Windows
Analysis Report
https://nam.dcv.ms/ZpeeCzItK2
Overview
Detection
Score: | 1 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
- System is w10x64_ra
chrome.exe (PID: 4008 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// nam.dcv.ms /ZpeeCzItK 2 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA) chrome.exe (PID: 1660 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2200 --fi eld-trial- handle=195 2,i,114189 0093682173 2573,14427 8115939413 66855,2621 44 --disab le-feature s=Optimiza tionGuideM odelDownlo ading,Opti mizationHi nts,Optimi zationHint sFetching, Optimizati onTargetPr ediction / prefetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
- cleanup
- • Compliance
- • Software Vulnerabilities
- • Networking
- • System Summary
- • Boot Survival
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Memory has grown: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | File created: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Window detected: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 Extra Window Memory Injection | 1 Extra Window Memory Injection | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
s-part-0017.t-0009.t-msedge.net | 13.107.246.45 | true | false | unknown | |
www.google.com | 142.250.186.132 | true | false | unknown | |
nam.dcv.ms | unknown | unknown | false | unknown | |
183.59.114.20.in-addr.arpa | unknown | unknown | false | unknown | |
198.187.3.20.in-addr.arpa | unknown | unknown | false | unknown | |
cdn.forms.office.net | unknown | unknown | false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
13.107.246.51 | unknown | United States | 8068 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
13.107.246.69 | unknown | United States | 8068 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
13.107.246.45 | s-part-0017.t-0009.t-msedge.net | United States | 8068 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
2.21.22.185 | unknown | European Union | 20940 | AKAMAI-ASN1EU | false | |
142.250.185.110 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.185.227 | unknown | United States | 15169 | GOOGLEUS | false | |
74.125.206.84 | unknown | United States | 15169 | GOOGLEUS | false | |
20.189.173.15 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.250.185.142 | unknown | United States | 15169 | GOOGLEUS | false | |
68.219.88.97 | unknown | United States | 6389 | BELLSOUTH-NET-BLKUS | false | |
142.250.186.132 | www.google.com | United States | 15169 | GOOGLEUS | false | |
2.18.121.134 | unknown | European Union | 16625 | AKAMAI-ASUS | false | |
142.250.186.100 | unknown | United States | 15169 | GOOGLEUS | false | |
204.79.197.237 | unknown | United States | 8068 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
142.250.186.138 | unknown | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.17 |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1452011 |
Start date and time: | 2024-06-04 22:42:01 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | https://nam.dcv.ms/ZpeeCzItK2 |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 17 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean1.win@15/4@11/186 |
- Exclude process from analysis
(whitelisted): SIHClient.exe - Excluded IPs from analysis (wh
itelisted): 142.250.185.227, 7 4.125.206.84, 142.250.185.110 - Excluded domains from analysis
(whitelisted): clients2.googl e.com, accounts.google.com, cl ientservices.googleapis.com, c lients.l.google.com, firstpart y-azurefd-prod.trafficmanager. net - Not all processes where analyz
ed, report is missing behavior information - VT rate limit hit for: https:
//nam.dcv.ms/ZpeeCzItK2
Input | Output |
---|---|
URL: https://customervoice.microsoft.com/Pages/ResponsePage.aspx?id=uqezkT-4fkScIa9mDeGm14Up_haXzcZLhfljNjwG7ZBUOFFERTVHNFVGRzRYUTVBUFQ5UklCWjY4VS4u Model: Perplexity: mixtral-8x7b-instruct | { "loginform": false, "urgency": false, "captcha": false, "reasons": [ "The webpage does not contain a login form, as there is no explicit request for sensitive information such as passwords, email addresses, usernames, phone numbers, or credit card numbers.", "The text does not create a sense of urgency, as it does not include phrases that urge the user to take immediate action, such as 'click here to view document' or 'to view secured document click here'.", "The webpage does not contain a CAPTCHA or any other anti-robot detection mechanism." ] } |
Title: CRM User Experience Survey OCR: CRM User Experience Survey The CRM "recalibration" project scope includes the CRM (both mobile and desktop experiences), CRM reporting and associated Power Bl reporting. Ultimately, this is our technology platform that connects M&A, PCA, Coverage, and Business Operations to drive and manage relationship building, revenue generation, deal execution, and firm management reporting. It must bolster HWs ability to generate and close revenue opportunities. The project's goals are to vastly improve the user experience with user interfaces fit to your role/needs and to simplify/automate data management where possible. To kick start this effort, we need your feedback. * Required 1. How confident are you using CRM, CRM Reporting, and/or Power Bl reports? (1 Not Confident, 5 = Very Confident) * 2 4 O O O O O 2. How frequently do you visit CRM and reports by device? * Multiple Times per Day Daily Weekly Monthly Never o O o o o Laptop o O o O o iPad phone | |
URL: https://customervoice.microsoft.com/Pages/ResponsePage.aspx?id=uqezkT-4fkScIa9mDeGm14Up_haXzcZLhfljNjwG7ZBUOFFERTVHNFVGRzRYUTVBUFQ5UklCWjY4VS4u Model: gpt-4o | ```json { "riskscore": 1, "reasons": "The provided JavaScript code appears to be configuration data for a web application, likely related to Microsoft Office Forms or a similar service. It includes settings for culture information, deployment environment, and various feature flags. The presence of an anti-forgery token is a common security measure to prevent CSRF attacks. There are no indications of malicious behavior such as data exfiltration, unauthorized access, or harmful actions. The code does not perform any actions; it merely sets up configuration values." } |
window.OfficeFormServerInfo = { addPrefixForProWhenNoCdn: true, antiForgeryToken: "21qV9wONDCvPPFzdCFLgmol__FrBhCynz01gh6Zt7lmY91z7WX67rF5f7KE2W4KJOmuNw6PwD6PMPWuIAs8cNDk-my5yUQa5_sZO8LSkabg1", cultureInfo: {"Calendar":{"TwoDigitYearMax":2049},"DateTimeFormat":{"AbbreviatedDayNames":["Sun","Mon","Tue","Wed","Thu","Fri","Sat"],"AbbreviatedMonthNames":["Jan","Feb","Mar","Apr","May","Jun","Jul","Aug","Sep","Oct","Nov","Dec"],"AMDesignator":"AM","DayNames":["Sunday","Monday","Tuesday","Wednesday","Thursday","Friday","Saturday"],"FirstDayOfWeek":0,"MonthNames":["January","February","March","April","May","June","July","August","September","October","November","December"],"PMDesignator":"PM","ShortDatePattern":"M/d/yyyy","ShortTimePattern":"h:mm tt","TimeSeparator":":"},"Name":"en-US"}, useDebugVersionScript: false, deployment: "Production", environmentType: "CVProd", flights: "CustomerVoiceDisableStrongCSPSanitize;!ProcessContextParams;FormsPro;FlowEmbed;FormsProMultiCds;PortalFormCardRefactor;FormsProSampleForm;FlowHistory;FormsProContextEmbed;!FormsProDemoView;FormsProInviteSetting;!FormsProDelayedProvisioning;FormsProPipes;FormsProBranching;!EnableVOCForms;FormsProDistributeHome;FormsProQuestionVisibility;FormsProSingleUrl;FormsProOptout;FormsProSignupInformationPage;FormsProDeferredLoad;!FormsProSignupPassThrough;!FormsProCustomCss;MultiLingualMVP1;FormsProFiveByFive;FormsProCustomDomain;PBIFacadeInitialization;FormsProTrial;FormsProSampleFormOnClient;!FormsProBackFill;FormsProO365SuiteHeader;!ProBackfillTeachingBubble;FormsProEnvironmentPicker;FormsProDeferValidationCheck;FormsProCdsPermissions;FormsProShowQuestionNumbers;FormsProEmailableEntitySelector;FormsProQuestionEmbed;!ImmersiveReaderInForms;FormsProLikertOptionExtension;!FormsProDisableAntiFishingNotice;FormsProImportCsv;FormsProBranchingV2;FormsProBranchingImprovement;FormsProEmbedCompact;PrefetchForm;!MenuItemForAddBranch;OwnerInfoOnResponsePage;FormsProEnvStickiness;!FormsProEmbedCompactPlus;!ReactUpgrade;!FormsProHidePrivacyLink;FormsProTextFieldValidation;FormsProRTFooter;FormsProCalculateSentiment;FormsProMultilingualImportExport;FormsProMultilingualImportExportV2;FormsProRatingSmiley;DisplayOptionSetting;ProgressBar;!SplitBasicsJs;FormsProCdsInfoInUrl;FormsProEmbedCodeToHive;!LoadJsByQuestionType;!PrefetchFormInServer;!DelayLoadAriaOdataJs;!YouTubeAdminControl;!IncrementalLoadForms;FormsProMultilingualLocalesIncreasedLimit;FormsProPipeBranching;FormsProPipeDeletePopUp;!DelayLoadThirdPartyJs;!FormsProCustomResponsesPage;EnableFormsProSettings;!AddBranchAndTeachUI;!FormsProHideFooter;!MultilingualLazyLoadResourceString;!LazyLoadResourceString;!LoadThemeInServer;!LoadResourceStringInServer;!PrefetchFormInServerByApi;!MobileQuestionCalloutBugfix;ProgressBarNew;CKEditiorHtmlSource;CustomerVoiceExportFromHive;FormsProCascadingBranching;CustomerVoiceProjectUpdate;!CVTextQuestionL | |
URL: https://customervoice.microsoft.com/Pages/ResponsePage.aspx?id=uqezkT-4fkScIa9mDeGm14Up_haXzcZLhfljNjwG7ZBUOFFERTVHNFVGRzRYUTVBUFQ5UklCWjY4VS4u Model: gpt-4o | ```json { "riskscore": 1, "reasons": "The provided JavaScript code appears to manipulate URL parameters and reload the page with modified parameters. It does not exhibit any behavior that is inherently malicious, such as stealing user data, injecting malicious scripts, or performing unauthorized actions. The code seems to be related to bypassing a CDN (Content Delivery Network) and possibly a feature switch (fswBypass). The risk score is low because the code does not perform any harmful actions." } |
function reloadNoCdn(){if(!window.isFormReloadNoCdn){window.isFormReloadNoCdn=!0;var o=location,n=o.search;0<n.length&&(n=n.substring(1));for(var s,i,t,a=n.split("&"),e=[],r=a.length,h=0;h<r;h+=1)if(a[h]){if(2===(s=a[h].split("=")).length){if("nocdn"===s[0]&&(s[1]=parseInt(s[1])+1,i=!0,1<s[1]))return;"fswBypass"===s[0]&&(t=!0)}e.push(s.join("="))}i||e.push("nocdn=1"),t||e.push("fswBypass=1");var n="?"+e.join("&"),d=o.protocol+"//"+o.host+o.pathname+n+o.hash;setTimeout(function(){o.href=d},2e3)}} | |
URL: https://customervoice.microsoft.com/Pages/ResponsePage.aspx?id=uqezkT-4fkScIa9mDeGm14Up_haXzcZLhfljNjwG7ZBUOFFERTVHNFVGRzRYUTVBUFQ5UklCWjY4VS4u Model: gpt-4o | ```json { "riskscore": 2, "reasons": "The provided JavaScript code appears to be related to webpack chunk loading and handling retries for failed chunk loads. It includes error handling and logging mechanisms. The code also includes functions for parsing URL parameters and determining the host environment. There are no obvious signs of malicious behavior such as data exfiltration, credential stealing, or unauthorized access. However, the use of dynamic code execution and external function calls (e.g., replaceChunkSrc, getChunkPath) could potentially be exploited if not properly secured, hence a low risk score." } |
!function(){"use strict";if("undefined"!=typeof __webpack_require__){var e=__webpack_require__.u;__webpack_require__.u=function(r){return function(e){try{if("function"!=typeof replaceChunkSrc)throw new Error("WebpackRequireFrom: 'replaceChunkSrc' is not a function or not available at runtime. See https://github.com/agoldis/webpack-require-from#troubleshooting");var r=replaceChunkSrc(e);if(!r||"string"!=typeof r)throw new Error("WebpackRequireFrom: 'replaceChunkSrc' does not return string. See https://github.com/agoldis/webpack-require-from#troubleshooting");return r}catch(r){return e}}(e(r))}}!function(){if("undefined"!=typeof __webpack_require__){var e=__webpack_require__.u,r=__webpack_require__.e,t=new Map,n=new Map;__webpack_require__.u=function(r){var n=e(r),a=n.indexOf("?")>-1;return n+(t.has(r)?(a?"&":"?")+t.get(r):"")},__webpack_require__.e=function(a){return r(a).catch((function(r){var o=n.has(a)?n.get(a):2;if(o<1){var i=e(a);throw r.message="Loading chunk "+a+" failed after 2 retries.\n("+i+")",r.request=i,r}return new Promise((function(e){setTimeout((function(){var r="cache-bust=true"+("&retry-attempt="+(2-o+1));t.set(a,r),n.set(a,o-1),e(__webpack_require__.e(a))}),0)}))}))}}}(),"undefined"!=typeof __webpack_require__&&Object.defineProperty(__webpack_require__,"p",{get:function(){try{if("function"!=typeof getChunkPath)throw new Error("WebpackRequireFrom: 'getChunkPath' is not a function or not available at runtime. See https://github.com/agoldis/webpack-require-from#troubleshooting");return getChunkPath()}catch(e){return""}},set:function(e){console.warn("WebpackRequireFrom: something is trying to override webpack public path. Ignoring the new value"+e+".")}});var r;function t(){var e;return null!==(e=window.OfficeFormServerInfo)&&void 0!==e?e:{cultureInfo:{Name:navigator.language},environmentType:"WWProd",serverInfoFromPageHeaders:{},userInfo:{}}}function n(e,r){return void 0===r&&(r=!0),a(e||window.location.search.substring(1),r)}function a(e,r){void 0===r&&(r=!0);var t={};return e&&e.trim().split("&").forEach((function(e){var n=e.indexOf("=");-1===n&&(n=e.length);var a=e.substring(0,n).trim();if(a){var o=e.substring(n+1).trim();t[a]=r?decodeURIComponent(o).trim():o}})),t}!function(e){e[e.signup=1]="signup"}(r||(r={}));var o;function i(){var e,r,t=o||n().Host||(void 0===r&&(r=!0),a(e||window.location.hash.substring(1),r)).Host;switch(t){case"Assignments":case"Bookings":case"Tasks":case"EmbedTestPage":case"Excel":case"Excel_Win32":case"Fluid_Component":case"Loop":case"ODC":case"OneDrive":case"OneNote":case"OneNoteUwp":case"Outlook":case"Outlook_Web_App_Fluid":case"PowerPointContent":case"PowerPointTaskpane":case"ProjectShimla":case"Stream":case"StreamMobile":case"SupplyChainInsights":case"Teams":case"TeamsApproval":case"TeamsBot":case"TeamsPollTab":case"TeamsPollBubble":case"TeamsBotForLife":case"TeamsReports":case"TeamsTab":case"Union":case"Word_Web":case"Word_Web_Fluid":return t;default:return null}}function s(){var e="ms-formweb";if( |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.99619326447693 |
Encrypted: | false |
SSDEEP: | |
MD5: | EF52A924B16666B36E3B1B76EB5592F8 |
SHA1: | 0F0654FEF635705303EAFEA2B3BDDC066360B45D |
SHA-256: | 8022AF56FA53B09B50B66F54F3ED57505B0C0252A1220F057DA3AEC4F4EF7ECC |
SHA-512: | A919397BB11DC83E4BB603ED3FDA5B914509813B4B9034402441210C42C47801D77982BAAE0A5CF7BDB3348193584073BE5C56D1A672F50043CE13DB1C5B39C9 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 4.009180923283448 |
Encrypted: | false |
SSDEEP: | |
MD5: | ABEF9B9D7A7A025700FB459BA28178C5 |
SHA1: | BFBEDE5B9D9D49017451E984E907F8FC1E069D57 |
SHA-256: | 51E9DD88E3EBE571D7BBB733942F56F3B89CFAC17D497BBB681050C3CA1FBBF7 |
SHA-512: | C1B91FBADE5D6F531DE305F55DEE13853B002A0F65983C485E7E4D63DEAF4AE61EBF629E179F4C8964149152580DD10B634FECD7D4B1AC6720B6E0BD9F406D18 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 4.007118066127502 |
Encrypted: | false |
SSDEEP: | |
MD5: | BEE3B2E525A6D26637E0B9BA79FFC8D2 |
SHA1: | B876C4320907AF2F2A122BE31DED8BD4163738D9 |
SHA-256: | BD9F7CBF79C880542D54A3A0AA14DC45B64EA9AEF193F8D3CADDC479FB47B15D |
SHA-512: | D1CCE21C10FD4B01938583A836703A545AF92BB284883E4B0B04B76420C9293A868760E8AB89D4DCF02670FFCE9F003C46C261564CE50B99E10DBCA917D734F8 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.99687056455191 |
Encrypted: | false |
SSDEEP: | |
MD5: | E1F24800FE1BECE9D2E98D25013BBCB6 |
SHA1: | 69FD6FE4E7E4878BF0F77C108BE77E4F813F0EC6 |
SHA-256: | E586F5FC79AF7BED7B829ED999EA6DB6C5DE41BD0EB528A9A742F3064B5A84C2 |
SHA-512: | DBB9A8B58ADDDAD8C29C604E5ABDA4A0959F80F768F42C50225ACD8BD5F1C00A4319E04AE16E9656D4FAC61A28D3DC1486EDB4CADBD525B0DB29292AD95CD7E3 |
Malicious: | false |
Reputation: | unknown |
Preview: |