Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Budget_Statement.htm

Overview

General Information

Sample name:Budget_Statement.htm
Analysis ID:1460298
MD5:7dd1feea1a6afa708810f8bee8a70723
SHA1:6d35dc6467437f1c11f9b185cbbe7bbfe33b7234
SHA256:8f465b2911f4d8989223c62ca0f1fd490aa391c17d58cf52030e58f20bc25031

Detection

HTMLPhisher
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected phishing page
Yara detected HtmlPhish10
Detected javascript redirector / loader
HTML Script injector detected
HTML document with suspicious name
HTML file submission containing password form
Phishing site detected (based on image similarity)
HTML body contains low number of good links
HTML body contains password input but no form action
HTML page contains hidden URLs or javascript code
HTML title does not match URL
Invalid T&C link found
None HTTPS page querying sensitive user data (password, username or email)
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 6724 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\Budget_Statement.htm MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6952 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 --field-trial-handle=1980,i,15778745784035817334,12930639215904347703,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
SourceRuleDescriptionAuthorStrings
0.0.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
    0.0.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
      0.1.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        Phishing

        barindex
        Source: file:///C:/Users/user/Desktop/Budget_Statement.htmLLM: Score: 9 brands: SharePoint Reasons: The URL 'file:///C:/Users/user/Desktop/Budget_Statement.htm' is a local file path, not a legitimate web domain. This is highly suspicious as legitimate SharePoint pages would be hosted on a domain like 'sharepoint.com'. The page requests users to verify their identity by entering professional email credentials, which is a common phishing technique to steal login information. The presence of a login form asking for credentials and the use of social engineering techniques to prompt users to enter sensitive information further indicate that this is a phishing site. Additionally, the page includes a suspicious link to a 'Shared file', which could potentially lead to malicious content. DOM: 0.0.pages.csv
        Source: file:///C:/Users/user/Desktop/Budget_Statement.htmLLM: Score: 9 brands: Microsoft Reasons: The URL 'file:///C:/Users/user/Desktop/Budget_Statement.htm' is a local file path, which is highly suspicious for a legitimate website. The page mimics a Microsoft SharePoint login page, which is a common target for phishing attacks. The presence of a login form asking for email credentials is another red flag, especially since it claims to verify identity for a shared file. The page also uses social engineering techniques by urging the user to verify their identity to access a document. Additionally, the legitimate domain for Microsoft SharePoint would be something like 'sharepoint.com' or 'microsoft.com', not a local file path. Therefore, this site is highly likely to be a phishing site. DOM: 0.1.pages.csv
        Source: Yara matchFile source: 0.0.pages.csv, type: HTML
        Source: Yara matchFile source: 0.0.pages.csv, type: HTML
        Source: Yara matchFile source: 0.1.pages.csv, type: HTML
        Source: Budget_Statement.htmHTTP Parser: Low number of body elements: 0
        Source: file:///C:/Users/user/Desktop/Budget_Statement.htmHTTP Parser: New script, src: https://cdn.socket.io/4.6.0/socket.io.min.js
        Source: file:///C:/Users/user/Desktop/Budget_Statement.htmHTTP Parser: New script, src: https://cdn.socket.io/4.6.0/socket.io.min.js
        Source: file:///C:/Users/user/Desktop/Budget_Statement.htmMatcher: Found strong image similarity, brand: MICROSOFT
        Source: file:///C:/Users/user/Desktop/Budget_Statement.htmHTTP Parser: Number of links: 1
        Source: file:///C:/Users/user/Desktop/Budget_Statement.htmHTTP Parser: <input type="password" .../> found but no <form action="...
        Source: Budget_Statement.htmHTTP Parser: Base64 decoded: https://fiveradio-newbam.com
        Source: file:///C:/Users/user/Desktop/Budget_Statement.htmHTTP Parser: Title: Authenticating ... does not match URL
        Source: file:///C:/Users/user/Desktop/Budget_Statement.htmHTTP Parser: Invalid link: Terms of use
        Source: file:///C:/Users/user/Desktop/Budget_Statement.htmHTTP Parser: Invalid link: Privacy & cookies
        Source: file:///C:/Users/user/Desktop/Budget_Statement.htmHTTP Parser: Invalid link: Terms of use
        Source: file:///C:/Users/user/Desktop/Budget_Statement.htmHTTP Parser: Invalid link: Privacy & cookies
        Source: file:///C:/Users/user/Desktop/Budget_Statement.htmHTTP Parser: Has password / email / username input fields
        Source: file:///C:/Users/user/Desktop/Budget_Statement.htmHTTP Parser: <input type="password" .../> found
        Source: Budget_Statement.htmHTTP Parser: No favicon
        Source: file:///C:/Users/user/Desktop/Budget_Statement.htmHTTP Parser: No favicon
        Source: file:///C:/Users/user/Desktop/Budget_Statement.htmHTTP Parser: No favicon
        Source: file:///C:/Users/user/Desktop/Budget_Statement.htmHTTP Parser: No <meta name="author".. found
        Source: file:///C:/Users/user/Desktop/Budget_Statement.htmHTTP Parser: No <meta name="author".. found
        Source: file:///C:/Users/user/Desktop/Budget_Statement.htmHTTP Parser: No <meta name="copyright".. found
        Source: file:///C:/Users/user/Desktop/Budget_Statement.htmHTTP Parser: No <meta name="copyright".. found
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\Chrome\Application\Dictionaries
        Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49721 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49728 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:49737 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:49750 version: TLS 1.2
        Source: chrome.exeMemory has grown: Private usage: 1MB later: 30MB
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
        Source: unknownTCP traffic detected without corresponding DNS query: 2.16.101.123
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
        Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
        Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
        Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
        Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
        Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
        Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
        Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
        Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
        Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
        Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
        Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
        Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
        Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
        Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
        Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
        Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
        Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
        Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
        Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
        Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
        Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
        Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
        Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
        Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
        Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
        Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
        Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
        Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
        Source: global trafficDNS traffic detected: DNS query: cdn.socket.io
        Source: global trafficDNS traffic detected: DNS query: fiveradio-newbam.com
        Source: global trafficDNS traffic detected: DNS query: www.w3schools.com
        Source: global trafficDNS traffic detected: DNS query: ih1.redbubble.net
        Source: global trafficDNS traffic detected: DNS query: aadcdn.msftauth.net
        Source: global trafficDNS traffic detected: DNS query: www.google.com
        Source: global trafficDNS traffic detected: DNS query: a.nel.cloudflare.com
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
        Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
        Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
        Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
        Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
        Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
        Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
        Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
        Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
        Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
        Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
        Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
        Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
        Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
        Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
        Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
        Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
        Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
        Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49721 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49728 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:49737 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:49750 version: TLS 1.2

        System Summary

        barindex
        Source: Name includes: Budget_Statement.htmInitial sample: statement
        Source: classification engineClassification label: mal76.phis.winHTM@14/18@20/218
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Program Files\Google\Chrome\Application\Dictionaries
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
        Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\Budget_Statement.htm
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 --field-trial-handle=1980,i,15778745784035817334,12930639215904347703,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 --field-trial-handle=1980,i,15778745784035817334,12930639215904347703,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\Chrome\Application\Dictionaries
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk

        Stealing of Sensitive Information

        barindex
        Source: file:///C:/Users/user/Desktop/Budget_Statement.htmHTTP Parser: file:///C:/Users/user/Desktop/Budget_Statement.htm
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
        Registry Run Keys / Startup Folder
        1
        Process Injection
        3
        Masquerading
        OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        Registry Run Keys / Startup Folder
        1
        Process Injection
        LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
        Non-Application Layer Protocol
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
        Extra Window Memory Injection
        1
        Extra Window Memory Injection
        Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
        Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        file:///C:/Users/user/Desktop/Budget_Statement.htm0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        a.nel.cloudflare.com
        35.190.80.1
        truefalse
          unknown
          cs203.wac.edgecastcdn.net
          68.232.35.237
          truefalse
            unknown
            d2vgu95hoyrpkh.cloudfront.net
            13.227.219.11
            truefalse
              unknown
              cs837.wac.edgecastcdn.net
              192.229.133.221
              truefalse
                unknown
                s-part-0017.t-0009.t-msedge.net
                13.107.246.45
                truefalse
                  unknown
                  sni1gl.wpc.omegacdn.net
                  152.199.21.175
                  truefalse
                    unknown
                    fiveradio-newbam.com
                    104.21.84.200
                    truefalse
                      unknown
                      www.google.com
                      142.250.186.132
                      truefalse
                        unknown
                        s-part-0032.t-0009.t-msedge.net
                        13.107.246.60
                        truefalse
                          unknown
                          ih1.redbubble.net
                          unknown
                          unknownfalse
                            unknown
                            aadcdn.msftauth.net
                            unknown
                            unknownfalse
                              unknown
                              www.w3schools.com
                              unknown
                              unknownfalse
                                unknown
                                cdn.socket.io
                                unknown
                                unknowntrue
                                  unknown
                                  NameMaliciousAntivirus DetectionReputation
                                  file:///C:/Users/user/Desktop/Budget_Statement.htmtrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  142.250.186.35
                                  unknownUnited States
                                  15169GOOGLEUSfalse
                                  142.250.184.195
                                  unknownUnited States
                                  15169GOOGLEUSfalse
                                  68.232.35.237
                                  cs203.wac.edgecastcdn.netUnited States
                                  15133EDGECASTUSfalse
                                  142.250.185.67
                                  unknownUnited States
                                  15169GOOGLEUSfalse
                                  1.1.1.1
                                  unknownAustralia
                                  13335CLOUDFLARENETUSfalse
                                  13.107.246.45
                                  s-part-0017.t-0009.t-msedge.netUnited States
                                  8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                  192.229.133.221
                                  cs837.wac.edgecastcdn.netUnited States
                                  15133EDGECASTUSfalse
                                  13.107.246.60
                                  s-part-0032.t-0009.t-msedge.netUnited States
                                  8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                  216.58.206.35
                                  unknownUnited States
                                  15169GOOGLEUSfalse
                                  142.250.181.238
                                  unknownUnited States
                                  15169GOOGLEUSfalse
                                  2.21.20.6
                                  unknownEuropean Union
                                  20940AKAMAI-ASN1EUfalse
                                  172.67.196.150
                                  unknownUnited States
                                  13335CLOUDFLARENETUSfalse
                                  13.227.219.11
                                  d2vgu95hoyrpkh.cloudfront.netUnited States
                                  16509AMAZON-02USfalse
                                  239.255.255.250
                                  unknownReserved
                                  unknownunknownfalse
                                  142.250.185.142
                                  unknownUnited States
                                  15169GOOGLEUSfalse
                                  104.21.84.200
                                  fiveradio-newbam.comUnited States
                                  13335CLOUDFLARENETUSfalse
                                  152.199.21.175
                                  sni1gl.wpc.omegacdn.netUnited States
                                  15133EDGECASTUSfalse
                                  64.233.184.84
                                  unknownUnited States
                                  15169GOOGLEUSfalse
                                  142.250.186.132
                                  www.google.comUnited States
                                  15169GOOGLEUSfalse
                                  35.190.80.1
                                  a.nel.cloudflare.comUnited States
                                  15169GOOGLEUSfalse
                                  IP
                                  192.168.2.16
                                  Joe Sandbox version:40.0.0 Tourmaline
                                  Analysis ID:1460298
                                  Start date and time:2024-06-20 19:11:46 +02:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:15
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • EGA enabled
                                  Analysis Mode:stream
                                  Analysis stop reason:Timeout
                                  Sample name:Budget_Statement.htm
                                  Detection:MAL
                                  Classification:mal76.phis.winHTM@14/18@20/218
                                  Cookbook Comments:
                                  • Found application associated with file extension: .htm
                                  • Exclude process from analysis (whitelisted): dllhost.exe, SgrmBroker.exe, svchost.exe
                                  • Excluded IPs from analysis (whitelisted): 216.58.206.35, 142.250.181.238, 64.233.184.84, 34.104.35.123, 2.21.20.6, 2.21.20.29, 142.250.186.35, 142.250.184.195
                                  • Excluded domains from analysis (whitelisted): san-ion.secure4.scene7.com.edgekey.net, logincdn.msauth.net, fs.microsoft.com, lgincdnmsftuswe2.azureedge.net, accounts.google.com, aadcdnoriginwus2.azureedge.net, clientservices.googleapis.com, aadcdn.msauth.net, firstparty-azurefd-prod.trafficmanager.net, clients2.google.com, edgedl.me.gvt1.com, cdn-dynmedia-1.microsoft.com, aadcdnoriginwus2.afd.azureedge.net, e81481.dsca.akamaiedge.net, lgincdnmsftuswe2.afd.azureedge.net, clients.l.google.com, www.gstatic.com
                                  • Not all processes where analyzed, report is missing behavior information
                                  • VT rate limit hit for: Budget_Statement.htm
                                  InputOutput
                                  URL: file:///C:/Users/user/Desktop/Budget_Statement.htm Model: gpt-4o
                                  ```json{  "phishing_score": 9,  "brands": "SharePoint",  "phishing": true,  "suspicious_domain": true,  "has_loginform": true,  "has_captcha": false,  "setechniques": true,  "has_suspicious_link": true,  "legitmate_domain": "sharepoint.com",  "reasons": "The URL 'file:///C:/Users/user/Desktop/Budget_Statement.htm' is a local file path, not a legitimate web domain. This is highly suspicious as legitimate SharePoint pages would be hosted on a domain like 'sharepoint.com'. The page requests users to verify their identity by entering professional email credentials, which is a common phishing technique to steal login information. The presence of a login form asking for credentials and the use of social engineering techniques to prompt users to enter sensitive information further indicate that this is a phishing site. Additionally, the page includes a suspicious link to a 'Shared file', which could potentially lead to malicious content."}
                                  URL: file:///C:/Users/user/Desktop/Budget_Statement.htm Model: gpt-4o
                                  ```json{  "phishing_score": 9,  "brands": "Microsoft",  "phishing": true,  "suspicious_domain": true,  "has_loginform": true,  "has_captcha": false,  "setechniques": true,  "has_suspicious_link": true,  "legitmate_domain": "microsoft.com",  "reasons": "The URL 'file:///C:/Users/user/Desktop/Budget_Statement.htm' is a local file path, which is highly suspicious for a legitimate website. The page mimics a Microsoft SharePoint login page, which is a common target for phishing attacks. The presence of a login form asking for email credentials is another red flag, especially since it claims to verify identity for a shared file. The page also uses social engineering techniques by urging the user to verify their identity to access a document. Additionally, the legitimate domain for Microsoft SharePoint would be something like 'sharepoint.com' or 'microsoft.com', not a local file path. Therefore, this site is highly likely to be a phishing site."}
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jun 20 16:12:20 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                  Category:dropped
                                  Size (bytes):2673
                                  Entropy (8bit):3.9925352298416894
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:24A8536918325216C26D084D8C86A9A2
                                  SHA1:919CDFBC9F11000B79BE22B0B8AD54181F0D2387
                                  SHA-256:27E98682E6B649305DD9E2F33CC5D50AE7294EBF27D2B0960C1DE86E12A9A74D
                                  SHA-512:9F91D4A2D2A3868D30919B56BF4ECFDB8C2586355AC5B26D83D313ED814577B34FABDFB8DBDDC09765DD485402C08373CCB2D02BE7CEE5E77C2770C1612AC63F
                                  Malicious:false
                                  Reputation:unknown
                                  Preview:L..................F.@.. ...$+.,....r9z.5...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.........../.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jun 20 16:12:20 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                  Category:dropped
                                  Size (bytes):2675
                                  Entropy (8bit):4.009007775775005
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:B9B8F676A91794263BC7AE7BA3171402
                                  SHA1:9573A4896637D6CE33D1AD69F30BE0B31385A639
                                  SHA-256:BE076E60DE241AFBDFB69DD34105D20797B293743AB33F5B250653DDE5B04193
                                  SHA-512:8341690CBDACDDF33D9B1823AF022954C44B4E804BD7CE06422829E98106417E6D2A7F5F98AF0BFD61F63F6E83073DCDEB5603D35DB62A1B5D1800B717567021
                                  Malicious:false
                                  Reputation:unknown
                                  Preview:L..................F.@.. ...$+.,....Q.m.5...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.........../.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                  Category:dropped
                                  Size (bytes):2689
                                  Entropy (8bit):4.015946184670139
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:C825AE8288EFEA523170761B64BA8AD2
                                  SHA1:D41DC5BEF8DB56DC49B2673DFE91B2993CB5CC52
                                  SHA-256:0C3AC83B662C6C30B52909B7CC093B0899AD8AA762A05E4562095713D9E38777
                                  SHA-512:A1A9F68872D1000DD516150BF00CD86D07E1E6EDF9B9F215580115ABF4553246E4D057803E907EA5D8A87EA43B6D21625538DEE2955C78930752F6CAA275FE4C
                                  Malicious:false
                                  Reputation:unknown
                                  Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.........../.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jun 20 16:12:20 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                  Category:dropped
                                  Size (bytes):2677
                                  Entropy (8bit):4.00625224065284
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:1347FFB7F71DB94C79851F3643084F08
                                  SHA1:4A554B5B5E7A291553E659E7A06C2D2F211DE7D7
                                  SHA-256:D1923A6D94B2EF27E43578309BAFBEA2DA5B02B12A04D46403459D904742AED2
                                  SHA-512:16DB788150FC55029CC5D54B4E16CEBA4A2F3512DB558FE89237775AF45795234560EDC744D0931FE343442BC0C6ACBA966D86A79560C237A662D48F92D4661F
                                  Malicious:false
                                  Reputation:unknown
                                  Preview:L..................F.@.. ...$+.,.....Mg.5...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.........../.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jun 20 16:12:20 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                  Category:dropped
                                  Size (bytes):2677
                                  Entropy (8bit):3.993696147799033
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:167881708CDA0EF15E4BA46665E7B239
                                  SHA1:900AC1192A51B29F302A11FEE977197D7F5AA43E
                                  SHA-256:0F4CF60FEA59F3131C8C31ABD858C76EF5D845BFAD1577DE9C4884671504D365
                                  SHA-512:1F4E3A9B6DA2F79DC6483F500AA52253AB4EC87F875886E0FDC025444F07CF7AD01F0ADAED6FDED002E52A9289D7B2C857F7F7DAB948ACBE2F532F18BCCC35BA
                                  Malicious:false
                                  Reputation:unknown
                                  Preview:L..................F.@.. ...$+.,....9Ft.5...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.........../.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jun 20 16:12:20 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                  Category:dropped
                                  Size (bytes):2679
                                  Entropy (8bit):4.008238143199276
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:F71AFAE1AFFCD37574207822689545BF
                                  SHA1:01D34434B5FF5A1C1C74D898A98648DA92DA33C4
                                  SHA-256:367BC3998D7610E71EBEA785417EBEA21E9E07B4606D4B24E65176B4F006273D
                                  SHA-512:CFEB4197BC767820321334985B3B6BC01F8E2D2BB156F1D0E081C8516763942B0F61E895B5B30D87C7328A03AEFF11F195B99E460255E163B8BB52F619D21F27
                                  Malicious:false
                                  Reputation:unknown
                                  Preview:L..................F.@.. ...$+.,......].5...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.........../.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 7390
                                  Category:dropped
                                  Size (bytes):2407
                                  Entropy (8bit):7.900400471609788
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:9D372E951D45A26EDE2DC8B417AAE4F8
                                  SHA1:84F97A777B6C33E2947E6D0BD2BFCFFEC601785A
                                  SHA-256:4E9C9141705E9A4D83514CEE332148E1E92126376D049DAED9079252FA9F9212
                                  SHA-512:78F5AA71EA44FF18BA081288F13AD118DB0E1B9C8D4D321ED40DCAB29277BD171BBB25BA7514566BBD4E25EA416C066019077FAA43E6ED781A29ADB683D218E2
                                  Malicious:false
                                  Reputation:unknown
                                  Preview:...........Y=s.8......mr...f.y....8.R...l.Nk.l..?....{$.l|e'zM.3...............S(..........O./......Mn.e..O..7.O.?=..?........../...~yy._t....8.a........~.....+..$..*..z..\....~..Jx|............|y...=................./.3....kN2...H...;<sy....H..?2..q5.0.0....f......L.^..v.W.L..7XCm8.I...6\.p.....O/%sX..I.......u............yE......$q....1/.....W....Zg...w..-..v....x...N)........R....c.W5.=...{_1_...+.#.......e...K..:..b.Ec...!...".I1../2X.....].i.sAF;^.1....1/UM.[r..d...>RX..U...<..1...V.|.......X.jX:..0...9..F.KsT...{.6,.._Q..9.b...Q)..0.R.t.u.JN..u$V.%X.9k..t.."..Q.........y.V.Z$7.q.{......k.......W....5.x..K.."y...=......4...h|!....r.."v\f`..c+.......b..hc.jn....0.&G..m.=.@..6../......6....tM^.&3.$......~.....m2...wFs..#5.Hy..?...r.p.O.X.'n...Z8L......7.;..QWGnr.sY..n...3.Jfq..+{m....\...X.q...0...0...........}}d...33.....Q...F$.8..v..UH&.H........0.q..n...q...F.Y7...u..B>..J.A.....$.,....w......Z..oe..w..%....$[+.......d...
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:ASCII text, with very long lines (41013)
                                  Category:downloaded
                                  Size (bytes):121405
                                  Entropy (8bit):4.434905513533929
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:4580C107A86C85FF4865AEE3B6206980
                                  SHA1:6E23CE4B73E53B1D86304B8560E954308D957358
                                  SHA-256:0118D27E818774350CFCB53CA69BF30B89BD41A4B1E78FF4B25931E6E7574470
                                  SHA-512:8D3AD904CE857BE110E8F926A2EB31D8477F139E03E6AC3DE39FEBE3F5052555BEA4FE9DB9C2C5B096E66C090DB65A7AE0485E9163E6B604A1ACE58F8BF9326A
                                  Malicious:false
                                  Reputation:unknown
                                  URL:https://fiveradio-newbam.com/jssp.js
                                  Preview:function _0x1600(_0x2c7fe4, _0x33dc06) { const _0x193400 = _0x1934(); return _0x1600 = function(_0x160049, _0x3dd26a) { _0x160049 = _0x160049 - 0x145; let _0x5bdf41 = _0x193400[_0x160049]; return _0x5bdf41; }, _0x1600(_0x2c7fe4, _0x33dc06); }.const _0x4cc68a = _0x1600;.(function(_0x5cfd21, _0x48e7cd) { const _0x5cd3f0 = _0x1600,. _0x152b2f = _0x5cfd21(); while (!![]) { try { const _0x4d91ef = parseInt(_0x5cd3f0(0x1d0)) / 0x1 * (parseInt(_0x5cd3f0(0x186)) / 0x2) + parseInt(_0x5cd3f0(0x199)) / 0x3 * (-parseInt(_0x5cd3f0(0x1a5)) / 0x4) + -parseInt(_0x5cd3f0(0x191)) / 0x5 + -parseInt(_0x5cd3f0(0x1d3)) / 0x6 * (parseInt(_0x5cd3f0(0x154)) / 0x7) + parseInt(_0x5cd3f0(0x178)) / 0x8 + -parseInt(_0x5cd3f0(0x198)) / 0x9 * (parseInt(_0x5cd3f0(0x16c)) / 0xa) + parseInt(_0x5cd3f0(0x19b)) / 0xb * (parseInt(_0x5cd3f0(0x1d7)) / 0xc); if (_0x4d91ef === _0x48e7cd) break;. else _0x152b2f['push'](_0x152b2f['shift']()); } catch (_0x452a09) { _0x152b2f['push'](_0x152b2f['shift']()); } } }(_
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 3651
                                  Category:downloaded
                                  Size (bytes):1435
                                  Entropy (8bit):7.8613342322590265
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:9F368BC4580FED907775F31C6B26D6CF
                                  SHA1:E393A40B3E337F43057EEE3DE189F197AB056451
                                  SHA-256:7ECBBA946C099539C3D9C03F4B6804958900E5B90D48336EEA7E5A2ED050FA36
                                  SHA-512:0023B04D1EEC26719363AED57C95C1A91244C5AFF0BB53091938798FB16E230680E1F972D166B633C1D2B314B34FE0B9D7C18442410DB7DD6024E279AAFD61B0
                                  Malicious:false
                                  Reputation:unknown
                                  URL:https://aadcdn.msauth.net/shared/1.0/content/images/microsoft_logo_564db913a7fa0ca42727161c6d031bef.svg
                                  Preview:...........WMo.7..+..uV.HJ...{..........&..v...(Q.F.....aW.Q.|..~.|{~...b{8...zv.....8|...b.gxb.y{.x<\lS...p...p..l7...o.}.v.....t.........r..r.|9?.......HP...r.4.aGA.j....7.!....K.n.B.Z.C.]....kj..A..p...xI...b..I!K..><.B..O....#...$.]h.bU.;.Y...).r.u....g*.-w.2..vPh....q....4_..N\..@y).t{.2pj.f..4h.....NC.....x.R..P..9.....".4.`%N..&...a.@.......fS)A4.F..8e9KHE....8d.CR.K..g..Q.......a....f.....dg*N.N.k..#w..........,.".%..I.q.Y.R]..7.!.:.Ux...T.qI..{..,b..2..B...Bh...[o..[4....dZ.z.!.l....E.9$..Y.'...M.,p..$..8Ns3.B.....{.....H..Se3....%.Ly...VP{.Bh.D.+....p..(..`....t....U.e....2......j...%..0.f<...q...B.k..N....03...8....l.....bS...vh..8..Q..LWXW..C.......3..Pr.V.l...^=VX\,d9f.Y;1!w.d,.qvs....f*;.....Zhrr.,.U....6.Y....+Zd.*R...but....".....4.L...z........L.Q......)....,.].Y.&....*ZsIVG.^...#...e..r....Z..F..c..... .QDCmV..1.~...J9..b_Oov\..X.R..._.TqH.q.5G.0{ZphQ..k...s..\.../.Dp..d`#......8.#Y...Mb.j.Q......=n4.c....p.[.SI.....0.N.
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:SVG Scalable Vector Graphics image
                                  Category:dropped
                                  Size (bytes):1636
                                  Entropy (8bit):4.214613323368661
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:F7AB697E65B83CE9870A4736085DEEEC
                                  SHA1:5FF40BFF26B523FBBEAA5228A2AAC63E44AFAA90
                                  SHA-256:CBB3706E65B35A43BDCFEBD23B5479DC0542CA7E23197869B683D12B524472FE
                                  SHA-512:158874143CE65485348813431BB585227772F315234E08158A329DF98319AA5F1DB21DEF2AD7CAA5C25AD11660E7D4E05158CFA1198913A33B1B91676C4CA402
                                  Malicious:false
                                  Reputation:unknown
                                  Preview:<svg xmlns="http://www.w3.org/2000/svg" width="48" height="48" viewBox="0 0 48 48"><title>assets</title><rect width="48" height="48" fill="none"/><path d="M38,14H10V34H38V14m2,22H8V12H40V36M17.688,18.8V28.828H15.531V21.234a3.2,3.2,0,0,1-.672.43l-.266.117a2.55,2.55,0,0,1-.562.188,2.423,2.423,0,0,1-.3.07q-.141.023-.281.055V20.266q.422-.125.813-.281t.766-.344a8.253,8.253,0,0,0,1.344-.844h1.313m4.531,8.234h4.156v1.8H19.859v-.75a3.292,3.292,0,0,1,.25-1.344,4.183,4.183,0,0,1,.625-1.078,5.7,5.7,0,0,1,.844-.828q.219-.187.438-.352t.422-.32q.453-.312.766-.578a2.593,2.593,0,0,0,.3-.281l.25-.281a3.148,3.148,0,0,0,.328-.562,1.59,1.59,0,0,0,.109-.609,1.176,1.176,0,0,0-.359-.937,1.552,1.552,0,0,0-1.078-.328,3.625,3.625,0,0,0-2.422,1V19.688a4.866,4.866,0,0,1,1.359-.625,5.548,5.548,0,0,1,1.516-.2,4.456,4.456,0,0,1,1.344.188,2.461,2.461,0,0,1,1,.563,2.242,2.242,0,0,1,.625.875,3.007,3.007,0,0,1,.219,1.156,3.538,3.538,0,0,1-.055.641,3.7,3.7,0,0,1-.148.563,3.439,3.439,0,0,1-.562.953,7.2,7.2,0,0,1-.8.8q-.21
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 360x360, components 3
                                  Category:dropped
                                  Size (bytes):9489
                                  Entropy (8bit):7.832401214573246
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:F80D441859CEB9AAEC300FC0D41FCA85
                                  SHA1:596C6691761E264E04745EDD4810AF343CDEF3ED
                                  SHA-256:48273EC7955DE6B58E1CCBE7525DEA9AD4CA5373F61EDE3042D4722D0DB7BE92
                                  SHA-512:BBE0FC430BE0458B8DE1E435C91CBD4B0188B7EB19C37EA3566FD3D35B32EA64C4C6CBB4A70157A17D9FDBBA3BB248CA9D5BA1A129220DD5EA4AE58E13CAF83C
                                  Malicious:false
                                  Reputation:unknown
                                  Preview:......JFIF.............tPhotoshop 3.0.8BIM.......W..Z...%G.........t.C. developerfriday - http://www.redbubble.com/people/developerfrida....C.....................................#...!....).!$%'('..+.+&.#&'&...C...........&...&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&......h.h.."........................................................................................:..N'.{v.4.9zc. .............O..h../...dyL..>.1i.=.A.hsf.i.....zVQ,/?...P........|x...R).m=......u.ds.......t...m.....4....U.c_w.n.....V......!X.|..hZ.....5.dG........t.....5.4L{.({M.4...@{..i..7.-.....#.t.p..&#^.,s..p.1,1.d.q,...q#........};....AAe4...@M.;.*.c........|......].K...%.,.bX."..m.<..OQ.....q.7...pgW.y.E4...@M.;.".>..z.<.....ZJ.....Xc..8c....H|..qH......Rn.S.=...DI.$D..k...1}.....+mO..n....%.1....:]...........x.C.ZEC.d.."H."%z.....E....T.M%s....G....F3...............{.......DI.$D...Po.k.......*....y.g......7.X.1...m.>.....u...P..(..f...,..2...7....]h.^d...V...'..x..a...xG
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:RIFF (little-endian) data, Web/P image, VP8 encoding, 75x75, Suserng: [none]x[none], YUV color, decoders should clamp
                                  Category:dropped
                                  Size (bytes):1246
                                  Entropy (8bit):7.808846010085192
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:0B0D324D8294AB9E1C36EFACB6276980
                                  SHA1:B7599E4CDD88F31A4A56C610D3E86223D95BAAE0
                                  SHA-256:0FE6AA8A56A4B66BA0B2D23C8AF6F1F94A894E5525C5E193C7FD70EF05A7E5E6
                                  SHA-512:C08A4BBDB1F2ACB74FAD8B2B51CD0E3343D38959153A62FD5E98B4591548E92344131C9ABFC742B3E51FCAE5D8FE8C98032B9EB5D2039690598B0E825093436B
                                  Malicious:false
                                  Reputation:unknown
                                  Preview:RIFF....WEBPVP8 .........*K.K.>Q..D......|8....c.....n....K.#.'...s..5y....|..{&...k....................[...._...>..r.......R..}3...g.....V.5u..V..../...~."...~.>y._...........B{..-kRW.d..=...F.......~. >Jr.pc...]..............gL.v$i.o.T..!P.....z..Go.....GE[......w..^.. ...M..].o....n.+WM.)..4.....?.|Q3..c.u....2O.N.....*`..n,*$`? ......P..{.tK..TP.....e.J.*..X..4..J\.<...7..CU....<g6D..]%......QO.--Q#..|.fe.&.1U...d.%m?.5...I..@.*E...k<.....,...IP.]T.O..8./...=~..X)......L....U........N.x0.<u.........x.......c._!...GdA<.....F.q..mj... ..O...5,#..".dPTO..9.....+.K2......m....Bl....K.#.>;s....8NG...l..% ...8............|t=x........&..|p.....~...G....?.j.Z.30v.m..a...i.N...A./-.....J.2.]zPI..j|3).PPr!..s....Zv......#/.,z.jM..Kr3...8.H.hH......d.t...........,.!rP.ZQ...N....1.K...v.(...C.%......F-rf.FDW..m....w.....^....M.y...:..u^.. .........,.B..6!D$/.......:>.........ZD.^..l8....[&\.h....'.....#..#......`...s...<....P...Ih.......+|
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:Unicode text, UTF-8 (with BOM) text
                                  Category:downloaded
                                  Size (bytes):23427
                                  Entropy (8bit):5.112735417225198
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:BA0537E9574725096AF97C27D7E54F76
                                  SHA1:BD46B47D74D344F435B5805114559D45979762D5
                                  SHA-256:4A7611BC677873A0F87FE21727BC3A2A43F57A5DED3B10CE33A0F371A2E6030F
                                  SHA-512:FC43F1A6B95E1CE005A8EFCDB0D38DF8CC12189BEAC18099FD97C278D254D5DA4C24556BD06515D9D6CA495DDB630A052AEFC0BB73D6ED15DEBC0FB1E8E208E7
                                  Malicious:false
                                  Reputation:unknown
                                  URL:https://www.w3schools.com/w3css/4/w3.css
                                  Preview:./* W3.CSS 4.15 December 2020 by Jan Egil and Borge Refsnes */.html{box-sizing:border-box}*,*:before,*:after{box-sizing:inherit}./* Extract from normalize.css by Nicolas Gallagher and Jonathan Neal git.io/normalize */.html{-ms-text-size-adjust:100%;-webkit-text-size-adjust:100%}body{margin:0}.article,aside,details,figcaption,figure,footer,header,main,menu,nav,section{display:block}summary{display:list-item}.audio,canvas,progress,video{display:inline-block}progress{vertical-align:baseline}.audio:not([controls]){display:none;height:0}[hidden],template{display:none}.a{background-color:transparent}a:active,a:hover{outline-width:0}.abbr[title]{border-bottom:none;text-decoration:underline;text-decoration:underline dotted}.b,strong{font-weight:bolder}dfn{font-style:italic}mark{background:#ff0;color:#000}.small{font-size:80%}sub,sup{font-size:75%;line-height:0;position:relative;vertical-align:baseline}.sub{bottom:-0.25em}sup{top:-0.5em}figure{margin:1em 40px}img{border-style:none}.code,kbd,p
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
                                  Category:dropped
                                  Size (bytes):2228
                                  Entropy (8bit):7.82817506159911
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:EF9941290C50CD3866E2BA6B793F010D
                                  SHA1:4736508C795667DCEA21F8D864233031223B7832
                                  SHA-256:1B9EFB22C938500971AAC2B2130A475FA23684DD69E43103894968DF83145B8A
                                  SHA-512:A0C69C70117C5713CAF8B12F3B6E8BBB9CDAF72768E5DB9DB5831A3C37541B87613C6B020DD2F9B8760064A8C7337F175E7234BFE776EEE5E3588DC5662419D9
                                  Malicious:false
                                  Reputation:unknown
                                  Preview:.PNG........IHDR...0...0.....W.......gAMA......a.... cHRM..z&..............u0...`..:....p..Q<....bKGD.......C......pHYs.................IDATh...P....=..8.....Nx. ..PlP8..;.C.1iL#6...*.Z..!......3.po .o.L.i.I..1fl..4..ujL&6$...............w...........,Z..z. ~.....\.._.C.eK...g..%..P..L7...96..q....L.....k6...*..,xz.._......B."#...L(n..f..Yb...*.8.;....K)N...H).%.F"Ic.LB.........jG.uD..B....Tm....T..).A.}D.f..3.V.....O.....t_..].x.{o......*....x?!W...j..@..G=Ed.XF.........J..E?../]..?p..W..H..d5% WA+.....)2r..+..'qk8.../HS.[...u..z.P.*....-.A.}.......I .P.....S....|...)..KS4....I.....W...@....S.s..s..$`.X9.....E.x.=.u.*iJ...........k......'...!.a....*+.....(...S..\h....@............I.$..%.2....l......a.|.....U....y.....t..8....TF.o.p.+.@<.g........-.M.....:.@..(.......@......>..=.ofm.WM{...e..,..D.r.......w....T.L.os..T@Rv..;.....9....56<.x...........2.k.1....dd.V.....m..y5../4|...G.p.V.......6...}.....B........5...&..v..yTd.6...../m.K...(.
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:JSON data
                                  Category:dropped
                                  Size (bytes):41
                                  Entropy (8bit):4.180365114215879
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:64E1C1EB9F4CAF0CF0E7484D7AFCEDB9
                                  SHA1:69E40D8C48A866A84046FD8BD17AF47FF02B79A4
                                  SHA-256:8ACAC48BC106C4EAE580C08071597F9DAFAB96D959DEFF65BEC44514DA907B1D
                                  SHA-512:F109767D57E85127D18B1AD2030A48C0EAD69F79A15C4008712407B1F62691654B74C9D6E225FFDC4A922847EABB928DC7520A656C7081B585124CF678B54E59
                                  Malicious:false
                                  Reputation:unknown
                                  Preview:{"code":1,"message":"Session ID unknown"}
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 513
                                  Category:downloaded
                                  Size (bytes):276
                                  Entropy (8bit):7.316609873335077
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:4E3510919D29D18EEB6E3E8B2687D2F5
                                  SHA1:31522A9EC576A462C3F1FFA65C010D4EB77E9A85
                                  SHA-256:1707BE1284617ACC0A66A14448207214D55C3DA4AAF25854E137E138E089257E
                                  SHA-512:DFAD29E3CF9E51D1749961B47382A5151B1F3C98DEABF2B63742EB6B7F7743EE9B605D646A730CF3E087D4F07E43107C8A01FF5F68020C7BF933EBA370175682
                                  Malicious:false
                                  Reputation:unknown
                                  URL:https://logincdn.msauth.net/shared/1.0/content/images/arrow_left_a9cc2824ef3517b6c4160dcf8ff7d410.svg
                                  Preview:...........Q=o. ..+.......=t....E.k["...../g;n.,....{.......2....*e.......J).*8..).5.....>,.ih...^s...&M.Ta..m........C.N5.G.!.-...}.9.~........u.3..@i..qK.U.......E.........S.......A.....6...G..g...,f3g.5F..I...G@<..L.:`.N&.?R....d..(.7._....z.L.......s....
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 250
                                  Category:downloaded
                                  Size (bytes):199
                                  Entropy (8bit):6.766983163126765
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:21B761F2B1FD37F587D7222023B09276
                                  SHA1:F7A416C8907424F9A9644753E3A93D4D63AE640E
                                  SHA-256:72D4161C18A46D85C5566273567F791976431EFEF49510A0E3DD76FEC92D9393
                                  SHA-512:77745F60804D421B34DE26F8A216CEE27C440E469FD786A642757CCEDBC4875D5196431897D80137BD3E20B01104BA76DEC7D8E75771D8A9B5F14B66F2A9B7C0
                                  Malicious:false
                                  Reputation:unknown
                                  URL:https://aadcdn.msauth.net/shared/1.0/content/images/picker_verify_sms_12b7d768ba76f2e782cc74e328171091.svg
                                  Preview:..........u....0.._%2k.8?....w..k..!.M.."b5<.M.bD..c..l.:..}...@.8p.sn.j...%".B...J..6...c..^..?...2d...R..w.<%..}..}s..ir0/.......:8).(.......^u...0..U..I.F....{]...[-......~..F.P_.....G.....
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:ASCII text, with very long lines (45667)
                                  Category:downloaded
                                  Size (bytes):45806
                                  Entropy (8bit):5.207605835316031
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:80F5B8C6A9EEAC15DE93E5A112036A06
                                  SHA1:F7174635137D37581B11937FC90E9CB325077BCE
                                  SHA-256:0401DE33701F1CAD16ECF952899D23990B6437D0A5B7335524EDF6BDFB932542
                                  SHA-512:B976A5F02202439D94C6817D037C813FA1945C6BB93762284D97FF61718C5B833402F372562034663A467FDBAA46990DE24CB1E356392340E64D034E4BA1B4E4
                                  Malicious:false
                                  Reputation:unknown
                                  URL:https://cdn.socket.io/4.6.0/socket.io.min.js
                                  Preview:/*!. * Socket.IO v4.6.0. * (c) 2014-2023 Guillermo Rauch. * Released under the MIT License.. */.!function(t,e){"object"==typeof exports&&"undefined"!=typeof module?module.exports=e():"function"==typeof define&&define.amd?define(e):(t="undefined"!=typeof globalThis?globalThis:t||self).io=e()}(this,(function(){"use strict";function t(e){return t="function"==typeof Symbol&&"symbol"==typeof Symbol.iterator?function(t){return typeof t}:function(t){return t&&"function"==typeof Symbol&&t.constructor===Symbol&&t!==Symbol.prototype?"symbol":typeof t},t(e)}function e(t,e){if(!(t instanceof e))throw new TypeError("Cannot call a class as a function")}function n(t,e){for(var n=0;n<e.length;n++){var r=e[n];r.enumerable=r.enumerable||!1,r.configurable=!0,"value"in r&&(r.writable=!0),Object.defineProperty(t,r.key,r)}}function r(t,e,r){return e&&n(t.prototype,e),r&&n(t,r),Object.defineProperty(t,"prototype",{writable:!1}),t}function i(){return i=Object.assign?Object.assign.bind():function(t){for(var e=
                                  File type:HTML document, ASCII text, with very long lines (915), with CRLF line terminators
                                  Entropy (8bit):5.082385036708021
                                  TrID:
                                  • HyperText Markup Language (15015/1) 55.58%
                                  • HyperText Markup Language (12001/1) 44.42%
                                  File name:Budget_Statement.htm
                                  File size:14'299 bytes
                                  MD5:7dd1feea1a6afa708810f8bee8a70723
                                  SHA1:6d35dc6467437f1c11f9b185cbbe7bbfe33b7234
                                  SHA256:8f465b2911f4d8989223c62ca0f1fd490aa391c17d58cf52030e58f20bc25031
                                  SHA512:a228fb83a71ef1b80c88e86f76bf4c64276de335b3dea53f9744691ec7f68030dfba623c8a9ceb9c9b69a0aa89bfc870edcbbcec424afe5c0d03bdd77b6a217e
                                  SSDEEP:384:EkXrQK9/JaMtvEib2UT/Yz19TZWTIiIuY4nBlAV0R5RqcHPd4Cu2DIMLb:ZrQK9/JaMtvEi6+/Yz19TZWHY4nBlAVG
                                  TLSH:B552114429C1784493BBBB65BA5BA4E8FB6601A353C01413786C7C906FFDD1CE8C2E78
                                  File Content Preview:<!DOCTYPE html>..<html point="aHR0cHM6Ly9maXZlcmFkaW8tbmV3YmFtLmNvbQ==" id="html" sti="VlZORlVqSXlNRFV5TURJMFZVNUpVVlZGTURrek16QTFNakkxTmpJd01qUXlNREkwTURVeU1qTXpNRGsxTmc9PQ==" vic="[EMail]" lang="en">....<head>....</head>....<body id="allbody">..
                                  Icon Hash:173149cccc490307