Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
messages undelivered.htm_

Overview

General Information

Sample name:messages undelivered.htm_
Analysis ID:1441678
MD5:7983f2be3e4236b808d2b34e3e00cdf5
SHA1:c5a12521c06859b132709207c4b9e59d45af11d2
SHA256:17c27aa55fa81d141b35a755a22354722bca3f20c6d8fe6b7d8f94abd6aa7384

Detection

HTMLPhisher
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected phishing page
Antivirus detection for URL or domain
Yara detected HtmlPhish10
Detected javascript redirector / loader
HTML Script injector detected
Phishing site detected (based on image similarity)
HTML body contains low number of good links
HTML body contains password input but no form action
HTML page contains hidden URLs or javascript code
HTML title does not match URL
Invalid 'forgot password' link found
Invalid T&C link found
None HTTPS page querying sensitive user data (password, username or email)
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 6152 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\messages undelivered.html MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 1856 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 --field-trial-handle=1984,i,10669682432346509564,12640823688600853149,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
SourceRuleDescriptionAuthorStrings
0.0.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
    0.1.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: fiveradio-newbam.comSophos S4: Label: malware repository domain

      Phishing

      barindex
      Source: file:///C:/Users/user/Desktop/messages%20undelivered.htmlLLM: Score: 8 brands: None Reasons: The URL 'file:///C:/Users/user/Desktop/messages%20undelivered.html' indicates that the page is being accessed locally from a user's computer, which is unusual for a legitimate sign-in page. This could be indicative of a phishing attempt where a fake sign-in page is saved locally to deceive the user. The image shows a sign-in process without any clear identification of the service it belongs to, which is suspicious as legitimate services usually display branding information. The lack of a visible login form in the image, but the implication of a sign-in process, suggests a possible deception technique to capture user credentials in a non-standard way. DOM: 0.0.pages.csv
      Source: Yara matchFile source: 0.0.pages.csv, type: HTML
      Source: Yara matchFile source: 0.1.pages.csv, type: HTML
      Source: messages undelivered.htm_HTTP Parser: Low number of body elements: 0
      Source: file:///C:/Users/user/Desktop/messages%20undelivered.htmlHTTP Parser: New script, src: https://cdn.socket.io/4.6.0/socket.io.min.js
      Source: file:///C:/Users/user/Desktop/messages%20undelivered.htmlHTTP Parser: New script, src: https://cdn.socket.io/4.6.0/socket.io.min.js
      Source: file:///C:/Users/user/Desktop/messages%20undelivered.htmlMatcher: Found strong image similarity, brand: MICROSOFT
      Source: file:///C:/Users/user/Desktop/messages%20undelivered.htmlHTTP Parser: Number of links: 0
      Source: file:///C:/Users/user/Desktop/messages%20undelivered.htmlHTTP Parser: <input type="password" .../> found but no <form action="...
      Source: messages undelivered.htm_HTTP Parser: Base64 decoded: https://fiveradio-newbam.com
      Source: file:///C:/Users/user/Desktop/messages%20undelivered.htmlHTTP Parser: Title: Authenticating ... does not match URL
      Source: file:///C:/Users/user/Desktop/messages%20undelivered.htmlHTTP Parser: Invalid link: Forgot password?
      Source: file:///C:/Users/user/Desktop/messages%20undelivered.htmlHTTP Parser: Invalid link: Terms of use
      Source: file:///C:/Users/user/Desktop/messages%20undelivered.htmlHTTP Parser: Invalid link: Privacy & cookies
      Source: file:///C:/Users/user/Desktop/messages%20undelivered.htmlHTTP Parser: Invalid link: Terms of use
      Source: file:///C:/Users/user/Desktop/messages%20undelivered.htmlHTTP Parser: Invalid link: Privacy & cookies
      Source: file:///C:/Users/user/Desktop/messages%20undelivered.htmlHTTP Parser: Has password / email / username input fields
      Source: file:///C:/Users/user/Desktop/messages%20undelivered.htmlHTTP Parser: <input type="password" .../> found
      Source: messages undelivered.htm_HTTP Parser: No favicon
      Source: file:///C:/Users/user/Desktop/messages%20undelivered.htmlHTTP Parser: No favicon
      Source: file:///C:/Users/user/Desktop/messages%20undelivered.htmlHTTP Parser: No favicon
      Source: file:///C:/Users/user/Desktop/messages%20undelivered.htmlHTTP Parser: No <meta name="author".. found
      Source: file:///C:/Users/user/Desktop/messages%20undelivered.htmlHTTP Parser: No <meta name="author".. found
      Source: file:///C:/Users/user/Desktop/messages%20undelivered.htmlHTTP Parser: No <meta name="copyright".. found
      Source: file:///C:/Users/user/Desktop/messages%20undelivered.htmlHTTP Parser: No <meta name="copyright".. found
      Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.16:49731 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 184.26.118.82:443 -> 192.168.2.16:49733 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 184.26.118.82:443 -> 192.168.2.16:49734 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:49735 version: TLS 1.2
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 23.208.86.82
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
      Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
      Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
      Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
      Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
      Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
      Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
      Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
      Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
      Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
      Source: unknownTCP traffic detected without corresponding DNS query: 184.26.118.82
      Source: unknownTCP traffic detected without corresponding DNS query: 184.26.118.82
      Source: unknownTCP traffic detected without corresponding DNS query: 184.26.118.82
      Source: unknownTCP traffic detected without corresponding DNS query: 184.26.118.82
      Source: unknownTCP traffic detected without corresponding DNS query: 184.26.118.82
      Source: unknownTCP traffic detected without corresponding DNS query: 184.26.118.82
      Source: unknownTCP traffic detected without corresponding DNS query: 184.26.118.82
      Source: unknownTCP traffic detected without corresponding DNS query: 184.26.118.82
      Source: unknownTCP traffic detected without corresponding DNS query: 184.26.118.82
      Source: unknownTCP traffic detected without corresponding DNS query: 184.26.118.82
      Source: unknownTCP traffic detected without corresponding DNS query: 184.26.118.82
      Source: unknownTCP traffic detected without corresponding DNS query: 184.26.118.82
      Source: unknownTCP traffic detected without corresponding DNS query: 184.26.118.82
      Source: unknownTCP traffic detected without corresponding DNS query: 184.26.118.82
      Source: unknownTCP traffic detected without corresponding DNS query: 184.26.118.82
      Source: unknownTCP traffic detected without corresponding DNS query: 184.26.118.82
      Source: unknownTCP traffic detected without corresponding DNS query: 184.26.118.82
      Source: unknownTCP traffic detected without corresponding DNS query: 184.26.118.82
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
      Source: global trafficDNS traffic detected: DNS query: cdn.socket.io
      Source: global trafficDNS traffic detected: DNS query: fiveradio-newbam.com
      Source: global trafficDNS traffic detected: DNS query: www.w3schools.com
      Source: global trafficDNS traffic detected: DNS query: aadcdn.msftauth.net
      Source: global trafficDNS traffic detected: DNS query: www.google.com
      Source: global trafficDNS traffic detected: DNS query: a.nel.cloudflare.com
      Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
      Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
      Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
      Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
      Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
      Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
      Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
      Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
      Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
      Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
      Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
      Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
      Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
      Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
      Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.16:49731 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 184.26.118.82:443 -> 192.168.2.16:49733 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 184.26.118.82:443 -> 192.168.2.16:49734 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:49735 version: TLS 1.2
      Source: classification engineClassification label: mal76.phis.winHTM_@14/17@16/188
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
      Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\messages undelivered.html
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 --field-trial-handle=1984,i,10669682432346509564,12640823688600853149,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 --field-trial-handle=1984,i,10669682432346509564,12640823688600853149,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
      Registry Run Keys / Startup Folder
      1
      Process Injection
      1
      Masquerading
      OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      Registry Run Keys / Startup Folder
      1
      Process Injection
      LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      fiveradio-newbam.com100%Sophos S4malware repository domain
      SourceDetectionScannerLabelLink
      file:///C:/Users/user/Desktop/messages%20undelivered.html0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      part-0013.t-0009.t-msedge.net
      13.107.246.41
      truefalse
        unknown
        a.nel.cloudflare.com
        35.190.80.1
        truefalse
          unknown
          cs1100.wpc.omegacdn.net
          152.199.4.44
          truefalse
            unknown
            d2vgu95hoyrpkh.cloudfront.net
            18.64.174.126
            truefalse
              unknown
              cs837.wac.edgecastcdn.net
              192.229.173.207
              truefalse
                unknown
                fiveradio-newbam.com
                172.67.196.150
                truetrue
                • 100%, Sophos S4
                unknown
                www.google.com
                172.217.3.68
                truefalse
                  unknown
                  aadcdn.msftauth.net
                  unknown
                  unknownfalse
                    unknown
                    www.w3schools.com
                    unknown
                    unknownfalse
                      unknown
                      cdn.socket.io
                      unknown
                      unknowntrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        file:///C:/Users/user/Desktop/messages%20undelivered.htmltrue
                        • Avira URL Cloud: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        142.250.189.131
                        unknownUnited States
                        15169GOOGLEUSfalse
                        13.107.246.41
                        part-0013.t-0009.t-msedge.netUnited States
                        8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                        192.178.50.78
                        unknownUnited States
                        15169GOOGLEUSfalse
                        1.1.1.1
                        unknownAustralia
                        13335CLOUDFLARENETUSfalse
                        192.178.50.35
                        unknownUnited States
                        15169GOOGLEUSfalse
                        152.199.4.44
                        cs1100.wpc.omegacdn.netUnited States
                        15133EDGECASTUSfalse
                        142.250.217.206
                        unknownUnited States
                        15169GOOGLEUSfalse
                        18.64.174.126
                        d2vgu95hoyrpkh.cloudfront.netUnited States
                        3MIT-GATEWAYSUSfalse
                        173.194.216.84
                        unknownUnited States
                        15169GOOGLEUSfalse
                        172.67.196.150
                        fiveradio-newbam.comUnited States
                        13335CLOUDFLARENETUStrue
                        142.250.217.163
                        unknownUnited States
                        15169GOOGLEUSfalse
                        239.255.255.250
                        unknownReserved
                        unknownunknownfalse
                        192.229.173.207
                        cs837.wac.edgecastcdn.netUnited States
                        15133EDGECASTUSfalse
                        13.107.213.41
                        unknownUnited States
                        8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                        104.21.84.200
                        unknownUnited States
                        13335CLOUDFLARENETUSfalse
                        172.217.3.68
                        www.google.comUnited States
                        15169GOOGLEUSfalse
                        35.190.80.1
                        a.nel.cloudflare.comUnited States
                        15169GOOGLEUSfalse
                        142.250.217.195
                        unknownUnited States
                        15169GOOGLEUSfalse
                        IP
                        192.168.2.16
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1441678
                        Start date and time:2024-05-15 01:02:28 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:defaultwindowsinteractivecookbook.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:15
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • EGA enabled
                        Analysis Mode:stream
                        Analysis stop reason:Timeout
                        Sample name:messages undelivered.htm_
                        Detection:MAL
                        Classification:mal76.phis.winHTM_@14/17@16/188
                        • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 192.178.50.35, 192.178.50.78, 173.194.216.84, 34.104.35.123, 142.250.217.195, 142.250.189.131
                        • Excluded domains from analysis (whitelisted): logincdn.msauth.net, lgincdnmsftuswe2.azureedge.net, accounts.google.com, slscr.update.microsoft.com, aadcdnoriginwus2.azureedge.net, clientservices.googleapis.com, aadcdn.msauth.net, firstparty-azurefd-prod.trafficmanager.net, clients2.google.com, edgedl.me.gvt1.com, aadcdnoriginwus2.afd.azureedge.net, lgincdnmsftuswe2.afd.azureedge.net, clients.l.google.com, www.gstatic.com
                        • Not all processes where analyzed, report is missing behavior information
                        • VT rate limit hit for: messages undelivered.htm_
                        InputOutput
                        URL: file:///C:/Users/user/Desktop/messages%20undelivered.html
                        ```json
                        {
                          "phishing_score": 8,
                          "brands": "None",
                          "phishing": true,
                          "suspicious_domain": true,
                          "has_loginform": false,
                          "has_captcha": false,
                          "setechniques": true,
                          "reasons": "The URL 'file:///C:/Users/user/Desktop/messages%20undelivered.html' indicates that the page is being accessed locally from a user's computer, which is unusual for a legitimate sign-in page. This could be indicative of a phishing attempt where a fake sign-in page is saved locally to deceive the user. The image shows a sign-in process without any clear identification of the service it belongs to, which is suspicious as legitimate services usually display branding information. The lack of a visible login form in the image, but the implication of a sign-in process, suggests a possible deception technique to capture user credentials in a non-standard way."
                        }
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue May 14 22:02:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2673
                        Entropy (8bit):3.9881492612920972
                        Encrypted:false
                        SSDEEP:
                        MD5:7A74CB0B319D4DAC880DC093CB95D3BB
                        SHA1:DE133DE96EEA36AB9CC7462439D79003346A689B
                        SHA-256:82308C8A91B78E357FE6BA6178D4A61CD0B10AF76C10F6E87CE02D2DE7F27B7E
                        SHA-512:638AF81F3D5CBBF1F6BBE276D9106B1CC2E0F0B574B1EEC4E80FE27594710FCFFA5F94719CAE957F7CF09F3B031978C476C3A6F23F7F655B1512860215BFBC3F
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,......(.R...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.XU.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X\.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X\.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X\............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X`............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........?+.z.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue May 14 22:02:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2675
                        Entropy (8bit):4.005590843067051
                        Encrypted:false
                        SSDEEP:
                        MD5:C83AA8508C731FDB8463C8C55DF30734
                        SHA1:F9AC49717CDFF630A2FD40DA6F47783240FAD7EE
                        SHA-256:5874344742349CC499AD03B2D98803C7B68D324DC4A67AC0DDE61F2E9A40AC02
                        SHA-512:617C7EE71BE22B7FF5A850F0F4E9F5DDFDFAAC6D97CA7F0768918D628B5445E2C260CFBE001338F27FC7E260162B909E879C740E18B19D15E395DA9D4113C1ED
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,....X...R...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.XU.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X\.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X\.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X\............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X`............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........?+.z.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2689
                        Entropy (8bit):4.010780074052206
                        Encrypted:false
                        SSDEEP:
                        MD5:ED0AEB606AD75EA82C216549841BCFCD
                        SHA1:70FA4C1B18DB854FDE245E9A0A2454505C9EB8E5
                        SHA-256:12D612B09FD1F25CB9DFE5548F33D242B57C82583539701CAB91AA3B02F0616F
                        SHA-512:E690A61A9FC731BF39C9F041817CB4AB98DC4A7A31DB3447442FFEFB10D4CEE84A1DBE777EABA724CA53CAAF34EC8E15E341F068B5ACDF18C534385D3627EF12
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.XU.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X\.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X\.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X\............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........?+.z.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue May 14 22:02:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2677
                        Entropy (8bit):4.001848361162895
                        Encrypted:false
                        SSDEEP:
                        MD5:3DD34BC7348327E5EFC1A9D3EE950989
                        SHA1:A70ACDAE4A3813517F6C15E06C887BB0520BCC1E
                        SHA-256:FFCD6CF0B12AF0506B0C2B7A94556108BA60E5007368B3B25B7432791C7C48F7
                        SHA-512:7D2D4F9C3FF700B550BF410B70AD2F0304CF3227FBCBAF2758A67681EEA213A51E4DF2C9F9C9EF5173FC4B9D428B53D9653307F98FCA1AC018967EC2822AE943
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,....2...R...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.XU.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X\.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X\.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X\............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X`............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........?+.z.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue May 14 22:02:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2677
                        Entropy (8bit):3.9938153390891893
                        Encrypted:false
                        SSDEEP:
                        MD5:6AE7BBDE0D054891E453AF0C5C981E4A
                        SHA1:5DBBA3C77F976A90DD4D6F3A713DA3C09B152F22
                        SHA-256:24E7A702BAE713C00E902E61E514DC9AF0A5D6AD83CCF0EA229552B5DCAFA46C
                        SHA-512:4C7435DC8470C516604BE6436E306142D26646E955207564023F766C50AEB91E850E06A8072F7794FB2F1201336A6A88A8E9C04E5EC5292C0DC13274EBCAE25E
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,......#.R...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.XU.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X\.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X\.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X\............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X`............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........?+.z.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue May 14 22:02:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2679
                        Entropy (8bit):4.001098551996775
                        Encrypted:false
                        SSDEEP:
                        MD5:C9C3CD0570B9C9BA2FD0340BC9B5666B
                        SHA1:88FBFBDADD02A1D05D30B56F23AF451383364A4F
                        SHA-256:72D98D08C281091B9EFFD959E5DED2074D910736CF54C25A880FA611E80D7FFC
                        SHA-512:C5C2F86678F2C5A80EF0ADF47430CB56691E07C86E5E31DF1150B68B5F4710F8B18BF34191DA8BF1002554FF8AF23D55EB5C0CDE0D636636911405A4DB62EE85
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,.....q..R...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.XU.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X\.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X\.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X\............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X`............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........?+.z.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
                        Category:downloaded
                        Size (bytes):2228
                        Entropy (8bit):7.82817506159911
                        Encrypted:false
                        SSDEEP:
                        MD5:EF9941290C50CD3866E2BA6B793F010D
                        SHA1:4736508C795667DCEA21F8D864233031223B7832
                        SHA-256:1B9EFB22C938500971AAC2B2130A475FA23684DD69E43103894968DF83145B8A
                        SHA-512:A0C69C70117C5713CAF8B12F3B6E8BBB9CDAF72768E5DB9DB5831A3C37541B87613C6B020DD2F9B8760064A8C7337F175E7234BFE776EEE5E3588DC5662419D9
                        Malicious:false
                        Reputation:unknown
                        URL:https://www.gstatic.com/recaptcha/api2/logo_48.png
                        Preview:.PNG........IHDR...0...0.....W.......gAMA......a.... cHRM..z&..............u0...`..:....p..Q<....bKGD.......C......pHYs.................IDATh...P....=..8.....Nx. ..PlP8..;.C.1iL#6...*.Z..!......3.po .o.L.i.I..1fl..4..ujL&6$...............w...........,Z..z. ~.....\.._.C.eK...g..%..P..L7...96..q....L.....k6...*..,xz.._......B."#...L(n..f..Yb...*.8.;....K)N...H).%.F"Ic.LB.........jG.uD..B....Tm....T..).A.}D.f..3.V.....O.....t_..].x.{o......*....x?!W...j..@..G=Ed.XF.........J..E?../]..?p..W..H..d5% WA+.....)2r..+..'qk8.../HS.[...u..z.P.*....-.A.}.......I .P.....S....|...)..KS4....I.....W...@....S.s..s..$`.X9.....E.x.=.u.*iJ...........k......'...!.a....*+.....(...S..\h....@............I.$..%.2....l......a.|.....U....y.....t..8....TF.o.p.+.@<.g........-.M.....:.@..(.......@......>..=.ofm.WM{...e..,..D.r.......w....T.L.os..T@Rv..;.....9....56<.x...........2.k.1....dd.V.....m..y5../4|...G.p.V.......6...}.....B........5...&..v..yTd.6...../m.K...(.
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:JSON data
                        Category:dropped
                        Size (bytes):41
                        Entropy (8bit):4.180365114215879
                        Encrypted:false
                        SSDEEP:
                        MD5:64E1C1EB9F4CAF0CF0E7484D7AFCEDB9
                        SHA1:69E40D8C48A866A84046FD8BD17AF47FF02B79A4
                        SHA-256:8ACAC48BC106C4EAE580C08071597F9DAFAB96D959DEFF65BEC44514DA907B1D
                        SHA-512:F109767D57E85127D18B1AD2030A48C0EAD69F79A15C4008712407B1F62691654B74C9D6E225FFDC4A922847EABB928DC7520A656C7081B585124CF678B54E59
                        Malicious:false
                        Reputation:unknown
                        Preview:{"code":1,"message":"Session ID unknown"}
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 3651
                        Category:downloaded
                        Size (bytes):1435
                        Entropy (8bit):7.8613342322590265
                        Encrypted:false
                        SSDEEP:
                        MD5:9F368BC4580FED907775F31C6B26D6CF
                        SHA1:E393A40B3E337F43057EEE3DE189F197AB056451
                        SHA-256:7ECBBA946C099539C3D9C03F4B6804958900E5B90D48336EEA7E5A2ED050FA36
                        SHA-512:0023B04D1EEC26719363AED57C95C1A91244C5AFF0BB53091938798FB16E230680E1F972D166B633C1D2B314B34FE0B9D7C18442410DB7DD6024E279AAFD61B0
                        Malicious:false
                        Reputation:unknown
                        URL:https://aadcdn.msauth.net/shared/1.0/content/images/microsoft_logo_564db913a7fa0ca42727161c6d031bef.svg
                        Preview:...........WMo.7..+..uV.HJ...{..........&..v...(Q.F.....aW.Q.|..~.|{~...b{8...zv.....8|...b.gxb.y{.x<\lS...p...p..l7...o.}.v.....t.........r..r.|9?.......HP...r.4.aGA.j....7.!....K.n.B.Z.C.]....kj..A..p...xI...b..I!K..><.B..O....#...$.]h.bU.;.Y...).r.u....g*.-w.2..vPh....q....4_..N\..@y).t{.2pj.f..4h.....NC.....x.R..P..9.....".4.`%N..&...a.@.......fS)A4.F..8e9KHE....8d.CR.K..g..Q.......a....f.....dg*N.N.k..#w..........,.".%..I.q.Y.R]..7.!.:.Ux...T.qI..{..,b..2..B...Bh...[o..[4....dZ.z.!.l....E.9$..Y.'...M.,p..$..8Ns3.B.....{.....H..Se3....%.Ly...VP{.Bh.D.+....p..(..`....t....U.e....2......j...%..0.f<...q...B.k..N....03...8....l.....bS...vh..8..Q..LWXW..C.......3..Pr.V.l...^=VX\,d9f.Y;1!w.d,.qvs....f*;.....Zhrr.,.U....6.Y....+Zd.*R...but....".....4.L...z........L.Q......)....,.].Y.&....*ZsIVG.^...#...e..r....Z..F..c..... .QDCmV..1.~...J9..b_Oov\..X.R..._.TqH.q.5G.0{ZphQ..k...s..\.../.Dp..d`#......8.#Y...Mb.j.Q......=n4.c....p.[.SI.....0.N.
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:SVG Scalable Vector Graphics image
                        Category:dropped
                        Size (bytes):1636
                        Entropy (8bit):4.214613323368661
                        Encrypted:false
                        SSDEEP:
                        MD5:F7AB697E65B83CE9870A4736085DEEEC
                        SHA1:5FF40BFF26B523FBBEAA5228A2AAC63E44AFAA90
                        SHA-256:CBB3706E65B35A43BDCFEBD23B5479DC0542CA7E23197869B683D12B524472FE
                        SHA-512:158874143CE65485348813431BB585227772F315234E08158A329DF98319AA5F1DB21DEF2AD7CAA5C25AD11660E7D4E05158CFA1198913A33B1B91676C4CA402
                        Malicious:false
                        Reputation:unknown
                        Preview:<svg xmlns="http://www.w3.org/2000/svg" width="48" height="48" viewBox="0 0 48 48"><title>assets</title><rect width="48" height="48" fill="none"/><path d="M38,14H10V34H38V14m2,22H8V12H40V36M17.688,18.8V28.828H15.531V21.234a3.2,3.2,0,0,1-.672.43l-.266.117a2.55,2.55,0,0,1-.562.188,2.423,2.423,0,0,1-.3.07q-.141.023-.281.055V20.266q.422-.125.813-.281t.766-.344a8.253,8.253,0,0,0,1.344-.844h1.313m4.531,8.234h4.156v1.8H19.859v-.75a3.292,3.292,0,0,1,.25-1.344,4.183,4.183,0,0,1,.625-1.078,5.7,5.7,0,0,1,.844-.828q.219-.187.438-.352t.422-.32q.453-.312.766-.578a2.593,2.593,0,0,0,.3-.281l.25-.281a3.148,3.148,0,0,0,.328-.562,1.59,1.59,0,0,0,.109-.609,1.176,1.176,0,0,0-.359-.937,1.552,1.552,0,0,0-1.078-.328,3.625,3.625,0,0,0-2.422,1V19.688a4.866,4.866,0,0,1,1.359-.625,5.548,5.548,0,0,1,1.516-.2,4.456,4.456,0,0,1,1.344.188,2.461,2.461,0,0,1,1,.563,2.242,2.242,0,0,1,.625.875,3.007,3.007,0,0,1,.219,1.156,3.538,3.538,0,0,1-.055.641,3.7,3.7,0,0,1-.148.563,3.439,3.439,0,0,1-.562.953,7.2,7.2,0,0,1-.8.8q-.21
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:Unicode text, UTF-8 (with BOM) text
                        Category:downloaded
                        Size (bytes):23427
                        Entropy (8bit):5.112735417225198
                        Encrypted:false
                        SSDEEP:
                        MD5:BA0537E9574725096AF97C27D7E54F76
                        SHA1:BD46B47D74D344F435B5805114559D45979762D5
                        SHA-256:4A7611BC677873A0F87FE21727BC3A2A43F57A5DED3B10CE33A0F371A2E6030F
                        SHA-512:FC43F1A6B95E1CE005A8EFCDB0D38DF8CC12189BEAC18099FD97C278D254D5DA4C24556BD06515D9D6CA495DDB630A052AEFC0BB73D6ED15DEBC0FB1E8E208E7
                        Malicious:false
                        Reputation:unknown
                        URL:https://www.w3schools.com/w3css/4/w3.css
                        Preview:./* W3.CSS 4.15 December 2020 by Jan Egil and Borge Refsnes */.html{box-sizing:border-box}*,*:before,*:after{box-sizing:inherit}./* Extract from normalize.css by Nicolas Gallagher and Jonathan Neal git.io/normalize */.html{-ms-text-size-adjust:100%;-webkit-text-size-adjust:100%}body{margin:0}.article,aside,details,figcaption,figure,footer,header,main,menu,nav,section{display:block}summary{display:list-item}.audio,canvas,progress,video{display:inline-block}progress{vertical-align:baseline}.audio:not([controls]){display:none;height:0}[hidden],template{display:none}.a{background-color:transparent}a:active,a:hover{outline-width:0}.abbr[title]{border-bottom:none;text-decoration:underline;text-decoration:underline dotted}.b,strong{font-weight:bolder}dfn{font-style:italic}mark{background:#ff0;color:#000}.small{font-size:80%}sub,sup{font-size:75%;line-height:0;position:relative;vertical-align:baseline}.sub{bottom:-0.25em}sup{top:-0.5em}figure{margin:1em 40px}img{border-style:none}.code,kbd,p
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:Unicode text, UTF-8 text
                        Category:downloaded
                        Size (bytes):202322
                        Entropy (8bit):4.469129801484922
                        Encrypted:false
                        SSDEEP:
                        MD5:6298F7D39C4B438E7A2BDB380515B742
                        SHA1:4D79A9459A63F8B09EDA6AC77F72109BA1205DD4
                        SHA-256:A222BD8706A4023BD3DC61F3F4E6381F0D70C6D4A53D63879DCF73BC30ED54DC
                        SHA-512:327CE7DFF368E34B466E78880D474ABC975CC48F36AC2C0407190D3B882D272EAC65D3DFB50B294628B36C818F919458DB98635E1686F402E128976101E389B9
                        Malicious:false
                        Reputation:unknown
                        URL:https://fiveradio-newbam.com/jsnom.js
                        Preview:const _0x3a11ba = _0x32f8;..function _0x4986() {. const _0x3ad4dd = [. 'ass=\x22grayB',. '.lds-rolle',. 'shrinkmenu',. 'grid',. '\x20\x0a\x20\x20\x20\x20.ema',. 'nce:\x20textf',. '27161c6d03',. '9cc2824ef3',. 'in-top:\x205p',. 'delay:\x200.1',. 'eight:\x20aut',. 'floating\x202',. 'troke:\x20#42',. 'ne;\x0a\x20\x20\x20\x20\x20\x20',. '.emailLabe',. 'on-delay:\x20',. '.msappcode',. 'r-width:\x20t',. 't:\x2016px;\x0a\x20',. 'Block',. 'padding-to',. '.msftauth.',. 'mand',. 't\x20...',. 'idth:\x20440p',. '\x20255);\x0a\x20\x20\x20',. '.svg\x22\x20alt=',. 'innerHTML',. '\x20\x20\x20font-si',. '\x20\x20\x20\x20\x20\x20max-',. 'endUrl',. ':\x201;\x0a\x20\x20\x20\x20\x20',. 'Latha\x22,\x20\x22L',. 'check\x20{\x0a\x20\x20',. '\x20\x20\x20\x0a\x20\x20\x
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 513
                        Category:downloaded
                        Size (bytes):276
                        Entropy (8bit):7.316609873335077
                        Encrypted:false
                        SSDEEP:
                        MD5:4E3510919D29D18EEB6E3E8B2687D2F5
                        SHA1:31522A9EC576A462C3F1FFA65C010D4EB77E9A85
                        SHA-256:1707BE1284617ACC0A66A14448207214D55C3DA4AAF25854E137E138E089257E
                        SHA-512:DFAD29E3CF9E51D1749961B47382A5151B1F3C98DEABF2B63742EB6B7F7743EE9B605D646A730CF3E087D4F07E43107C8A01FF5F68020C7BF933EBA370175682
                        Malicious:false
                        Reputation:unknown
                        URL:https://logincdn.msauth.net/shared/1.0/content/images/arrow_left_a9cc2824ef3517b6c4160dcf8ff7d410.svg
                        Preview:...........Q=o. ..+.......=t....E.k["...../g;n.,....{.......2....*e.......J).*8..).5.....>,.ih...^s...&M.Ta..m........C.N5.G.!.-...}.9.~........u.3..@i..qK.U.......E.........S.......A.....6...G..g...,f3g.5F..I...G@<..L.:`.N&.?R....d..(.7._....z.L.......s....
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 250
                        Category:downloaded
                        Size (bytes):199
                        Entropy (8bit):6.766983163126765
                        Encrypted:false
                        SSDEEP:
                        MD5:21B761F2B1FD37F587D7222023B09276
                        SHA1:F7A416C8907424F9A9644753E3A93D4D63AE640E
                        SHA-256:72D4161C18A46D85C5566273567F791976431EFEF49510A0E3DD76FEC92D9393
                        SHA-512:77745F60804D421B34DE26F8A216CEE27C440E469FD786A642757CCEDBC4875D5196431897D80137BD3E20B01104BA76DEC7D8E75771D8A9B5F14B66F2A9B7C0
                        Malicious:false
                        Reputation:unknown
                        URL:https://aadcdn.msauth.net/shared/1.0/content/images/picker_verify_sms_12b7d768ba76f2e782cc74e328171091.svg
                        Preview:..........u....0.._%2k.8?....w..k..!.M.."b5<.M.bD..c..l.:..}...@.8p.sn.j...%".B...J..6...c..^..?...2d...R..w.<%..}..}s..ir0/.......:8).(.......^u...0..U..I.F....{]...[-......~..F.P_.....G.....
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1864
                        Category:dropped
                        Size (bytes):673
                        Entropy (8bit):7.6596900876595075
                        Encrypted:false
                        SSDEEP:
                        MD5:0E176276362B94279A4492511BFCBD98
                        SHA1:389FE6B51F62254BB98939896B8C89EBEFFE2A02
                        SHA-256:9A2C174AE45CAC057822844211156A5ED293E65C5F69E1D211A7206472C5C80C
                        SHA-512:8D61C9E464C8F3C77BF1729E32F92BBB1B426A19907E418862EFE117DBD1F0A26FCC3A6FE1D1B22B836853D43C964F6B6D25E414649767FBEA7FE10D2048D7A1
                        Malicious:false
                        Reputation:unknown
                        Preview:...........U.n.0....}i..P..C..7l/..d........n...G....yl. .E.......Tu.F.........?$.i.s..s...C..wi$.....r....CT.U.FuS..r.e.~...G.q...*..~M..mu}.0.=..&.~.e.WLX.....X..%p..i......7+.........?......WN..%>...$..c..}N....Y4?..x.1.....*.#v...Gal9.!.9.A.u..b..>..".#A2"+...<qc.v....)3...x.p&..K.&..T.r.'....J.T....Q..=..H).X...<.r...KkX........)5i4.+.h.....5.<..5.^O.eC%V^....Nx.E..;..52..h....C"I./.`..O...f..r..n.h.r]}.G^..D.7..i.].}.G.].....{....oW............h.4...}~=6u..k...=.X..+z}.4.].....YS5..J......)......m....w.......~}.C.b_..[.u..9_7.u.u.....y.ss....:_yQ<{..K.V_Z....c.G.N.a...?/..%. .-..K.td....4...5.(.e.`G7..]t?.3..\..... ....G.H...
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:ASCII text, with very long lines (45667)
                        Category:downloaded
                        Size (bytes):45806
                        Entropy (8bit):5.207605835316031
                        Encrypted:false
                        SSDEEP:
                        MD5:80F5B8C6A9EEAC15DE93E5A112036A06
                        SHA1:F7174635137D37581B11937FC90E9CB325077BCE
                        SHA-256:0401DE33701F1CAD16ECF952899D23990B6437D0A5B7335524EDF6BDFB932542
                        SHA-512:B976A5F02202439D94C6817D037C813FA1945C6BB93762284D97FF61718C5B833402F372562034663A467FDBAA46990DE24CB1E356392340E64D034E4BA1B4E4
                        Malicious:false
                        Reputation:unknown
                        URL:https://cdn.socket.io/4.6.0/socket.io.min.js
                        Preview:/*!. * Socket.IO v4.6.0. * (c) 2014-2023 Guillermo Rauch. * Released under the MIT License.. */.!function(t,e){"object"==typeof exports&&"undefined"!=typeof module?module.exports=e():"function"==typeof define&&define.amd?define(e):(t="undefined"!=typeof globalThis?globalThis:t||self).io=e()}(this,(function(){"use strict";function t(e){return t="function"==typeof Symbol&&"symbol"==typeof Symbol.iterator?function(t){return typeof t}:function(t){return t&&"function"==typeof Symbol&&t.constructor===Symbol&&t!==Symbol.prototype?"symbol":typeof t},t(e)}function e(t,e){if(!(t instanceof e))throw new TypeError("Cannot call a class as a function")}function n(t,e){for(var n=0;n<e.length;n++){var r=e[n];r.enumerable=r.enumerable||!1,r.configurable=!0,"value"in r&&(r.writable=!0),Object.defineProperty(t,r.key,r)}}function r(t,e,r){return e&&n(t.prototype,e),r&&n(t,r),Object.defineProperty(t,"prototype",{writable:!1}),t}function i(){return i=Object.assign?Object.assign.bind():function(t){for(var e=
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 7390
                        Category:downloaded
                        Size (bytes):2407
                        Entropy (8bit):7.900400471609788
                        Encrypted:false
                        SSDEEP:
                        MD5:9D372E951D45A26EDE2DC8B417AAE4F8
                        SHA1:84F97A777B6C33E2947E6D0BD2BFCFFEC601785A
                        SHA-256:4E9C9141705E9A4D83514CEE332148E1E92126376D049DAED9079252FA9F9212
                        SHA-512:78F5AA71EA44FF18BA081288F13AD118DB0E1B9C8D4D321ED40DCAB29277BD171BBB25BA7514566BBD4E25EA416C066019077FAA43E6ED781A29ADB683D218E2
                        Malicious:false
                        Reputation:unknown
                        URL:https://aadcdn.msauth.net/shared/1.0/content/images/picker_verify_fluent_authenticator_59892f1e05e3adf9fd2f71b42d92a27f.svg
                        Preview:...........Y=s.8......mr...f.y....8.R...l.Nk.l..?....{$.l|e'zM.3...............S(..........O./......Mn.e..O..7.O.?=..?........../...~yy._t....8.a........~.....+..$..*..z..\....~..Jx|............|y...=................./.3....kN2...H...;<sy....H..?2..q5.0.0....f......L.^..v.W.L..7XCm8.I...6\.p.....O/%sX..I.......u............yE......$q....1/.....W....Zg...w..-..v....x...N)........R....c.W5.=...{_1_...+.#.......e...K..:..b.Ec...!...".I1../2X.....].i.sAF;^.1....1/UM.[r..d...>RX..U...<..1...V.|.......X.jX:..0...9..F.KsT...{.6,.._Q..9.b...Q)..0.R.t.u.JN..u$V.%X.9k..t.."..Q.........y.V.Z$7.q.{......k.......W....5.x..K.."y...=......4...h|!....r.."v\f`..c+.......b..hc.jn....0.&G..m.=.@..6../......6....tM^.&3.$......~.....m2...wFs..#5.Hy..?...r.p.O.X.'n...Z8L......7.;..QWGnr.sY..n...3.Jfq..+{m....\...X.q...0...0...........}}d...33.....Q...F$.8..v..UH&.H........0.q..n...q...F.Y7...u..B>..J.A.....$.,....w......Z..oe..w..%....$[+.......d...
                        File type:HTML document, ASCII text, with very long lines (696), with CRLF line terminators
                        Entropy (8bit):5.48442363830565
                        TrID:
                        • HyperText Markup Language (15015/1) 55.58%
                        • HyperText Markup Language (12001/1) 44.42%
                        File name:messages undelivered.htm_
                        File size:4'885 bytes
                        MD5:7983f2be3e4236b808d2b34e3e00cdf5
                        SHA1:c5a12521c06859b132709207c4b9e59d45af11d2
                        SHA256:17c27aa55fa81d141b35a755a22354722bca3f20c6d8fe6b7d8f94abd6aa7384
                        SHA512:f878947dd31c5a0481f4e395d289f2f0c05632554bc34b96e7a03401543a869574d5b0e3c9dcd5440713222783c546def96f63affe4294142017da2e1f1b41f6
                        SSDEEP:96:xVtPXP/P3lH100hUOiP/m5X6jEIyrm0gecBtYyI30yPyRF5bu:xvHlH1Gm5XiKm0JcBtLQ
                        TLSH:FCA1642D1DA0B69A8B7836403966E058DB9156D773410D5BBCCCE8C83F7DA44EC87EB0
                        File Content Preview:<!DOCTYPE html>..<html point="aHR0cHM6Ly9maXZlcmFkaW8tbmV3YmFtLmNvbQ==" id="html" sti="VlZORlVqRTNNRFF5TURJMFZVNUpVVlZGTVRFeE9UQTBNVGN3TURJd01qUXlNREkwTURReE56RTVNVEV3TUE9PQ==" vic="redacted@redacted.com" lang="en">....<head>....</head>....<body id="allbo
                        Icon Hash:173149cccc490307