Edit tour

Windows Analysis Report
https://jpmchase.secure.virtru.com/start/?c=experiment&t=emailtemplate2019-09&s=noreplies.sua%40jpmchase.com&p=e02e997d-f712-4e94-8db7-783fb38a9d21#v=3.0.0&d=https%3A%2F%2Fapi.virtru.com%2Fstorage%2Fapi%2Fpolicies%2Fe02e997d-f712-4e94-8db7-783fb38a9d21%2Fdata%2Fmetadata&dk=O0xgpTzETEUzaIWEGIfyF9oHtp

Overview

General Information

Sample URL:https://jpmchase.secure.virtru.com/start/?c=experiment&t=emailtemplate2019-09&s=noreplies.sua%40jpmchase.com&p=e02e997d-f712-4e94-8db7-783fb38a9d21#v=3.0.0&d=https%3A%2F%2Fapi.virtru.com%2Fstorage%2Fa
Analysis ID:1459014

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected phishing page
HTML body contains low number of good links
Stores files to the Windows start menu directory

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64_ra
  • chrome.exe (PID: 1060 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://jpmchase.secure.virtru.com/start/?c=experiment&t=emailtemplate2019-09&s=noreplies.sua%40jpmchase.com&p=e02e997d-f712-4e94-8db7-783fb38a9d21#v=3.0.0&d=https%3A%2F%2Fapi.virtru.com%2Fstorage%2Fapi%2Fpolicies%2Fe02e997d-f712-4e94-8db7-783fb38a9d21%2Fdata%2Fmetadata&dk=O0xgpTzETEUzaIWEGIfyF9oHtpyDvDTn%2BeLtJYZebwg%3D MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
    • chrome.exe (PID: 4188 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 --field-trial-handle=1968,i,4228173679527060565,9680251860739749132,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
  • cleanup
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: https://jpmchase.secure.virtru.comLLM: Score: 8 brands: JPMorgan Chase Reasons: The URL 'https://jpmchase.secure.virtru.com' is suspicious because it uses a subdomain 'jpmchase.secure' under 'virtru.com', which is not the legitimate domain for JPMorgan Chase. The legitimate domain for JPMorgan Chase is 'jpmorganchase.com'. The use of 'secure' in the subdomain is a common social engineering technique to create a false sense of security. The page asks to confirm an email, which is another common phishing tactic. The presence of a suspicious link and the use of social engineering techniques strongly indicate that this is a phishing site. DOM: 1.4.pages.csv
Source: https://jpmchase.secure.virtru.com/secure-reader/?c=experiment&t=emailtemplate2019-09&s=noreplies.sua%40jpmchase.com&p=e02e997d-f712-4e94-8db7-783fb38a9d21#v=3.0.0&d=https%3A%2F%2Fapi.virtru.com%2Fstorage%2Fapi%2Fpolicies%2Fe02e997d-f712-4e94-8db7-783fb38a9d21%2Fdata%2Fmetadata&dk=O0xgpTzETEUzaIWEGIfyF9oHtpyDvDTn%2BeLtJYZebwg%3DHTTP Parser: Number of links: 0
Source: https://jpmchase.secure.virtru.com/secure-reader/initial-loaderHTTP Parser: No favicon
Source: https://jpmchase.secure.virtru.com/secure-reader/initial-loaderHTTP Parser: No favicon
Source: https://jpmchase.secure.virtru.com/secure-reader/?c=experiment&t=emailtemplate2019-09&s=noreplies.sua%40jpmchase.com&p=e02e997d-f712-4e94-8db7-783fb38a9d21#v=3.0.0&d=https%3A%2F%2Fapi.virtru.com%2Fstorage%2Fapi%2Fpolicies%2Fe02e997d-f712-4e94-8db7-783fb38a9d21%2Fdata%2Fmetadata&dk=O0xgpTzETEUzaIWEGIfyF9oHtpyDvDTn%2BeLtJYZebwg%3DHTTP Parser: No <meta name="author".. found
Source: https://jpmchase.secure.virtru.com/secure-reader/?c=experiment&t=emailtemplate2019-09&s=noreplies.sua%40jpmchase.com&p=e02e997d-f712-4e94-8db7-783fb38a9d21#v=3.0.0&d=https%3A%2F%2Fapi.virtru.com%2Fstorage%2Fapi%2Fpolicies%2Fe02e997d-f712-4e94-8db7-783fb38a9d21%2Fdata%2Fmetadata&dk=O0xgpTzETEUzaIWEGIfyF9oHtpyDvDTn%2BeLtJYZebwg%3DHTTP Parser: No <meta name="copyright".. found
Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.17:49720 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.17:49726 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.17:49727 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.126.32.74:443 -> 192.168.2.17:49769 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.23.209.141:443 -> 192.168.2.17:49777 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.17:49786 version: TLS 1.2
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: global trafficDNS traffic detected: DNS query: jpmchase.secure.virtru.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: api.virtru.com
Source: global trafficDNS traffic detected: DNS query: api.amplitude.com
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49691
Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49680 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49691 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.17:49720 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.17:49726 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.17:49727 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.126.32.74:443 -> 192.168.2.17:49769 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.23.209.141:443 -> 192.168.2.17:49777 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.17:49786 version: TLS 1.2
Source: classification engineClassification label: mal48.phis.win@14/19@14/134
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://jpmchase.secure.virtru.com/start/?c=experiment&t=emailtemplate2019-09&s=noreplies.sua%40jpmchase.com&p=e02e997d-f712-4e94-8db7-783fb38a9d21#v=3.0.0&d=https%3A%2F%2Fapi.virtru.com%2Fstorage%2Fapi%2Fpolicies%2Fe02e997d-f712-4e94-8db7-783fb38a9d21%2Fdata%2Fmetadata&dk=O0xgpTzETEUzaIWEGIfyF9oHtpyDvDTn%2BeLtJYZebwg%3D
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 --field-trial-handle=1968,i,4228173679527060565,9680251860739749132,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 --field-trial-handle=1968,i,4228173679527060565,9680251860739749132,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://jpmchase.secure.virtru.com/start/?c=experiment&t=emailtemplate2019-09&s=noreplies.sua%40jpmchase.com&p=e02e997d-f712-4e94-8db7-783fb38a9d21#v=3.0.0&d=https%3A%2F%2Fapi.virtru.com%2Fstorage%2Fapi%2Fpolicies%2Fe02e997d-f712-4e94-8db7-783fb38a9d21%2Fdata%2Fmetadata&dk=O0xgpTzETEUzaIWEGIfyF9oHtpyDvDTn%2BeLtJYZebwg%3D0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
api-gcp.virtru.com
130.211.46.139
truefalse
    unknown
    static-gcp.virtru.com
    34.160.98.162
    truefalse
      unknown
      api.amplitude.com
      34.217.200.188
      truefalse
        unknown
        www.google.com
        142.250.184.228
        truefalse
          unknown
          jpmchase.secure.virtru.com
          unknown
          unknowntrue
            unknown
            api.virtru.com
            unknown
            unknownfalse
              unknown
              NameMaliciousAntivirus DetectionReputation
              https://jpmchase.secure.virtru.com/secure-reader/initial-loadertrue
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                142.250.186.46
                unknownUnited States
                15169GOOGLEUSfalse
                34.160.98.162
                static-gcp.virtru.comUnited States
                2686ATGS-MMD-ASUSfalse
                1.1.1.1
                unknownAustralia
                13335CLOUDFLARENETUSfalse
                52.11.248.105
                unknownUnited States
                16509AMAZON-02USfalse
                34.217.200.188
                api.amplitude.comUnited States
                16509AMAZON-02USfalse
                216.58.206.67
                unknownUnited States
                15169GOOGLEUSfalse
                130.211.46.139
                api-gcp.virtru.comUnited States
                15169GOOGLEUSfalse
                172.217.23.110
                unknownUnited States
                15169GOOGLEUSfalse
                142.251.168.84
                unknownUnited States
                15169GOOGLEUSfalse
                239.255.255.250
                unknownReserved
                unknownunknownfalse
                142.250.184.228
                www.google.comUnited States
                15169GOOGLEUSfalse
                172.217.16.195
                unknownUnited States
                15169GOOGLEUSfalse
                IP
                192.168.2.17
                192.168.2.16
                192.168.2.4
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1459014
                Start date and time:2024-06-18 18:35:35 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:defaultwindowsinteractivecookbook.jbs
                Sample URL:https://jpmchase.secure.virtru.com/start/?c=experiment&t=emailtemplate2019-09&s=noreplies.sua%40jpmchase.com&p=e02e997d-f712-4e94-8db7-783fb38a9d21#v=3.0.0&d=https%3A%2F%2Fapi.virtru.com%2Fstorage%2Fapi%2Fpolicies%2Fe02e997d-f712-4e94-8db7-783fb38a9d21%2Fdata%2Fmetadata&dk=O0xgpTzETEUzaIWEGIfyF9oHtpyDvDTn%2BeLtJYZebwg%3D
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:17
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • EGA enabled
                Analysis Mode:stream
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal48.phis.win@14/19@14/134
                • Exclude process from analysis (whitelisted): SIHClient.exe, svchost.exe
                • Excluded IPs from analysis (whitelisted): 172.217.16.195, 142.251.168.84, 142.250.186.46
                • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, clientservices.googleapis.com, clients.l.google.com
                • Not all processes where analyzed, report is missing behavior information
                • VT rate limit hit for: https://jpmchase.secure.virtru.com/start/?c=experiment&amp;t=emailtemplate2019-09&amp;s=noreplies.sua%40jpmchase.com&amp;p=e02e997d-f712-4e94-8db7-783fb38a9d21#v=3.0.0&amp;d=https%3A%2F%2Fapi.virtru.com%2Fstorage%2Fapi%2Fpolicies%2Fe02e997d-f712-4e94-8db7-783fb38a9d21%2Fdata%2Fmetadata&amp;dk=O0xgpTzETEUzaIWEGIfyF9oHtpyDvDTn%2BeLtJYZebwg%3D
                InputOutput
                URL: https://jpmchase.secure.virtru.com Model: gpt-4o
                ```json{  "phishing_score": 8,  "brands": "JPMorgan Chase",  "phishing": true,  "suspicious_domain": true,  "has_loginform": false,  "has_captcha": false,  "setechniques": true,  "has_suspicious_link": true,  "legitmate_domain": "jpmorganchase.com",  "reasons": "The URL 'https://jpmchase.secure.virtru.com' is suspicious because it uses a subdomain 'jpmchase.secure' under 'virtru.com', which is not the legitimate domain for JPMorgan Chase. The legitimate domain for JPMorgan Chase is 'jpmorganchase.com'. The use of 'secure' in the subdomain is a common social engineering technique to create a false sense of security. The page asks to confirm an email, which is another common phishing tactic. The presence of a suspicious link and the use of social engineering techniques strongly indicate that this is a phishing site."}
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:Web Open Font Format (Version 2), TrueType, length 17780, version 1.0
                Category:downloaded
                Size (bytes):17780
                Entropy (8bit):7.990077561816256
                Encrypted:true
                SSDEEP:
                MD5:84E180D228A5B965D875DFBDC927585D
                SHA1:BB019E6460C5B982ECDB77FB5D2D1474078AB889
                SHA-256:D094038EC1D1EFDC963CA50983AECD020850172AC5A1788DE0109A97C3EA4B8B
                SHA-512:C663BDDB03D89E518A5DC8DBD895A7703E4505386F00D4F6B86A5269DD9370E2CE68B8594535293E6C4CC96E814DDB07406B3065226505E825A36EB9D0D18B9B
                Malicious:false
                Reputation:unknown
                URL:https://jpmchase.secure.virtru.com/secure-reader/static/assets/fonts/opensans-regular..woff2
                Preview:wOF2......Et..........E.........................?FFTM..... ....`.....&..4.....$.....z..6.$..p. ..-..A.....y.o.y..*....F".........6..b\Y.....d.a+.j..I..ZPF....y.....l..-wS...P...../<..9m.R(T<...u ...U...l..:.Z...D.......E.H.!........+~.J.~...;.^.....IN^....SI....B...-...(....<..?..B..5y[..p..T.`.`...fg3ua.(D0.Mj&**"F..3.3.. b4*F!..97...tQ.?......4SK.......H..i.l.[..ZR.....v.......g.8....OU...Ig.|..R.O:...\IW*....6<:}.e.k...^.}..'...M.....u...A..u.DU..9U..F......|5......GagQ..........b......i.....{...(..L....@E.P.....'...@&...HK..e...I.....r..E.!......_S....!.{...g].....;...F:....r..6.h-+."?...+.b..D...Gv.>...^..@......{....c.....t:.".".)S....}.....>....".. m6..T.)...p....@)Mv..)..%. .......K-S.).,o.e.e.]&...).9.C..f....V..9_N..[..I9.j......y..A.........~..'.P..\..R...}....W..4...V.|.0...aU.......F......wf.Y.#..|>l..K..>...e.n.......q.E./.|. ...0.8`!...._..rg.).P;_....k.L..o-g.Y7.>W....ah3$..!.;.;Q..../..x...qy..U<.k..ss7..rU.../.n...#.x..A..
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with very long lines (54527), with no line terminators
                Category:downloaded
                Size (bytes):54527
                Entropy (8bit):5.409108834192943
                Encrypted:false
                SSDEEP:
                MD5:8FCC638D03AB732103B0F2767676B1B5
                SHA1:1E93F857FAEA1D1BC15C59149E27D628308EA2C6
                SHA-256:F35C1E0F3A509F0EA022D277B957EEEF07CCD3BD63C997C13625338AD892E645
                SHA-512:32EDA52A88A3E5463CC1278B18A4C44E80141548DB6E8A2426C06013060858FADE907E7FBCA3E977F12F907670C889028F35FDB0197A727F5418A459ECC0887C
                Malicious:false
                Reputation:unknown
                URL:https://jpmchase.secure.virtru.com/secure-reader/static/js/error-views-chunk.js?v=7.36.0
                Preview:(self.webpackChunksecureReader=self.webpackChunksecureReader||[]).push([[617],{48442:function(n,e,l){function t(n){return t="function"==typeof Symbol&&"symbol"==typeof Symbol.iterator?function(n){return typeof n}:function(n){return n&&"function"==typeof Symbol&&n.constructor===Symbol&&n!==Symbol.prototype?"symbol":typeof n},t(n)}var o,i,r,c,s=(o="/app/src/components/Input/Input.js",i=new Function("return this")(),(c=i[r="__coverage__"]||(i[r]={}))[o]&&"a8b8bd293fb0191f6d3c89e22e308535869df949"===c[o].hash?c[o]:c[o]={path:"/app/src/components/Input/Input.js",statementMap:{0:{start:{line:1,column:14},end:{line:1,column:30}},1:{start:{line:2,column:18},end:{line:2,column:39}},2:{start:{line:3,column:11},end:{line:3,column:32}},3:{start:{line:5,column:15},end:{line:5,column:37}},4:{start:{line:7,column:14},end:{line:9,column:2}},5:{start:{line:8,column:2},end:{line:8,column:96}},6:{start:{line:11,column:0},end:{line:13,column:2}},7:{start:{line:15,column:0},end:{line:17,column:2}},8:{start
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with very long lines (19783)
                Category:downloaded
                Size (bytes):19850
                Entropy (8bit):5.422044524083745
                Encrypted:false
                SSDEEP:
                MD5:E3F60FD31BB1CC4A7DF1AFF7608B8535
                SHA1:4C604099EFC7A46D39A7DDE49FF2BAC52EDBAB03
                SHA-256:F3129CA7ACC922F43FC3B273961BDD2DD0434F94B0E6C6C0678EE062B5FB06B6
                SHA-512:2DBE77099C4EC34D0DA7E4A7E916144F5B806B43C408A61949070AC145AD7BFF306EA88D37C79D673B1ED8CD8E28F956F8609D07F9D3B8461DD305F94701FC47
                Malicious:false
                Reputation:unknown
                URL:https://jpmchase.secure.virtru.com/secure-reader/static/js/945-chunk.js?v=7.36.0
                Preview:/*! For license information please see 945-chunk.js.LICENSE.txt */."use strict";(self.webpackChunksecureReader=self.webpackChunksecureReader||[]).push([[945],{98947:function(e,t,r){var n=r(79930),o=r(34336);function i(e){for(var t="https://reactjs.org/docs/error-decoder.html?invariant="+e,r=1;r<arguments.length;r++)t+="&args[]="+encodeURIComponent(arguments[r]);return"Minified React error #"+e+"; visit "+t+" for the full message or use the non-minified dev environment for full errors and additional helpful warnings."}var a="function"==typeof Symbol&&Symbol.for,l=a?Symbol.for("react.portal"):60106,u=a?Symbol.for("react.fragment"):60107,s=a?Symbol.for("react.strict_mode"):60108,c=a?Symbol.for("react.profiler"):60114,f=a?Symbol.for("react.provider"):60109,h=a?Symbol.for("react.context"):60110,p=a?Symbol.for("react.concurrent_mode"):60111,d=a?Symbol.for("react.forward_ref"):60112,y=a?Symbol.for("react.suspense"):60113,m=a?Symbol.for("react.suspense_list"):60120,v=a?Symbol.for("react.memo")
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:data
                Category:dropped
                Size (bytes):1703
                Entropy (8bit):7.896450023536708
                Encrypted:false
                SSDEEP:
                MD5:FFB92614C58F70BA64886E565DACB302
                SHA1:BEB26849368198F5940A638DB3A1057E6ED3E9A8
                SHA-256:EE041D7BC26F643834F3F734FCB02D1D33E252CDE5335C9DB7F3D992436B2A32
                SHA-512:E4C63396BADEB5F5957B16C0F2934C2558213822075753C9112743DF0929DBAC9563C507D746259D13676D7DC60E7BE020240ADAFE8226D3B0A3A9552221B33B
                Malicious:false
                Reputation:unknown
                Preview:0....._....p.....Y.....0.D..ex.Z"JJ.X.....w.Z...o(..('9........Qc.^.)..F...U...]3......?.rR..(..."....3...G..(....JZ.r..T-..$.i~d.T.#9.c.5.y......#x.;...J..F.../.Z..pv|j/i.2...o...|."T.Pz|..aQ.......E.....r....V...Z.u.........:.B p6.,..pU........v...-BSO.'}...0-`....5q............X...Y;...m..#).\..h.pCy.3..{..za.....9........V6+.E.&..B^..].'.#.XH..g..2.7].!.U..............-.m...C......AbH..F......\&.8.?..h^....).N.\...a..9...Q......Ry..l.....5.Ml.l7.....R&.........|.....+c..].q....P.....)!..<.o@.+.\S'...x.%.C..Q......H.....@*...jN.....=.....J..h.+.....6FY)yr....rs(..].....i...`.m@.4l...L.../..F_f.u...~...EO..R..{...<3...=..I...I[w......-...G.z.+.BBM.M[._........D.......:q../.4.q.-3-.._...g.xy..*.D.....[......2G...$j..._...#....w;.1sm+......\..I....[Y..S....|.*.D.o......V..I......)..l...j.2...yv.uN...8.92....t...p?....wUH.mX..|..\.....W....I...c.r...~...Y0....wWk..G...f.%...:g...%.{...N..anj.U%R.q=...S.<nP.SH{Yo...a.\...,...Q...8u^z...k.~.W..
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):13
                Entropy (8bit):3.085055102756477
                Encrypted:false
                SSDEEP:
                MD5:E1B468C52D580BB0C563F7DDAC593474
                SHA1:D41AF16632A19F7BEB11A6471387F576EB3D3BA7
                SHA-256:179F1CEA3A0D7D6A99E2A7C10A0B27AE9831C71978051A3EDB0743203DA8C10A
                SHA-512:95E27DC11252999AF74B28CF6D96EDAB1AC69861A59BF72B6E2DFC63E790FA9D9D43DCC57E68622BD9DA021948F3E92EBCAA8891D32285C9EB78F82AE8CD6778
                Malicious:false
                Reputation:unknown
                Preview:missing_event
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with very long lines (29186)
                Category:downloaded
                Size (bytes):29259
                Entropy (8bit):5.170009776149324
                Encrypted:false
                SSDEEP:
                MD5:F64F85BC0413453773899BB055F10AAF
                SHA1:CA73826494AC1A82A0F826A59580B0D7EBFBEA2E
                SHA-256:0454CEAD2E524C23DAE6A6E5A1D1A695EE721789241B919FB4B4B9D3A50E6A6D
                SHA-512:A8CEB3AD0CB4BE87928B4393E925353D3A92D0612EC57E0A388F5FA7A54B6E15690FCDD86C9BBA19DD8C55F3D3DF9CC6514A0E80A9C7EE59483D73A9944A2C8D
                Malicious:false
                Reputation:unknown
                URL:https://jpmchase.secure.virtru.com/secure-reader/static/js/localforage.min.js
                Preview:/*! For license information please see localforage.min.js.LICENSE.txt */.!function(e){if("object"==typeof exports&&"undefined"!=typeof module)module.exports=e();else if("function"==typeof define&&define.amd)define([],e);else{("undefined"!=typeof window?window:"undefined"!=typeof global?global:"undefined"!=typeof self?self:this).localforage=e()}}((function(){return function e(n,t,r){function o(a,u){if(!t[a]){if(!n[a]){var c="function"==typeof require&&require;if(!u&&c)return c(a,!0);if(i)return i(a,!0);var f=new Error("Cannot find module '"+a+"'");throw f.code="MODULE_NOT_FOUND",f}var s=t[a]={exports:{}};n[a][0].call(s.exports,(function(e){return o(n[a][1][e]||e)}),s,s.exports,e,n,t,r)}return t[a].exports}for(var i="function"==typeof require&&require,a=0;a<r.length;a++)o(r[a]);return o}({1:[function(e,n,t){(function(e){"use strict";function t(){f=!0;for(var e,n,t=s.length;t;){for(n=s,s=[],e=-1;++e<t;)n[e]();t=s.length}f=!1}var r,o=e.MutationObserver||e.WebKitMutationObserver;if(o){var i
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:Web Open Font Format (Version 2), TrueType, length 29500, version 1.0
                Category:downloaded
                Size (bytes):29500
                Entropy (8bit):7.992985247779619
                Encrypted:true
                SSDEEP:
                MD5:E401CA1A904C9D6106463C9D1C6504CB
                SHA1:C310F6CC3E71105966A88B94BD4712949071FF23
                SHA-256:AE4062D312ECC61F8304F4F54B6B5086478DA465FCBBEBA7BDB7CCF1D43A3DC5
                SHA-512:66FEF2A121E12FD785EE7A761213F75A0440C04F5ED50D37956903484C829C6A2320E3B78E13BC117865F260076F618327AC5ED024EDF7662C60ED7F2FA7BE45
                Malicious:false
                Reputation:unknown
                URL:https://jpmchase.secure.virtru.com/secure-reader/static/assets/fonts/raleway-semibold..woff2
                Preview:wOF2......s<.......4..r.........................?FFTM..6........`.....L........P.....8..6.$..l. ........3[.qq...&y#r..(.....6.Q....R.`.......:.Z.........t.....@.U...9"P...CiB..C.1..mY..&.0.r.....-h<..(...Z.....v-N..)c}.V..G.dj....86..^/G....~p..ShV@.<.....Ny....g...........Hp.....y.o.......S?..Qh...zX..j.A:..2<e.....u.Q%....sv.........'UK.."g..\....:...2.......%.........(...HVN.|.....:.G..@.<.+p......w..-...,....m0bo.02...?g`^...~.1..>..:.6KZ..J...._o.i.f.9..U...0)D]$J"T.z.v?....{O3.d.....E...N>(/...(..B.....7.........f.....f%..t.n.*!1....rf.~...!.hA..'..A... ..R..2]......_!.D.........r...............!......,.Y.) ..2.m..........P...og?.}..w?..VW...N..`<.V.....r.(.....N....C.B.4Ai.....U_..U.t.fJ..V.|..+JJ.D[..O.,>Y...,+..d.E..`.6..K$....*.L...Z..U.-;f.:."C...<.%..Pz.n.8..q.....$.._..$..V..Wn6...........;.Z=J.....(zK...F......pP..t....F4.!..b..!..2.,C.....9.j...W....k.....YN`.p.M".E.J.@.?.s..1....IAS...p.^.*.........W.S.B..4...G..^..m.1*.P........W.oJ.t.
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with very long lines (507)
                Category:downloaded
                Size (bytes):689
                Entropy (8bit):5.867641499724233
                Encrypted:false
                SSDEEP:
                MD5:F565AF8EC9641F9456FD4205B0B4E96B
                SHA1:BD93EDFE68E062EDBBAF7176EA6378E527511E24
                SHA-256:FE7E0E7467E8632B55B775142FE136580FA68F97C5993624E63A5FB1045BE997
                SHA-512:95C15BC6F7209ED684AA97303C291C0BEDA97250F0FB82FB7D141A28A9A7E9C31ECF746E909043BC69ED7BE11D24F1B81281239951E14082D48168E9BA92655A
                Malicious:false
                Reputation:unknown
                URL:https://jpmchase.secure.virtru.com/secure-reader/static/styles/whitelabel/whitelabel.css
                Preview:.powered-by-virtru-logo {. display: block !important;.}...footer-component.content-enableNewUX2019 {. height: 110px;.} ../*# sourceURL=/app/src/styles/whitelabel/whitelabel.css */./*# sourceMappingURL=data:application/json;charset=utf-8;base64,eyJ2ZXJzaW9uIjozLCJzb3VyY2VzIjpbIi9hcHAvc3JjL3N0eWxlcy93aGl0ZWxhYmVsL3doaXRlbGFiZWwuY3NzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBO0VBQ0UseUJBQXlCO0FBQzNCOztBQUVBO0VBQ0UsYUFBYTtBQUNmIiwiZmlsZSI6IndoaXRlbGFiZWwuY3NzIiwic291cmNlc0NvbnRlbnQiOlsiLnBvd2VyZWQtYnktdmlydHJ1LWxvZ28ge1xuICBkaXNwbGF5OiBibG9jayAhaW1wb3J0YW50O1xufVxuXG4uZm9vdGVyLWNvbXBvbmVudC5jb250ZW50LWVuYWJsZU5ld1VYMjAxOSB7XG4gIGhlaWdodDogMTEwcHg7XG59IFxuIl0sInNvdXJjZVJvb3QiOiIifQ== */
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:SVG Scalable Vector Graphics image
                Category:dropped
                Size (bytes):71252
                Entropy (8bit):3.730731037334624
                Encrypted:false
                SSDEEP:
                MD5:1BB55E1ECDB41E182E8ED14E62FB5A64
                SHA1:D0AC7AB2DA9FD974060052E10524A46F55B42555
                SHA-256:C73B49EF37E9656CDB3D14693952234536064B3D657F72F2DF710A0CA5E13163
                SHA-512:5ED7CEBC656A768A530B0C0096190B7FB658556CA448BCB1C4A8789FAB698813D49855FA89EA9CF11434049EF57967FC5804114816F6A3C4C0ABE52F20527CC9
                Malicious:false
                Reputation:unknown
                Preview:<?xml version="1.0" encoding="utf-8"?>. Generator: Adobe Illustrator 24.3.0, SVG Export Plug-In . SVG Version: 6.00 Build 0) -->.<svg version="1.1" id="Layer_1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px".. viewBox="0 0 602 40" style="enable-background:new 0 0 602 40;" xml:space="preserve">.<style type="text/css">...st0{fill:none;}...st1{fill:#F7BC60;}...st2{fill:#FFFFFF;}.</style>.<pattern x="-96" y="294.5" width="69" height="69" patternUnits="userSpaceOnUse" id="Polka_Dot_Pattern" viewBox="2.1 -70.9 69 69" style="overflow:visible;">..<g>...<rect x="2.1" y="-70.9" class="st0" width="69" height="69"/>...<rect x="2.1" y="-70.9" class="st1" width="69" height="69"/>...<g>....<path class="st2" d="M61.8-71.7c0,0.1,0,0.1,0,0.2c-0.1,0.1-0.1,0.1-0.2,0.1c-0.1,0.1-0.1,0.3-0.1,0.4c-0.2,0.1,0,0.2,0,0.3.....c0,0,0,0.1,0,0.2c0,0.1,0,0.3,0.1,0.4c0.1,0.2,0.3,0.4,0.4,0.5c0.2,0.1,0.4,0.6,0.6,0.6c0.2,0,0.4-0.1,0.5-0.1.....c0.2,0,0.4,0,0.6-0.1c0.2-0.
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:SVG Scalable Vector Graphics image
                Category:downloaded
                Size (bytes):47094
                Entropy (8bit):5.084813736273501
                Encrypted:false
                SSDEEP:
                MD5:D1EC2AD747082FCA617EECD4E566AF30
                SHA1:E9DC23258086D4320D0A16C3FD96794A8C468B6F
                SHA-256:55FE0CA09C9529BCDC4DD2D69548C9FE3C47DBB1421A7AF192AC0B5949A7A8F8
                SHA-512:59A1F96EF2FCC9559CCDB477D683EEBC8ECA81A852D36360B8814F53041CC1B6E27E3A836996343254FBB7E7FA629AF6569C190C5470D8C34DDCB51099A4D061
                Malicious:false
                Reputation:unknown
                URL:https://jpmchase.secure.virtru.com/secure-reader/static/svg/virtru.svg
                Preview:<?xml version="1.0" encoding="utf-8"?><svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink"><symbol viewBox="0 0 24 24" id="add-24"><title>add-24</title><g data-name="Layer 2"><g fill="none" stroke="currentColor" stroke-linecap="round" stroke-linejoin="round" data-name="Layer 1"><path d="M7 12h10M12 17V7"/><circle cx="12" cy="12" r="11"/></g></g></symbol><symbol viewBox="0 0 24 24" id="add-filled-in-24"><title>add-filled-in-24</title><g data-name="Layer 2"><path d="M12 0a12 12 0 1 0 12 12A12 12 0 0 0 12 0zm5 13h-4v4a1 1 0 0 1-2 0v-4H7a1 1 0 0 1 0-2h4V7a1 1 0 0 1 2 0v4h4a1 1 0 0 1 0 2z" data-name="Layer 1"/></g></symbol><symbol viewBox="0 0 24 24" id="arrow-down-24"><title>arrow-down-24</title><g data-name="Layer 2"><path fill="none" stroke="currentColor" stroke-linecap="round" stroke-linejoin="round" d="M1 7l11 10L23 7" data-name="Layer 1"/></g></symbol><symbol viewBox="0 0 24 24" id="arrow-down-filled-in-24"><title>arrow-down-filled-in-24</title><g data-na
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
                Category:downloaded
                Size (bytes):1327
                Entropy (8bit):7.787526275485961
                Encrypted:false
                SSDEEP:
                MD5:BAC74ED9FEA111B59DAD625F896D45FB
                SHA1:92E271374B61DF20E9ADC7F16A3ADE55AEE84EC2
                SHA-256:E03C98224E2F2A54FEDBC1BB893CEB5D74813DD4A5059691717C853D966C4885
                SHA-512:93D155FA3FE60DB6E9B66FD4182B0CABC1D3868561628990944EDA394282E6B8FA66453D1E704B81B7E2D2F4A5CA4C0FDBA61F1EF0D6D7EB359176D9CFA7226D
                Malicious:false
                Reputation:unknown
                URL:https://jpmchase.secure.virtru.com/secure-reader/static/img/favicon-32x32.png
                Preview:.PNG........IHDR... ... .....szz.....pHYs.........K.@F....tEXtSoftware.www.inkscape.org..<.....IDATX...}L.U..?...W....$.e..M.tMs*..\.l..\[.-g.K...v7.K...r..4.pm..5.iN+....4l.. .......+........{.=.9.(..RG.2.f.bL...d.~.:.?.....L..jw2mU...||R....LN.........TO.48...+...A........ccrsO..:?.x.7y..O`..0u@...qD...../JzP..3././.i..+..42k.T....U1.3.........rM.(.......N.ls...sg.x5+3.ES.....;.[@..X,'.q..Wxd1m.......F.DoC.BS...0.m.=?.]D.Tn...3P....r\.[S.....;>.a.......T5..@.+.z6.....*........B...<kBN@...)...a..W...C..&...t.....1....//..$-Xp...............Q../.wt^..z-....x.k@F.T....;.....+u......z.9..1?....{..J.;..;.y..TEQZ..i[.vgE.6.N.....H/.h...P.%.rS.y.J.J,jD8^\.......J.......^E.Q.E&./q..L.Hc...u..+..c.....P..g..1......5.v8ucP.2.p.%a...u.Z...eh...Kz...f.~.n`l..A.Yw%f.......dxJp.....`...7.?.o.6y.4p9.gRJ..9../.......q.h5..k..L..).......%....3%...U.j3%g...`...(..~k.G.%....A(.........#0.L.....q.t..(...K[M....~..i.......h{.nD....h.8\..........jT0.)..%
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
                Category:downloaded
                Size (bytes):4286
                Entropy (8bit):2.7607576447372977
                Encrypted:false
                SSDEEP:
                MD5:2CFA2C928C0659D098B57E7E4FE8CF41
                SHA1:4E2D4440AE5B7843172BBF646AFEDEDDD69A8F0E
                SHA-256:4E6D777AF1F5B3BEB973A4CEC2E1DAC00BC1DFFB7F797AAA71B3B4BC5E5164C3
                SHA-512:CA2BD0238834646952DA37FE96F612E7E14F8D5D5D2A7A1C208DC5EA80F2023F34922C24A0C7EB43422E91DAFCF66F2F94882DAFB111B6FE58EDA6FB0D0ECBBA
                Malicious:false
                Reputation:unknown
                URL:https://jpmchase.secure.virtru.com/secure-reader/static/img/favicon.ico?1718728590802
                Preview:...... .... .........(... ...@..... ..................................................................F...J.V.J...I..I..I...I...I..I..I...H.U.N...........................................................................I.#.J...I...I...I...I...I...I...I...I...I...I...I...I..I...F.!.........................................................@...I...I...I...I...I...I...I...I...I...I...I...I...I...I...I...I...I...I...@...............................................M...I..I...I...I...I...I...I...I.{.H.N.G.6.G.D.I.I.H.|.I...I...I...I...I...I...I..K.".....................................I.#.I...I...I...I...I..J.r.M...................................C...H.|.I..I...I...I...I..K.".............................F.!.I..I...I...I...J...M...................................................M...I...I...I...I...J..I.......................@...I..I...I...I...I.t.................................................................H.u.I...I...I...I..@...................I.~.I...I...I...H.n..............
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:Web Open Font Format (Version 2), TrueType, length 18520, version 1.6619
                Category:downloaded
                Size (bytes):18520
                Entropy (8bit):7.986422080209832
                Encrypted:false
                SSDEEP:
                MD5:D7E772D9CED800743BAF55C89775FE36
                SHA1:D9C4E30B48DEB99F4D1729D708A6B8B9CBEC2ACD
                SHA-256:FDD0E0F871A88EDAE3D5354B5DF7963F2E1DE8220F488B486599EEBA9C3375AF
                SHA-512:83FB048A1A5AAC489AF65BECD45724C3DC7B2DF6F021355CA6AD1AF39D0A6A7238335BCAAFD841332B408DC86743BE6A62F3C67231DF26571FD2C2FEFC29E7B6
                Malicious:false
                Reputation:unknown
                URL:https://jpmchase.secure.virtru.com/secure-reader/static/assets/fonts/opensans-bold..woff2
                Preview:wOF2......HX..........G.........................?FFTM..... ....`........`.....4..h.6.$..l..x.. ..l..?..x?webf...~5l.F.n.....DQ.VG....."..g....d....Y....ld..,d\#Q.{`...".5.q".bn0.......'.}..".....qT4.....X..I....CK....[q..Iw....(.2......g.#.u.S...N.....gzv...tPJ!.3...K..EL..|3@s.FT..Q....%#z0.G.dI.R)R"..T.....6)F.z=5M......uT..Nm.7).).j.#O.."~..v......Y..6OiN...S.K.;..WW..,.L2....]..s.>.6/U.mq..w.R%..y......K..}.....y.......}.SC.9H>...3....}...KB.Yq?..D........K..`...o&..c.....K~Rd7.,9.f..N.Up...E.Hd..\ . .u..<X..D.9.G\3/.k......1..15tS7.#..v'V.i.U...1.t.oD...j._..{......w..A...uDH...\.....9.+.J..z.B...A.....-..*.m:f:../.27..j...w..c.....y<..NK^ .%.:k....<LN.s...d...,.D..u!..!W!..sE.qu...4..Y.e...OL.....e.Vr{...Fs.cL#..B(......u8....D{. ......M..........p.C.......z..|..pK.|D;l......L..EL..K.w.._....!.b.$F....D...:W.....K..u_....E..,.U...%......y...Q..S.m......).....<....Z....;U."..H@.8..T.B..a2.3&..j.o)...k....G.}...5T.N.i..i.s...:i...)H.d
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with very long lines (2410), with no line terminators
                Category:downloaded
                Size (bytes):2410
                Entropy (8bit):5.067212506176829
                Encrypted:false
                SSDEEP:
                MD5:6309C5370D0A08498FFDC6D0075A9C88
                SHA1:5AA61DE4001E772244835735A8879B9D97117BFB
                SHA-256:F9E722CBF849616CD0CFF51DC6659A338179F2BEB6BBE31357FA1AE598FAD1B3
                SHA-512:A12E57D9EB07C48EFE65D6BEAB008C7FE79737EFC8F6FF3885B997A63E749A5AC5C914A29125BE21CED6A104E335B24DDE1397184B596F29DF1273D1E06FA62F
                Malicious:false
                Reputation:unknown
                URL:https://jpmchase.secure.virtru.com/secure-reader/static/js/textlayerbuilder.js?v=7.36.0
                Preview:var CustomStyle=function(){var t=["ms","Moz","Webkit","O"],e={};function n(){}return n.getProp=function(n,i){if(1==arguments.length&&"string"==typeof e[n])return e[n];var s,r,o=(i=i||document.documentElement).style;if("string"==typeof o[n])return e[n]=n;r=n.charAt(0).toUpperCase()+n.slice(1);for(var a=0,h=t.length;a<h;a++)if("string"==typeof o[s=t[a]+r])return e[n]=s;return e[n]="undefined"},n.setProp=function(t,e,n){var i=this.getProp(t);"undefined"!=i&&(e.style[i]=n)},n}(),TextLayerBuilder=function(t,e){var n=document.createDocumentFragment();this.textLayerDiv=t,this.layoutDone=!1,this.divContentDone=!1,this.pageIdx=e,this.matches=[],this.beginLayout=function(){this.textDivs=[],this.renderingDone=!1},this.endLayout=function(){this.layoutDone=!0,this.insertDivContent()},this.renderLayer=function(){var t=this.textDivs,e=this.textContent.bidiTexts,i=this.textLayerDiv,s=document.createElement("canvas").getContext("2d");if(!(t.length>1e5)){for(var r=0,o=t.length;r<o;r++){var a=t[r];if(!("
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:PNG image data, 100 x 100, 8-bit/color RGBA, non-interlaced
                Category:downloaded
                Size (bytes):2162
                Entropy (8bit):7.462032808142066
                Encrypted:false
                SSDEEP:
                MD5:2B4CB92F976837DBB0F7F07BD78653D8
                SHA1:B2CE2C78F1AA730E9FE06E40372100B294E90EDF
                SHA-256:2364AC34D390B125F4A0B83DADA45C0FA3A1B21AF1CE3ACF0DABE0B7DCE9A54A
                SHA-512:A016F9D15BEAF19DB51CAB2383190DEB0231A2AB873EDA4F34103B60F4679C8A0E06F0C283C558CC4E620F746EFE592AFBE6BA213109FF58F0BF1FDDAE201E9C
                Malicious:false
                Reputation:unknown
                URL:https://jpmchase.secure.virtru.com/secure-reader/static/img/dragdrop_icon.png
                Preview:.PNG........IHDR...d...d.....p.T....tEXtSoftware.Adobe ImageReadyq.e<...!iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.5-c014 79.151481, 2013/03/13-12:09:15 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CC (Windows)" xmpMM:InstanceID="xmp.iid:C7074CD8434211E3B13EFA65B18A67BB" xmpMM:DocumentID="xmp.did:C7074CD9434211E3B13EFA65B18A67BB"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:C7074CD6434211E3B13EFA65B18A67BB" stRef:documentID="xmp.did:C7074CD7434211E3B13EFA65B18A67BB"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>uF......IDATx..[.UU...Q.R.u....|0%H.S. .)z....2%......:...R4..AtT.1...>.A...M..>.(>.M#.......I..Z..g........>.....
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:Unicode text, UTF-8 text, with very long lines (28162), with no line terminators
                Category:downloaded
                Size (bytes):28176
                Entropy (8bit):5.539695737028399
                Encrypted:false
                SSDEEP:
                MD5:0CF82A0336D612CDDA6B71C44F03D069
                SHA1:490E13BA49AE932D29B3218766B32C23CFF2ED18
                SHA-256:9C67BF758CF68B031501F76051E074B6A7B3466B978D92037F12F9A10AA195E3
                SHA-512:D769FEF2EFB48911B4DB8D35EF70163009ACB71EFB94AC5E702A3F010E2F4986500F882C4FE6EA28B531CCE4437BA832D2FF45A8B1AD7AAE69B2716B5964B48D
                Malicious:false
                Reputation:unknown
                URL:https://jpmchase.secure.virtru.com/secure-reader/static/js/jwo4onu.js
                Preview:window.Typekit||(window.Typekit={}),window.Typekit.config={a:"764598",c:[".tk-proxima-nova",'"proxima-nova",sans-serif',".tk-proxima-nova-condensed",'"proxima-nova-condensed",sans-serif',".tk-effra",'"effra",sans-serif'],dl:"AAAA2AAAAAooJc3sUL3q47TGC37/BOnNT28UC/F4GogAG+qG",f:"//use.typekit.net/c/641466/1w;effra,2,gdQ:W:i3,gdS:W:i4,gdV:W:i5,gdP:W:n3,gdR:W:n4,gdT:W:n5,gdW:W:n7,gdY:W:n9;proxima-nova,2,2clzCG:W:i4,2clzC6:W:i7,2clzCF:W:n4,2clzC5:W:n7;proxima-nova-condensed,7cdcb44be4a7db8877ffa5c0007b8dd865b3bbc383831fe2ea177f62257a9191,2clzDV:W:i4,2clzDL:W:i7,2clzDT:W:n4,2clzDK:W:n7/{format}{/extras*}",fc:[{id:139,family:"proxima-nova",src:"{scheme}://{hostname}/af/03034e/00000000000000003b9ad1b1/27/{format}{?primer,subset_id,fvd}",descriptors:{weight:"700",style:"normal",subset_id:2}},{id:140,family:"proxima-nova",src:"{scheme}://{hostname}/af/5a684a/00000000000000003b9ad1b2/27/{format}{?primer,subset_id,fvd}",descriptors:{weight:"700",style:"italic",subset_id:2}},{id:175,family:"proxima
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with very long lines (3499)
                Category:downloaded
                Size (bytes):5412
                Entropy (8bit):5.944060230365357
                Encrypted:false
                SSDEEP:
                MD5:23DD65BB5EF90E3FA6BF13C0119051DA
                SHA1:596E39ED40A1D9F09DADDA93A4DD15E8F1B99D67
                SHA-256:971D097BC8EFBD303D8A70EE34342E04B91F8CF66571015712A4412B09160737
                SHA-512:E350095D3751CCE56DF55FD04FDFD9524A07FE176DD8330CBA7FECEF436C61291CDF6B24C6651C40C9DE9A321F7DE4F0CCBB6169CDA115CA90DC1855D2033500
                Malicious:false
                Reputation:unknown
                URL:https://jpmchase.secure.virtru.com/secure-reader/static/styles/whitelabel/jpmchase.css
                Preview:*[data-theme="wl-header"], [data-theme="wl-header"] *:not([data-theme="wl-header-logo"], [data-theme="wl-header-delimiter"], [data-theme="wl-header-font"]) {. background: #6C6E6E !important;. color: #fff !important;. fill: #fff;. }. . *[data-theme="wl-header"] a.rowCloseIconContainer:hover, *[data-theme="wl-header"] a.rowCloseIconContainer:hover > svg, *[data-theme="wl-header"] a.rowCloseIconContainer:hover > svg * {. background: #fff !important;. color: #6C6E6E !important;. fill: #6C6E6E !important;. }. . rect#Rectangle {. fill: #0e59a4 !important;. }. . *[data-theme="wl-header"] {. background: #6C6E6E !important;. border-bottom: #c8c8c8 1px solid;. }. . *[data-theme="wl-header-font"] {. color: #fff !important;. fill: #fff !important;. }. . *[data-theme="wl-header-delimiter"] {. background: #fff !important . }. . *[data-theme="wl-poweredBy"] {. color: #fff !important;. }. . *[data-theme="wl-header-logo"] {. height: 45px;.
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:Unicode text, UTF-8 text, with very long lines (65470)
                Category:downloaded
                Size (bytes):17943553
                Entropy (8bit):5.759446658167986
                Encrypted:false
                SSDEEP:
                MD5:83653C73B02F237EA5BA1A50256AB978
                SHA1:5713F57C1F78E5CD60003C328A4E76451AFAABAC
                SHA-256:185CFE7CF806D12DEC91C5DF07BDF238D4E75ADE2AC9D5144A2C504CF82DDA29
                SHA-512:010D3851ADCD753DE7E74B491A5435666914BE0EDB5908216A0107FF6DAD7E24F107989F03B6970406D314192909668C2690C74833BB56596C50D1C42B403A6C
                Malicious:false
                Reputation:unknown
                URL:https://jpmchase.secure.virtru.com/secure-reader/static/js/app.js?v=7.36.0
                Preview:/*! For license information please see app.js.LICENSE.txt */.var secureReader;(function(){var __webpack_modules__={20016:function(e,t,n){var r,i,o,a,s=(r="/app/locales/index.js",i=new Function("return this")(),(a=i[o="__coverage__"]||(i[o]={}))[r]&&"707d7ae2933e6aa9d0d6a402fb3767e7f35adb24"===a[r].hash?a[r]:a[r]={path:"/app/locales/index.js",statementMap:{0:{start:{line:2,column:14},end:{line:2,column:44}},1:{start:{line:3,column:14},end:{line:3,column:44}},2:{start:{line:4,column:14},end:{line:4,column:44}},3:{start:{line:6,column:16},end:{line:28,column:1}},4:{start:{line:30,column:0},end:{line:30,column:25}}},fnMap:{},branchMap:{},s:{0:0,1:0,2:0,3:0,4:0},f:{},b:{},_coverageSchema:"43e27e138ebf9cfc5966b082cf9a028302ed4184",hash:"707d7ae2933e6aa9d0d6a402fb3767e7f35adb24"}),l=(s.s[0]++,n(58397)),u=(s.s[1]++,n(22060)),c=(s.s[2]++,n(25612)),d=(s.s[3]++,{"en-US":{translation:l,label:"English (USA)",mobileLabel:"EN",momentLocale:"en",published:!0},"fr-FR":{translation:u,label:"Fran.ais (F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:Web Open Font Format (Version 2), TrueType, length 29496, version 3.0
                Category:downloaded
                Size (bytes):29496
                Entropy (8bit):7.990916060862368
                Encrypted:true
                SSDEEP:
                MD5:0FB1ACB9CECCFF4D6F268D9F250AD869
                SHA1:336CC8BA85028400CE05755721F804D880BF0376
                SHA-256:AB6BBCB407D72C0CD61ED9443258CA444218F51F6888AC5B4A348BA1A47A636F
                SHA-512:87878C133D8AFD2AA972F4F8C2809261FCCC27645F254BAD286237F162246BE7326BD68A146C22CBB3AFA8066598B0F25C3DAFCA210D996DD973F610E3F341B4
                Malicious:false
                Reputation:unknown
                URL:https://jpmchase.secure.virtru.com/secure-reader/static/assets/fonts/raleway-bold..woff2
                Preview:wOF2......s8.......(..r.........................?FFTM..6........`.....L........t..h.6.$..l..8.. ..F.....3?webf.[.mq........|.[S.Q........:......._.....Ie.m.~."..VZ..).J.c...i,....f../.+.y.H;...'=.|.[UT.u.wn....C.;.F&(..99,...!..'..UK'.J.c.t..4.c..7.5..|.&.T<{...L..]...Q1MF......*.....j....-g(;+..t!}f..I\.BI.8.E...4l...S........$.......x.4...,.6...W..%....G.J.L6..W......n.......G}yx.....yZ.9.q.3.LD.B..!.Io...mT..e.*.1..F....mH..L...#.1".#..F......f.;...D...."k.....kZj.[A...|Pgi).Q....e..pw...n..]..v]..m.. .'...e..~..,Hv....' .lOS..]..4....'.{.H.v.Gu...'J........o.?.:.$K..DNK...9Wt..~>...'..7.|h.@..H..s..N;...f4..(6.Z..5d\.Q&.l!]...D.~..n6....)..&.NZ...-.F...-`...{....$ ...j...@....0t.S.%.Z]J..... V...L.Vm4B!L..,J"T.w..@.dn...[u...e.:.L@....]....h.t...r..!.....o:..LmM.U..X.&!d.2...7..F.... ......`.....<.R.#..h`g........A9../.;.-.o.ky.......r7..)?<G...i(.]...PQ...UW.+ln.x-R..b`....... ..k...7..?.......R.....c,Zw............`...A..+.@J.B......
                No static file info