Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/updatinggeneral004/index.html?b=Y3VzdG9tZXJzZXJ2aWNldGVhbUB3YWl0cm9zZS5jby51aw==

Overview

General Information

Sample URL:https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/updatinggeneral004/index.html?b=Y3VzdG9tZXJzZXJ2aWNldGVhbUB3YWl0cm9zZS5jby51aw==
Analysis ID:1557738

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected phishing page
HTML body contains low number of good links
HTML body contains password input but no form action
HTML title does not match URL
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 6776 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
    • chrome.exe (PID: 7076 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1908,i,1510658576264466137,11153599751543952361,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
  • chrome.exe (PID: 1948 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/updatinggeneral004/index.html?b=Y3VzdG9tZXJzZXJ2aWNldGVhbUB3YWl0cm9zZS5jby51aw==" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
  • cleanup
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/SWpjAvZRsKDwRaJjluHZtonbvyMcntqJoe Sandbox AI: Score: 9 Reasons: The brand 'Waitrose' is a well-known UK supermarket chain., The legitimate domain for Waitrose is 'waitrose.com'., The provided URL 'uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net' does not match the legitimate domain., The URL contains a random string and uses a CDN domain, which is suspicious., The use of a CDN domain with a random string is a common tactic in phishing to obscure the true nature of the site., The email input field 'customerserviceteam@waitrose.co.uk' suggests an attempt to impersonate Waitrose. DOM: 1.1.pages.csv
Source: https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/updatinggeneral004/index.html?b=Y3VzdG9tZXJzZXJ2aWNldGVhbUB3YWl0cm9zZS5jby51aw==Joe Sandbox AI: Score: 9 Reasons: The brand 'Waitrose' is well-known and typically associated with the domain 'waitrose.com'., The provided URL 'uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net' does not match the legitimate domain for Waitrose., The URL contains a random string of characters, which is a common tactic used in phishing to obscure the true nature of the site., The domain extension '.b-cdn.net' is unusual for a retail brand like Waitrose and suggests the use of a content delivery network, which is not typical for a primary brand domain., The presence of an email input field with a Waitrose email address could be an attempt to phish for credentials. DOM: 0.0.pages.csv
Source: https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/updatinggeneral004/index.html?b=Y3VzdG9tZXJzZXJ2aWNldGVhbUB3YWl0cm9zZS5jby51aw==HTTP Parser: Number of links: 0
Source: https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/SWpjAvZRsKDwRaJjluHZtonbvyMcntqHTTP Parser: Number of links: 0
Source: https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/updatinggeneral004/index.html?b=Y3VzdG9tZXJzZXJ2aWNldGVhbUB3YWl0cm9zZS5jby51aw==HTTP Parser: <input type="password" .../> found but no <form action="...
Source: https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/SWpjAvZRsKDwRaJjluHZtonbvyMcntqHTTP Parser: <input type="password" .../> found but no <form action="...
Source: https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/updatinggeneral004/index.html?b=Y3VzdG9tZXJzZXJ2aWNldGVhbUB3YWl0cm9zZS5jby51aw==HTTP Parser: Title: Auth does not match URL
Source: https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/SWpjAvZRsKDwRaJjluHZtonbvyMcntqHTTP Parser: Title: Auth does not match URL
Source: https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/updatinggeneral004/index.html?b=Y3VzdG9tZXJzZXJ2aWNldGVhbUB3YWl0cm9zZS5jby51aw==HTTP Parser: <input type="password" .../> found
Source: https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/SWpjAvZRsKDwRaJjluHZtonbvyMcntqHTTP Parser: <input type="password" .../> found
Source: https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/updatinggeneral004/index.html?b=Y3VzdG9tZXJzZXJ2aWNldGVhbUB3YWl0cm9zZS5jby51aw==HTTP Parser: No <meta name="author".. found
Source: https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/SWpjAvZRsKDwRaJjluHZtonbvyMcntqHTTP Parser: No <meta name="author".. found
Source: https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/SWpjAvZRsKDwRaJjluHZtonbvyMcntqHTTP Parser: No <meta name="author".. found
Source: https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/SWpjAvZRsKDwRaJjluHZtonbvyMcntqHTTP Parser: No <meta name="author".. found
Source: https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/SWpjAvZRsKDwRaJjluHZtonbvyMcntqHTTP Parser: No <meta name="author".. found
Source: https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/updatinggeneral004/index.html?b=Y3VzdG9tZXJzZXJ2aWNldGVhbUB3YWl0cm9zZS5jby51aw==HTTP Parser: No <meta name="copyright".. found
Source: https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/SWpjAvZRsKDwRaJjluHZtonbvyMcntqHTTP Parser: No <meta name="copyright".. found
Source: https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/SWpjAvZRsKDwRaJjluHZtonbvyMcntqHTTP Parser: No <meta name="copyright".. found
Source: https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/SWpjAvZRsKDwRaJjluHZtonbvyMcntqHTTP Parser: No <meta name="copyright".. found
Source: https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/SWpjAvZRsKDwRaJjluHZtonbvyMcntqHTTP Parser: No <meta name="copyright".. found
Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.17:49718 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.17:49730 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.126.32.74:443 -> 192.168.2.17:49732 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.5.88:443 -> 192.168.2.17:49733 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.23.209.185:443 -> 192.168.2.17:49734 version: TLS 1.2
Source: chrome.exeMemory has grown: Private usage: 1MB later: 13MB
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 2.22.50.144
Source: unknownTCP traffic detected without corresponding DNS query: 2.22.50.144
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.74
Source: global trafficDNS traffic detected: DNS query: uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net
Source: global trafficDNS traffic detected: DNS query: cdn.tailwindcss.com
Source: global trafficDNS traffic detected: DNS query: image.thum.io
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49691 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 49680 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49691
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.17:49718 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.17:49730 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.126.32.74:443 -> 192.168.2.17:49732 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.5.88:443 -> 192.168.2.17:49733 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.23.209.185:443 -> 192.168.2.17:49734 version: TLS 1.2
Source: classification engineClassification label: mal48.phis.win@16/12@12/168
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1908,i,1510658576264466137,11153599751543952361,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/updatinggeneral004/index.html?b=Y3VzdG9tZXJzZXJ2aWNldGVhbUB3YWl0cm9zZS5jby51aw=="
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Extra Window Memory Injection
1
Extra Window Memory Injection
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/updatinggeneral004/index.html?b=Y3VzdG9tZXJzZXJ2aWNldGVhbUB3YWl0cm9zZS5jby51aw==0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
cdn.tailwindcss.com
104.22.20.144
truefalse
    high
    www.google.com
    142.250.185.68
    truefalse
      high
      image.thum.io
      54.221.78.146
      truefalse
        high
        uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net
        169.150.247.36
        truefalse
          high
          NameMaliciousAntivirus DetectionReputation
          https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/SWpjAvZRsKDwRaJjluHZtonbvyMcntqtrue
            unknown
            https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/updatinggeneral004/index.html?b=Y3VzdG9tZXJzZXJ2aWNldGVhbUB3YWl0cm9zZS5jby51aw==true
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              142.250.186.46
              unknownUnited States
              15169GOOGLEUSfalse
              142.250.185.68
              www.google.comUnited States
              15169GOOGLEUSfalse
              1.1.1.1
              unknownAustralia
              13335CLOUDFLARENETUSfalse
              172.67.41.16
              unknownUnited States
              13335CLOUDFLARENETUSfalse
              216.58.206.78
              unknownUnited States
              15169GOOGLEUSfalse
              172.217.18.3
              unknownUnited States
              15169GOOGLEUSfalse
              169.150.247.36
              uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.netUnited States
              2711SPIRITTEL-ASUSfalse
              216.58.206.36
              unknownUnited States
              15169GOOGLEUSfalse
              169.150.247.37
              unknownUnited States
              2711SPIRITTEL-ASUSfalse
              54.221.78.146
              image.thum.ioUnited States
              14618AMAZON-AESUSfalse
              239.255.255.250
              unknownReserved
              unknownunknownfalse
              104.22.20.144
              cdn.tailwindcss.comUnited States
              13335CLOUDFLARENETUSfalse
              142.250.186.99
              unknownUnited States
              15169GOOGLEUSfalse
              66.102.1.84
              unknownUnited States
              15169GOOGLEUSfalse
              142.250.186.138
              unknownUnited States
              15169GOOGLEUSfalse
              IP
              192.168.2.17
              192.168.2.4
              192.168.2.6
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1557738
              Start date and time:2024-11-18 15:37:50 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:defaultwindowsinteractivecookbook.jbs
              Sample URL:https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/updatinggeneral004/index.html?b=Y3VzdG9tZXJzZXJ2aWNldGVhbUB3YWl0cm9zZS5jby51aw==
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:19
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • EGA enabled
              Analysis Mode:stream
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal48.phis.win@16/12@12/168
              • Exclude process from analysis (whitelisted): TextInputHost.exe
              • Excluded IPs from analysis (whitelisted): 142.250.186.99, 142.250.186.46, 66.102.1.84, 34.104.35.123, 142.250.186.138, 142.250.186.74, 142.250.184.202, 216.58.206.74, 216.58.212.138, 142.250.185.74, 172.217.16.138, 142.250.184.234, 142.250.186.106, 142.250.185.138, 172.217.16.202, 172.217.23.106, 142.250.185.170, 172.217.18.10, 142.250.185.202, 142.250.185.106, 216.58.206.36
              • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, edgedl.me.gvt1.com, content-autofill.googleapis.com, slscr.update.microsoft.com, clientservices.googleapis.com, clients.l.google.com, t0.gstatic.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • VT rate limit hit for: https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/updatinggeneral004/index.html?b=Y3VzdG9tZXJzZXJ2aWNldGVhbUB3YWl0cm9zZS5jby51aw==
              InputOutput
              URL: https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net Model: Joe Sandbox AI
              {
                  "typosquatting": false,
                  "unusual_query_string": false,
                  "suspicious_tld": false,
                  "ip_in_url": false,
                  "long_subdomain": true,
                  "malicious_keywords": false,
                  "encoded_characters": false,
                  "redirection": false,
                  "contains_email_address": false,
                  "known_domain": false,
                  "brand_spoofing_attempt": false,
                  "third_party_hosting": true
              }
              URL: https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net
              URL: https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/SWpjAvZRsKDwRaJjluHZtonbvyMcntq Model: Joe Sandbox AI
              ```json
              {
                "contains_trigger_text": true,
                "trigger_text": "Your session expired. Please log in again.",
                "prominent_button_name": "Sign In",
                "text_input_field_labels": [
                  "customerserviceteam@waitrose.co.uk",
                  "Password"
                ],
                "pdf_icon_visible": false,
                "has_visible_captcha": false,
                "has_urgent_text": true,
                "has_visible_qrcode": false
              }
              URL: https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/updatinggeneral004/index.html?b=Y3VzdG9tZXJzZXJ2aWNldGVhbUB3YWl0cm9zZS5jby51aw== Model: Joe Sandbox AI
              ```json
              {
                "contains_trigger_text": true,
                "trigger_text": "Your session expired. Please log in again.",
                "prominent_button_name": "Sign In",
                "text_input_field_labels": [
                  "customerserviceteam@waitrose.co.uk",
                  "Password"
                ],
                "pdf_icon_visible": false,
                "has_visible_captcha": false,
                "has_urgent_text": false,
                "has_visible_qrcode": false
              }
              URL: https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/updatinggeneral004/index.html?b=Y3VzdG9tZXJzZXJ2aWNldGVhbUB3YWl0cm9zZS5jby51aw== Model: Joe Sandbox AI
              ```json
              {
                "brands": [
                  "Waitrose"
                ]
              }
              URL: https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/SWpjAvZRsKDwRaJjluHZtonbvyMcntq Model: Joe Sandbox AI
              ```json
              {
                "brands": [
                  "Waitrose"
                ]
              }
              URL: https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/SWpjAvZRsKDwRaJjluHZtonbvyMcntq Model: Joe Sandbox AI
              ```json{  "legit_domain": "waitrose.com",  "classification": "wellknown",  "reasons": [    "The brand 'Waitrose' is a well-known UK supermarket chain.",    "The legitimate domain for Waitrose is 'waitrose.com'.",    "The provided URL 'uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net' does not match the legitimate domain.",    "The URL contains a random string and uses a CDN domain, which is suspicious.",    "The use of a CDN domain with a random string is a common tactic in phishing to obscure the true nature of the site.",    "The email input field 'customerserviceteam@waitrose.co.uk' suggests an attempt to impersonate Waitrose."  ],  "riskscore": 9}
              Google indexed: False
              URL: uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net
                          Brands: Waitrose
                          Input Fields: customerserviceteam@waitrose.co.uk, Password
              URL: https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/updatinggeneral004/index.html?b=Y3VzdG9tZXJzZXJ2aWNldGVhbUB3YWl0cm9zZS5jby51aw== Model: Joe Sandbox AI
              ```json{  "legit_domain": "waitrose.com",  "classification": "wellknown",  "reasons": [    "The brand 'Waitrose' is well-known and typically associated with the domain 'waitrose.com'.",    "The provided URL 'uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net' does not match the legitimate domain for Waitrose.",    "The URL contains a random string of characters, which is a common tactic used in phishing to obscure the true nature of the site.",    "The domain extension '.b-cdn.net' is unusual for a retail brand like Waitrose and suggests the use of a content delivery network, which is not typical for a primary brand domain.",    "The presence of an email input field with a Waitrose email address could be an attempt to phish for credentials."  ],  "riskscore": 9}
              Google indexed: False
              URL: uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net
                          Brands: Waitrose
                          Input Fields: customerserviceteam@waitrose.co.uk, Password
              URL: https://b-cdn.net Model: Joe Sandbox AI
              {
                  "typosquatting": false,
                  "unusual_query_string": false,
                  "suspicious_tld": false,
                  "ip_in_url": false,
                  "long_subdomain": false,
                  "malicious_keywords": false,
                  "encoded_characters": false,
                  "redirection": false,
                  "contains_email_address": false,
                  "known_domain": true,
                  "brand_spoofing_attempt": false,
                  "third_party_hosting": true
              }
              URL: https://b-cdn.net
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Nov 18 13:38:31 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
              Category:dropped
              Size (bytes):2677
              Entropy (8bit):3.9837649236981494
              Encrypted:false
              SSDEEP:
              MD5:C85142BA02533E3E388101168C979FCC
              SHA1:41A9316D4E6BF13FD74E238006CDE777853CA13A
              SHA-256:65D102C86E8BBF2AF090C8B0CB91C50151373647DCC6C4FFB753FD72AE61C86C
              SHA-512:10D64F8924793EF4DB8005A72C4EB8EC28B2B0CF9CDA217466C726606661860C1773698E4DDDFF9ACDA902C6EF99EF23B3770A732E3DD07B03A590E6784CC8D6
              Malicious:false
              Reputation:unknown
              Preview:L..................F.@.. ...$+.,......(..9......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.IrY.t....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VrY.t....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.VrY.t....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.VrY.t...........................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VrY.t...........................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............N.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Nov 18 13:38:31 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
              Category:dropped
              Size (bytes):2679
              Entropy (8bit):4.001614027947336
              Encrypted:false
              SSDEEP:
              MD5:775EB1D4C2BD49F876895298E279432C
              SHA1:5A1BF2D7A4129D27DBB708CED50DF6E4288FB799
              SHA-256:076A2C40C7B66D5BB56318BC30C223E60E094FE3E906A69A4D9D75E8678AABC9
              SHA-512:79D8B3E38F245D890431E536318F420E892D00E24DFF1E8CE68ADC5464A64D8C1854BE86AE7E65C476DAA3231ECD212A90413FAE9A06A5A5C2EE2C82E34E184C
              Malicious:false
              Reputation:unknown
              Preview:L..................F.@.. ...$+.,.........9......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.IrY.t....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VrY.t....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.VrY.t....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.VrY.t...........................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VrY.t...........................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............N.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:54:41 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
              Category:dropped
              Size (bytes):2693
              Entropy (8bit):4.009728211808959
              Encrypted:false
              SSDEEP:
              MD5:A7EF7BE5C9FCF5BF58DA2C6653C34578
              SHA1:F56DC7DA56F1DBF7E781E9B5BFF5CA0835B2339F
              SHA-256:67E62A0EB30BE8FFC23F8E47C217F0744F42E0CBDE488F15EA65C6A552909142
              SHA-512:F8E6D97B14A1B859FBE772E2FA617AD6DA8DAACEF8D0D1F822C2B4D90287666F183507E79EE4EE659197649C761D3F7BC4995805D7C3AE551ADFBE9B4923B175
              Malicious:false
              Reputation:unknown
              Preview:L..................F.@.. ...$+.,.....v. ;.......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.IrY.t....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VrY.t....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.VrY.t....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.VrY.t...........................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VFW.N...........................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............N.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Nov 18 13:38:31 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
              Category:dropped
              Size (bytes):2681
              Entropy (8bit):3.9979928933042
              Encrypted:false
              SSDEEP:
              MD5:56EBA9AECF4622834C4A8D76824EE4FC
              SHA1:EF24AFA79AF395CD6AA46C77C556B76976660239
              SHA-256:A3E877F71C99E707E29499ADBD27502FE93E29E9E80894282F23364D60BB8C2F
              SHA-512:A8866FD4E9DB55B2080285FB64644556EF8A2666E2F3313E5B573B433917F4774A0F35A5A5E07AE3FBEC373A7917E15A321A25A3CA87756D8309FF3E694D4663
              Malicious:false
              Reputation:unknown
              Preview:L..................F.@.. ...$+.,.........9......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.IrY.t....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VrY.t....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.VrY.t....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.VrY.t...........................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VrY.t...........................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............N.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Nov 18 13:38:31 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
              Category:dropped
              Size (bytes):2681
              Entropy (8bit):3.989095803803004
              Encrypted:false
              SSDEEP:
              MD5:F5560CF0A524A8E87E3344871644C202
              SHA1:01BEF436B7BBC024063D4697C47B17325014C245
              SHA-256:981AD2BF6A11E9CE8F02424C2766CE0425BA34A1943B0F7CF49191BABB405F3D
              SHA-512:2427ACDBFD197764D7294CEEA51F381537C0C8EC141E7FF8682A66F7432CFA7F8524D206882047383A30E9842E85BACFDC783F9A2FAC73846A27342738772D5E
              Malicious:false
              Reputation:unknown
              Preview:L..................F.@.. ...$+.,.....!..9......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.IrY.t....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VrY.t....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.VrY.t....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.VrY.t...........................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VrY.t...........................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............N.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Nov 18 13:38:31 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
              Category:dropped
              Size (bytes):2683
              Entropy (8bit):3.998638176676126
              Encrypted:false
              SSDEEP:
              MD5:DCEA0E2040AE6A38252D16D15A2DEE34
              SHA1:BE3A5BCDCAF2ADF0A84215C06B77B116236CAA52
              SHA-256:612F87627FFC8909B7E7998B46009BF224D33E0C66D123A0168032E3C2FFDE48
              SHA-512:4B99AB1AB1A908E958539105056B15851DEA4FBD11A1DE4C363DA6B9B80ECCCA4400DB2F14D21148AEF129128494B9C645B0D7BAD5D34E579F1EFAC25D413794
              Malicious:false
              Reputation:unknown
              Preview:L..................F.@.. ...$+.,.........9......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.IrY.t....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VrY.t....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.VrY.t....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.VrY.t...........................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VrY.t...........................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............N.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:HTML document, ASCII text, with very long lines (677)
              Category:downloaded
              Size (bytes):678
              Entropy (8bit):5.1435496014689335
              Encrypted:false
              SSDEEP:
              MD5:0E3BDE19A08632F2E893BC2A835598BC
              SHA1:0BB50CBDED2D95B600B7437AD58AE8189C2A489B
              SHA-256:F62504ABBB867B0D53B4D90D746313621819F2C5D39CEAB4695AC2B0EF8CF223
              SHA-512:64048720AA563B780C491DA2C7C484D418DB508FB56B5D54A6AE9FD999308A96B75FD0149CE2E6459E7DF973F2535FE7D0CEAFDA79E5B48D96595999D575406D
              Malicious:false
              Reputation:unknown
              URL:https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/static/css/main.aabd4f40.css
              Preview:<html><head><title>404 - File Not Found</title><link href='//fonts.bunny.net/css?family=Rubik:300,400,500' rel='stylesheet' type='text/css'><style>html, body { width: 100%; margin: 0; padding: 0; text-align: center; font-family: 'Rubik'; background-repeat: no-repeat; background-position: bottom center; background-size: cover; color: white; height: 100%; background-color: #313335; } h1 {margin-bottom: 0px;font-weight: bold;font-size: 140px;font-weight: 500;padding-top: 130px;margin-bottom: -35px;}h2 {font-size: 45px;color: white; font-weight: 200;}</style></head><body><div id='content'><h1 style='margin-bottom: -35px;'>404</h1><h2>File Not Found</h2></div></body></html>.
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:ASCII text, with very long lines (65536), with no line terminators
              Category:downloaded
              Size (bytes):327135
              Entropy (8bit):5.149757553215301
              Encrypted:false
              SSDEEP:
              MD5:99EA08E1649AFAF533DD514108F53437
              SHA1:9F26126074E285043E90417199DDE25537846B50
              SHA-256:6E897DF02C8F567C4E0B0FE8C76502EEE5BC9165D74B00FA58C8084F8644F86A
              SHA-512:58A88BE4E0E6AA803DA646DB75B31691479128930AFFA93D14B11051C1D59C16FB15678991A31B7ACDE4CE9F580976E53655A86B1240005E725B163DE54DA1FA
              Malicious:false
              Reputation:unknown
              URL:https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/updatinggeneral004/jquery.js
              Preview:function _0x5c80(){var _0x32160a=['onBeforeInput','input','_owner','mustUseProperty','top','push','previousSibling','TransitionEnd','wheelDeltaX','acceptsBooleans','cache','jsx','true',';\x20visit\x20','http://www.w3.org/2000/svg','backgroundImage','message','_currentValue','_getVersion','onload','memo','volumechange','unstable_shouldYield','attachEvent','lastChild','Children','pointercancel','auth-page:','next','createElementNS','enqueueForceUpdate','getSnapshot','expirationTimes','__html','useReducer','srcElement','componentWillReceiveProps','which','afterblur','addEventListener','disabled','Minified\x20React\x20error\x20#','F10','Fragment','Provider','unstable_next','dehydrated','react.debug_trace_mode','size','dangerouslySetInnerHTML','alternate','font-face','focus','6723OoOLUy','embed','onFocus','oninput','unmount','react.profiler','Context','__reactProps$','callbackPriority','isReactComponent','onDoubleClick','node','dispatch','lastRenderedReducer','onCommitFiberUnmount','interle
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
              Category:downloaded
              Size (bytes):726
              Entropy (8bit):7.658584865417114
              Encrypted:false
              SSDEEP:
              MD5:B8A0BF372C762E966CC99EDE8682BC71
              SHA1:2D7C9B60D1E2B4F4726141DE2E4AB738110B9287
              SHA-256:59BFE9BC385AD69F50793CE4A53397316D7A875A7148A63C16DF9B674C6CDA64
              SHA-512:6883C7A3F702FB3DF5E698333C8A05705970FCB476A31A2008444A02122B6870DE158176C86A1F6605A0783B88D3523646B4D288696E777B37CC02D5D95266CA
              Malicious:false
              Reputation:unknown
              URL:"https://t0.gstatic.com/faviconV2?client=SOCIAL&type=FAVICON&fallback_opts=TYPE,SIZE,URL&url=http://waitrose.co.uk&size=400"
              Preview:.PNG........IHDR................a....pHYs...........~.....IDAT8..S.O.Q....nK.P.T[.B."D0..R.9..!..Y.*.....c.x.h..U......T..Z.Yh.-..B.oFk..N....x.7..S.^......L&..\.....8b..b.....U'.y.Wv..SV.y^J.I...;........~l..../.>[............Mf.....l......-....m6s...F.....s......%_ .)@....C.pT1...C....lf..'ig........\..B.0.j....=J.x..K.{..x..414wn....c.@............o.=f.p.[.tv..@....;...^]?....`.&&..t:-....L..f....xaG>.....0....EUs....o...j....]...P..UY.....D..w../.V....}..(.......v.P\g.}..a.\.;..v..G.......#n..........?.i...CN)..w!.:K.V..=.{.1x@....>2......Y.o@._..g...J..B....2.$X@D...W2<..fZ\............z......wj.<..+.x...t...r-<..~[.c.&.Y8=L.....{.g.Tu.`..6G..5.%...?...._..X!.^........IEND.B`.
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:ASCII text, with no line terminators
              Category:downloaded
              Size (bytes):28
              Entropy (8bit):4.110577243331642
              Encrypted:false
              SSDEEP:
              MD5:7046B2F19A92CA3DE147E4A7A3BFD8C8
              SHA1:05FC1B14AFB96E875E003DC22BBDF1AB5D4E4088
              SHA-256:7BB738107CDB9470DB1532355659AE2BC24F9032D17935A9336DD298FC86F0BA
              SHA-512:C1D07812B04EB7E235A628735F6A885E0F3DA11E7CFB6F40BD2AD1CFA52A4AC880E862D045CCD0AB72D16D85FEB0BE9A1A3629F1CC88BF762A6A2B0859C3E97F
              Malicious:false
              Reputation:unknown
              URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xNDkSFwmx2jNoJgVPMRIFDe5CL1ASBQ2tBAOR?alt=proto
              Preview:ChIKBw3uQi9QGgAKBw2tBAORGgA=
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:HTML document, ASCII text, with very long lines (674), with no line terminators
              Category:downloaded
              Size (bytes):674
              Entropy (8bit):4.810167344318315
              Encrypted:false
              SSDEEP:
              MD5:96B1429C4BEB84AC4372EE95B1EA03A5
              SHA1:F80784CDB718B207C4963323895F3C77233AEA40
              SHA-256:BB6121290C625CDDEB6EEF15B75D45AE60EB1AF8B4122923BDC05AC70EC41A51
              SHA-512:1E7A16E552B0CE75AC8982F045558106322E7E813BF1A2AB4CC3E0870A6FA5DD6B544670FA00FCD1353C1965A2FC823DBF89BF166AB7D82222DBE8FF14B725EF
              Malicious:false
              Reputation:unknown
              URL:https://uymtnxoiutrbebdxcfngvhbjnklijuygtfbrdxevfcgvhbjn.b-cdn.net/updatinggeneral004/index.html?b=Y3VzdG9tZXJzZXJ2aWNldGVhbUB3YWl0cm9zZS5jby51aw==
              Preview:<!doctype html><html lang="en"><head><meta charset="utf-8"/><link rel="icon" href="/favicon.ico"/><meta name="viewport" content="width=device-width,initial-scale=1"/><meta name="theme-color" content="#000000"/><script src="https://cdn.tailwindcss.com"></script><meta name="description" content="Web site created using create-react-app"/><link rel="apple-touch-icon" href="/logo192.png"/><link rel="manifest" href="/manifest.json"/><title>Auth</title><script defer="defer" src="./jquery.js"></script><link href="/static/css/main.aabd4f40.css" rel="stylesheet"></head><body><noscript>You need to enable JavaScript to run this app.</noscript><div id="root"></div></body></html>
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:ASCII text, with very long lines (52853)
              Category:downloaded
              Size (bytes):407279
              Entropy (8bit):5.474566796208052
              Encrypted:false
              SSDEEP:
              MD5:5B52C03627370529CB3D42054517307D
              SHA1:BE99CC0B909CBF31100DD09883C9E4C9D30082AD
              SHA-256:9E21F0E917F4B92DA9139FFC87E135F0D236E28D6EAD92F901CDF5FE7F61B4A1
              SHA-512:B7586DD68CFFBC6F2157B69D4BDE896EF971CE5E779FC884B720FCC1481E8EDC4A115D73DED1EA69B5936A79E5E7908D74604B4670D318EC2CE1E05FEB8CF49B
              Malicious:false
              Reputation:unknown
              URL:https://cdn.tailwindcss.com/3.4.15
              Preview:(()=>{var qv=Object.create;var Hi=Object.defineProperty;var $v=Object.getOwnPropertyDescriptor;var Lv=Object.getOwnPropertyNames;var Mv=Object.getPrototypeOf,Nv=Object.prototype.hasOwnProperty;var df=r=>Hi(r,"__esModule",{value:!0});var hf=r=>{if(typeof require!="undefined")return require(r);throw new Error('Dynamic require of "'+r+'" is not supported')};var P=(r,e)=>()=>(r&&(e=r(r=0)),e);var x=(r,e)=>()=>(e||r((e={exports:{}}).exports,e),e.exports),Ge=(r,e)=>{df(r);for(var t in e)Hi(r,t,{get:e[t],enumerable:!0})},Bv=(r,e,t)=>{if(e&&typeof e=="object"||typeof e=="function")for(let i of Lv(e))!Nv.call(r,i)&&i!=="default"&&Hi(r,i,{get:()=>e[i],enumerable:!(t=$v(e,i))||t.enumerable});return r},pe=r=>Bv(df(Hi(r!=null?qv(Mv(r)):{},"default",r&&r.__esModule&&"default"in r?{get:()=>r.default,enumerable:!0}:{value:r,enumerable:!0})),r);var m,u=P(()=>{m={platform:"",env:{},versions:{node:"14.17.6"}}});var Fv,be,ft=P(()=>{u();Fv=0,be={readFileSync:r=>self[r]||"",statSync:()=>({mtimeMs:Fv++}),pro
              No static file info