C.h.r.o.m.e.....`.1.....FW.R..APPLIC~1..H......CW.V"X.............................pd.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V"X.......#......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............\o......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jan 2 18:52:26 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2677
                Entropy (8bit):3.993388099895696
                Encrypted:false
                SSDEEP:
                MD5:5EB27CB39580137445F7E5EDB442BDDF
                SHA1:4F1B67E67386391A01CDE800215F8FD0C074A116
                SHA-256:DE34790017DFD6247CC0546BEA4897BCB390C4002002E1A0746AAFB563ADF76C
                SHA-512:96980A1A507CDB7D935D86429972B6A3ECE3B42289F18F6C02B107B8A7A614A19EC04D1367606104466AC67013EE2C5A75E2D8BF13DB348B6B89AB263E069909
                Malicious:false
                Reputation:low
                Preview:L..................F.@.. ...$+.,.....~.6.=......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.R..PROGRA~1..t......O.I"X......B...............J......Y..P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V"X......L.....................p+j.G.o.o.g.l.e.....T.1.....FW.R..Chrome..>......CW.V"X......M......................pd.C.h.r.o.m.e.....`.1.....FW.R..APPLIC~1..H......CW.V"X.............................pd.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V"X.......#......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............\o......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 09:23:19 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2691
                Entropy (8bit):4.001880042340615
                Encrypted:false
                SSDEEP:
                MD5:A61EA5416EFE9643EC02EDAF64314749
                SHA1:1DF7F701A667FFE4FFF053C51FF6E9E033A2138D
                SHA-256:301DBD9A602B7BAD8EF967A037B575C46614592EB134DF9804E7418649340EDF
                SHA-512:2DCB3B8D1C462BFA9A26E48259BF7F7BB6B1B5B44E7760C3CA62DD853D5CC6963F1B1072EB3D5D3F577813FD4D597C1F1E40102AD9DC491FD8F103DE47C5E12A
                Malicious:false
                Reputation:low
                Preview:L..................F.@.. ...$+.,....?.4 ?.......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.R..PROGRA~1..t......O.I"X......B...............J......Y..P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V"X......L.....................p+j.G.o.o.g.l.e.....T.1.....FW.R..Chrome..>......CW.V"X......M......................pd.C.h.r.o.m.e.....`.1.....FW.R..APPLIC~1..H......CW.V"X.............................pd.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VFW.R.....#......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............\o......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jan 2 18:52:26 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2679
                Entropy (8bit):3.9906425988984164
                Encrypted:false
                SSDEEP:
                MD5:B269CFABA87E9E71E2B00B785A774F17
                SHA1:074142DCE65DB117B7FCBFDFFA376A2B1ADFE29D
                SHA-256:9D7E23AB872601E12233275EA60CDEF6B69219A8379F7EBB93F65E223ACF22C2
                SHA-512:E72439AD873BB632780D8A266DFBEB3A36791E46E4735A21B393F00FBCE3036D2D1398CB4668B544F23A682F40488AA05728E82CDEA3727D81462AC57F12782B
                Malicious:false
                Reputation:low
                Preview:L..................F.@.. ...$+.,.....u.6.=......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.R..PROGRA~1..t......O.I"X......B...............J......Y..P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V"X......L.....................p+j.G.o.o.g.l.e.....T.1.....FW.R..Chrome..>......CW.V"X......M......................pd.C.h.r.o.m.e.....`.1.....FW.R..APPLIC~1..H......CW.V"X.............................pd.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V"X.......#......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............\o......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jan 2 18:52:26 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2679
                Entropy (8bit):3.9813439922308413
                Encrypted:false
                SSDEEP:
                MD5:C763448F57D7C7295CCC56A8F48E9012
                SHA1:6B7CBACAD373D901CBA2BDA6FC00C00626623993
                SHA-256:706635618767121F871669295C6FCEFBDC2A665E7E556FA9DD96382D7BA737A7
                SHA-512:F4ED3CCE1A27493AA3A764F9F94744B5DA9229D15ACC4DFB33C68BCD8ECCDD0941B619A7A6CF9172A07475F01488B05952B3014A471CFC15A626605713F934B8
                Malicious:false
                Reputation:low
                Preview:L..................F.@.. ...$+.,......$6.=......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.R..PROGRA~1..t......O.I"X......B...............J......Y..P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V"X......L.....................p+j.G.o.o.g.l.e.....T.1.....FW.R..Chrome..>......CW.V"X......M......................pd.C.h.r.o.m.e.....`.1.....FW.R..APPLIC~1..H......CW.V"X.............................pd.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V"X.......#......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............\o......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jan 2 18:52:26 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2681
                Entropy (8bit):3.990464153724291
                Encrypted:false
                SSDEEP:
                MD5:043C2647CF6F4AB1EDACA6DF3F89EBD0
                SHA1:5A2F0E416C4B2DC868CF9EC7AC65AA4DCFDFEDFE
                SHA-256:58CEB5C0AE6CD9540A686BEF5440F1013AB63C19450DD8FA799CE95A5C0FE289
                SHA-512:8FC2DE1539FA5A5B6AD9DE246FC42C5CAE578F16C2B598C477E1EB2DBFCF78DF1787766A347D11D649D2F18EDF854A28D1E83FD48378AA25D4C6B3AF66BC855D
                Malicious:false
                Reputation:low
                Preview:L..................F.@.. ...$+.,....*_.6.=......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.R..PROGRA~1..t......O.I"X......B...............J......Y..P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V"X......L.....................p+j.G.o.o.g.l.e.....T.1.....FW.R..Chrome..>......CW.V"X......M......................pd.C.h.r.o.m.e.....`.1.....FW.R..APPLIC~1..H......CW.V"X.............................pd.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V"X.......#......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............\o......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:GIF image data, version 89a, 1200 x 130
                Category:downloaded
                Size (bytes):2926
                Entropy (8bit):6.839978812802928
                Encrypted:false
                SSDEEP:
                MD5:D48F93267419F13EE0F3A775FA48EE6A
                SHA1:CD3924AB285A897E452054ADB8D187108BDD3824
                SHA-256:D674FFCC6A5CE458811EC06A6E5CBD2574D2C1FA9390E4CE55927187EF1E5C6C
                SHA-512:0CA798B19601BE00038956E17B89C7D8EED9F75B4F2F63D42C2EAEE41D37B2C67E9E977428B82E50B84B9EDC09C1DD55FA1A508EE4F1C905820B33E0DC410959
                Malicious:false
                Reputation:low
                URL:https://web1.zixmail.net/i/mnbsf/top_20160531_0714.gif
                Preview:GIF89a......."I.=OsLQmYTfvZZgW`.G..G.#R.1].@i.Ot.]..l..{...h:.]S._M.bF.d@.j3.m-.o&.s!.{...<..J..X..f..t.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................!.......,...............H......*\....#J.H....3j.... C..I...(S.\...0c.I...8s.....@...J...H.*]...P.J.J...X.j....`..K...h.]...p..K...x..........L.....+^....#K.L....3k.....C..M....S.^....
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text
                Category:downloaded
                Size (bytes):288580
                Entropy (8bit):5.066983843372853
                Encrypted:false
                SSDEEP:
                MD5:2849239B95F5A9A2AEA3F6ED9420BB88
                SHA1:AF32F706407AB08F800C5E697CCE92466E735847
                SHA-256:1FE2BB5390A75E5D61E72C107CAB528FC3C29A837D69AAB7D200E1DBB5DCD239
                SHA-512:9FFE201D6DDAB4CDD0A9171B0A7E9EC26A7170B00719A0E3A4406EE3165DE3B3745B6A10FBAABBA1CDCF5ECB6B2585DC6CD535387750D53EE900FFA08B962EF2
                Malicious:false
                Reputation:low
                URL:https://web1.zixmail.net/s/REL-6.3.11-release.1.39489/scripts/jquery/jquery.js
                Preview:/*!. * jQuery JavaScript Library v3.6.0. * https://jquery.com/. *. * Includes Sizzle.js. * https://sizzlejs.com/. *. * Copyright OpenJS Foundation and other contributors. * Released under the MIT license. * https://jquery.org/license. *. * Date: 2021-03-02T17:08Z. */.( function( global, factory ) {..."use strict";...if ( typeof module === "object" && typeof module.exports === "object" ) {....// For CommonJS and CommonJS-like environments where a proper `window`...// is present, execute the factory and get jQuery....// For environments that do not have a `window` with a `document`...// (such as Node.js), expose a factory as module.exports....// This accentuates the need for the creation of a real `window`....// e.g. var jQuery = require("jquery")(window);...// See ticket #14549 for more info....module.exports = global.document ?....factory( global, true ) :....function( w ) {.....if ( !w.document ) {......throw new Error( "jQuery requires a window with a document" );.....}.....return fa
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text
                Category:downloaded
                Size (bytes):109
                Entropy (8bit):4.682630221661915
                Encrypted:false
                SSDEEP:
                MD5:56A5BB37719239FD5EA38C789FBC0E39
                SHA1:079B63878CBDA4DF4B9534257E36F3734D3B13BD
                SHA-256:5F180D55F25EAEBF710C3ADF71EEC2D704C42EAEA452AA3120126D873F281509
                SHA-512:10DA22386141936B82350D0083FA4D1E42FF51D9DD7808FEE0963E6A05B2D4AA571AA82DBD4BC6C58FEDA9E6130BFD3F285FD58E7EFBB1F4C1266D22DC8E4F32
                Malicious:false
                Reputation:low
                URL:https://web1.zixmail.net/s/CON-566f38d3/mnbsf_stylesheet_mobile.css
                Preview:#secondarybranding {min-height:1em;}.#secondarybrandinginfotext {padding:6px;min-height:1em;font-size:0.7em}.
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with very long lines (736)
                Category:downloaded
                Size (bytes):2795
                Entropy (8bit):4.998137030841464
                Encrypted:false
                SSDEEP:
                MD5:EC2CE98C11C47F6E4FEC84470A74011D
                SHA1:C3092CAB18EA755A164E1ADC888C9F0D17FBE097
                SHA-256:9067BAB2250174B292E6970C58650C11096A29887FD47FB716355AEB50F8F0EF
                SHA-512:E72AD9740358F9C93D3612BCD9CC91F3C084F02D4CA6CED4C7B89D3A887DA7C3FCAFEC23DD50FBFD656EC30E1749B5844A9E8B5A71D270B93D0891F20B0CAE96
                Malicious:false
                Reputation:low
                URL:https://web1.zixmail.net/s/CON-596d78f3/mnbsf_stylesheet.css
                Preview:#messagetextcontainer .cke_1 .cke_wrapper,#messagetextcontainer .cke_1_dialog .cke_dialog_contents,#messagetextcontainer .cke_1_dialog a.cke_dialog_tab,#messagetextcontainer .cke_1_dialog .cke_dialog_footer {background-color:#f2f2f2 !important;}.#topaccent1,#topaccent2,#bottomaccent1,#bottomaccent2 {border-top-color:#0f3463;}..topaccent3 {..border-top-color:#0f3463;..border-bottom-color:#0f3463;.}..navlinkon,#navbarpagelabel {color:#000000;}.#mailkey,#sentitemskey,#draftitemskey,#addressbookkey,#mailkey li,#sentitemskey li,#draftitemskey li,#addressbookkey li {border-color:#0f3463;}.#changepasswordlink a:hover,#createaccountlink a:hover,#helplink a:hover,#layerbrandheader .access:hover,#composebody #attach .button:hover,#replybody #attach .button:hover,#submitbutton input:hover,#actions input:hover,#changepassinfo #submitbutton:hover,#registerinfo #submitbutton:hover,#attachmentfiles .button:hover,#errorbody #submitbutton:hover,#acceptbody #submitbutton:hover,#cancelbody .button:hover,
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text
                Category:downloaded
                Size (bytes):3872
                Entropy (8bit):5.46034012764402
                Encrypted:false
                SSDEEP:
                MD5:1BB76B6E62A47BD8E54BAAF5DA382B78
                SHA1:EEEF314B661E68472400BBD9D477E86D77FCAAE5
                SHA-256:B0C0E3C8FCF8160433ADE6287C7022FE3E8AE2F9D473762238977712791629D2
                SHA-512:F4E1D3A6AFA901C23D779914DB5BB77D65C72EF8CE112BDCE098B874BBC072C168FF71C549A92C9B650A687A676290D53EE7ECF64A7540F111AC5BEE31BF0AA7
                Malicious:false
                Reputation:low
                URL:https://web1.zixmail.net/s/REL-6.3.11-release.1.39489/default_validatorconstants_en.js
                Preview:NAME_CHAR_SET = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ-'.~";.NAME_MIN_LENGTH = 1;.NAME_MAX_LENGTH = 254;..FIRST_NAME_WARN_MISSING = "Enter your first name.";.FIRST_NAME_WARN_CONTENT = "Your First Name must be corrected before continuing.\nYou must remove the prohibited characters from your First Name.";..LAST_NAME_WARN_MISSING = "You must enter your Last Name before continuing.";.LAST_NAME_WARN_CONTENT = "Your Last Name must be corrected before continuing.\nYou must remove the prohibited characters from your Last Name.";...MIDDLE_INITIAL_CHAR_SET = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ";.MIDDLE_INITIAL_MIN_LENGTH = 0;.MIDDLE_INITIAL_MAX_LENGTH = 1;..MIDDLE_INITIAL_WARN_CONTENT = "Your Middle Initial must be corrected before continuing.\nYou must remove the prohibited characters from your Middle Initial.";..EMAIL_ADDRESS_WARN_INVALID = "The email address you entered is invalid.";..PASSWORD_CHAR_SET = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKL
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text
                Category:downloaded
                Size (bytes):2552
                Entropy (8bit):4.878673329767581
                Encrypted:false
                SSDEEP:
                MD5:372E5E534B2F2DD81AD3647ACA4782D4
                SHA1:CFAFD72458521B6896D16B17F47C31B5B20009D2
                SHA-256:FE8E6E29FD6FF507EB4320931B53996D1D20EB33CB2A3BE0DBA694AF8796EE06
                SHA-512:CA82CF38065B81B93109069F781299949AC4467119AFA2A5EDBD3F36A00A1E03156300783F52C11B9A3EA84312455CE8CC41EA53F1AC5C6068BA5942BD2CE064
                Malicious:false
                Reputation:low
                URL:https://web1.zixmail.net/s/REL-6.3.11-release.1.39489/userNotifier.js
                Preview:function issueClientWarning(inlineWarningText, elementID, displayInline).{. issueInlineAlert(inlineWarningText, elementID, false);.}..function issueServerWarning(inlineWarningText, elementID, displayInline).{. issueInlineAlert(inlineWarningText, elementID, false);.}..function issueClientLoginWarning(inlineWarningText, elementID, displayInline).{. issueInlineAlert(inlineWarningText, elementID, displayInline);.}..function issueInlineAlert(text, elementID, displayInline).{..if(text == null || text == "null"). {. return;. }..var displayText = trim(text);. if(displayText == ""). {. return;. }.. if( displayInline ). {. document.getElementById(elementID).innerHTML = '<div id="errortext">' + displayText + '</div>';. }. else. {. alert(displayText);. }.}...function updateLastAction(text,isPositive).{. var div = document.getElementById('lastaction');. div.style.position="";. div.style.left="";. div.setAttribute("class", isP
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with very long lines (342)
                Category:downloaded
                Size (bytes):16544
                Entropy (8bit):5.096884809716413
                Encrypted:false
                SSDEEP:
                MD5:D3C4BE0F7308A19FB17DB9376D7DEC7A
                SHA1:EE16C49C9B804EB7EE2988B38F5611AB85026678
                SHA-256:81103F073BE555414136AEA440D8F6272A80F08CE513607CB76040453712E25C
                SHA-512:EC82276ACA0BC62B8C72D69A401D7762A2975A07A81F1F3AF765AD0EDC658C745B0433A5AC90990DEFB87BF5FF7625FAA65B74B4D6E4C95607EE68F0D7EC1DA9
                Malicious:false
                Reputation:low
                URL:https://web1.zixmail.net/s/REL-6.3.11-release.1.39489/2ndGen/base/stylesheet_tablet.css
                Preview:@media screen and (min-width:801px) {../*------ for all pages ------*/..container {..max-width: 1200px;..margin: 0 auto;.}...nodata {..padding: 12px;.}..#navbarbutton {..display: none;..}...navlinkon {..color: #999999;..font-size: 1.25em;.}...navlinkoff {..font-size: 1.25em;.}..#navbar li {..border-style: solid none none none;..overflow: visible;.}...#navtopaccent {..display: none;.}..#navbottomaccent {..display: none;.}..#mfainputarea.{..margin: auto;..max-width: 720px;.}..#navexpansion {..width: 100%;..height: auto;..overflow: visible;..float: none;..margin-bottom: auto;.}..#navbar {..width: 100%;..border: none;..background-color: transparent;..margin: 6px 0 0 0;..display: block;..-moz-box-shadow: none;..-webkit-box-shadow: none;..z-index: 3;.}..#navexpansion ul {.}..#navbar #navofflogout {..display: block;..height: 0;..overflow: visible;..padding: 0;..text-align: right;..border: none;.}..#addressbookbody #actions, #draftitemsbody #actions {..min-height: 46px;.}..#navofflogout .navli
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with no line terminators
                Category:downloaded
                Size (bytes):48
                Entropy (8bit):4.13442806519115
                Encrypted:false
                SSDEEP:
                MD5:9EBA26905B967E18022E3F736C43F402
                SHA1:5A51FA0EEFEDAB14E18ED6F17B440F0BAEC6F6C7
                SHA-256:5C923FF6E174473E797D78A5D3EDCA01965AC435A1E01260419E5D4CB8D6E93D
                SHA-512:909C0F2BADA25CC37038D13FCAF9D593F330F67025E0669984EFCFA6FCB0B0C03EEB2C7BA784DB2EE41B7CDDBC39E7981B27616FDF05C14A823A7354AEBCEF4D
                Malicious:false
                Reputation:low
                URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xNDkSFwm05Uv8Ynr_uBIFDcPxAUESBQ3iWAvg?alt=proto
                Preview:CiIKEw3D8QFBGgQICRgBGgQIVhgCIAEKCw3iWAvgGgQISxgC
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text
                Category:downloaded
                Size (bytes):1414
                Entropy (8bit):4.994494585610974
                Encrypted:false
                SSDEEP:
                MD5:738806F6615E2BD7730F0E97EB375C98
                SHA1:F91D847E78830D8278B9F1CED3907AC13501EF98
                SHA-256:A63577E7A4896B28D2FF18374539681D675B6D6E815846315E51EAD479FE6B89
                SHA-512:4A3F1C1FE2BF5E9D5CF8322E1651EC0D91DDF57D3060C12512F940C3AFCFC49366AE3AFBBCF10FFD9FBF8CCA41F3E8BF29C7D6917B0DE3A68DA86EA23BCC9490
                Malicious:false
                Reputation:low
                URL:https://web1.zixmail.net/s/REL-6.3.11-release.1.39489/fieldvalue.js
                Preview:ALPHA_CHARS = "ABCDEFGHIGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz";.NUMBERS = "0123456789";.PASSWORD_SYMBOLS = "!@#$%^&*)(_-=+{}[]:;\"'<>.?~";..function isBlank( field ).{. trimmedField = trim( field );. if( trimmedField.length == 0 ). {. return true;. }. . return false;.}...function containsOnly( field, validChars ).{. for( var i = 0; i < field.length; i++ ). {. var c = field.charAt( i );. if( validChars.indexOf( c ) == -1 ). {. return false;. }. }. . return true;.}..function find( field, searchString ).{. var positions = new Array();. var startindex = 0;. var foundindex = -1;. var arrayindex = 0;. while( true ). {. foundindex = field.indexOf( searchString, startindex );. if( foundindex.length == 0 ). {. return positions;. }.. if( foundindex < 0 ). {. return positions;. }. . positions[arrayindex] = foundindex;. arrayindex ++;. startindex = foundindex + searchString.length;. if( star
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:SVG Scalable Vector Graphics image
                Category:downloaded
                Size (bytes):4168
                Entropy (8bit):4.364207777843192
                Encrypted:false
                SSDEEP:
                MD5:C5E7A96D9F08831036AF7261F519F8EF
                SHA1:13F265BBBEAEAED4E6D43995A7553893F514FB0A
                SHA-256:2EC8BFF74CFFA23AFAD4C372398FF59B7BDEA6C07DCE9B511112D9A4B743A560
                SHA-512:BB1132DACCAA7E5FDEDF21DF9DFFB3381787D7379C485159E8D1E66080C8D2160F85E3356A0B4395EB98031798518532FCA0905E0884E140AC78B09D30D1A8EC
                Malicious:false
                Reputation:low
                URL:https://web1.zixmail.net/i/securedbyzix.svg
                Preview:<svg xmlns="http://www.w3.org/2000/svg" width="144" height="41" viewBox="0 0 144 41">. <defs>. <style>. .a {. fill: #14b1e7;. }.. .b {. fill: #0160a8;. }. </style>. </defs>. <title>securedbyzix</title>. <g>. <g>. <path class="a" d="M.68,34.93A3.44,3.44,0,0,0,3.26,36a2.35,2.35,0,0,0,2.5-2.16c0-2.14-4.36-1.89-4.36-4.65a3.47,3.47,0,0,1,3.67-3.11,3.78,3.78,0,0,1,2.8,1l-.61.79a3.18,3.18,0,0,0-2.17-.83,2.46,2.46,0,0,0-2.62,2.12c0,1.93,4.36,1.74,4.36,4.65A3.38,3.38,0,0,1,3.26,37,4.15,4.15,0,0,1,0,35.66Z"/>. <path class="a" d="M12.8,29.11a2.51,2.51,0,0,1,2.76,2.73,4.9,4.9,0,0,1-.23,1.27H9.54a3.24,3.24,0,0,0-.06.65A2.22,2.22,0,0,0,11.9,36.1a4.3,4.3,0,0,0,2.46-.92l.33.84a5,5,0,0,1-2.82,1,3.14,3.14,0,0,1-3.45-3.18A4.58,4.58,0,0,1,12.8,29.11Zm1.67,3.17a3.44,3.44,0,0,0,0-.53A1.61,1.61,0,0,0,12.8,30a3.32,3.32,0,0,0-3.06,2.31Z"/>. <path class="a" d="M21.33,29.11a3.46,3.46,0,0,1,2.73,1.08l-.62.69A2.83,2.83,0,0,0,21.38,30a3.72,3.72,0,0,0-3.6
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:C source, ASCII text
                Category:downloaded
                Size (bytes):2731
                Entropy (8bit):4.918169128272672
                Encrypted:false
                SSDEEP:
                MD5:78E5C476E160DC0D2F1E219A1AC54D12
                SHA1:64AA415D7522DA1BCF3581239B61EC2591E3097E
                SHA-256:BF714B969A60F049145EB5C2879309AE27CB4D4D6C557D1D71F1233E12F1755D
                SHA-512:5079D07CB4C3F8FDF6F8584CEE391EC944BBD3F89A49C2E5179CC9FDEC07EA8C9DE4FB058810D6878DE1BFE6F1D27E7980526AE32965B80DF4679443BC05F8B4
                Malicious:false
                Reputation:low
                URL:https://web1.zixmail.net/s/REL-6.3.11-release.1.39489/2ndGen/base/stylesheet_print.css
                Preview:@media print {..#topaccent1, #topaccent2, #bottomaccent1, #bottomaccent2, #navtopaccent, #navbottomaccent {..display: none;.}...access {..display: none;.}...body {.background: #fff; .margin: 10px;.font-family: arial, helvetica, sans-serif; .color:#000;.}..a:link, a:visited {.color:#000;.text-decoration:none;.}..a:active {.color:#000;.text-decoration:none;.}..ul {.list-style-type:none;.}..hr {.display:none;.}..#loginform #submitbutton {.display:none;.}..#passwordreminderlink {.line-height:2em;.}..#rememberme {.line-height:2em;.}..#changepasswordlink {.line-height:2em;.}..#helplink {.line-height:2em;.}..#messageheader input {.width:60%;.}..#messageheader #attach input {.display:none;.}..#messagecenterbody hr, #addressbookbody hr, #sentitemsbody hr, #recallmailbody hr, #draftitemsbody hr {.display:block;.}..#primarybranding {.font-size:1.4em;.margin-bottom: 12px;.}..#layerbrandheader {.display:none;.}..#navbar {.display:none;.}..#navbarfooter {.font-size:.9em;.font-weight:bold;.margin:0 0
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:GIF image data, version 89a, 185 x 60
                Category:dropped
                Size (bytes):2271
                Entropy (8bit):7.773250653947018
                Encrypted:false
                SSDEEP:
                MD5:0D73550368E86F17746F226BA187787E
                SHA1:6BE228080DCACE16D88AB71843DC5EB224D49C94
                SHA-256:689CFB629C8055246958A87D01CCB1D7B11E5474B6B8AC5F40A2A9F251A9EA89
                SHA-512:080A0D6F5D69EF54F7C2ADA5B227AD825275592ECA5FECB775944CBEF32BCF08300DFD53C62CCE2C51657FF95480B31B678245007EFFBFA5FECCB694A71B04D4
                Malicious:false
                Reputation:low
                Preview:GIF89a..<.....G..H..I..I..J..K..L..L..M..N..N. O. P.!Q.#R.$S.%S.&T.'U.(V.)V.+X.+Y.,Y.-Z..[./[.0\.1].2^.3^.4_.5`.6`.7b.9c.;e.=f.?h.@h.Ai.Ck.Dl.Em.Fm.Gn.Ho.Ip.Jp.Kq.Lr.Ls.Ms.Nt.Ou.Pu.Qv.Rw.Sx.Tx.Uy.Wz.W{.X|.Y}.Z}.[~.\..]..^.._..`..a..b..c..c..d..e..f..g..h..i..j..k..l..m..n..n..p..q..s..t..u..v..w..x..y..y..z..{..|..}..~....................................................................................................................................................................................................................................................................................................................................................................................................................!.......,......<........H......*\....#J.H....3j.... C..I...(S.\...0c.I...8s.....@...J...H.*]...P9.Y..@.E. P...J.m.5;.k. ....@0...#..h0..=(..|.......v<.$..........*.?.J%,.@...........-.&..@..\..!P..n.
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text
                Category:downloaded
                Size (bytes):65
                Entropy (8bit):4.439139114250231
                Encrypted:false
                SSDEEP:
                MD5:496D4CD5A824E776DED961247841A2D6
                SHA1:57CAF10F2500D036438421A6196D359686B28B2C
                SHA-256:1CD23F829A9FDA20D675E4B312DE0F6C6D1E4E207EC60084C1DA519D6CF3CA62
                SHA-512:731026E71FB459995B9D8AE73B974B15B4DA475DFA700B8D268886CB7626DBE6BCFC0B8DF5EA058FCA4F82541D445FF16C14CF5B6BED1280B036C591CD2978A9
                Malicious:false
                Reputation:low
                URL:https://web1.zixmail.net/s/REL-6.3.11-release.1.39489/2ndGen/base/stylesheet_desktop.css
                Preview:@media screen and (min-width:950px) {.......} /* end of @media */
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text
                Category:downloaded
                Size (bytes):36108
                Entropy (8bit):5.176033132020104
                Encrypted:false
                SSDEEP:
                MD5:32E9D431BD7BA52AACDAA3988B7A47DC
                SHA1:538C7ADBFA8E1588AC59931B3387462F116304D8
                SHA-256:7D110159015B3BF23A9F8D78E5D9DFC0AB06769988599213DC0417E6FE2A4CDC
                SHA-512:178186194061CCB950FBF514D45E64BFE60C5A7E18CDD8E36F07BD0AD202D80B0F367C106DD8297DBE2B201708BCA3B2CF877FABFDC44EA133966E6A6C61921E
                Malicious:false
                Reputation:low
                URL:https://web1.zixmail.net/s/REL-6.3.11-release.1.39489/2ndGen/base/stylesheet_mobile.css
                Preview:@media screen {.../* Reset ---------------------------------------------------- */.html,body,div,span,object,iframe,h1,h2,h3,h4,h5,h6,p,blockquote,pre,a,abbr,acronym,address,code,del,dfn,em,img,q,dl,dt,dd,ol,ul,li,fieldset,form,label,legend,table,caption,tbody,tfoot,thead,tr,th,td..{..margin: 0;..padding: 0;..border: 0;..font-weight: inherit;..font-style: inherit;..font-size: 100%;..font-family: inherit;..vertical-align: baseline;..-webkit-text-size-adjust: none;..-webkit-tap-highlight-color: rgba(0, 0, 0, 0);.}..#messagebody em {..font-style:italic;.}..#messagebody ul, #messagebody ol {..margin: 10px 40px;.}..body {..font-family: Arial, Helvetica, sans-serif;..background-color: white;..padding: 0 6px;..margin: 0 auto;.}..a {..text-decoration: underline;..color: #555555;..font-weight: bold;.}...positive_action.{. color: #00AA00;. border: 1px solid #00AA00;..}...negative_action.{. color: #AA0000;. border: 1px solid #AA0000;.}..#closelastaction.{. background: transparent;. colo
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:C source, ASCII text
                Category:downloaded
                Size (bytes):6055
                Entropy (8bit):5.179218892050803
                Encrypted:false
                SSDEEP:
                MD5:F7C582BEF0D90EC28C1500B05F62EC63
                SHA1:79B2276C5C9D1131347EBC7183AC65EC6E2AD920
                SHA-256:A57E6E8ACE4AF732A75BE722FF22CAC47EC4253DE7220FCFF4881604FCCB2EAA
                SHA-512:D02D3458738F3AFA59B2A8551F4C061185E0EDE1BB2CBE5F96CE6A8215115E6775E76108B48BB11BAEF91036EF17A6F822B0D1FD25F999ABE3B068BAE2F2074D
                Malicious:false
                Reputation:low
                URL:https://web1.zixmail.net/s/REL-6.3.11-release.1.39489/2ndGen/base/stylesheet_desktopFallthrough.css
                Preview:@media screen {../* ------------------- */./* button hover effect */./* ------------------- */.#changepasswordlink a:hover, #createaccountlink a:hover, #helplink a:hover, #layerbrandheader .access:hover,.#composebody #attach .button:hover, #replybody #attach .button:hover,.#submitbutton input:hover, #actions input:hover, #changepassinfo #submitbutton:hover,.#registerinfo #submitbutton:hover, #attachmentfiles .button:hover,.#errorbody #submitbutton:hover, #acceptbody #submitbutton:hover, #cancelbody .button:hover, .#declinebody #submitbutton:hover, #infobody #submitbutton:hover, #confirmactionbody #submitbutton:hover,.#challengequestioninfo #submitbutton:hover.#verifyfields #submitbutton:hover {..background-color: #CCCCCC;..background: -webkit-gradient(linear, center top, center bottom, from(#CCCCCC), to(#999999) );..background: -moz-linear-gradient(top, #CCCCCC, #999999);.}...#changepassinfo #cancelbutton:hover, #registerinfo #cancelbutton:hover, #pinentryinfo #cancelbutton:hover,.#cha
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text
                Category:downloaded
                Size (bytes):3324
                Entropy (8bit):4.9057442951405115
                Encrypted:false
                SSDEEP:
                MD5:1EE901EA2968D580CB3DBFC0D576A60E
                SHA1:D34381C10C8130EBAB70E589825FEEC7341DEE44
                SHA-256:E967764F603B517699D3C4AB4C8722211E0ACA5A5C3C8B55D666B2CA7FA44E8B
                SHA-512:01E1E54060AD4CBB6BE7C406DAB69C7786409B9A1A342611F650ECD2F69AEE99F4CA562FD1393EC4078AEBD7AAEF346D7A96096D8BAD83FB1CDAADDD16CCC737
                Malicious:false
                Reputation:low
                URL:https://web1.zixmail.net/s/REL-6.3.11-release.1.39489/2ndGen/base/stylesheet_mobileLandscape.css
                Preview:@media screen and (min-width:341px) {../*-------- mc.jsp -----*/.#actionmessages {..}..#newmsgcount, #replytomsg {..white-space: normal;..overflow: visible;.}..#lastlogin {..white-space: normal;..overflow: visible;.}....mailattachment,..sentitemsattachment, .recallmailattachment,..draftitemsattachment {. float: left;. align: right;. text-align: right;. padding: 9px 0px 0px 0px;. width: 5%;.}...mailsender,..sentitemsrecipient,..recallmailrecipient,..draftitemsrecipient,..multifactoritemsname,..addressbookname,..groupinfoname,..groupinfolistname {..float: left;..margin-left: 10%;..width: 46%;.}...multifactoritemstype {. float: left;. margin-left: 10%;. width: 85%;. padding: 4px 0px 0px 0px;.}..mailsubjectread, .mailsubjectunread,..sentitemssubject, .sentitemssubjectlong,..draftitemssubject, .draftitemssubjectlong {. float: left;. margin-left: 10%;. width: 85%;. padding: 4px 0px 12px 0px;.}...multifactoritemscategory {. f
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with very long lines (545)
                Category:downloaded
                Size (bytes):1593
                Entropy (8bit):4.95506566766411
                Encrypted:false
                SSDEEP:
                MD5:23C3006AA2306EF65A982F0E135F5B85
                SHA1:939B9E69FFD2588166B871E0643EC67AC407524D
                SHA-256:425533232E1245EEBF4FFE8E82F8831280064E0207046B609218F99B5A56D60C
                SHA-512:B09F96C2F2509A2277314D3EA48CC2FF62F7C0D55A35E9078286AFABDEDD3D063E6E5195B7F48B5FF0637D5604B05BE8398BCD0A0B4405FF4790AA9C0E0036D3
                Malicious:false
                Reputation:low
                URL:https://web1.zixmail.net/s/CON-1bf86621/mnbsf_stylesheet_HandHeld.css
                Preview:#primarybranding #smallBanner {background-color:transparent;}.#secondarybranding {background-color:#154786;}.#secondarybrandinginfotext {..padding:34px 6px 6px 6px;..color:#ffffff;..float:left;.}.#secondarybrandinginfotext a {color:#0000ff;}.#brandingbottombanner {..background:url(/i/mnbsf/footer_20160531_0714.gif) no-repeat right center;..height:90px;..float:right;..width:185px;.}..messageselecton {background-color:#f2f2f2;}.#changepasswordlink,#createaccountlink,#helplink,#inputarea,#displayarea,#changepassinfo,#registerinfo,#actions {background-color:#f2f2f2;}.#topaccent1,#topaccent2,#bottomaccent1,#bottomaccent2 {border-top-color:#0f3463;}..topaccent3,#navtopaccent,#navbottomaccent {..border-bottom-color:#0f3463;..border-top-color:#0f3463;.}.#container ul {border-top:1px solid #0f3463;}.#container,#messageheader {border-color:#0f3463;}.#messageviewactions li input,#replyactions li input,#composeactions li input,#composebody #attach .button,#replybody #attach .button,#messagecentera
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text
                Category:downloaded
                Size (bytes):492
                Entropy (8bit):4.673424200155852
                Encrypted:false
                SSDEEP:
                MD5:37F0A98FA1E40956308C3FCAEE929744
                SHA1:39467A9D2ED951F9461F51032F354F3F03974776
                SHA-256:2A07A12EC6607580E1C9BD6BFE4EEC68A495563A224F82EB56CCE72BFC8348A4
                SHA-512:28C8ADF0A026BCB49993AF9A94BAEFB040B610DA9BDC2CA914D817783C47FCADD96437ACDFA7887C6461CE13A9906C497C2C35EC149BC3F478B4205F6A48BB38
                Malicious:false
                Reputation:low
                URL:https://web1.zixmail.net/s/stylesheets/skipnav.css
                Preview:.skipnav { text-align: left; }. .skipnav a { display: block; position: absolute; left: -10000px; width: 1px; height: 1px; overflow: hidden; }. .skipnav a:focus, .skipnav a:active { . .display: inline-block; . .position: static; . .left: 0; . .width: auto; . .height: auto; . .overflow: visible; . .text-decoration: underline; . .margin: 12px;. .padding: 1px;. .font-size: 16px;. .font-weight: normal;. .outline-width: 3px;. .outline-color: #bcddfa;. .outline-style: solid;. }
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text
                Category:downloaded
                Size (bytes):4171
                Entropy (8bit):4.617307131461832
                Encrypted:false
                SSDEEP:
                MD5:BF9A0EAE8529030C24FB3E19C86E4FD0
                SHA1:788BB1FD37EE9C29D2FCE24F18B4697D25B5CF98
                SHA-256:50982BA9961B6C3F2BE89BC0C20948DDAD27AF428A44AA21B123AB5007BE8309
                SHA-512:7740863F1D149AB5374E176D6A1FD5FB39AC551EDBFE037497F2D0D4A55F02C63E779DA091CFC3A56E4137022CA887CD7470B1BED687FAFB3B417DB6C9A34DA6
                Malicious:false
                Reputation:low
                URL:https://web1.zixmail.net/s/REL-6.3.11-release.1.39489/emailfieldvalue.js
                Preview:function isEmailValid(emailAddress).{. if( emailAddress.length < 5 ). {. return false;. }. . // Exactly 1 @. var atPositions = find( emailAddress, "@" );. if( atPositions.length != 1 ). {. return false;. }. . // Does not begin with @. if( atPositions[0] == 0 ). {. return false;. }. . // Has a dot after the @. var dotPositions = find( emailAddress, "." );. if( dotPositions.length == 0 ). {. return false;. }. . if( dotPositions[dotPositions.length - 1] < atPositions[0] ). {. return false;. }.. // But not immediately after the @. if ( emailAddress.search(/\@\./) != -1 ). {..return false;. }. . // Has at least 2 characters after the final .. if( dotPositions[dotPositions.length - 1] >= emailAddress.length - 2 ). {. return false;. }. . // Does not have 2 dots in a row. if ( emailAddress.search(/\.\./) != -1 ). {..return false;. }. . // Check mailbox and domain. var mailbox = emailAddress.substring( 0, atPositions[0] ).toLowe
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text
                Category:downloaded
                Size (bytes):1005
                Entropy (8bit):4.872768633004354
                Encrypted:false
                SSDEEP:
                MD5:A2F6081C877AD62CFA117EBBEA517DC0
                SHA1:C859B3D693B568355D71CEC52B11B851F2AE050F
                SHA-256:7C09CDA7E306B74834E26C300055B1DC45FDD393E176297E9C60F5F1258545EE
                SHA-512:C5DD7967A0EB0002CD95B8584AFFA37313B7D487AB3EAABA73867ED997B18D333B18E368F0EFB4742EBFAD63F6A167BDE5BA57D6F0522B54A4BBE93C09A4B8E7
                Malicious:false
                Reputation:low
                URL:https://web1.zixmail.net/s/REL-6.3.11-release.1.39489/default_loginview_validator.js
                Preview:function checkEntries( emailKeyInput, passwordKeyInput, elementID, displayInline ).{. if( !checkEmailAddress( emailKeyInput, passwordKeyInput, elementID, displayInline ) ). {. return false;. }.. if( !checkPassword( passwordKeyInput, elementID, displayInline ) ). {. return false;. }.. return true;.}..function checkEmailAddress( emailKeyInput, passwordKeyInput, elementID, displayInline ).{. var emailAddress= emailKeyInput.value;. if( isBlank( emailAddress ) || !isEmailValid( emailAddress ) ). {. issueClientLoginWarning( LOGIN_EMAIL_WARN_INVALID, elementID, displayInline );. passwordKeyInput.value = "";. emailKeyInput.focus();. return false;. }.. return true;.}..function checkPassword( passwordKeyInput, elementID, displayInline ).{. var password = passwordKeyInput.value;. if( isBlank( password ) ). {. issueClientLoginWarning( LOGIN_PASSWORD_WARN_MISSING, elementID, displayInline );. passwordKeyInput.focus();. return false;. }.. return tr
                No static file info