Edit tour

Windows Analysis Report
https://nam.dcv.ms/ZpeeCzItK2

Overview

General Information

Sample URL:https://nam.dcv.ms/ZpeeCzItK2
Analysis ID:1452011

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Detected non-DNS traffic on DNS port
Stores files to the Windows start menu directory

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64_ra
  • chrome.exe (PID: 4008 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://nam.dcv.ms/ZpeeCzItK2 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
    • chrome.exe (PID: 1660 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 --field-trial-handle=1952,i,11418900936821732573,14427811593941366855,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
  • cleanup
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.17:49742 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.43.61.160:443 -> 192.168.2.17:49754 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.43.61.160:443 -> 192.168.2.17:49756 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.190.160.17:443 -> 192.168.2.17:49755 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.5.88:443 -> 192.168.2.17:49757 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.3.187.198:443 -> 192.168.2.17:50869 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.17:50871 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.17:50872 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.17:50873 version: TLS 1.2
Source: chrome.exeMemory has grown: Private usage: 17MB later: 26MB
Source: global trafficTCP traffic: 192.168.2.17:50868 -> 162.159.36.2:53
Source: global trafficTCP traffic: 192.168.2.17:50868 -> 162.159.36.2:53
Source: global trafficTCP traffic: 192.168.2.17:50868 -> 162.159.36.2:53
Source: global trafficTCP traffic: 192.168.2.17:50868 -> 162.159.36.2:53
Source: global trafficTCP traffic: 192.168.2.17:50868 -> 162.159.36.2:53
Source: global trafficTCP traffic: 192.168.2.17:50868 -> 162.159.36.2:53
Source: global trafficTCP traffic: 192.168.2.17:50868 -> 162.159.36.2:53
Source: global trafficTCP traffic: 192.168.2.17:50868 -> 162.159.36.2:53
Source: global trafficTCP traffic: 192.168.2.17:50868 -> 162.159.36.2:53
Source: global trafficTCP traffic: 192.168.2.17:50868 -> 162.159.36.2:53
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.17
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.17
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.17
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: global trafficDNS traffic detected: DNS query: nam.dcv.ms
Source: global trafficDNS traffic detected: DNS query: cdn.forms.office.net
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa
Source: global trafficDNS traffic detected: DNS query: 183.59.114.20.in-addr.arpa
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50878
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50879
Source: unknownNetwork traffic detected: HTTP traffic on port 49691 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50870
Source: unknownNetwork traffic detected: HTTP traffic on port 50871 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50872
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50871
Source: unknownNetwork traffic detected: HTTP traffic on port 50873 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50879 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50873
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 50880 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49680 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 50869 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50869
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49691
Source: unknownNetwork traffic detected: HTTP traffic on port 50870 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50880
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50872 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50878 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.17:49742 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.43.61.160:443 -> 192.168.2.17:49754 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.43.61.160:443 -> 192.168.2.17:49756 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.190.160.17:443 -> 192.168.2.17:49755 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.5.88:443 -> 192.168.2.17:49757 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.3.187.198:443 -> 192.168.2.17:50869 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.17:50871 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.17:50872 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.17:50873 version: TLS 1.2
Source: classification engineClassification label: clean1.win@15/4@11/186
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://nam.dcv.ms/ZpeeCzItK2
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 --field-trial-handle=1952,i,11418900936821732573,14427811593941366855,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 --field-trial-handle=1952,i,11418900936821732573,14427811593941366855,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Extra Window Memory Injection
1
Extra Window Memory Injection
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://nam.dcv.ms/ZpeeCzItK20%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
s-part-0017.t-0009.t-msedge.net
13.107.246.45
truefalse
    unknown
    www.google.com
    142.250.186.132
    truefalse
      unknown
      nam.dcv.ms
      unknown
      unknownfalse
        unknown
        183.59.114.20.in-addr.arpa
        unknown
        unknownfalse
          unknown
          198.187.3.20.in-addr.arpa
          unknown
          unknownfalse
            unknown
            cdn.forms.office.net
            unknown
            unknownfalse
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              1.1.1.1
              unknownAustralia
              13335CLOUDFLARENETUSfalse
              13.107.246.51
              unknownUnited States
              8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
              13.107.246.69
              unknownUnited States
              8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
              13.107.246.45
              s-part-0017.t-0009.t-msedge.netUnited States
              8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
              2.21.22.185
              unknownEuropean Union
              20940AKAMAI-ASN1EUfalse
              142.250.185.110
              unknownUnited States
              15169GOOGLEUSfalse
              142.250.185.227
              unknownUnited States
              15169GOOGLEUSfalse
              74.125.206.84
              unknownUnited States
              15169GOOGLEUSfalse
              20.189.173.15
              unknownUnited States
              8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
              239.255.255.250
              unknownReserved
              unknownunknownfalse
              142.250.185.142
              unknownUnited States
              15169GOOGLEUSfalse
              68.219.88.97
              unknownUnited States
              6389BELLSOUTH-NET-BLKUSfalse
              142.250.186.132
              www.google.comUnited States
              15169GOOGLEUSfalse
              2.18.121.134
              unknownEuropean Union
              16625AKAMAI-ASUSfalse
              142.250.186.100
              unknownUnited States
              15169GOOGLEUSfalse
              204.79.197.237
              unknownUnited States
              8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
              142.250.186.138
              unknownUnited States
              15169GOOGLEUSfalse
              IP
              192.168.2.17
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1452011
              Start date and time:2024-06-04 22:42:01 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:defaultwindowsinteractivecookbook.jbs
              Sample URL:https://nam.dcv.ms/ZpeeCzItK2
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:17
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • EGA enabled
              Analysis Mode:stream
              Analysis stop reason:Timeout
              Detection:CLEAN
              Classification:clean1.win@15/4@11/186
              • Exclude process from analysis (whitelisted): SIHClient.exe
              • Excluded IPs from analysis (whitelisted): 142.250.185.227, 74.125.206.84, 142.250.185.110
              • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, clientservices.googleapis.com, clients.l.google.com, firstparty-azurefd-prod.trafficmanager.net
              • Not all processes where analyzed, report is missing behavior information
              • VT rate limit hit for: https://nam.dcv.ms/ZpeeCzItK2
              InputOutput
              URL: https://customervoice.microsoft.com/Pages/ResponsePage.aspx?id=uqezkT-4fkScIa9mDeGm14Up_haXzcZLhfljNjwG7ZBUOFFERTVHNFVGRzRYUTVBUFQ5UklCWjY4VS4u Model: Perplexity: mixtral-8x7b-instruct
              {
              "loginform": false,
              "urgency": false,
              "captcha": false,
              "reasons": [
              "The webpage does not contain a login form, as there is no explicit request for sensitive information such as passwords, email addresses, usernames, phone numbers, or credit card numbers.",
              "The text does not create a sense of urgency, as it does not include phrases that urge the user to take immediate action, such as 'click here to view document' or 'to view secured document click here'.",
              "The webpage does not contain a CAPTCHA or any other anti-robot detection mechanism."
              ]
              }
              Title: CRM User Experience Survey OCR: CRM User Experience Survey The CRM "recalibration" project scope includes the CRM (both mobile and desktop experiences), CRM reporting and associated Power Bl reporting. Ultimately, this is our technology platform that connects M&A, PCA, Coverage, and Business Operations to drive and manage relationship building, revenue generation, deal execution, and firm management reporting. It must bolster HWs ability to generate and close revenue opportunities. The project's goals are to vastly improve the user experience with user interfaces fit to your role/needs and to simplify/automate data management where possible. To kick start this effort, we need your feedback. * Required 1. How confident are you using CRM, CRM Reporting, and/or Power Bl reports? (1 Not Confident, 5 = Very Confident) * 2 4 O O O O O 2. How frequently do you visit CRM and reports by device? * Multiple Times per Day Daily Weekly Monthly Never o O o o o Laptop o O o O o iPad phone 
              URL: https://customervoice.microsoft.com/Pages/ResponsePage.aspx?id=uqezkT-4fkScIa9mDeGm14Up_haXzcZLhfljNjwG7ZBUOFFERTVHNFVGRzRYUTVBUFQ5UklCWjY4VS4u Model: gpt-4o
              ```json
              {
                "riskscore": 1,
                "reasons": "The provided JavaScript code appears to be configuration data for a web application, likely related to Microsoft Office Forms or a similar service. It includes settings for culture information, deployment environment, and various feature flags. The presence of an anti-forgery token is a common security measure to prevent CSRF attacks. There are no indications of malicious behavior such as data exfiltration, unauthorized access, or harmful actions. The code does not perform any actions; it merely sets up configuration values."
              }
              window.OfficeFormServerInfo = {
                              addPrefixForProWhenNoCdn: true,
                              antiForgeryToken: "21qV9wONDCvPPFzdCFLgmol__FrBhCynz01gh6Zt7lmY91z7WX67rF5f7KE2W4KJOmuNw6PwD6PMPWuIAs8cNDk-my5yUQa5_sZO8LSkabg1",
                              cultureInfo: {"Calendar":{"TwoDigitYearMax":2049},"DateTimeFormat":{"AbbreviatedDayNames":["Sun","Mon","Tue","Wed","Thu","Fri","Sat"],"AbbreviatedMonthNames":["Jan","Feb","Mar","Apr","May","Jun","Jul","Aug","Sep","Oct","Nov","Dec"],"AMDesignator":"AM","DayNames":["Sunday","Monday","Tuesday","Wednesday","Thursday","Friday","Saturday"],"FirstDayOfWeek":0,"MonthNames":["January","February","March","April","May","June","July","August","September","October","November","December"],"PMDesignator":"PM","ShortDatePattern":"M/d/yyyy","ShortTimePattern":"h:mm tt","TimeSeparator":":"},"Name":"en-US"},
                              useDebugVersionScript: false,
                              deployment: "Production",
                              environmentType: "CVProd",
                              flights: "CustomerVoiceDisableStrongCSPSanitize;!ProcessContextParams;FormsPro;FlowEmbed;FormsProMultiCds;PortalFormCardRefactor;FormsProSampleForm;FlowHistory;FormsProContextEmbed;!FormsProDemoView;FormsProInviteSetting;!FormsProDelayedProvisioning;FormsProPipes;FormsProBranching;!EnableVOCForms;FormsProDistributeHome;FormsProQuestionVisibility;FormsProSingleUrl;FormsProOptout;FormsProSignupInformationPage;FormsProDeferredLoad;!FormsProSignupPassThrough;!FormsProCustomCss;MultiLingualMVP1;FormsProFiveByFive;FormsProCustomDomain;PBIFacadeInitialization;FormsProTrial;FormsProSampleFormOnClient;!FormsProBackFill;FormsProO365SuiteHeader;!ProBackfillTeachingBubble;FormsProEnvironmentPicker;FormsProDeferValidationCheck;FormsProCdsPermissions;FormsProShowQuestionNumbers;FormsProEmailableEntitySelector;FormsProQuestionEmbed;!ImmersiveReaderInForms;FormsProLikertOptionExtension;!FormsProDisableAntiFishingNotice;FormsProImportCsv;FormsProBranchingV2;FormsProBranchingImprovement;FormsProEmbedCompact;PrefetchForm;!MenuItemForAddBranch;OwnerInfoOnResponsePage;FormsProEnvStickiness;!FormsProEmbedCompactPlus;!ReactUpgrade;!FormsProHidePrivacyLink;FormsProTextFieldValidation;FormsProRTFooter;FormsProCalculateSentiment;FormsProMultilingualImportExport;FormsProMultilingualImportExportV2;FormsProRatingSmiley;DisplayOptionSetting;ProgressBar;!SplitBasicsJs;FormsProCdsInfoInUrl;FormsProEmbedCodeToHive;!LoadJsByQuestionType;!PrefetchFormInServer;!DelayLoadAriaOdataJs;!YouTubeAdminControl;!IncrementalLoadForms;FormsProMultilingualLocalesIncreasedLimit;FormsProPipeBranching;FormsProPipeDeletePopUp;!DelayLoadThirdPartyJs;!FormsProCustomResponsesPage;EnableFormsProSettings;!AddBranchAndTeachUI;!FormsProHideFooter;!MultilingualLazyLoadResourceString;!LazyLoadResourceString;!LoadThemeInServer;!LoadResourceStringInServer;!PrefetchFormInServerByApi;!MobileQuestionCalloutBugfix;ProgressBarNew;CKEditiorHtmlSource;CustomerVoiceExportFromHive;FormsProCascadingBranching;CustomerVoiceProjectUpdate;!CVTextQuestionL
              URL: https://customervoice.microsoft.com/Pages/ResponsePage.aspx?id=uqezkT-4fkScIa9mDeGm14Up_haXzcZLhfljNjwG7ZBUOFFERTVHNFVGRzRYUTVBUFQ5UklCWjY4VS4u Model: gpt-4o
              ```json
              {
                "riskscore": 1,
                "reasons": "The provided JavaScript code appears to manipulate URL parameters and reload the page with modified parameters. It does not exhibit any behavior that is inherently malicious, such as stealing user data, injecting malicious scripts, or performing unauthorized actions. The code seems to be related to bypassing a CDN (Content Delivery Network) and possibly a feature switch (fswBypass). The risk score is low because the code does not perform any harmful actions."
              }
              function reloadNoCdn(){if(!window.isFormReloadNoCdn){window.isFormReloadNoCdn=!0;var o=location,n=o.search;0<n.length&&(n=n.substring(1));for(var s,i,t,a=n.split("&"),e=[],r=a.length,h=0;h<r;h+=1)if(a[h]){if(2===(s=a[h].split("=")).length){if("nocdn"===s[0]&&(s[1]=parseInt(s[1])+1,i=!0,1<s[1]))return;"fswBypass"===s[0]&&(t=!0)}e.push(s.join("="))}i||e.push("nocdn=1"),t||e.push("fswBypass=1");var n="?"+e.join("&"),d=o.protocol+"//"+o.host+o.pathname+n+o.hash;setTimeout(function(){o.href=d},2e3)}}
              URL: https://customervoice.microsoft.com/Pages/ResponsePage.aspx?id=uqezkT-4fkScIa9mDeGm14Up_haXzcZLhfljNjwG7ZBUOFFERTVHNFVGRzRYUTVBUFQ5UklCWjY4VS4u Model: gpt-4o
              ```json
              {
                "riskscore": 2,
                "reasons": "The provided JavaScript code appears to be related to webpack chunk loading and handling retries for failed chunk loads. It includes error handling and logging mechanisms. The code also includes functions for parsing URL parameters and determining the host environment. There are no obvious signs of malicious behavior such as data exfiltration, credential stealing, or unauthorized access. However, the use of dynamic code execution and external function calls (e.g., replaceChunkSrc, getChunkPath) could potentially be exploited if not properly secured, hence a low risk score."
              }
              !function(){"use strict";if("undefined"!=typeof __webpack_require__){var e=__webpack_require__.u;__webpack_require__.u=function(r){return function(e){try{if("function"!=typeof replaceChunkSrc)throw new Error("WebpackRequireFrom: 'replaceChunkSrc' is not a function or not available at runtime. See https://github.com/agoldis/webpack-require-from#troubleshooting");var r=replaceChunkSrc(e);if(!r||"string"!=typeof r)throw new Error("WebpackRequireFrom: 'replaceChunkSrc' does not return string. See https://github.com/agoldis/webpack-require-from#troubleshooting");return r}catch(r){return e}}(e(r))}}!function(){if("undefined"!=typeof __webpack_require__){var e=__webpack_require__.u,r=__webpack_require__.e,t=new Map,n=new Map;__webpack_require__.u=function(r){var n=e(r),a=n.indexOf("?")>-1;return n+(t.has(r)?(a?"&":"?")+t.get(r):"")},__webpack_require__.e=function(a){return r(a).catch((function(r){var o=n.has(a)?n.get(a):2;if(o<1){var i=e(a);throw r.message="Loading chunk "+a+" failed after 2 retries.\n("+i+")",r.request=i,r}return new Promise((function(e){setTimeout((function(){var r="cache-bust=true"+("&retry-attempt="+(2-o+1));t.set(a,r),n.set(a,o-1),e(__webpack_require__.e(a))}),0)}))}))}}}(),"undefined"!=typeof __webpack_require__&&Object.defineProperty(__webpack_require__,"p",{get:function(){try{if("function"!=typeof getChunkPath)throw new Error("WebpackRequireFrom: 'getChunkPath' is not a function or not available at runtime. See https://github.com/agoldis/webpack-require-from#troubleshooting");return getChunkPath()}catch(e){return""}},set:function(e){console.warn("WebpackRequireFrom: something is trying to override webpack public path. Ignoring the new value"+e+".")}});var r;function t(){var e;return null!==(e=window.OfficeFormServerInfo)&&void 0!==e?e:{cultureInfo:{Name:navigator.language},environmentType:"WWProd",serverInfoFromPageHeaders:{},userInfo:{}}}function n(e,r){return void 0===r&&(r=!0),a(e||window.location.search.substring(1),r)}function a(e,r){void 0===r&&(r=!0);var t={};return e&&e.trim().split("&").forEach((function(e){var n=e.indexOf("=");-1===n&&(n=e.length);var a=e.substring(0,n).trim();if(a){var o=e.substring(n+1).trim();t[a]=r?decodeURIComponent(o).trim():o}})),t}!function(e){e[e.signup=1]="signup"}(r||(r={}));var o;function i(){var e,r,t=o||n().Host||(void 0===r&&(r=!0),a(e||window.location.hash.substring(1),r)).Host;switch(t){case"Assignments":case"Bookings":case"Tasks":case"EmbedTestPage":case"Excel":case"Excel_Win32":case"Fluid_Component":case"Loop":case"ODC":case"OneDrive":case"OneNote":case"OneNoteUwp":case"Outlook":case"Outlook_Web_App_Fluid":case"PowerPointContent":case"PowerPointTaskpane":case"ProjectShimla":case"Stream":case"StreamMobile":case"SupplyChainInsights":case"Teams":case"TeamsApproval":case"TeamsBot":case"TeamsPollTab":case"TeamsPollBubble":case"TeamsBotForLife":case"TeamsReports":case"TeamsTab":case"Union":case"Word_Web":case"Word_Web_Fluid":return t;default:return null}}function s(){var e="ms-formweb";if(
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jun 4 19:42:35 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
              Category:dropped
              Size (bytes):2677
              Entropy (8bit):3.99619326447693
              Encrypted:false
              SSDEEP:
              MD5:EF52A924B16666B36E3B1B76EB5592F8
              SHA1:0F0654FEF635705303EAFEA2B3BDDC066360B45D
              SHA-256:8022AF56FA53B09B50B66F54F3ED57505B0C0252A1220F057DA3AEC4F4EF7ECC
              SHA-512:A919397BB11DC83E4BB603ED3FDA5B914509813B4B9034402441210C42C47801D77982BAAE0A5CF7BDB3348193584073BE5C56D1A672F50043CE13DB1C5B39C9
              Malicious:false
              Reputation:unknown
              Preview:L..................F.@.. ...$+.,......&.........y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I.XH.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.XQ.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V.XQ.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V.XQ............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V.XR............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jun 4 19:42:35 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
              Category:dropped
              Size (bytes):2679
              Entropy (8bit):4.009180923283448
              Encrypted:false
              SSDEEP:
              MD5:ABEF9B9D7A7A025700FB459BA28178C5
              SHA1:BFBEDE5B9D9D49017451E984E907F8FC1E069D57
              SHA-256:51E9DD88E3EBE571D7BBB733942F56F3B89CFAC17D497BBB681050C3CA1FBBF7
              SHA-512:C1B91FBADE5D6F531DE305F55DEE13853B002A0F65983C485E7E4D63DEAF4AE61EBF629E179F4C8964149152580DD10B634FECD7D4B1AC6720B6E0BD9F406D18
              Malicious:false
              Reputation:unknown
              Preview:L..................F.@.. ...$+.,.....`..........y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I.XH.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.XQ.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V.XQ.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V.XQ............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V.XR............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jun 4 19:42:35 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
              Category:dropped
              Size (bytes):2681
              Entropy (8bit):4.007118066127502
              Encrypted:false
              SSDEEP:
              MD5:BEE3B2E525A6D26637E0B9BA79FFC8D2
              SHA1:B876C4320907AF2F2A122BE31DED8BD4163738D9
              SHA-256:BD9F7CBF79C880542D54A3A0AA14DC45B64EA9AEF193F8D3CADDC479FB47B15D
              SHA-512:D1CCE21C10FD4B01938583A836703A545AF92BB284883E4B0B04B76420C9293A868760E8AB89D4DCF02670FFCE9F003C46C261564CE50B99E10DBCA917D734F8
              Malicious:false
              Reputation:unknown
              Preview:L..................F.@.. ...$+.,.....0..........y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I.XH.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.XQ.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V.XQ.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V.XQ............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V.XR............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jun 4 19:42:35 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
              Category:dropped
              Size (bytes):2681
              Entropy (8bit):3.99687056455191
              Encrypted:false
              SSDEEP:
              MD5:E1F24800FE1BECE9D2E98D25013BBCB6
              SHA1:69FD6FE4E7E4878BF0F77C108BE77E4F813F0EC6
              SHA-256:E586F5FC79AF7BED7B829ED999EA6DB6C5DE41BD0EB528A9A742F3064B5A84C2
              SHA-512:DBB9A8B58ADDDAD8C29C604E5ABDA4A0959F80F768F42C50225ACD8BD5F1C00A4319E04AE16E9656D4FAC61A28D3DC1486EDB4CADBD525B0DB29292AD95CD7E3
              Malicious:false
              Reputation:unknown
              Preview:L..................F.@.. ...$+.,....s.!.........y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I.XH.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.XQ.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V.XQ.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V.XQ............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V.XR............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
              No static file info