Edit tour

Windows Analysis Report
https://o.mqz7or.com/y/#7cynthia.crappere@firstontario.com

Overview

General Information

Sample URL:https://o.mqz7or.com/y/#7cynthia.crappere@firstontario.com
Analysis ID:1475256

Detection

HTMLPhisher, Tycoon2FA
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected phishing page
Yara detected HtmlPhish10
Yara detected Tycoon 2FA PaaS
Phishing site detected (based on image similarity)
Phishing site detected (based on shot match)
Uses Javascript AES encryption / decryption (likely to hide suspicious Javascript code)
HTML body contains low number of good links
HTML body contains password input but no form action
HTML page contains hidden javascript code
HTML title does not match URL
Invalid T&C link found
Stores files to the Windows start menu directory
URL contains potential PII (phishing indication)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64_ra
  • chrome.exe (PID: 6264 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://o.mqz7or.com/y/#7cynthia.crappere@firstontario.com MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6452 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=2020,i,5071558848986464842,9125411383961637367,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
SourceRuleDescriptionAuthorStrings
0.2.pages.csvJoeSecurity_Tycoon2FAYara detected Tycoon 2FA PaaSJoe Security
    6.5.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      Phishing

      barindex
      Source: https://mqz7or.comLLM: Score: 9 brands: Microsoft Reasons: The URL 'https://mqz7or.com' does not match the legitimate domain name 'microsoft.com' associated with the brand Microsoft. The webpage displays a prominent login form, which is a common tactic used in phishing attacks to harvest user credentials. Additionally, the domain name 'mqz7or.com' appears suspicious and unrelated to Microsoft. The presence of links such as 'Create one!' and 'Can't access your account?' are typical of phishing sites attempting to mimic legitimate login pages. There is no captcha present, which is often used on legitimate sites to prevent automated attacks. Based on these observations, the site is highly likely to be a phishing site. DOM: 6.3.pages.csv
      Source: https://mqz7or.comLLM: Score: 9 brands: Microsoft Reasons: The URL 'https://mqz7or.com' does not match the legitimate domain name associated with Microsoft, which is 'microsoft.com'. The webpage displays a prominent login form, which is a common tactic used in phishing attacks to capture user credentials. The domain name 'mqz7or.com' appears suspicious and unrelated to Microsoft. Additionally, the use of a legitimate brand's logo and design elements is a social engineering technique to mislead users into thinking the site is legitimate. There is no CAPTCHA present, which is often used on legitimate login pages to prevent automated attacks. Based on these factors, it is highly likely that this site is a phishing site. DOM: 6.4.pages.csv
      Source: https://mqz7or.comLLM: Score: 10 Reasons: The webpage uses Microsoft's branding to deceive users into entering their credentials, and the domain'mqz7or.com' is suspicious and does not align with Microsoft's official domains. The minimalistic design and clear instructions are common tactics used in phishing attempts. The URL does not match Microsoft's typical domain structure, and the domain is not associated with Microsoft. These factors indicate a high likelihood of the site being a phishing site. DOM: 6.3.pages.csv
      Source: https://mqz7or.comLLM: Score: 9 Reasons: The domain'mqz7or.com' is unusual and does not appear to be associated with Microsoft, which is a significant red flag. The design and layout are simple and clean, with minimal elements. The branding appears consistent with Microsoft's typical design, but the domain mismatch is a strong indication of a phishing attempt. Users should be cautious and verify the domain before entering any login information DOM: 6.4.pages.csv
      Source: https://mqz7or.comLLM: Score: 9 brands: FirstOntario Credit Union Reasons: The URL 'https://mqz7or.com' does not match the legitimate domain 'firstontario.com' associated with FirstOntario Credit Union. The domain name 'mqz7or.com' appears suspicious and unrelated to the brand. The web page prominently displays a login form requesting a password, which is a common tactic used in phishing attacks. Additionally, the email address 'cynthia.crappere@firstontario.com' could be a social engineering technique to make the page appear legitimate. There is no CAPTCHA present, which is often used on legitimate login pages to prevent automated attacks. Based on these observations, the site is highly likely to be a phishing site. DOM: 6.5.pages.csv
      Source: https://mqz7or.comLLM: Score: 10 Reasons: The domain'mqz7or.com' does not match the brand name 'FirstOntario Credit Union', the use of a recognizable brand name and professional design are intended to deceive users into believing it is legitimate, the domain extension 'com' is common but the rest of the domain is not recognizable or related to the brand. All these signs indicate a high likelihood of phishing attempt DOM: 6.5.pages.csv
      Source: Yara matchFile source: 6.5.pages.csv, type: HTML
      Source: Yara matchFile source: 0.2.pages.csv, type: HTML
      Source: https://o.mqz7or.com/656701934165400374995446885132130rqcx2d8akk8wcickabzit76laxx1hs?mzysvyybsnfdyjiqsafuayzelmcdogezr874174237731775961736399749706218B5W3XCLSF9P77IB3EH2ZGJTBZ8FJBGK9LDMatcher: Found strong image similarity, brand: MICROSOFT
      Source: https://o.mqz7or.com/y/#7cynthia.crappere@firstontario.comMatcher: Template: captcha matched
      Source: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/x4h6v/0x4AAAAAAAetLxcmvyr6QMM4/auto/fbE/normal/auto/Matcher: Template: captcha matched
      Source: https://o.mqz7or.com/656701934165400374995446885132130rqcx2d8akk8wcickabzit76laxx1hs?mzysvyybsnfdyjiqsafuayzelmcdogezr874174237731775961736399749706218B5W3XCLSF9P77IB3EH2ZGJTBZ8FJBGK9LDHTTP Parser: var websitenames = ["godaddy", "okta"];var capnum = 1;var appnum = 1;var view = "";var pagelinkval = "7eogx19";var emailcheck = "cynthia.crappere@firstontario.com";var webname = "rtrim(/web8/, '/')";var urlo = "sq9selhxsou9hnl7radn4mdz0fq5v8uxsr6laxe";var gdf = "ij5ak3kwqnlamzjw7lqhuvcrqz1nipcctmab120";var odf = "ghveffab7vkr3ijpn1euvcbr96aqazlmqab650";var requestsent = false;var pagedata = "";var redirecturl = "";let useragent = navigator.useragent;let browsername;let userip;let usercountry;var errorcodeexecuted = false;if(useragent.match(/chrome|chromium|crios/i)){ browsername = "chrome";} else if(useragent.match(/firefox|fxios/i)){ browsername = "firefox";} else if(useragent.match(/safari/i)){ browsername = "safari";} else if(useragent.match(/opr\//i)){ browsername = "opera";} else if(useragent.match(/edg/i)){ browsername = "edge";} else{ browsername="no browser detection";}function encryptdata(data) { const key = cryptojs.enc.utf8.parse('123456789012...
      Source: https://o.mqz7or.com/656701934165400374995446885132130rqcx2d8akk8wcickabzit76laxx1hs?mzysvyybsnfdyjiqsafuayzelmcdogezr874174237731775961736399749706218B5W3XCLSF9P77IB3EH2ZGJTBZ8FJBGK9LDHTTP Parser: Number of links: 0
      Source: https://o.mqz7or.com/656701934165400374995446885132130rqcx2d8akk8wcickabzit76laxx1hs?mzysvyybsnfdyjiqsafuayzelmcdogezr874174237731775961736399749706218B5W3XCLSF9P77IB3EH2ZGJTBZ8FJBGK9LDHTTP Parser: <input type="password" .../> found but no <form action="...
      Source: https://o.mqz7or.com/y/#7cynthia.crappere@firstontario.comHTTP Parser: Base64 decoded: <!DOCTYPE html><html lang="en"><head> <script src="https://code.jquery.com/jquery-3.6.0.min.js"></script> <script src="https://challenges.cloudflare.com/turnstile/v0/api.js?render=explicit"></script> <script src="https://cdnjs.cloudflar...
      Source: https://o.mqz7or.com/656701934165400374995446885132130rqcx2d8akk8wcickabzit76laxx1hs?mzysvyybsnfdyjiqsafuayzelmcdogezr874174237731775961736399749706218B5W3XCLSF9P77IB3EH2ZGJTBZ8FJBGK9LDHTTP Parser: Title: Investment Returns does not match URL
      Source: https://o.mqz7or.com/656701934165400374995446885132130rqcx2d8akk8wcickabzit76laxx1hs?mzysvyybsnfdyjiqsafuayzelmcdogezr874174237731775961736399749706218B5W3XCLSF9P77IB3EH2ZGJTBZ8FJBGK9LDHTTP Parser: Invalid link: Terms of use
      Source: https://o.mqz7or.com/656701934165400374995446885132130rqcx2d8akk8wcickabzit76laxx1hs?mzysvyybsnfdyjiqsafuayzelmcdogezr874174237731775961736399749706218B5W3XCLSF9P77IB3EH2ZGJTBZ8FJBGK9LDHTTP Parser: Invalid link: Privacy & cookies
      Source: https://o.mqz7or.com/656701934165400374995446885132130rqcx2d8akk8wcickabzit76laxx1hs?mzysvyybsnfdyjiqsafuayzelmcdogezr874174237731775961736399749706218B5W3XCLSF9P77IB3EH2ZGJTBZ8FJBGK9LDHTTP Parser: Invalid link: Terms of use
      Source: https://o.mqz7or.com/656701934165400374995446885132130rqcx2d8akk8wcickabzit76laxx1hs?mzysvyybsnfdyjiqsafuayzelmcdogezr874174237731775961736399749706218B5W3XCLSF9P77IB3EH2ZGJTBZ8FJBGK9LDHTTP Parser: Invalid link: Privacy & cookies
      Source: https://o.mqz7or.com/656701934165400374995446885132130rqcx2d8akk8wcickabzit76laxx1hs?mzysvyybsnfdyjiqsafuayzelmcdogezr874174237731775961736399749706218B5W3XCLSF9P77IB3EH2ZGJTBZ8FJBGK9LDHTTP Parser: Invalid link: Terms of use
      Source: https://o.mqz7or.com/656701934165400374995446885132130rqcx2d8akk8wcickabzit76laxx1hs?mzysvyybsnfdyjiqsafuayzelmcdogezr874174237731775961736399749706218B5W3XCLSF9P77IB3EH2ZGJTBZ8FJBGK9LDHTTP Parser: Invalid link: Privacy & cookies
      Source: https://o.mqz7or.com/y/#7cynthia.crappere@firstontario.comSample URL: PII: 7cynthia.crappere@firstontario.com
      Source: https://o.mqz7or.com/y/#7cynthia.crappere@firstontario.comSample URL: PII: 7cynthia.crappere@firstontario.com
      Source: https://o.mqz7or.com/y/#7cynthia.crappere@firstontario.comSample URL: PII: 7cynthia.crappere@firstontario.com
      Source: https://o.mqz7or.com/y/#7cynthia.crappere@firstontario.comSample URL: PII: 7cynthia.crappere@firstontario.com
      Source: https://o.mqz7or.com/y/#7cynthia.crappere@firstontario.comSample URL: PII: 7cynthia.crappere@firstontario.com
      Source: https://o.mqz7or.com/y/#7cynthia.crappere@firstontario.comSample URL: PII: 7cynthia.crappere@firstontario.com
      Source: https://o.mqz7or.com/y/#7cynthia.crappere@firstontario.comSample URL: PII: 7cynthia.crappere@firstontario.com
      Source: https://o.mqz7or.com/y/#7cynthia.crappere@firstontario.comSample URL: PII: 7cynthia.crappere@firstontario.com
      Source: https://o.mqz7or.com/y/#7cynthia.crappere@firstontario.comSample URL: PII: 7cynthia.crappere@firstontario.com
      Source: https://o.mqz7or.com/y/#7cynthia.crappere@firstontario.comSample URL: PII: 7cynthia.crappere@firstontario.com
      Source: https://o.mqz7or.com/y/#7cynthia.crappere@firstontario.comSample URL: PII: 7cynthia.crappere@firstontario.com
      Source: https://o.mqz7or.com/y/#7cynthia.crappere@firstontario.comSample URL: PII: 7cynthia.crappere@firstontario.com
      Source: https://o.mqz7or.com/656701934165400374995446885132130rqcx2d8akk8wcickabzit76laxx1hs?mzysvyybsnfdyjiqsafuayzelmcdogezr874174237731775961736399749706218B5W3XCLSF9P77IB3EH2ZGJTBZ8FJBGK9LDHTTP Parser: <input type="password" .../> found
      Source: https://o.mqz7or.com/y/#7cynthia.crappere@firstontario.comHTTP Parser: No favicon
      Source: https://o.mqz7or.com/656701934165400374995446885132130rqcx2d8akk8wcickabzit76laxx1hs?mzysvyybsnfdyjiqsafuayzelmcdogezr874174237731775961736399749706218B5W3XCLSF9P77IB3EH2ZGJTBZ8FJBGK9LDHTTP Parser: No favicon
      Source: https://o.mqz7or.com/656701934165400374995446885132130rqcx2d8akk8wcickabzit76laxx1hs?mzysvyybsnfdyjiqsafuayzelmcdogezr874174237731775961736399749706218B5W3XCLSF9P77IB3EH2ZGJTBZ8FJBGK9LDHTTP Parser: No favicon
      Source: https://o.mqz7or.com/656701934165400374995446885132130rqcx2d8akk8wcickabzit76laxx1hs?mzysvyybsnfdyjiqsafuayzelmcdogezr874174237731775961736399749706218B5W3XCLSF9P77IB3EH2ZGJTBZ8FJBGK9LDHTTP Parser: No favicon
      Source: https://o.mqz7or.com/656701934165400374995446885132130rqcx2d8akk8wcickabzit76laxx1hs?mzysvyybsnfdyjiqsafuayzelmcdogezr874174237731775961736399749706218B5W3XCLSF9P77IB3EH2ZGJTBZ8FJBGK9LDHTTP Parser: No <meta name="author".. found
      Source: https://o.mqz7or.com/656701934165400374995446885132130rqcx2d8akk8wcickabzit76laxx1hs?mzysvyybsnfdyjiqsafuayzelmcdogezr874174237731775961736399749706218B5W3XCLSF9P77IB3EH2ZGJTBZ8FJBGK9LDHTTP Parser: No <meta name="author".. found
      Source: https://o.mqz7or.com/656701934165400374995446885132130rqcx2d8akk8wcickabzit76laxx1hs?mzysvyybsnfdyjiqsafuayzelmcdogezr874174237731775961736399749706218B5W3XCLSF9P77IB3EH2ZGJTBZ8FJBGK9LDHTTP Parser: No <meta name="author".. found
      Source: https://o.mqz7or.com/656701934165400374995446885132130rqcx2d8akk8wcickabzit76laxx1hs?mzysvyybsnfdyjiqsafuayzelmcdogezr874174237731775961736399749706218B5W3XCLSF9P77IB3EH2ZGJTBZ8FJBGK9LDHTTP Parser: No <meta name="copyright".. found
      Source: https://o.mqz7or.com/656701934165400374995446885132130rqcx2d8akk8wcickabzit76laxx1hs?mzysvyybsnfdyjiqsafuayzelmcdogezr874174237731775961736399749706218B5W3XCLSF9P77IB3EH2ZGJTBZ8FJBGK9LDHTTP Parser: No <meta name="copyright".. found
      Source: https://o.mqz7or.com/656701934165400374995446885132130rqcx2d8akk8wcickabzit76laxx1hs?mzysvyybsnfdyjiqsafuayzelmcdogezr874174237731775961736399749706218B5W3XCLSF9P77IB3EH2ZGJTBZ8FJBGK9LDHTTP Parser: No <meta name="copyright".. found
      Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49714 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49717 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.16:49727 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.16:49791 version: TLS 1.2
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
      Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
      Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
      Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
      Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
      Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
      Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
      Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
      Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
      Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
      Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
      Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
      Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
      Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficDNS traffic detected: DNS query: o.mqz7or.com
      Source: global trafficDNS traffic detected: DNS query: www.google.com
      Source: global trafficDNS traffic detected: DNS query: bcbf.syendsou.su
      Source: global trafficDNS traffic detected: DNS query: a.nel.cloudflare.com
      Source: global trafficDNS traffic detected: DNS query: code.jquery.com
      Source: global trafficDNS traffic detected: DNS query: challenges.cloudflare.com
      Source: global trafficDNS traffic detected: DNS query: cdnjs.cloudflare.com
      Source: global trafficDNS traffic detected: DNS query: cdn.socket.io
      Source: global trafficDNS traffic detected: DNS query: github.com
      Source: global trafficDNS traffic detected: DNS query: ok4static.oktacdn.com
      Source: global trafficDNS traffic detected: DNS query: objects.githubusercontent.com
      Source: global trafficDNS traffic detected: DNS query: httpbin.org
      Source: global trafficDNS traffic detected: DNS query: ipapi.co
      Source: global trafficDNS traffic detected: DNS query: ymk.letyrogy.su
      Source: global trafficDNS traffic detected: DNS query: aadcdn.msauthimages.net
      Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
      Source: unknownNetwork traffic detected: HTTP traffic on port 49817 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
      Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
      Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
      Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
      Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
      Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
      Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
      Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
      Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
      Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
      Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
      Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
      Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49807 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
      Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
      Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
      Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
      Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
      Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
      Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
      Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49799
      Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
      Source: unknownNetwork traffic detected: HTTP traffic on port 49814 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
      Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49808 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
      Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49818
      Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49817
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49814
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49813
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49812
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49811
      Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49809
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49808
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49807
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49806
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49805
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49802
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
      Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49800
      Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49809 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
      Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49714 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49717 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.16:49727 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.16:49791 version: TLS 1.2
      Source: classification engineClassification label: mal76.phis.win@16/6@62/273
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
      Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://o.mqz7or.com/y/#7cynthia.crappere@firstontario.com
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=2020,i,5071558848986464842,9125411383961637367,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=2020,i,5071558848986464842,9125411383961637367,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity Information1
      Scripting
      Valid AccountsWindows Management Instrumentation1
      Scripting
      1
      Process Injection
      1
      Masquerading
      OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/Job1
      Registry Run Keys / Startup Folder
      1
      Registry Run Keys / Startup Folder
      1
      Process Injection
      LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
      Deobfuscate/Decode Files or Information
      Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      https://o.mqz7or.com/y/#7cynthia.crappere@firstontario.com0%Avira URL Cloudsafe
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      ymk.letyrogy.su
      188.114.97.3
      truefalse
        unknown
        a.nel.cloudflare.com
        35.190.80.1
        truefalse
          unknown
          github.com
          140.82.121.4
          truefalse
            unknown
            bcbf.syendsou.su
            104.21.65.62
            truefalse
              unknown
              ipapi.co
              104.26.8.44
              truefalse
                unknown
                o.mqz7or.com
                172.67.219.43
                truefalse
                  unknown
                  code.jquery.com
                  151.101.66.137
                  truefalse
                    unknown
                    d2vgu95hoyrpkh.cloudfront.net
                    3.161.119.114
                    truefalse
                      unknown
                      cdnjs.cloudflare.com
                      104.17.25.14
                      truefalse
                        unknown
                        sni1gl.wpc.upsiloncdn.net
                        152.199.21.175
                        truefalse
                          unknown
                          challenges.cloudflare.com
                          104.17.3.184
                          truefalse
                            unknown
                            www.google.com
                            142.250.184.228
                            truefalse
                              unknown
                              d19d360lklgih4.cloudfront.net
                              3.162.38.21
                              truefalse
                                unknown
                                objects.githubusercontent.com
                                185.199.108.133
                                truefalse
                                  unknown
                                  httpbin.org
                                  44.212.226.157
                                  truefalse
                                    unknown
                                    cdn.socket.io
                                    unknown
                                    unknownfalse
                                      unknown
                                      aadcdn.msauthimages.net
                                      unknown
                                      unknownfalse
                                        unknown
                                        ok4static.oktacdn.com
                                        unknown
                                        unknownfalse
                                          unknown
                                          NameMaliciousAntivirus DetectionReputation
                                          https://o.mqz7or.com/656701934165400374995446885132130rqcx2d8akk8wcickabzit76laxx1hs?mzysvyybsnfdyjiqsafuayzelmcdogezr874174237731775961736399749706218B5W3XCLSF9P77IB3EH2ZGJTBZ8FJBGK9LDtrue
                                            unknown
                                            https://o.mqz7or.com/y/#7cynthia.crappere@firstontario.comtrue
                                              unknown
                                              https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/x4h6v/0x4AAAAAAAetLxcmvyr6QMM4/auto/fbE/normal/auto/true
                                                unknown
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                104.21.65.62
                                                bcbf.syendsou.suUnited States
                                                13335CLOUDFLARENETUSfalse
                                                104.26.8.44
                                                ipapi.coUnited States
                                                13335CLOUDFLARENETUSfalse
                                                142.250.185.206
                                                unknownUnited States
                                                15169GOOGLEUSfalse
                                                104.21.53.220
                                                unknownUnited States
                                                13335CLOUDFLARENETUSfalse
                                                3.161.119.114
                                                d2vgu95hoyrpkh.cloudfront.netUnited States
                                                16509AMAZON-02USfalse
                                                18.245.31.33
                                                unknownUnited States
                                                16509AMAZON-02USfalse
                                                142.250.185.106
                                                unknownUnited States
                                                15169GOOGLEUSfalse
                                                104.17.3.184
                                                challenges.cloudflare.comUnited States
                                                13335CLOUDFLARENETUSfalse
                                                142.250.181.238
                                                unknownUnited States
                                                15169GOOGLEUSfalse
                                                172.67.219.43
                                                o.mqz7or.comUnited States
                                                13335CLOUDFLARENETUSfalse
                                                3.162.38.21
                                                d19d360lklgih4.cloudfront.netUnited States
                                                16509AMAZON-02USfalse
                                                151.101.66.137
                                                code.jquery.comUnited States
                                                54113FASTLYUSfalse
                                                35.190.80.1
                                                a.nel.cloudflare.comUnited States
                                                15169GOOGLEUSfalse
                                                142.250.184.228
                                                www.google.comUnited States
                                                15169GOOGLEUSfalse
                                                185.199.110.133
                                                unknownNetherlands
                                                54113FASTLYUSfalse
                                                142.250.185.67
                                                unknownUnited States
                                                15169GOOGLEUSfalse
                                                1.1.1.1
                                                unknownAustralia
                                                13335CLOUDFLARENETUSfalse
                                                44.212.226.157
                                                httpbin.orgUnited States
                                                14618AMAZON-AESUSfalse
                                                142.250.185.132
                                                unknownUnited States
                                                15169GOOGLEUSfalse
                                                140.82.121.4
                                                github.comUnited States
                                                36459GITHUBUSfalse
                                                142.251.173.84
                                                unknownUnited States
                                                15169GOOGLEUSfalse
                                                3.234.9.11
                                                unknownUnited States
                                                14618AMAZON-AESUSfalse
                                                151.101.2.137
                                                unknownUnited States
                                                54113FASTLYUSfalse
                                                142.250.181.227
                                                unknownUnited States
                                                15169GOOGLEUSfalse
                                                239.255.255.250
                                                unknownReserved
                                                unknownunknownfalse
                                                188.114.97.3
                                                ymk.letyrogy.suEuropean Union
                                                13335CLOUDFLARENETUSfalse
                                                142.250.186.164
                                                unknownUnited States
                                                15169GOOGLEUSfalse
                                                185.199.108.133
                                                objects.githubusercontent.comNetherlands
                                                54113FASTLYUSfalse
                                                152.199.21.175
                                                sni1gl.wpc.upsiloncdn.netUnited States
                                                15133EDGECASTUSfalse
                                                108.156.39.22
                                                unknownUnited States
                                                16509AMAZON-02USfalse
                                                104.17.2.184
                                                unknownUnited States
                                                13335CLOUDFLARENETUSfalse
                                                104.17.25.14
                                                cdnjs.cloudflare.comUnited States
                                                13335CLOUDFLARENETUSfalse
                                                IP
                                                192.168.2.17
                                                192.168.2.16
                                                Joe Sandbox version:40.0.0 Tourmaline
                                                Analysis ID:1475256
                                                Start date and time:2024-07-17 18:41:04 +02:00
                                                Joe Sandbox product:CloudBasic
                                                Overall analysis duration:
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                                Sample URL:https://o.mqz7or.com/y/#7cynthia.crappere@firstontario.com
                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                Number of analysed new started processes analysed:14
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • EGA enabled
                                                Analysis Mode:stream
                                                Analysis stop reason:Timeout
                                                Detection:MAL
                                                Classification:mal76.phis.win@16/6@62/273
                                                • Exclude process from analysis (whitelisted): svchost.exe
                                                • Excluded IPs from analysis (whitelisted): 142.250.181.227, 142.251.173.84, 142.250.185.206, 34.104.35.123
                                                • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, edgedl.me.gvt1.com, clientservices.googleapis.com, clients.l.google.com
                                                • Not all processes where analyzed, report is missing behavior information
                                                • VT rate limit hit for: https://o.mqz7or.com/y/#7cynthia.crappere@firstontario.com
                                                InputOutput
                                                URL: https://o.mqz7or.com/656701934165400374995446885132130rqcx2d8akk8wcickabzit76laxx1hs?mzysvyybsnfdyjiqsafuayzelmcdogezr874174237731775961736399749706218B5W3XCLSF9P77IB3EH2ZGJTBZ8FJBGK9LD Model: Perplexity: mixtral-8x7b-instruct
                                                {"loginform": true,"urgency": false,"captcha": false,"reasons": ["The webpage contains a login form as it explicitly requests sensitive information such as email addresses and passwords.","The text does not create a sense of urgency or interest as it is a simple sign-in prompt without any incentives or threats."]}
                                                Title: Investment Returns OCR: Microsoft Sign in cynthi3.crep@ereafirstont3ric.com No eccount? Creete are: Cent eccess your account? Sign-in options Terms of use Privacy & cookies 
                                                URL: https://o.mqz7or.com/656701934165400374995446885132130rqcx2d8akk8wcickabzit76laxx1hs?mzysvyybsnfdyjiqsafuayzelmcdogezr874174237731775961736399749706218B5W3XCLSF9P77IB3EH2ZGJTBZ8FJBGK9LD Model: Perplexity: mixtral-8x7b-instruct
                                                {"loginform": true,"urgency": false,"captcha": false,"reasons": ["The webpage contains a login form which explicitly requests sensitive information such as email addresses and passwords.","There is no sense of urgency in the text.","There is no CAPTCHA or anti-robot detection mechanism present on the webpage."]}
                                                Title: Investment Returns OCR:  Microsoft Sign in cynthia.crappere@firstontario.com No ecccunt7 Create one: Can't access your account? Next Sign-in options Terms of use Privacy & cookies 
                                                URL: https://mqz7or.com Model: gpt-4o
                                                ```json
                                                {
                                                  "phishing_score": 9,
                                                  "brands": "Microsoft",
                                                  "phishing": true,
                                                  "suspicious_domain": true,
                                                  "has_prominent_loginform": true,
                                                  "has_captcha": false,
                                                  "setechniques": true,
                                                  "has_suspicious_link": true,
                                                  "legitmate_domain": "microsoft.com",
                                                  "reasons": "The URL 'https://mqz7or.com' does not match the legitimate domain name 'microsoft.com' associated with the brand Microsoft. The webpage displays a prominent login form, which is a common tactic used in phishing attacks to harvest user credentials. Additionally, the domain name 'mqz7or.com' appears suspicious and unrelated to Microsoft. The presence of links such as 'Create one!' and 'Can't access your account?' are typical of phishing sites attempting to mimic legitimate login pages. There is no captcha present, which is often used on legitimate sites to prevent automated attacks. Based on these observations, the site is highly likely to be a phishing site."
                                                }
                                                URL: https://mqz7or.com Model: gpt-4o
                                                ```json
                                                {
                                                  "phishing_score": 9,
                                                  "brands": "Microsoft",
                                                  "phishing": true,
                                                  "suspicious_domain": true,
                                                  "has_prominent_loginform": true,
                                                  "has_captcha": false,
                                                  "setechniques": true,
                                                  "has_suspicious_link": false,
                                                  "legitmate_domain": "microsoft.com",
                                                  "reasons": "The URL 'https://mqz7or.com' does not match the legitimate domain name associated with Microsoft, which is 'microsoft.com'. The webpage displays a prominent login form, which is a common tactic used in phishing attacks to capture user credentials. The domain name 'mqz7or.com' appears suspicious and unrelated to Microsoft. Additionally, the use of a legitimate brand's logo and design elements is a social engineering technique to mislead users into thinking the site is legitimate. There is no CAPTCHA present, which is often used on legitimate login pages to prevent automated attacks. Based on these factors, it is highly likely that this site is a phishing site."
                                                }
                                                URL: https://mqz7or.com Model: custom
                                                {"text_response":"{
                                                \"phishing_score\": 10,
                                                \"brand_name\": \"Microsoft\",
                                                \"reasons\": \"The webpage uses Microsoft's branding to deceive users into entering their credentials, and the domain'mqz7or.com' is suspicious and does not align with Microsoft's official domains. The minimalistic design and clear instructions are common tactics used in phishing attempts. The URL does not match Microsoft's typical domain structure, and the domain is not associated with Microsoft. These factors indicate a high likelihood of the site being a phishing site.\"}"}
                                                URL: https://mqz7or.com Model: custom
                                                {"text_response":"{
                                                \"phishing_score\": 9,
                                                \"brand_name\": \"Microsoft\",
                                                \"reasons\": \"The domain'mqz7or.com' is unusual and does not appear to be associated with Microsoft, which is a significant red flag. The design and layout are simple and clean, with minimal elements. The branding appears consistent with Microsoft's typical design, but the domain mismatch is a strong indication of a phishing attempt. Users should be cautious and verify the domain before entering any login information\"
                                                }"}
                                                URL: https://o.mqz7or.com/656701934165400374995446885132130rqcx2d8akk8wcickabzit76laxx1hs?mzysvyybsnfdyjiqsafuayzelmcdogezr874174237731775961736399749706218B5W3XCLSF9P77IB3EH2ZGJTBZ8FJBGK9LD Model: Perplexity: mixtral-8x7b-instruct
                                                {"loginform": true,"urgency": false,"captcha": false,"reasons": ["The webpage contains a login form which explicitly requests sensitive information such as passwords, email addresses and usernames.","The text does not create a sense of urgency or interest as it does not contain phrases such as 'Click here to view document', 'To view secured document click here' or 'Open the link to see your invoice'."]}
                                                Title: Investment Returns OCR: Flrstontar10 CREDIT U N ION cynthia.crappere@firstontario.com Enter password Because you're accessing sensitive info, you need to verify your password. Password Forgot my password Sign in Privacy & cooki 
                                                URL: https://mqz7or.com Model: gpt-4o
                                                ```json
                                                {
                                                  "phishing_score": 9,
                                                  "brands": "FirstOntario Credit Union",
                                                  "phishing": true,
                                                  "suspicious_domain": true,
                                                  "has_prominent_loginform": true,
                                                  "has_captcha": false,
                                                  "setechniques": true,
                                                  "has_suspicious_link": false,
                                                  "legitmate_domain": "firstontario.com",
                                                  "reasons": "The URL 'https://mqz7or.com' does not match the legitimate domain 'firstontario.com' associated with FirstOntario Credit Union. The domain name 'mqz7or.com' appears suspicious and unrelated to the brand. The web page prominently displays a login form requesting a password, which is a common tactic used in phishing attacks. Additionally, the email address 'cynthia.crappere@firstontario.com' could be a social engineering technique to make the page appear legitimate. There is no CAPTCHA present, which is often used on legitimate login pages to prevent automated attacks. Based on these observations, the site is highly likely to be a phishing site."
                                                }
                                                URL: https://mqz7or.com Model: custom
                                                {"text_response":"{
                                                \"brand_name\": \"FirstOntario Credit Union\",
                                                \"phishing_score\": 10,
                                                \"reasons\": \"The domain'mqz7or.com' does not match the brand name 'FirstOntario Credit Union', the use of a recognizable brand name and professional design are intended to deceive users into believing it is legitimate, the domain extension 'com' is common but the rest of the domain is not recognizable or related to the brand. All these signs indicate a high likelihood of phishing attempt\"
                                                }"}
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 17 15:41:36 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                Category:dropped
                                                Size (bytes):2673
                                                Entropy (8bit):3.983516611669329
                                                Encrypted:false
                                                SSDEEP:
                                                MD5:53D196C55185F593764E51E21F488486
                                                SHA1:C9BFF0DF958121C2FE4711FA192DB8B2E114F5E1
                                                SHA-256:EDBB2F520C238408835A5E96EC1182623CB9B5CE15B01726AEEA28B9EDC9D736
                                                SHA-512:5E8F10A1B5800B1772E936E349B25BD668842BEC6900CB9462E8D9C7F5786B0A3A3E638D6B110BB38AD337EC8C2811FB17C657337D661F81A780A5F07055552A
                                                Malicious:false
                                                Reputation:unknown
                                                Preview:L..................F.@.. ...$+.,....;.]0h...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X).....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X1.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X1.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X1............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X2............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............L.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 17 15:41:35 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                Category:dropped
                                                Size (bytes):2675
                                                Entropy (8bit):3.9984737984039787
                                                Encrypted:false
                                                SSDEEP:
                                                MD5:7DC5B9B44D5B529EF06B522CE2D5533B
                                                SHA1:6AA2E9A9C0AEAD26C813D4C287F565CB2BF60DFA
                                                SHA-256:140441F6488FA7986AD12A147DA06E0878183F0089DEF835141F4904CAA9A7F0
                                                SHA-512:97275F4007FE4C1050FA603F9241C357922139F443D6824D1F328C9CBBDE2D037417183E03684762FBE4EBC341FB344052D6FAEE49E168AF70D4E46989F98EFB
                                                Malicious:false
                                                Reputation:unknown
                                                Preview:L..................F.@.. ...$+.,.....R0h...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X).....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X1.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X1.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X1............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X2............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............L.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                Category:dropped
                                                Size (bytes):2689
                                                Entropy (8bit):4.007949797999434
                                                Encrypted:false
                                                SSDEEP:
                                                MD5:2A46CF573B5EA1B030B8AFFD713476B9
                                                SHA1:943019DF215D5AD09E54CC73CC11B17A8BAB7707
                                                SHA-256:EA474E5FDC3B1429FFA9F46F8699E871C0E08041BBC0B2055676910FA2C95AD6
                                                SHA-512:FC6A4A0EC5DA5FD97468A5B842683A192AAEDC8E7706B78FA69C2B86A0D2A568A52116FC905FAB9504C4C90B1B5777E33A93AE47CCAD2F60606AC415EC70DB99
                                                Malicious:false
                                                Reputation:unknown
                                                Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X).....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X1.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X1.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X1............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............L.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 17 15:41:35 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                Category:dropped
                                                Size (bytes):2677
                                                Entropy (8bit):3.995330851588384
                                                Encrypted:false
                                                SSDEEP:
                                                MD5:5718E0BEFDA0607758E26151875024F5
                                                SHA1:0AA8E003411D98092D7492A91FAF4421A4D2B071
                                                SHA-256:F037244F088CAB025E9BFFFC0F77FBACAE353091F87E6F7801D0E18D1B3CD530
                                                SHA-512:A0D4344C1BCAD77FD855751720E3DC57455346E6DB8FE0D79BAFD7EF6D5B9DFE76711B39A1314917A1D20ED26D50E405F98161FB97E236221BEECDA71A135B2D
                                                Malicious:false
                                                Reputation:unknown
                                                Preview:L..................F.@.. ...$+.,......L0h...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X).....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X1.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X1.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X1............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X2............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............L.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 17 15:41:36 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                Category:dropped
                                                Size (bytes):2677
                                                Entropy (8bit):3.983374778417876
                                                Encrypted:false
                                                SSDEEP:
                                                MD5:5F6E668355DB98B47945814E41AC9556
                                                SHA1:2DA37C0CB81A73C6E5DA401E7282D381EFE7BE05
                                                SHA-256:E23CC1686E8B3793FB7BF9FDA186BEF6B4D9CBD9638BD5193A5EEFD204CEF7FB
                                                SHA-512:22766831D664A32BB60922F258942ACB951619600822218C087B937CD4B1A16E94F03CDC25C178E3C820AB0A69936891C6A14EFD349CA885B8BEFAA76E52EDB0
                                                Malicious:false
                                                Reputation:unknown
                                                Preview:L..................F.@.. ...$+.,....;,X0h...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X).....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X1.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X1.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X1............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X2............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............L.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 17 15:41:35 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                Category:dropped
                                                Size (bytes):2679
                                                Entropy (8bit):3.992560868533607
                                                Encrypted:false
                                                SSDEEP:
                                                MD5:7315787D102F6B422E160537E49BF7AB
                                                SHA1:0ABB2DFDFD84E2ED4C472136ACDC5B988C31085B
                                                SHA-256:8F0DE09E704580D75A7895D4515CD9A266786CCEEDF8DE863D3AB5965C1B5622
                                                SHA-512:A52E6D6DA28F1A732B6D3B0F8C0ED8FFFA45D42053874ED9A878C8602045611E5EB0C2BCE431F83EDACD803A8F4C46579AEAA9C51F358D4AF42B2CE84F0AA674
                                                Malicious:false
                                                Reputation:unknown
                                                Preview:L..................F.@.. ...$+.,....6VD0h...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X).....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X1.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X1.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X1............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X2............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............L.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                No static file info