Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://site.ntesmail.com/product/1187170.html?mid=2caa3bb1-3cd6-46c4-9828-8457a4681228&bid=yKt9XNNayY6RSE0qNd-iOW-ITnKtRMrSmlFD82EPrWTl2AEuuQNDG3I4hI1dqYvXSf9sVu1aC4OB8qO77Xqqlw&cid=site%5C_ngxvLcIm8CN043WgmaKV5L8RaPSew%5C_ZtFhCGFVcL5br4ylTP5Zdst1weTlirIWGR

Overview

General Information

Sample URL:https://site.ntesmail.com/product/1187170.html?mid=2caa3bb1-3cd6-46c4-9828-8457a4681228&bid=yKt9XNNayY6RSE0qNd-iOW-ITnKtRMrSmlFD82EPrWTl2AEuuQNDG3I4hI1dqYvXSf9sVu1aC4OB8qO77Xqqlw&cid=site%5C_ngxvLcIm8
Analysis ID:1504862

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 6852 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://site.ntesmail.com/product/1187170.html?mid=2caa3bb1-3cd6-46c4-9828-8457a4681228&bid=yKt9XNNayY6RSE0qNd-iOW-ITnKtRMrSmlFD82EPrWTl2AEuuQNDG3I4hI1dqYvXSf9sVu1aC4OB8qO77Xqqlw&cid=site%5C_ngxvLcIm8CN043WgmaKV5L8RaPSew%5C_ZtFhCGFVcL5br4ylTP5Zdst1weTlirIWGR MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 7036 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 --field-trial-handle=1932,i,8923876068966171169,1991052651884414868,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49713 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49717 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.16:49724 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.231.128.59:443 -> 192.168.2.16:49728 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.126.31.67:443 -> 192.168.2.16:49732 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.126.31.67:443 -> 192.168.2.16:49737 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.231.128.59:443 -> 192.168.2.16:49741 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.231.128.59:443 -> 192.168.2.16:49742 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.127.240.158:443 -> 192.168.2.16:49743 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.106.86.13:443 -> 192.168.2.16:49746 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.127.240.158:443 -> 192.168.2.16:49748 version: TLS 1.2
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 4.231.128.59
Source: unknownTCP traffic detected without corresponding DNS query: 4.231.128.59
Source: unknownTCP traffic detected without corresponding DNS query: 4.231.128.59
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: global trafficDNS traffic detected: DNS query: site.ntesmail.com
Source: global trafficDNS traffic detected: DNS query: cowork-storage.nosdn.127.net
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: waimao.office.163.com
Source: global trafficDNS traffic detected: DNS query: sentry2.lx.netease.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49713 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49717 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.16:49724 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.231.128.59:443 -> 192.168.2.16:49728 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.126.31.67:443 -> 192.168.2.16:49732 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.126.31.67:443 -> 192.168.2.16:49737 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.231.128.59:443 -> 192.168.2.16:49741 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.231.128.59:443 -> 192.168.2.16:49742 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.127.240.158:443 -> 192.168.2.16:49743 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.106.86.13:443 -> 192.168.2.16:49746 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.127.240.158:443 -> 192.168.2.16:49748 version: TLS 1.2
Source: classification engineClassification label: clean0.win@13/17@18/58
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://site.ntesmail.com/product/1187170.html?mid=2caa3bb1-3cd6-46c4-9828-8457a4681228&bid=yKt9XNNayY6RSE0qNd-iOW-ITnKtRMrSmlFD82EPrWTl2AEuuQNDG3I4hI1dqYvXSf9sVu1aC4OB8qO77Xqqlw&cid=site%5C_ngxvLcIm8CN043WgmaKV5L8RaPSew%5C_ZtFhCGFVcL5br4ylTP5Zdst1weTlirIWGR
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 --field-trial-handle=1932,i,8923876068966171169,1991052651884414868,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 --field-trial-handle=1932,i,8923876068966171169,1991052651884414868,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://site.ntesmail.com/product/1187170.html?mid=2caa3bb1-3cd6-46c4-9828-8457a4681228&bid=yKt9XNNayY6RSE0qNd-iOW-ITnKtRMrSmlFD82EPrWTl2AEuuQNDG3I4hI1dqYvXSf9sVu1aC4OB8qO77Xqqlw&cid=site%5C_ngxvLcIm8CN043WgmaKV5L8RaPSew%5C_ZtFhCGFVcL5br4ylTP5Zdst1weTlirIWGR0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
sentry2.lx.netease.com
59.111.243.39
truefalse
    unknown
    www.google.com
    142.250.184.228
    truefalse
      unknown
      site.ntesmail.com.w.cdngslb.com
      47.246.24.223
      truefalse
        unknown
        cowork-storage.nosdn.127.net.w.cdngslb.com
        128.1.157.228
        truefalse
          unknown
          hwweb.qiye.ntes53.netease.com
          103.129.255.238
          truefalse
            unknown
            waimao.office.163.com
            unknown
            unknownfalse
              unknown
              cowork-storage.nosdn.127.net
              unknown
              unknownfalse
                unknown
                site.ntesmail.com
                unknown
                unknownfalse
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  https://site.ntesmail.com/product/1187170.html?mid=2caa3bb1-3cd6-46c4-9828-8457a4681228&bid=yKt9XNNayY6RSE0qNd-iOW-ITnKtRMrSmlFD82EPrWTl2AEuuQNDG3I4hI1dqYvXSf9sVu1aC4OB8qO77Xqqlw&cid=site%5C_ngxvLcIm8CN043WgmaKV5L8RaPSew%5C_ZtFhCGFVcL5br4ylTP5Zdst1weTlirIWGRfalse
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    1.1.1.1
                    unknownAustralia
                    13335CLOUDFLARENETUSfalse
                    142.250.186.170
                    unknownUnited States
                    15169GOOGLEUSfalse
                    128.1.157.228
                    cowork-storage.nosdn.127.net.w.cdngslb.comUnited States
                    21859ZNETUSfalse
                    59.111.243.39
                    sentry2.lx.netease.comChina
                    45062NETEASE-ASGuangzhouNetEaseComputerSystemCoLtdCNfalse
                    216.58.206.67
                    unknownUnited States
                    15169GOOGLEUSfalse
                    74.125.71.84
                    unknownUnited States
                    15169GOOGLEUSfalse
                    142.250.185.110
                    unknownUnited States
                    15169GOOGLEUSfalse
                    47.246.24.223
                    site.ntesmail.com.w.cdngslb.comUnited States
                    24429TAOBAOZhejiangTaobaoNetworkCoLtdCNfalse
                    163.181.92.230
                    unknownUnited States
                    24429TAOBAOZhejiangTaobaoNetworkCoLtdCNfalse
                    139.95.8.252
                    unknownUnited States
                    45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCfalse
                    239.255.255.250
                    unknownReserved
                    unknownunknownfalse
                    142.250.184.228
                    www.google.comUnited States
                    15169GOOGLEUSfalse
                    103.129.255.238
                    hwweb.qiye.ntes53.netease.comHong Kong
                    137263NETEASE-AS-APNETEASEHONGKONGLIMITEDHKfalse
                    IP
                    192.168.2.16
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1504862
                    Start date and time:2024-09-05 14:30:33 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:defaultwindowsinteractivecookbook.jbs
                    Sample URL:https://site.ntesmail.com/product/1187170.html?mid=2caa3bb1-3cd6-46c4-9828-8457a4681228&bid=yKt9XNNayY6RSE0qNd-iOW-ITnKtRMrSmlFD82EPrWTl2AEuuQNDG3I4hI1dqYvXSf9sVu1aC4OB8qO77Xqqlw&cid=site%5C_ngxvLcIm8CN043WgmaKV5L8RaPSew%5C_ZtFhCGFVcL5br4ylTP5Zdst1weTlirIWGR
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:13
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • EGA enabled
                    Analysis Mode:stream
                    Analysis stop reason:Timeout
                    Detection:CLEAN
                    Classification:clean0.win@13/17@18/58
                    • Exclude process from analysis (whitelisted): SgrmBroker.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 216.58.206.67, 142.250.185.110, 74.125.71.84, 34.104.35.123, 199.232.210.172
                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, clients2.google.com, accounts.google.com, edgedl.me.gvt1.com, ctldl.windowsupdate.com, clientservices.googleapis.com, clients.l.google.com
                    • Not all processes where analyzed, report is missing behavior information
                    • VT rate limit hit for: https://site.ntesmail.com/product/1187170.html?mid=2caa3bb1-3cd6-46c4-9828-8457a4681228&bid=yKt9XNNayY6RSE0qNd-iOW-ITnKtRMrSmlFD82EPrWTl2AEuuQNDG3I4hI1dqYvXSf9sVu1aC4OB8qO77Xqqlw&cid=site%5C_ngxvLcIm8CN043WgmaKV5L8RaPSew%5C_ZtFhCGFVcL5br4ylTP5Zdst1weTlirIWGR
                    InputOutput
                    URL: https://site.ntesmail.com/product/1187170.html?mid=2caa3bb1-3cd6-46c4-9828-8457a4681228&bid=yKt9XNNayY6RSE0qNd-iOW-ITnKtRMrSmlFD82EPrWTl2AEuuQNDG3I4hI1dqYvXSf9sVu1aC4OB8qO77Xqqlw&cid=site%5C_ngxvLcIm8CN043WgmaKV5L8RaPSew%5C_ZtFhCGFVcL5br4ylTP5Zdst1weTlirI Model: jbxai
                    {
                    "brand":["ALL Vacuum yin-yang bag",
                    "HOT Vacuum yn-yang bag",
                    "FOB"],
                    "contains_trigger_text":false,
                    "prominent_button_name":"unknown",
                    "text_input_field_labels":["unknown"],
                    "pdf_icon_visible":false,
                    "has_visible_captcha":false,
                    "has_urgent_text":false,
                    "has_visible_qrcode":false}
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Sep 5 11:31:07 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2673
                    Entropy (8bit):3.9885527239648115
                    Encrypted:false
                    SSDEEP:
                    MD5:D258939D77F52BAC43EAF2CA151648D9
                    SHA1:B09E1ED0F37E3ED8363F604954AFEC0483CB89EC
                    SHA-256:C7D0DD077F137C3311CC16EA0D69D15A3EBCB4A78A831B2D8D90BDA76CD4291C
                    SHA-512:151BCC2828E654DD72C308C6ED20ACC285E9749BCBAD85D46EBC949FBF25824991E3921CEC9360DB662D7E543EF0F35330C1441E7F8FE073BD1BB340193BCBF9
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,.....F.{....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I%Y.c....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V%Y.c....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V%Y.c....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V%Y.c..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V%Y.c...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Sep 5 11:31:07 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2675
                    Entropy (8bit):4.003147752227048
                    Encrypted:false
                    SSDEEP:
                    MD5:92FC97E33FF7E0F41F7BE27A26DD950A
                    SHA1:241DB1D24BB5D08F5B107B236837B70B96D94BEB
                    SHA-256:EEF8958A65D3C4899A0EA960ED4BBA355549EA8AFA75D80F19234860804533E3
                    SHA-512:DBE8E760CA00CBF30C44155DE47ED3645DC3E79B27D30D05E4737617F5E43641A0DE5D145AD1B63F1111E0747AE8720277639BA4920FDFF201AB45213829226A
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,.....8.{....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I%Y.c....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V%Y.c....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V%Y.c....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V%Y.c..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V%Y.c...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2689
                    Entropy (8bit):4.009880232558091
                    Encrypted:false
                    SSDEEP:
                    MD5:2DD27EF5E4A174720A015763DADFC9AE
                    SHA1:8D90555C719B5B49851D64BE60B0D39314556EE9
                    SHA-256:059C35328E529CDF8F1261037C43B231CA33CE62BA16F476B0F93637C98535B0
                    SHA-512:6FAB69F013E576552D9E39EC69B4BB0CFDD177FCB248C568A1221052288657ACFF0ECD292EC13C1E23F35D47784D9EA6EFA340CBCB015AE7C518D514E234CB79
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I%Y.c....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V%Y.c....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V%Y.c....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V%Y.c..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Sep 5 11:31:07 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2677
                    Entropy (8bit):4.003618662948481
                    Encrypted:false
                    SSDEEP:
                    MD5:00146C744DAE4BD0B0896100DDCEF964
                    SHA1:25B926B5788ACA449F2660F0574FDDBF04CB1207
                    SHA-256:7F344D7EC2FA944A2AE1B176C5D9AD0021B3CD0068807E7B271DC601FD6AE5ED
                    SHA-512:7DDF3322B6CE02427B59AAD42E19779E63B68AD226595FB78FBE38BDD94F781C484C11184CE5965CADDB6852993811B5EC40299ADDA6F535097319A20F2DB2F5
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,....+..{....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I%Y.c....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V%Y.c....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V%Y.c....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V%Y.c..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V%Y.c...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Sep 5 11:31:07 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2677
                    Entropy (8bit):3.9902510729510525
                    Encrypted:false
                    SSDEEP:
                    MD5:364A9439158545CD58F19B47212C30F5
                    SHA1:34A3CD6113F1A6A87FC972CBB3197F1A61515B10
                    SHA-256:48C9E7B6DBA12DADACC1107099C57084FA27B5EFB962FA7DC5E3D9618D8A7577
                    SHA-512:F7EF83FF419F6A09DBA1B68530A81D234F0F913F7892B61FEF30D6BD68ADAABABB1A2F9B7B50308AB7DBF0E3A9DAA6F6A9C0926DEDDC0625C2F6DAB02D5DC777
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,....-z.{....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I%Y.c....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V%Y.c....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V%Y.c....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V%Y.c..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V%Y.c...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Sep 5 11:31:06 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2679
                    Entropy (8bit):3.9992755080902382
                    Encrypted:false
                    SSDEEP:
                    MD5:D83EE20EAB1B149F0D249087C6E9BA59
                    SHA1:9C267FA6C508BB7FA29C351E26669950010A7088
                    SHA-256:F33E06819DC1B464A7E33071D9E0624665ABB986610F54AE99E01F4DBB353199
                    SHA-512:07C174BDFBC453B255E73D1FC7EA85E58AE553EEFC72F68DADF96E0CFB4C4B08D25FDD903BE592CD850677CE388E3850EF158AD490E191E4B3F0303172CF6406
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,.......{....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I%Y.c....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V%Y.c....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V%Y.c....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V%Y.c..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V%Y.c...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:JSON data
                    Category:dropped
                    Size (bytes):22
                    Entropy (8bit):3.82306798227366
                    Encrypted:false
                    SSDEEP:
                    MD5:689525EE6C812E73A44B6AA1036AB53A
                    SHA1:7350CB4703A96EA7C140BD30DA9A6D1BCFF36EB2
                    SHA-256:37EC4665A8102D115FFD1AC20DAE94C98B4DAC64B0C1A68228AA2A531CAEB35D
                    SHA-512:DA6DEFF19F0B2BF5E0EF17B3CAE34A0D44C5D48FBF9F3FFEDD00CEA74F923E1A3E9C4C926A6564C889CCA21041550F557E1EC00DB9E35502FFC794A5F9E9722E
                    Malicious:false
                    Reputation:unknown
                    Preview:{"detail":"Not Found"}
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:SVG Scalable Vector Graphics image
                    Category:downloaded
                    Size (bytes):1460
                    Entropy (8bit):4.065814852413931
                    Encrypted:false
                    SSDEEP:
                    MD5:D08ACF8D76A1065F39A11EE8847558A1
                    SHA1:CE4E976D8DAFDC33E28EBAEEC6EB546E2001CF70
                    SHA-256:DE08EB45B6008D6C2BCB25D269EF8622B23BC9D005BC9206E1DDC93AFAEB050B
                    SHA-512:9073BB53B15EC5F4B2DC438B0575776D7323CCFD5544382259EADCE035C4257F385CA100DCCC2A426073FEB7EB505439EC75702EE41D5D173B98CC5BEFDB6278
                    Malicious:false
                    Reputation:unknown
                    URL:https://site.ntesmail.com/static/alibaba.84fa3c8d.svg
                    Preview:<svg width="33" height="24" viewBox="0 0 33 24" fill="none" xmlns="http://www.w3.org/2000/svg">.<path d="M19.4115 17.5704C18.105 17.6617 18.2315 16.9628 19.0077 15.9478C20.7778 13.5876 24.0546 10.381 24.2021 8.03843C24.4058 4.99692 21.3467 4.05566 18.1963 4.05566C16.0048 4.11186 13.7359 4.71946 12.1906 5.27086C6.8662 7.14986 3.52967 10.1001 1.41185 13.419C-0.779726 16.6994 -0.0983718 19.8533 4.63599 19.9446C8.21134 19.7971 10.6242 18.8031 13.0546 17.5493C13.0721 17.5493 6.29372 19.4845 3.78605 18.0656C3.50859 17.9181 3.23465 17.7144 3.16089 17.1454C3.16089 15.9829 5.07852 14.7677 6.2024 14.3813V12.39C8.46773 13.1837 11.1405 12.9624 13.4269 11.2661C13.5006 11.4698 13.5744 11.7262 13.5568 12.0036H13.9432C14.0345 11.2099 13.5006 10.4372 12.6156 10.381C12.8719 10.5847 13.0581 10.7498 13.1494 10.8973L13.1143 10.9324L13.0967 10.95C10.15 13.0151 7.29116 12.0563 7.01722 12.0001L8.65739 10.3951L8.1973 9.23255C11.4601 8.09111 14.1504 7.25873 18.6248 6.4685L17.6239 5.66071L18.1402 5.34813C20.7918
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:PNG image data, 800 x 800, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):359734
                    Entropy (8bit):7.964496695856054
                    Encrypted:false
                    SSDEEP:
                    MD5:EEE78233C84547315503919176588A3A
                    SHA1:1EE926A2177D8877BA3FD1D6BCFFC020A024BFB6
                    SHA-256:CFBE0F7F0831B4226E33CC707CE419F27D921D15E3D67D8BBFF2C356C091B9F2
                    SHA-512:343B3DBF8A6E4A72B8E15007E88DD3B007865F6E96E64F746D899AE7E17415FC6BC3206A17F9E13E3861D8658C487CC303C7B8253E46C1360025CD0DADA806A5
                    Malicious:false
                    Reputation:unknown
                    Preview:.PNG........IHDR... ... .....T..?.. .IDATx...i...u'.s...r..k.F...JR....!...h......O......3(<.;<!...k."ERC..H..z..-.g..9~q3......I..x~.@..............B.!...o....B.!.h$`.!..Bl..,!..B....%..B..a....B.!6L...B.!.I..B.!..0.XB.!...&.K.!..b.$`.!..Bl..,!..B....%..B..a....B.!6L...B.!.I..B.!..0.XB.!...&.K.!..b.$`.!..Bl..,!..B....%..B..a....B.!6L...B.!.I..B.!..0.XB.!...&.K.!..b.$`.!..Bl..,!..B....%..B..a....B.!6L...B.!.I..B.!..0.XB.!...&.K.!..b.$`.!..Bl..,!..B....%..B..a....B.!6L...B.!.I..B.!..0.XB.!...&.K.!..b.$`.!..Bl..,!..B....%..B..a....B.!6L...B.!.I..B.!..0.XB.!...&.K.!..b.$`.!..Bl..,!..B....%..B..a....B.!6L...B.!.I..B.!..0.XB.!...&.K.!..b.$`.!..Bl..,!..B....%..B..a....B.!6L...B.!.I..B.!..0.XB.!...&.K.!..b.$`.!..Bl..,!..B....%..B..a....B.!6L...B.!.I..B.!..0.XB.!...&.K.!..b.$`.!..Bl..,!..B....%..B..a....B.!6L...B.!.I..B.!..0.XB.!...&.K.!..b.$`.!..Bl..,!..B....%..B..a....B.!6L...B.!.I..B.!..0.XB.!...&.K.!..b.$`.!..Bl..,!..B....%..B..a....B.!6L...B.!.I..B.!..0.XB.!...&.K.!..b.
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:PNG image data, 1280 x 1280, 8-bit/color RGB, non-interlaced
                    Category:downloaded
                    Size (bytes):436773
                    Entropy (8bit):7.9721492357461985
                    Encrypted:false
                    SSDEEP:
                    MD5:523B2001D73B4C7C9423D887605B4846
                    SHA1:025B561042319D049766EEE4EE7FA5D71297C940
                    SHA-256:162B384035EEA1EFD7EF2CD3D82BE4C5DFC9277252C482C7CB52B1CEE86574BB
                    SHA-512:BA24A027FED76636DFA2CD8E3B0A60BE5212AC76B9B4375D27B5999DF0AC16B72A635B1F8B33DA24B37253BC848463FA18B61C8E9B48796AEFE11382F1CE6BA2
                    Malicious:false
                    Reputation:unknown
                    URL:https://cowork-storage.nosdn.127.net/snapshot%2F2024%2F08%2F22%2Fdd6b97948ba54b32a44ecd867d492ae4.jpg?Signature=ovTi06nNvGntAhLkEmvM3iIe8pQI9fBJ3rcPUoOGsC0%3D&Expires=3301089634&NOSAccessKeyId=5de274d3b56f4e17be4ba5a9a7ce4824
                    Preview:.PNG........IHDR...............h... .IDATx...i...u......1..D..d9...7....|rGX.G/..}.#K.EI......z....X.;w.....N... ..UYYY9.gO.f&........{................@......,..........`....."........@......,..........`....."........@......,..........`....."........@......,..........`....."........@......,..........`....."........@......,..........`....."........@......,..........`....."........@......,..........`....."........@......,..........`....."........@......,..........`....."........@......,..........`....."........@......,..........`....."........@......,..........`....."........@......,..........`....."........@......,..........`....."........@......,..........`....."........@......,..........`....."........@......,..........`....."........@......,..........`....."........@......,..........`....."........@......,..........`....."........@......,..........`....."........@......,..........`....."........@......,..........`....."........@......,..........`....."........@......,..........`.
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (21738)
                    Category:downloaded
                    Size (bytes):25222
                    Entropy (8bit):5.836038352290744
                    Encrypted:false
                    SSDEEP:
                    MD5:84966DAAB0C06AD3CCE3C796F8E21D17
                    SHA1:1CABB376077A05E81758A72475A3338B7048D5DA
                    SHA-256:6B15C0C960A8114F9096B5C39090FF9B0965C80C030FA26AEF7910944EDF77A8
                    SHA-512:2C2E9B433A94C7414C34FDACFCFD2261D44B1CE6AAE5326AF06B11D77426321F8347BFCF113A3807EEF2A92C9B1775075321AFDD51EEDD4156645EE5B9E9EDD0
                    Malicious:false
                    Reputation:unknown
                    URL:https://site.ntesmail.com/product/1187170.html?mid=2caa3bb1-3cd6-46c4-9828-8457a4681228&bid=yKt9XNNayY6RSE0qNd-iOW-ITnKtRMrSmlFD82EPrWTl2AEuuQNDG3I4hI1dqYvXSf9sVu1aC4OB8qO77Xqqlw&cid=site%5C_ngxvLcIm8CN043WgmaKV5L8RaPSew%5C_ZtFhCGFVcL5br4ylTP5Zdst1weTlirIWGR
                    Preview:<!DOCTYPE html><html><head><title data-react-helmet="true">Vacuum yin-yang bag</title>. <meta charset="utf-8">. <meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=1, minimum-scale=1, user-scalable=no">. <link rel="stylesheet" href="/umi.7010d9a0.css">. <script>. window.routerBase = "/";. </script>. <script>. //! umi version: 3.5.41. </script>. <link data-react-helmet="true" rel="shortcut icon" type="image/x-icon" href="https://waimao.office.163.com/site/favicon.png"></head>. <body>. <div id="root"><div><div class="header"><div class="header-wrapper"><div class="company"><img class="company-icon"/><div class="company-title"></div></div><button type="button" class="ant-btn ant-btn-default contact-btn"><span>Contact us</span></button></div></div><div class="detail0-wrapper" data-edit="editJSON,Background" data-no-cache="true" style="background-repeat:no-repeat;background-position:center"><nav class="ant-breadcrumb breadcru
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with no line terminators
                    Category:downloaded
                    Size (bytes):96
                    Entropy (8bit):4.914798048785688
                    Encrypted:false
                    SSDEEP:
                    MD5:778103778F831265404FAFD087EA2982
                    SHA1:7660B70A28173E8E545AD06CDE6EC826A37FF55C
                    SHA-256:5DC853ED25A0A7369EDD97D8D6710E136209DCB46F8968E98E02A5FA52B8E162
                    SHA-512:CC7594AB791B3A491D509018BE72EEF348E3BFDEED4F7D49422671CCE84D00BB7E6D932B2240F8854299FE8B05AA9155381B4CA55519E776035F5DFD3BF463FF
                    Malicious:false
                    Reputation:unknown
                    URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISHgnlsdTjLqveahIFDbNghHMSBQ0dSTIpEgUNSpQx0RIeCcbc7Co0ZV9mEgUNrbU-nBIFDaS-leoSBQ3SSlA-?alt=proto
                    Preview:CiMKCw2zYIRzGgQIBxgBCgcNHUkyKRoACgsNSpQx0RoECAkYAQofCgcNrbU+nBoACgcNpL6V6hoACgsN0kpQPhoECAkYAQ==
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (65536), with no line terminators
                    Category:downloaded
                    Size (bytes):686144
                    Entropy (8bit):5.056099138345463
                    Encrypted:false
                    SSDEEP:
                    MD5:1B0AB8235136FE101240B53D193D1F42
                    SHA1:04EE158B9985E481CC0E2C1E42B0F2DAC54911DA
                    SHA-256:AF723429622E97CD6051841560D8EE0EE5454E67B840C9D0BF5275FC27895903
                    SHA-512:D45DE0ECF70B73116FCB8540D35DE9D32B39918993B2CB5AE4A10CEF5C9A969C2D497F9059A8FABA4D884462177C91B79D3F8FDCD8BF0ECC75B7395934F67202
                    Malicious:false
                    Reputation:unknown
                    URL:https://site.ntesmail.com/umi.7010d9a0.css
                    Preview:[class*=ant-]::-ms-clear,[class*=ant-] input::-ms-clear,[class*=ant-] input::-ms-reveal,[class^=ant-]::-ms-clear,[class^=ant-] input::-ms-clear,[class^=ant-] input::-ms-reveal{display:none}body,html{width:100%;height:100%}input::-ms-clear,input::-ms-reveal{display:none}html{font-family:sans-serif;-ms-text-size-adjust:100%;-ms-overflow-style:scrollbar;-webkit-tap-highlight-color:rgba(0,0,0,0)}@-ms-viewport{width:device-width}body{color:rgba(0,0,0,.85);font-size:14px;font-family:-apple-system,BlinkMacSystemFont,"Segoe UI",Roboto,"Helvetica Neue",Arial,"Noto Sans",sans-serif,"Apple Color Emoji","Segoe UI Emoji","Segoe UI Symbol","Noto Color Emoji";font-variant:tabular-nums;line-height:1.5715;background-color:#fff;font-feature-settings:"tnum","tnum"}[tabindex="-1"]:focus{outline:none!important}hr{box-sizing:content-box;overflow:visible}h1,h2,h3,h4,h5,h6{margin-top:0;margin-bottom:.5em;color:rgba(0,0,0,.85);font-weight:500}p{margin-top:0;margin-bottom:1em}abbr[data-original-title],abbr[titl
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:PNG image data, 800 x 800, 8-bit/color RGB, non-interlaced
                    Category:downloaded
                    Size (bytes):302546
                    Entropy (8bit):7.980685085341308
                    Encrypted:false
                    SSDEEP:
                    MD5:33A0950B54F8C2993DF752C9663C20C8
                    SHA1:D4FFDB1D99E798892B19131FAF7FD3BA2D34E117
                    SHA-256:4DCF402F195E3F65796EF01CDCCBE1735F3799255F9C4E6A1EC50E0089B044B3
                    SHA-512:FE9E37354ABD8D160F94F02CC2320075727265C4D7A06D3138B480098B754234C8CF3304027E73ACD65541B313B95A6D1C71CB65E318C8A9C15410AC86483FA2
                    Malicious:false
                    Reputation:unknown
                    URL:https://cowork-storage.nosdn.127.net/snapshot%2F2024%2F08%2F22%2Fed99e0205d8a46ceb76a841cc76075d7.jpg?Signature=AoJhwa4E40A5TOfextX2NOXJMjoT5RnbtvlXKkpL8q8%3D&Expires=3301089634&NOSAccessKeyId=5de274d3b56f4e17be4ba5a9a7ce4824
                    Preview:.PNG........IHDR... ... .....T..?.. .IDATx...$Ir.gf...y...=.&....jw..A|.$@...^..}!H........(Ps...:'3#..L.........$.f...3.DFx\2.....QU.q..q.....n..8..8.......q..qn..,.q..q.....q..q....r..q..1....q..qn..,.q..q.....q..q....r..q..1....q..qn..,.q..q.....q..q....r..q..1....q..qn..,.q..q.....q..q....r..q..1....q..qn..,.q..q.....q..q....r..q..1....q..qn..,.q..q.....q..q....r..q..1....q..qn..,.q..q.....q..q....r..q..1....q..qn..,.q..q.....q..q....r..q..1....q..qn..,.q..q.....q..q....r..q..1....q..qn..,.q..q.....q..q....r..q..1....q..qn..,.q..q.....q..q....r..q..1....q..qn..,.q..q.....q..q....r..q..1....q..qn..,.q..q.....q..q....r..q..1....q..qn..,.q..q.....q..q....r..q..1....q..qn..,.q..q.....q..q....r..q..1....q..qn..,.q..q.....q..q....r..q..1....q..qn..,.q..q.....q..q....r..q..1....q..qn..,.q..q.....q..q....r..q..1....q..qn..,.q..q.....q..q....r..q..1....q..qn..,.q..q.....q..q....r..q..1....q..qn..,.q..q.....q..q....r..q..1....q..qn..,.q..q.....q
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (65536), with no line terminators
                    Category:downloaded
                    Size (bytes):2938941
                    Entropy (8bit):5.529799106031986
                    Encrypted:false
                    SSDEEP:
                    MD5:79E758B6250E7FE806D7612286836259
                    SHA1:C5A70ADACE10F05775EFA5C12061BE953EFA241A
                    SHA-256:74AB135812FBB65D150A0FBCF65BA134A6C8D70388CF7B2BE00AE4CEAB768EB0
                    SHA-512:60B6EC1DA942A5AB5962AA0B2E29595EDC76B2D1DFA945F2A25A225501967FD14728792EE3297E55BCE65A0243B4CB691A8BFA4F5BDB143742296FDAD7922411
                    Malicious:false
                    Reputation:unknown
                    URL:https://site.ntesmail.com/umi.1961b306.js
                    Preview:(function(e){function t(t){for(var n,a,i=t[0],o=t[1],c=0,l=[];c<i.length;c++)a=i[c],Object.prototype.hasOwnProperty.call(r,a)&&r[a]&&l.push(r[a][0]),r[a]=0;for(n in o)Object.prototype.hasOwnProperty.call(o,n)&&(e[n]=o[n]);s&&s(t);while(l.length)l.shift()()}var n={},r={1:0};function a(e){return i.p+""+({}[e]||e)+"."+{0:"144c8ee5",2:"9abd6426",3:"47927a37"}[e]+".async.js"}function i(t){if(n[t])return n[t].exports;var r=n[t]={i:t,l:!1,exports:{}};return e[t].call(r.exports,r,r.exports,i),r.l=!0,r.exports}i.e=function(e){var t=[],n=r[e];if(0!==n)if(n)t.push(n[2]);else{var o=new Promise((function(t,a){n=r[e]=[t,a]}));t.push(n[2]=o);var c,l=document.createElement("script");l.charset="utf-8",l.timeout=120,i.nc&&l.setAttribute("nonce",i.nc),l.src=a(e);var s=new Error;c=function(t){l.onerror=l.onload=null,clearTimeout(u);var n=r[e];if(0!==n){if(n){var a=t&&("load"===t.type?"missing":t.type),i=t&&t.target&&t.target.src;s.message="Loading chunk "+e+" failed.\n("+a+": "+i+")",s.name="ChunkLoadErro
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:PNG image data, 744 x 625, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):297936
                    Entropy (8bit):7.980544782962463
                    Encrypted:false
                    SSDEEP:
                    MD5:2C62A07A5EC610F42AB1010B280B441E
                    SHA1:E875CFC1B36EBA93CC0AC0B393177C0744C73241
                    SHA-256:002C73C256051388D4D4C85AF13ADB64BA4EF6B2ADAC84C6643F063C8298DAE8
                    SHA-512:FC15A0A09917808ECA556E3A34FB4411102B0AFB6E6917C40D74446A0808B5542CAD33E9E663DF6DD61FADD5CB9A0BA76E5E06ADCB2680AF000A57B21C328DC1
                    Malicious:false
                    Reputation:unknown
                    Preview:.PNG........IHDR.......q......Q.L.. .IDATx..i.$Ir.....Gd..=}....f K.B................%...`..Gu.....f..`...GDfVe....TGz.a~d..z...0..0.....=..0..0..b..0..0.....a..a.g....0..0.....a..a..&\..0..8.L...a..q6.p1..0..l0.b..a...`..0..0.....a..a.g....0..0.....a..a..&\..0..8.L...a..q6.p1..0..l0.b..a...`..0..0.....a..a.g....0..0.....a..a..&\..0..8.L...a..q6.p1..0..l0.b..a...`..0..0.....a..a.g....0..0.....a..a..&\..0..8.L...a..q6.p1..0..l0.b..a...`..0..0.....a..a.g....0..0.....a..a..&\..0..8.L...a..q6.p1..0..l0.b..a...`..0..0.....a..a.g....0..0.....a..a..&\..0..8.L...a..q6.p1..0..l0.b..a...`..0..0.....a..a.g....0..0.....a..a..&\..0..8.L...a..q6.p1..0..l0.b..a...`..0..0.....a..a.g....0..0.....a..a..&\..0..8.L...a..q6.p1..0..l0.b..a...`..0..0.....a..a.g....0..0.....a..a..&\..0..8.L...a..q6.p1..0..l0.b..a...`..0..0.....a..a.g....0..0.....a..a..&\..0..8.L...a..q6.p1..0..l0.b..a...`..0..0.....a..a.g....0..0.....a..a..&\..0..8.L...a..q6.p1..0..l0.b..a...`..0..0.....a..a.g....0..0.....a..a..&\..0..8.L..
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:SVG Scalable Vector Graphics image
                    Category:downloaded
                    Size (bytes):1588
                    Entropy (8bit):4.612359893897474
                    Encrypted:false
                    SSDEEP:
                    MD5:3B643F065B9C43E96E15E97B5797BF8C
                    SHA1:63BC976B60527910359F8F989FFB9AB36E843833
                    SHA-256:D5E07C92F5DA54DACB46872A433661DA89D784C9D712A8312D057AA990A52F71
                    SHA-512:8EE7DC9CEFE1B70DDBD71772B04A9CCBE10CAAD94CF3EF740D5ACDD1966E26965BAE111A3FCEA3DBB779FC0A0A8670D68D1DC8D7F6B70AD0F4962C9AD19DD54E
                    Malicious:false
                    Reputation:unknown
                    URL:https://site.ntesmail.com/static/hot.643d43d1.svg
                    Preview:<svg width="33" height="16" viewBox="0 0 33 16" fill="none" xmlns="http://www.w3.org/2000/svg">.<path d="M0 8.87988C0 4.4616 3.58172 0.879883 8 0.879883H30.9976C32.1021 0.879883 32.9976 1.77531 32.9976 2.87988V8C32.9976 12.4183 29.4158 16 24.9976 16H2C0.89543 16 0 15.1046 0 14V8.87988Z" fill="url(#paint0_linear_195_13789)"/>.<path d="M4.85172 4.31188V12.8799H6.25572V9.08788H10.5997V12.8799H12.0037V4.31188H10.5997V7.88788H6.25572V4.31188H4.85172ZM17.4917 4.14388C16.1717 4.14388 15.1397 4.56388 14.3957 5.42788C13.6757 6.24388 13.3277 7.29988 13.3277 8.60788C13.3277 9.90388 13.6757 10.9599 14.3957 11.7759C15.1397 12.6159 16.1717 13.0479 17.4917 13.0479C18.7997 13.0479 19.8317 12.6279 20.5877 11.7879C21.3077 10.9839 21.6677 9.92788 21.6677 8.60788C21.6677 7.28788 21.3077 6.21988 20.5877 5.41588C19.8317 4.56388 18.7997 4.14388 17.4917 4.14388ZM17.4917 5.37988C18.3797 5.37988 19.0637 5.65588 19.5437 6.23188C20.0117 6.80788 20.2517 7.59988 20.2517 8.60788C20.2517 9.61588 20.0117 10.3959 19.54
                    No static file info