Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
securedoc_20241216T121346.html

Overview

General Information

Sample name:securedoc_20241216T121346.html
Analysis ID:1576362
MD5:2a3629d13e32b7a808df62dd6b70d992
SHA1:e9f6686d976a275f2ca1fa73a0d4c94175ec6e14
SHA256:2dd926883acc2e4e939002b4c1ebfe6eb2134555694ae9b868edba7b63506afc

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected phishing page
AI detected suspicious Javascript
HTML file submission containing password form
Suspicious Javascript code found in HTML file
Detected hidden input values containing email addresses (often used in phishing pages)
HTML body contains low number of good links
HTML page contains hidden javascript code
HTML title does not match URL
HTTP GET or POST without a user agent
None HTTPS page querying sensitive user data (password, username or email)
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 6800 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\securedoc_20241216T121346.html MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 7072 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 --field-trial-handle=1768,i,13132331378037480680,11710520669971933826,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • rundll32.exe (PID: 780 cmdline: C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: file:///C:/Users/user/Desktop/securedoc_20241216T121346.htmlJoe Sandbox AI: Score: 10 Reasons: HTML file with login form DOM: 1.0.pages.csv
Source: 0.10.id.script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: file:///C:/Users/user/Desktop/securedoc_20241216T1... This script exhibits several high-risk behaviors, including dynamic code execution, data exfiltration, and redirects to suspicious domains. The use of obfuscated code and the presence of a payload being sent to an external server are also highly concerning. Overall, this script demonstrates a clear intent to perform malicious activities and should be considered a high-risk threat.
Source: securedoc_20241216T121346.htmlHTTP Parser: document.write
Source: securedoc_20241216T121346.htmlHTTP Parser: location.href
Source: securedoc_20241216T121346.htmlHTTP Parser: .location
Source: securedoc_20241216T121346.htmlHTTP Parser: .location
Source: securedoc_20241216T121346.htmlHTTP Parser: Josh Mejia <Josh.Mejia@mitchell.com>
Source: file:///C:/Users/user/Desktop/securedoc_20241216T121346.htmlHTTP Parser: {'name':null,'msgID':'|1__bd0a17fc00000193d11afb0644e88dbdf42f43bf@esa1.mitchell.iphmx.com','keysize':24,'flags':2049,'rid':'bXlsZXMgb2xzb24gPG1vbHNvbkBmbW5lLmNvbT4=','algnames':{'encryption':{'data':'AES'}},'algparams':{'encryption':{'data':{'IV':'fIfkk05zUSO/RyO4cvoI/g=='}}},'keyserverhost':'res.cisco.com:443','securereplyhost':'res.cisco.com:443','openerhost':'res.cisco.com:443','toc':[['Body-1734380026633.txt',1,'','',13,[0,6068],'Body-1734380026633.txt','ISO-8859-1'],['image001.png',2,'','image001.png',21,[6068,5520],'image001.png','ISO-8859-1'],['MessageBar.html',4,'','',1,[11588,28407],'MessageBar.html','ISO-8859-1']],'salt':'SajcmDqehO0ww5fotwx+YKEuW8Q=','data':['','','']}
Source: file:///C:/Users/user/Desktop/securedoc_20241216T121346.htmlHTTP Parser: |1__bd0a17fc00000193d11afb0644e88dbdf42f43bf@esa1.mitchell.iphmx.com
Source: file:///C:/Users/user/Desktop/securedoc_20241216T121346.htmlHTTP Parser: molson@fmne.com
Source: file:///C:/Users/user/Desktop/securedoc_20241216T121346.htmlHTTP Parser: Number of links: 1
Source: securedoc_20241216T121346.htmlHTTP Parser: Base64 decoded: Zeppelin rules!
Source: securedoc_20241216T121346.htmlHTTP Parser: Title: Secure Registered Envelope:FN UAT Users @secure does not match URL
Source: file:///C:/Users/user/Desktop/securedoc_20241216T121346.htmlHTTP Parser: Title: Authentication Frame does not match URL
Source: file:///C:/Users/user/Desktop/securedoc_20241216T121346.htmlHTTP Parser: Has password / email / username input fields
Source: securedoc_20241216T121346.htmlHTTP Parser: <input type="password" .../> found
Source: file:///C:/Users/user/Desktop/securedoc_20241216T121346.htmlHTTP Parser: <input type="password" .../> found
Source: securedoc_20241216T121346.htmlHTTP Parser: No favicon
Source: file:///C:/Users/user/Desktop/securedoc_20241216T121346.htmlHTTP Parser: No favicon
Source: file:///C:/Users/user/Desktop/securedoc_20241216T121346.htmlHTTP Parser: No favicon
Source: file:///C:/Users/user/Desktop/securedoc_20241216T121346.htmlHTTP Parser: No favicon
Source: securedoc_20241216T121346.htmlHTTP Parser: No <meta name="author".. found
Source: file:///C:/Users/user/Desktop/securedoc_20241216T121346.htmlHTTP Parser: No <meta name="author".. found
Source: file:///C:/Users/user/Desktop/securedoc_20241216T121346.htmlHTTP Parser: No <meta name="copyright".. found
Source: unknownHTTPS traffic detected: 23.218.208.109:443 -> 192.168.2.16:49706 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.218.208.109:443 -> 192.168.2.16:49719 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:49726 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:49759 version: TLS 1.2
Source: chrome.exeMemory has grown: Private usage: 1MB later: 27MB
Source: global trafficHTTP traffic detected: GET /envelopeopener/pf/ZGJAVG9rZW43ODc2OjIxNTQ5/kq2iUBINAy0.LOAHqcY9wMJ551awcCpdSHTCEfGwg4xsepncLRtPZWbVczvVBhFXPfzTCF.4Z9-fAN20QdqA7uIUBKS0bBzrXQ!!/?p=0&d=%7B%27name%27%3Anull,%0D%0A%27msgID%27%3A%27%7C1__bd0a17fc00000193d11afb0644e88dbdf42f43bf%40esa1%2Emitchell%2Eiphmx%2Ecom%27,%0D%0A%27keysize%27%3A24,%0D%0A%27flags%27%3A2049,%0D%0A%27rid%27%3A%27bXlsZXMgb2xzb24gPG1vbHNvbkBmbW5lLmNvbT4%3D%27,%0D%0A%27algnames%27%3A%7B%27encryption%27%3A%7B%27data%27%3A%27AES%27%7D%7D,%0D%0A%27algparams%27%3A%7B%27encryption%27%3A%7B%27data%27%3A%7B%27IV%27%3A%27fIfkk05zUSO%2FRyO4cvoI%2Fg%3D%3D%27%7D%7D%7D,%0D%0A%27keyserverhost%27%3A%27res%2Ecisco%2Ecom%3A443%27,%0D%0A%27securereplyhost%27%3A%27res%2Ecisco%2Ecom%3A443%27,%0D%0A%27openerhost%27%3A%27res%2Ecisco%2Ecom%3A443%27,%0D%0A%27toc%27%3A%5B%0D%0A%5B%27Body-1734380026633%2Etxt%27,1,%0D%0A%27%27,%0D%0A%27%27,%0D%0A13,%5B0,6068%5D,%27Body-1734380026633%2Etxt%27,%0D%0A%27ISO-8859-1%27%5D,%0D%0A%5B%27image001%2Epng%27,2,%0D%0A%27%27,%0D%0A%27image001%2Epng%27,%0D%0A21,%5B6068,5520%5D,%27image001%2Epng%27,%0D%0A%27ISO-8859-1%27%5D,%0D%0A%5B%27MessageBar%2Ehtml%27,4,%0D%0A%27%27,%0D%0A%27%27,%0D%0A1,%5B11588,28407%5D,%27MessageBar%2Ehtml%27,%0D%0A%27ISO-8859-1%27%5D%0D%0A%5D,%0D%0A%27salt%27%3A%27SajcmDqehO0ww5fotwx%2BYKEuW8Q%3D%27,%0D%0A%27data%27%3A%5B%0D%0A%27%27,%27End6kG1Xup0qFCNKcCBJtK8AsyTDq9KNGkXBDtT8s%2FDCtoAz0jZKvni7SQAQLIsP5uEoMoOdwpaR%2Fzxd4k6iK9%2BKX2jwhtpxe5MULXIvVN7gN0i5EPlRtpz4poQ2NsYHjL1padlY8KX7fKJDbhj%2FC%2FB33RqS%2FFfEltRTJfjDcDbfKnCux0uBsZx%2Bn13mp9Hsb%2FVGJlato56ZrU%2FlaB2pur%2B0zsI3QzxWNHY330TnZriKCmhfEGqndLmUvj4FrrkVgfPqeLWewwqzjhs6kDtOX9pIZh%2B4QR4INVISkb%2FBhQcs7uzXpZGWOU4FQGElzBxxa3OvueTqqyrUwC1fUmn9KR2hOheIqVIWvO3Aezr84islcX%2FvdLIhc%2FOI7HWw8KIoLsqui8Ye0U%2BUcZuD5ZdnjrQ4dIQiQ%2F2WJIUNU1yRwaxK%2B9iIQfLDTpgjo9bWNow6XQ2mPZJpscAU5lAOPrKAp%2B%2FrfFZmPUOP%2B3RpIiUBBffDrCZnYjMny8maut9wic5YNmvKVioOeqTrV%2B6ht0tZnEfNSuA37dZr5B8jvahOG4X12s0NAbr3mF1TMOnES92y5Y9zLOAG3GFF0VjyyiWh5UlYiw7gYPmIgT%2BYJlkdeQ5JNeP5hkbWbjbU0T2zlosdhOXsxRj%2FcaLdMvNH2UjGE7YJOh%2Fdb%2FrU75PaImVog04wxbynHuFVN7q48jHrMgF%2BwZOJWq%2Fqlv6OMtOsTHlxADGl70YHcjLHM2X34aS60FiSO1%2FdBnd%2Bo6CtTh3wrH0eGemk%2FF%2FXuqBFnUfkn8c0nEXZey8P%2BeHPVdHrkWwYUpXPKJz7TzD%2FbgohlB1ZGds3vXUgMHUhXAvnt2YCb9v%2BgDZDmVJFdWyDCvPhhj16bGTcDolrfBPa3cO2bxTcxgAf%2FXL3sPpKgdOUwGqC0UbJgMUViXuvoVkqvHl5Eh4t6gGjafiB%2FzLyuft2z6PqsaX5OVA5ww5f9%2BRv86yuldx4URyQ%2Bev%2BwwX03OdRfB3AuOIFug%2FEicBhBnylABDAt%2BVm3aUXzeoWPcCniJVjmCqqRggF9MGVzKBKFRPRF7wqX7SVKNjkL60PVfsmy%2B8GOwCdKXdfsTJbmXMKxBF5ZeZHcOtnHIMimSmg092I2H%2FjRiMMrQoZvP2%2FzFog2Ye6yGmzDuTtX0EH9M7ygVAgpDnzPTKAtsdRG0rSpAw%2BgQZ1jHZKYFtBcjjyZpGJOXDrMJ51odoBQtypcqjSJ5mFobGfhRrlFdR0La2jX6BT%2BL4N9%2FzU54s8D8OCCiQb4mzjvto2fmVzwwezATmN1mE%2BrtuyRheOtQzAAiafms0JaEarN2Pai8uRILcUQAEA5S7rVy8mn8pBo4yLM%2F2G0Q8hoYR9B4WAattO%2BycCimm4AcDo%2FniNLO%2BuLFiGN0LznhoxgvWIgy%2BwICgZr%2BM7MaPSvMr9wQCBJ%2Fx6Z9m%2FrXvVAqhkkWiuHtbD%2BHaWL52CFZ306m6cvZxHGRzdqiU%2BVHXOKYnP%2Fyx2KysG3%2Fnyok89x0NM8B3i1u49h9Tq3GKOf9DFMnHrj4CQ%2FZ0VTiJ4bc%
Source: global trafficHTTP traffic detected: GET /envelopeopener/pf/ZGJAVG9rZW43ODc2OjIxNTQ5/kq2iUBINAy0.LOAHqcY9wMJ551awcCpdSHTCEfGwg4xsepncLRtPZWbVczvVBhFXPfzTCF.4Z9-fAN20QdqA7uIUBKS0bBzrXQ!!/?p=0&d=%7B%27name%27%3Anull,%0D%0A%27msgID%27%3A%27%7C1__bd0a17fc00000193d11afb0644e88dbdf42f43bf%40esa1%2Emitchell%2Eiphmx%2Ecom%27,%0D%0A%27keysize%27%3A24,%0D%0A%27flags%27%3A2049,%0D%0A%27rid%27%3A%27bXlsZXMgb2xzb24gPG1vbHNvbkBmbW5lLmNvbT4%3D%27,%0D%0A%27algnames%27%3A%7B%27encryption%27%3A%7B%27data%27%3A%27AES%27%7D%7D,%0D%0A%27algparams%27%3A%7B%27encryption%27%3A%7B%27data%27%3A%7B%27IV%27%3A%27fIfkk05zUSO%2FRyO4cvoI%2Fg%3D%3D%27%7D%7D%7D,%0D%0A%27keyserverhost%27%3A%27res%2Ecisco%2Ecom%3A443%27,%0D%0A%27securereplyhost%27%3A%27res%2Ecisco%2Ecom%3A443%27,%0D%0A%27openerhost%27%3A%27res%2Ecisco%2Ecom%3A443%27,%0D%0A%27toc%27%3A%5B%0D%0A%5B%27Body-1734380026633%2Etxt%27,1,%0D%0A%27%27,%0D%0A%27%27,%0D%0A13,%5B0,6068%5D,%27Body-1734380026633%2Etxt%27,%0D%0A%27ISO-8859-1%27%5D,%0D%0A%5B%27image001%2Epng%27,2,%0D%0A%27%27,%0D%0A%27image001%2Epng%27,%0D%0A21,%5B6068,5520%5D,%27image001%2Epng%27,%0D%0A%27ISO-8859-1%27%5D,%0D%0A%5B%27MessageBar%2Ehtml%27,4,%0D%0A%27%27,%0D%0A%27%27,%0D%0A1,%5B11588,28407%5D,%27MessageBar%2Ehtml%27,%0D%0A%27ISO-8859-1%27%5D%0D%0A%5D,%0D%0A%27salt%27%3A%27SajcmDqehO0ww5fotwx%2BYKEuW8Q%3D%27,%0D%0A%27data%27%3A%5B%0D%0A%27%27,%27End6kG1Xup0qFCNKcCBJtK8AsyTDq9KNGkXBDtT8s%2FDCtoAz0jZKvni7SQAQLIsP5uEoMoOdwpaR%2Fzxd4k6iK9%2BKX2jwhtpxe5MULXIvVN7gN0i5EPlRtpz4poQ2NsYHjL1padlY8KX7fKJDbhj%2FC%2FB33RqS%2FFfEltRTJfjDcDbfKnCux0uBsZx%2Bn13mp9Hsb%2FVGJlato56ZrU%2FlaB2pur%2B0zsI3QzxWNHY330TnZriKCmhfEGqndLmUvj4FrrkVgfPqeLWewwqzjhs6kDtOX9pIZh%2B4QR4INVISkb%2FBhQcs7uzXpZGWOU4FQGElzBxxa3OvueTqqyrUwC1fUmn9KR2hOheIqVIWvO3Aezr84islcX%2FvdLIhc%2FOI7HWw8KIoLsqui8Ye0U%2BUcZuD5ZdnjrQ4dIQiQ%2F2WJIUNU1yRwaxK%2B9iIQfLDTpgjo9bWNow6XQ2mPZJpscAU5lAOPrKAp%2B%2FrfFZmPUOP%2B3RpIiUBBffDrCZnYjMny8maut9wic5YNmvKVioOeqTrV%2B6ht0tZnEfNSuA37dZr5B8jvahOG4X12s0NAbr3mF1TMOnES92y5Y9zLOAG3GFF0VjyyiWh5UlYiw7gYPmIgT%2BYJlkdeQ5JNeP5hkbWbjbU0T2zlosdhOXsxRj%2FcaLdMvNH2UjGE7YJOh%2Fdb%2FrU75PaImVog04wxbynHuFVN7q48jHrMgF%2BwZOJWq%2Fqlv6OMtOsTHlxADGl70YHcjLHM2X34aS60FiSO1%2FdBnd%2Bo6CtTh3wrH0eGemk%2FF%2FXuqBFnUfkn8c0nEXZey8P%2BeHPVdHrkWwYUpXPKJz7TzD%2FbgohlB1ZGds3vXUgMHUhXAvnt2YCb9v%2BgDZDmVJFdWyDCvPhhj16bGTcDolrfBPa3cO2bxTcxgAf%2FXL3sPpKgdOUwGqC0UbJgMUViXuvoVkqvHl5Eh4t6gGjafiB%2FzLyuft2z6PqsaX5OVA5ww5f9%2BRv86yuldx4URyQ%2Bev%2BwwX03OdRfB3AuOIFug%2FEicBhBnylABDAt%2BVm3aUXzeoWPcCniJVjmCqqRggF9MGVzKBKFRPRF7wqX7SVKNjkL60PVfsmy%2B8GOwCdKXdfsTJbmXMKxBF5ZeZHcOtnHIMimSmg092I2H%2FjRiMMrQoZvP2%2FzFog2Ye6yGmzDuTtX0EH9M7ygVAgpDnzPTKAtsdRG0rSpAw%2BgQZ1jHZKYFtBcjjyZpGJOXDrMJ51odoBQtypcqjSJ5mFobGfhRrlFdR0La2jX6BT%2BL4N9%2FzU54s8D8OCCiQb4mzjvto2fmVzwwezATmN1mE%2BrtuyRheOtQzAAiafms0JaEarN2Pai8uRILcUQAEA5S7rVy8mn8pBo4yLM%2F2G0Q8hoYR9B4WAattO%2BycCimm4AcDo%2FniNLO%2BuLFiGN0LznhoxgvWIgy%2BwICgZr%2BM7MaPSvMr9wQCBJ%2Fx6Z9m%2FrXvVAqhkkWiuHtbD%2BHaWL52CFZ306m6cvZxHGRzdqiU%2BVHXOKYnP%2Fyx2KysG3%2Fnyok89x0NM8B3i1u49h9Tq3GKOf9DFMnHrj4CQ%2FZ0VTiJ4bc%
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /envelopeopener/pf/ZGJAVG9rZW43ODc2OjIxNTQ5/kq2iUBINAy0.LOAHqcY9wMJ551awcCpdSHTCEfGwg4xsepncLRtPZWbVczvVBhFXPfzTCF.4Z9-fAN20QdqA7uIUBKS0bBzrXQ!!/?lp=en HTTP/1.1Host: res.cisco.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /envelopeopener/pf/ZGJAVG9rZW43ODc2OjIxNTQ5/kq2iUBINAy0.LOAHqcY9wMJ551awcCpdSHTCEfGwg4xsepncLRtPZWbVczvVBhFXPfzTCF.4Z9-fAN20QdqA7uIUBKS0bBzrXQ!!/?p=0&d=%7B%27name%27%3Anull,%0D%0A%27msgID%27%3A%27%7C1__bd0a17fc00000193d11afb0644e88dbdf42f43bf%40esa1%2Emitchell%2Eiphmx%2Ecom%27,%0D%0A%27keysize%27%3A24,%0D%0A%27flags%27%3A2049,%0D%0A%27rid%27%3A%27bXlsZXMgb2xzb24gPG1vbHNvbkBmbW5lLmNvbT4%3D%27,%0D%0A%27algnames%27%3A%7B%27encryption%27%3A%7B%27data%27%3A%27AES%27%7D%7D,%0D%0A%27algparams%27%3A%7B%27encryption%27%3A%7B%27data%27%3A%7B%27IV%27%3A%27fIfkk05zUSO%2FRyO4cvoI%2Fg%3D%3D%27%7D%7D%7D,%0D%0A%27keyserverhost%27%3A%27res%2Ecisco%2Ecom%3A443%27,%0D%0A%27securereplyhost%27%3A%27res%2Ecisco%2Ecom%3A443%27,%0D%0A%27openerhost%27%3A%27res%2Ecisco%2Ecom%3A443%27,%0D%0A%27toc%27%3A%5B%0D%0A%5B%27Body-1734380026633%2Etxt%27,1,%0D%0A%27%27,%0D%0A%27%27,%0D%0A13,%5B0,6068%5D,%27Body-1734380026633%2Etxt%27,%0D%0A%27ISO-8859-1%27%5D,%0D%0A%5B%27image001%2Epng%27,2,%0D%0A%27%27,%0D%0A%27image001%2Epng%27,%0D%0A21,%5B6068,5520%5D,%27image001%2Epng%27,%0D%0A%27ISO-8859-1%27%5D,%0D%0A%5B%27MessageBar%2Ehtml%27,4,%0D%0A%27%27,%0D%0A%27%27,%0D%0A1,%5B11588,28407%5D,%27MessageBar%2Ehtml%27,%0D%0A%27ISO-8859-1%27%5D%0D%0A%5D,%0D%0A%27salt%27%3A%27SajcmDqehO0ww5fotwx%2BYKEuW8Q%3D%27,%0D%0A%27data%27%3A%5B%0D%0A%27%27,%27End6kG1Xup0qFCNKcCBJtK8AsyTDq9KNGkXBDtT8s%2FDCtoAz0jZKvni7SQAQLIsP5uEoMoOdwpaR%2Fzxd4k6iK9%2BKX2jwhtpxe5MULXIvVN7gN0i5EPlRtpz4poQ2NsYHjL1padlY8KX7fKJDbhj%2FC%2FB33RqS%2FFfEltRTJfjDcDbfKnCux0uBsZx%2Bn13mp9Hsb%2FVGJlato56ZrU%2FlaB2pur%2B0zsI3QzxWNHY330TnZriKCmhfEGqndLmUvj4FrrkVgfPqeLWewwqzjhs6kDtOX9pIZh%2B4QR4INVISkb%2FBhQcs7uzXpZGWOU4FQGElzBxxa3OvueTqqyrUwC1fUmn9KR2hOheIqVIWvO3Aezr84islcX%2FvdLIhc%2FOI7HWw8KIoLsqui8Ye0U%2BUcZuD5ZdnjrQ4dIQiQ%2F2WJIUNU1yRwaxK%2B9iIQfLDTpgjo9bWNow6XQ2mPZJpscAU5lAOPrKAp%2B%2FrfFZmPUOP%2B3RpIiUBBffDrCZnYjMny8maut9wic5YNmvKVioOeqTrV%2B6ht0tZnEfNSuA37dZr5B8jvahOG4X12s0NAbr3mF1TMOnES92y5Y9zLOAG3GFF0VjyyiWh5UlYiw7gYPmIgT%2BYJlkdeQ5JNeP5hkbWbjbU0T2zlosdhOXsxRj%2FcaLdMvNH2UjGE7YJOh%2Fdb%2FrU75PaImVog04wxbynHuFVN7q48jHrMgF%2BwZOJWq%2Fqlv6OMtOsTHlxADGl70YHcjLHM2X34aS60FiSO1%2FdBnd%2Bo6CtTh3wrH0eGemk%2FF%2FXuqBFnUfkn8c0nEXZey8P%2BeHPVdHrkWwYUpXPKJz7TzD%2FbgohlB1ZGds3vXUgMHUhXAvnt2YCb9v%2BgDZDmVJFdWyDCvPhhj16bGTcDolrfBPa3cO2bxTcxgAf%2FXL3sPpKgdOUwGqC0UbJgMUViXuvoVkqvHl5Eh4t6gGjafiB%2FzLyuft2z6PqsaX5OVA5ww5f9%2BRv86yuldx4URyQ%2Bev%2BwwX03OdRfB3AuOIFug%2FEicBhBnylABDAt%2BVm3aUXzeoWPcCniJVjmCqqRggF9MGVzKBKFRPRF7wqX7SVKNjkL60PVfsmy%2B8GOwCdKXdfsTJbmXMKxBF5ZeZHcOtnHIMimSmg092I2H%2FjRiMMrQoZvP2%2FzFog2Ye6yGmzDuTtX0EH9M7ygVAgpDnzPTKAtsdRG0rSpAw%2BgQZ1jHZKYFtBcjjyZpGJOXDrMJ51odoBQtypcqjSJ5mFobGfhRrlFdR0La2jX6BT%2BL4N9%2FzU54s8D8OCCiQb4mzjvto2fmVzwwezATmN1mE%2BrtuyRheOtQzAAiafms0JaEarN2Pai8uRILcUQAEA5S7rVy8mn8pBo4yLM%2F2G0Q8hoYR9B4WAattO%2BycCimm4AcDo%2FniNLO%2BuLFiGN0LznhoxgvWIgy%2BwICgZr%2BM7MaPSvMr9wQCBJ%2Fx6Z9m%2FrXvVAqhkkWiuHtbD%2BHaWL52CFZ306m6cvZxHGRzdqiU%2BVHXOKYnP%2Fyx2KysG3%2Fnyok89x0NM8B3i1u49h9Tq3GKOf9DFMnHrj4CQ%2FZ0VTiJ4bc%
Source: global trafficHTTP traffic detected: GET /envelopeopener/pf/ZGJAVG9rZW43ODc2OjIxNTQ5/kq2iUBINAy0.LOAHqcY9wMJ551awcCpdSHTCEfGwg4xsepncLRtPZWbVczvVBhFXPfzTCF.4Z9-fAN20QdqA7uIUBKS0bBzrXQ!!/?button=google&lp=en HTTP/1.1Host: res.cisco.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /envelopeopener/pf/ZGJAVG9rZW43ODc2OjIxNTQ5/kq2iUBINAy0.LOAHqcY9wMJ551awcCpdSHTCEfGwg4xsepncLRtPZWbVczvVBhFXPfzTCF.4Z9-fAN20QdqA7uIUBKS0bBzrXQ!!/?button=ok&lp=en HTTP/1.1Host: res.cisco.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /envelopeopener/pf/ZGJAVG9rZW43ODc2OjIxNTQ5/kq2iUBINAy0.LOAHqcY9wMJ551awcCpdSHTCEfGwg4xsepncLRtPZWbVczvVBhFXPfzTCF.4Z9-fAN20QdqA7uIUBKS0bBzrXQ!!/?p=0&d=%7B%27name%27%3Anull,%0D%0A%27msgID%27%3A%27%7C1__bd0a17fc00000193d11afb0644e88dbdf42f43bf%40esa1%2Emitchell%2Eiphmx%2Ecom%27,%0D%0A%27keysize%27%3A24,%0D%0A%27flags%27%3A2049,%0D%0A%27rid%27%3A%27bXlsZXMgb2xzb24gPG1vbHNvbkBmbW5lLmNvbT4%3D%27,%0D%0A%27algnames%27%3A%7B%27encryption%27%3A%7B%27data%27%3A%27AES%27%7D%7D,%0D%0A%27algparams%27%3A%7B%27encryption%27%3A%7B%27data%27%3A%7B%27IV%27%3A%27fIfkk05zUSO%2FRyO4cvoI%2Fg%3D%3D%27%7D%7D%7D,%0D%0A%27keyserverhost%27%3A%27res%2Ecisco%2Ecom%3A443%27,%0D%0A%27securereplyhost%27%3A%27res%2Ecisco%2Ecom%3A443%27,%0D%0A%27openerhost%27%3A%27res%2Ecisco%2Ecom%3A443%27,%0D%0A%27toc%27%3A%5B%0D%0A%5B%27Body-1734380026633%2Etxt%27,1,%0D%0A%27%27,%0D%0A%27%27,%0D%0A13,%5B0,6068%5D,%27Body-1734380026633%2Etxt%27,%0D%0A%27ISO-8859-1%27%5D,%0D%0A%5B%27image001%2Epng%27,2,%0D%0A%27%27,%0D%0A%27image001%2Epng%27,%0D%0A21,%5B6068,5520%5D,%27image001%2Epng%27,%0D%0A%27ISO-8859-1%27%5D,%0D%0A%5B%27MessageBar%2Ehtml%27,4,%0D%0A%27%27,%0D%0A%27%27,%0D%0A1,%5B11588,28407%5D,%27MessageBar%2Ehtml%27,%0D%0A%27ISO-8859-1%27%5D%0D%0A%5D,%0D%0A%27salt%27%3A%27SajcmDqehO0ww5fotwx%2BYKEuW8Q%3D%27,%0D%0A%27data%27%3A%5B%0D%0A%27%27,%27End6kG1Xup0qFCNKcCBJtK8AsyTDq9KNGkXBDtT8s%2FDCtoAz0jZKvni7SQAQLIsP5uEoMoOdwpaR%2Fzxd4k6iK9%2BKX2jwhtpxe5MULXIvVN7gN0i5EPlRtpz4poQ2NsYHjL1padlY8KX7fKJDbhj%2FC%2FB33RqS%2FFfEltRTJfjDcDbfKnCux0uBsZx%2Bn13mp9Hsb%2FVGJlato56ZrU%2FlaB2pur%2B0zsI3QzxWNHY330TnZriKCmhfEGqndLmUvj4FrrkVgfPqeLWewwqzjhs6kDtOX9pIZh%2B4QR4INVISkb%2FBhQcs7uzXpZGWOU4FQGElzBxxa3OvueTqqyrUwC1fUmn9KR2hOheIqVIWvO3Aezr84islcX%2FvdLIhc%2FOI7HWw8KIoLsqui8Ye0U%2BUcZuD5ZdnjrQ4dIQiQ%2F2WJIUNU1yRwaxK%2B9iIQfLDTpgjo9bWNow6XQ2mPZJpscAU5lAOPrKAp%2B%2FrfFZmPUOP%2B3RpIiUBBffDrCZnYjMny8maut9wic5YNmvKVioOeqTrV%2B6ht0tZnEfNSuA37dZr5B8jvahOG4X12s0NAbr3mF1TMOnES92y5Y9zLOAG3GFF0VjyyiWh5UlYiw7gYPmIgT%2BYJlkdeQ5JNeP5hkbWbjbU0T2zlosdhOXsxRj%2FcaLdMvNH2UjGE7YJOh%2Fdb%2FrU75PaImVog04wxbynHuFVN7q48jHrMgF%2BwZOJWq%2Fqlv6OMtOsTHlxADGl70YHcjLHM2X34aS60FiSO1%2FdBnd%2Bo6CtTh3wrH0eGemk%2FF%2FXuqBFnUfkn8c0nEXZey8P%2BeHPVdHrkWwYUpXPKJz7TzD%2FbgohlB1ZGds3vXUgMHUhXAvnt2YCb9v%2BgDZDmVJFdWyDCvPhhj16bGTcDolrfBPa3cO2bxTcxgAf%2FXL3sPpKgdOUwGqC0UbJgMUViXuvoVkqvHl5Eh4t6gGjafiB%2FzLyuft2z6PqsaX5OVA5ww5f9%2BRv86yuldx4URyQ%2Bev%2BwwX03OdRfB3AuOIFug%2FEicBhBnylABDAt%2BVm3aUXzeoWPcCniJVjmCqqRggF9MGVzKBKFRPRF7wqX7SVKNjkL60PVfsmy%2B8GOwCdKXdfsTJbmXMKxBF5ZeZHcOtnHIMimSmg092I2H%2FjRiMMrQoZvP2%2FzFog2Ye6yGmzDuTtX0EH9M7ygVAgpDnzPTKAtsdRG0rSpAw%2BgQZ1jHZKYFtBcjjyZpGJOXDrMJ51odoBQtypcqjSJ5mFobGfhRrlFdR0La2jX6BT%2BL4N9%2FzU54s8D8OCCiQb4mzjvto2fmVzwwezATmN1mE%2BrtuyRheOtQzAAiafms0JaEarN2Pai8uRILcUQAEA5S7rVy8mn8pBo4yLM%2F2G0Q8hoYR9B4WAattO%2BycCimm4AcDo%2FniNLO%2BuLFiGN0LznhoxgvWIgy%2BwICgZr%2BM7MaPSvMr9wQCBJ%2Fx6Z9m%2FrXvVAqhkkWiuHtbD%2BHaWL52CFZ306m6cvZxHGRzdqiU%2BVHXOKYnP%2Fyx2KysG3%2Fnyok89x0NM8B3i1u49h9Tq3GKOf9DFMnHrj4CQ%2FZ0VTiJ4bc%
Source: global trafficDNS traffic detected: DNS query: static.cres-aws.com
Source: global trafficDNS traffic detected: DNS query: cdnjs.cloudflare.com
Source: global trafficDNS traffic detected: DNS query: res.cisco.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49694
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49694 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownHTTPS traffic detected: 23.218.208.109:443 -> 192.168.2.16:49706 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.218.208.109:443 -> 192.168.2.16:49719 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:49726 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:49759 version: TLS 1.2
Source: classification engineClassification label: mal60.phis.winHTML@17/27@28/190
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\securedoc_20241216T121346.html
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 --field-trial-handle=1768,i,13132331378037480680,11710520669971933826,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 --field-trial-handle=1768,i,13132331378037480680,11710520669971933826,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX

Stealing of Sensitive Information

barindex
Source: file:///C:/Users/user/Desktop/securedoc_20241216T121346.htmlHTTP Parser: file:///C:/Users/user/Desktop/securedoc_20241216T121346.html
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Browser Extensions
1
Process Injection
1
Masquerading
OS Credential Dumping1
System Information Discovery
Remote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Registry Run Keys / Startup Folder
1
Registry Run Keys / Startup Folder
1
Rundll32
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Extra Window Memory Injection
1
Process Injection
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Extra Window Memory Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
file:///C:/Users/user/Desktop/securedoc_20241216T121346.html0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
res.cisco.com
184.73.13.143
truefalse
    high
    cdnjs.cloudflare.com
    104.17.24.14
    truefalse
      high
      www.google.com
      142.250.181.68
      truefalse
        high
        d2qj7djftjbj85.cloudfront.net
        18.66.161.34
        truefalse
          unknown
          static.cres-aws.com
          unknown
          unknownfalse
            unknown
            NameMaliciousAntivirus DetectionReputation
            file:///C:/Users/user/Desktop/securedoc_20241216T121346.htmltrue
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            104.17.24.14
            cdnjs.cloudflare.comUnited States
            13335CLOUDFLARENETUSfalse
            172.217.19.206
            unknownUnited States
            15169GOOGLEUSfalse
            172.217.19.238
            unknownUnited States
            15169GOOGLEUSfalse
            1.1.1.1
            unknownAustralia
            13335CLOUDFLARENETUSfalse
            172.217.17.35
            unknownUnited States
            15169GOOGLEUSfalse
            18.235.210.193
            unknownUnited States
            14618AMAZON-AESUSfalse
            142.250.181.138
            unknownUnited States
            15169GOOGLEUSfalse
            184.73.13.143
            res.cisco.comUnited States
            14618AMAZON-AESUSfalse
            239.255.255.250
            unknownReserved
            unknownunknownfalse
            172.217.21.42
            unknownUnited States
            15169GOOGLEUSfalse
            142.250.181.68
            www.google.comUnited States
            15169GOOGLEUSfalse
            172.217.21.35
            unknownUnited States
            15169GOOGLEUSfalse
            64.233.162.84
            unknownUnited States
            15169GOOGLEUSfalse
            172.217.17.42
            unknownUnited States
            15169GOOGLEUSfalse
            44.199.0.156
            unknownUnited States
            14618AMAZON-AESUSfalse
            104.17.25.14
            unknownUnited States
            13335CLOUDFLARENETUSfalse
            18.66.161.34
            d2qj7djftjbj85.cloudfront.netUnited States
            3MIT-GATEWAYSUSfalse
            IP
            192.168.2.16
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1576362
            Start date and time:2024-12-16 22:02:47 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:defaultwindowsinteractivecookbook.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:16
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • EGA enabled
            Analysis Mode:stream
            Analysis stop reason:Timeout
            Sample name:securedoc_20241216T121346.html
            Detection:MAL
            Classification:mal60.phis.winHTML@17/27@28/190
            Cookbook Comments:
            • Found application associated with file extension: .html
            • Exclude process from analysis (whitelisted): dllhost.exe
            • Excluded IPs from analysis (whitelisted): 172.217.21.35, 172.217.19.238, 64.233.162.84, 142.250.181.138, 172.217.17.46, 172.217.21.42
            • Excluded domains from analysis (whitelisted): fs.microsoft.com, clients2.google.com, accounts.google.com, redirector.gvt1.com, slscr.update.microsoft.com, ajax.googleapis.com, clientservices.googleapis.com, clients.l.google.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • VT rate limit hit for: securedoc_20241216T121346.html
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Dec 16 20:03:26 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2673
            Entropy (8bit):3.9801924251798493
            Encrypted:false
            SSDEEP:
            MD5:BE101A70EE79B5C00D93A1869E88D4E6
            SHA1:14586B5C632DA1D7B6EAECA7F8058BAC10E0101D
            SHA-256:DBA43202582100C0982DDC46CEA3DBF277EA9A3472D46B29D3DF20D5B9D1DC8B
            SHA-512:CDD9C390260E89AA993711A0DD088C806388705D572B623F6C2E79E18CEBB0DFAFFAF2736181D63F9A30F40A6FCBB49D00F24AF9B7F043442FCFD563F3092641
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,....#.)..O..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Y`.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Yl.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Yl.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Yl............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Yn............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........jk2Y.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Dec 16 20:03:26 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2675
            Entropy (8bit):3.9946142491795382
            Encrypted:false
            SSDEEP:
            MD5:A64812CDBAB31CA974766DB79FF9A6D9
            SHA1:C4A95B45E864EB82DEC7D9D298C3B37C55C6B6E6
            SHA-256:FBDAFB29D60736FD57036E7307FF42D2CCBE7ED97C0901496C28C5DD29452295
            SHA-512:BD0A78946AD451E5F66EB05475A80E661E247BB88FE50CC46E61394654A9CB8399F50C955F19341EAADDF8F7FA226C50A85138B0B366D937055E73C78701452B
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,....Kc...O..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Y`.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Yl.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Yl.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Yl............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Yn............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........jk2Y.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2689
            Entropy (8bit):4.0040907593278625
            Encrypted:false
            SSDEEP:
            MD5:0D6D70DEEFC3151556803EC0A65807F1
            SHA1:5C5D21DCE85BBFA9F2D6F9741C90A55187462414
            SHA-256:FC18938A256F5A9CA844355751267ECA2C5751FD69D618A94ECDF1F40C753B2F
            SHA-512:75F3E688EDCA4554C5213256552B564DDCF0FFD51078D030DA257AD83AE0C3897E886036DEF9F318F2BA4E6FDD44F7A45D26154D9759D1A3E3B59CC12FB18FC4
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Y`.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Yl.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Yl.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Yl............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........jk2Y.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Dec 16 20:03:26 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2677
            Entropy (8bit):3.9928610925838695
            Encrypted:false
            SSDEEP:
            MD5:1F909EF34408D9466062D7A1214225F6
            SHA1:134FC14520F2F277439CA18D3F8E6B1CD33C01E9
            SHA-256:638B5C10884544C29829EEF9E44A2461EDE54F14645056F0ADDB02B90367345F
            SHA-512:A0E73C3E4E66AB70DDF01DA578025030BB08B22BDC3CEEC839B6D03A824C1B507C3CC11373A2B4ED6BA4F86EACB93450D6AD0C3C36C8FB06DCC0736324F3D821
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,.........O..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Y`.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Yl.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Yl.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Yl............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Yn............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........jk2Y.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Dec 16 20:03:26 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2677
            Entropy (8bit):3.98264225159571
            Encrypted:false
            SSDEEP:
            MD5:D49F5948CDFE5AE4D44BF2B8182765DC
            SHA1:454F581BE77B4B9F5ED251DCE1BB185D714ECCC2
            SHA-256:BA5815030F6CCEBBBB1234D6588AA7C8D0365ED78E4014142BC5AC01F676394D
            SHA-512:3876F964A6A51B1BE4BB2BC39A08776EF48E700F354CF28108282B4D90697901147D9D23F2D6C6DFC84A82A648915996F2256077A6BA494C0EE7FBC3F49F9B6D
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,.....R#..O..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Y`.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Yl.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Yl.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Yl............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Yn............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........jk2Y.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Dec 16 20:03:26 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2679
            Entropy (8bit):3.99159684139447
            Encrypted:false
            SSDEEP:
            MD5:A0CA74E96450A1EC9FDA869FB61F2E37
            SHA1:C1A93B60B279E9482638EAEA9A4C230EF2C82E58
            SHA-256:F8E261B2FB39C961FC52EBEB8D6AA941B2F60FFA137FD21F3DC5B2532E97C43D
            SHA-512:17D28ED1F9B9AE10E03A36788FF7C4786F6919C3C79867C9483E9F6A8CC7EC928360D31D9A36C22F012631EC515DFDA6CA0B2D344C8B6B85F8E5B9C19FDDB79C
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,.........O..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Y`.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Yl.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Yl.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Yl............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Yn............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........jk2Y.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:ASCII text, with very long lines (322), with CRLF, LF line terminators
            Category:downloaded
            Size (bytes):1238
            Entropy (8bit):5.409044181160082
            Encrypted:false
            SSDEEP:
            MD5:A0A71A41AFA47A5837C476A9D333F02D
            SHA1:12B73621F148BD9FB1A1639B03D9AF9DF65ED5D2
            SHA-256:C991F1644645A0C9CCEE939E72C15ADC28948B013DA8979512659D556BEECD37
            SHA-512:42482D507794C1115AD9547EC1C8A35718009538AA1B4F5FA527E1AD7D9AA01EE4D732083943B4439B2500344AEC6B7A8D71909D8A97AAFC78AD7974744E6F2D
            Malicious:false
            Reputation:unknown
            URL:https://res.cisco.com/keyserver/keyserver?su=MOlson%40fmne.com&df=&tf=&lp=en&v=2&m=%7c1__bd0a17fc00000193d11afb0644e88dbdf42f43bf%40esa1.mitchell.iphmx.com&s=1&f=0&d=1734383007929&action=open&j=1&jc=l_&jca=%22RPCRef%22%3apayload.rpc%2c%0a%22callback%22%3aqr&src=1&na=Netscape&nj=0&njs=1&nl=en-US&np=Win32&nu=Mozilla%2f5.0%20%28Windows%20NT%2010.0%3b%20Win64%3b%20x64%29%20AppleWebKit%2f537.36%20%28KHTML%2c%20like%20Gecko%29%20Chrome%2f117.0.0.0%20Safari%2f537.36&nv=5.0%20%28Windows%20NT%2010.0%3b%20Win64%3b%20x64%29%20AppleWebKit%2f537.36%20%28KHTML%2c%20like%20Gecko%29%20Chrome%2f117.0.0.0%20Safari%2f537.36
            Preview:if(l_)..l_({.."RPCRef":payload.rpc,."callback":qr..,'action':'open'..,'status':16..,'message':'Authentication required.'..,'state':1..,'reqTime':1734383007929..,'reqNumber':1..,'recipientIdentified':false..,'success':true..,'cookiesEnabled':true..,'hadRememberMe':false..,'hadEnablePSP':false..,'openOnline':false..,'recipient':'molson@fmne.com'..,'sessionId':'FD833C7B61A155B752A377827E7DE1D8'..,'lp':'en'..,'credentialsExpiredWarning':false..,'credentialsExpiredDays':-1..,'pswdExpLink':'https://res.cisco.com/websafe/custom.action?cmd=changeExpiredPassword&id=molson@fmne.com'..,'waitTime':50000..,'minPoll':1000..,'maxPoll':5000..,'totalPoll':1200000..,'supportedLocales':[['en','English (US)'],['nl_NL','Dutch'],['de','Deutsch'],['es','Espa\xf1ol'],['fr','Fran\xe7ais'],['it','Italiano'],['pl','Polski'],['pt','Portugu\xeas'],['ru','\u0420\u0443\u0441\u0441\u043a\u0438\u0439'],['zh_CN','\u4e2d\u6587(\u7b80\u4f53)'],['ja','\u65e5\u672c\u8a9e'],['ko','\ud55c\uad6d\uc5b4']]..,'sensitivity':'High
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:GIF image data, version 89a, 1280 x 808
            Category:dropped
            Size (bytes):10598
            Entropy (8bit):7.973575732670468
            Encrypted:false
            SSDEEP:
            MD5:C22D6210FC87C4743002CEA8A581D766
            SHA1:F0050B25B3FCBF863695CFD025E611A98A353CC8
            SHA-256:A0DF8C2C2AAF954F3F45E88A82B2F15AB918BA9DA08EB7BE21569C6143BA5262
            SHA-512:2F22F7109C4F45D8760011CC7FD25A0740FA647D3148ABB3C493F9FF162E799B9FD9CE7294ED9730CAE6E6D825EFB5FA23BF127128B020FDE3C134BCFAD0AC5F
            Malicious:false
            Reputation:unknown
            Preview:GIF89a..(................!.......!..ImageMagick.gamma=0.454545.,......(....................H........L..............L*.....J.....j..........N....................(8HXhx..........)9IYiy..........*:JZjz..........+;K[k{..........,<L\l|..........-=M]m}...........>N^n~........../?O_o..........0......<.0....:|.1...+Z..1....;z..2..$K.<.2..,[.|.3..4k..3..<{...4..D..=.4..L.:}.5..T.Z..5..\.z..6..d.=.6..l.}.7..t...7..|....8......>.8....;~.9...+[..9...;{..:..]...6=.....R.;.;6l.d.FM;...s.....:.....E.....;..S.....N.z...ok..=..I...V...F.......C...OV...@.......s..GH....."x...1H.w.z.a..*7`..\...yp.......x.X..#.h..r........o........m.....Y..j.i[.F..d.K..lO2.elS.Q%lJ^yJ..q)...m..(b.Vf.g..&).6.&.k..g(s.Y'.s.i.|j...)h.....t"J..^..U8*)%.V*...Fr.Oh.#.......2.I..*"..j......C.j. .........=.*,........~..24.l..F[...h.+d....v......-.k.......'.+..k.;...~.."../........j...$...7....G1...Hl...g\.../.....+....|r...1.*....1......L.8..s....0.>......m
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:ASCII text, with CRLF, LF line terminators
            Category:dropped
            Size (bytes):489
            Entropy (8bit):5.223044776140686
            Encrypted:false
            SSDEEP:
            MD5:7867FF4DF2BCACAEEF139E2C9099DF87
            SHA1:E56A7F49080A37B329A247977DD2210FE1ACD327
            SHA-256:FB397F17246EAAAB652090133C2F18611280CF6B82ABA4E8F6537C7EC5D29AA6
            SHA-512:D50864069F21ED6A2A839A8042A225F866BEB2819F66F067EF0355FF6D41F87CA778EFF66DD7EE0EC2F207F5E8B74E1E6E91DA586C865EEFD6F7E21B0849EF2E
            Malicious:false
            Reputation:unknown
            Preview:if(l_)..l_({.."RPCRef":payload.rpc,."callback":qp..,'action':'open'..,'status':23..,'message':''..,'state':9..,'locale':'en'..,'reqTime':1734383014379..,'reqNumber':6..,'success':true..,'sessionId':'FD833C7B61A155B752A377827E7DE1D8'..,'recipient':''..,'cacheFlags':0..,'openOnline':false..,'requestState':-1..,'createDateEpoch':1734380027000..,'createDate':'12/16/2024 08:13:47\xa0PM\xa0GMT'..,'offerLogout':true..,'credentialsExpiredWarning':'false'..,'credentialsExpiredDays':'-1'..});..
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:assembler source, ASCII text, with very long lines (554)
            Category:downloaded
            Size (bytes):125394
            Entropy (8bit):5.069062799454485
            Encrypted:false
            SSDEEP:
            MD5:A0B4FF216E038470B000B63F5AA39816
            SHA1:319D6BB77F2115DA9F977569477AC010F87E6386
            SHA-256:7A61694ACF36F22050B90F751DBAFC330D5025471F83F5C08F663CD2633448F7
            SHA-512:A3B38E3CC9B204D809DBAEEB1417E878EFA9A2D8AAF9E311051FF6FEDD1C1F92F89901274EBD43A163F03D42567D6586063333A3ECDDC128A64773315BB1B094
            Malicious:false
            Reputation:unknown
            URL:https://static.cres-aws.com/postx.css
            Preview:/* Inter Font Library */..@font-face {. font-family: "Inter";. font-weight: 100;. src: url("./fonts/Inter/Inter-Thin.ttf") format("truetype");.}..@font-face {. font-family: "Inter";. font-weight: 200;. src: url("./fonts/Inter/Inter-ExtraLight.ttf") format("truetype");.}..@font-face {. font-family: "Inter";. font-weight: 300;. src: url("./fonts/Inter/Inter-Light.ttf") format("truetype");.}..@font-face {. font-family: "Inter";. font-weight: 400;. src: url("./fonts/Inter/Inter-Regular.ttf") format("truetype");.}..@font-face {. font-family: "Inter";. font-weight: 500;. src: url("./fonts/Inter/Inter-Medium.ttf") format("truetype");.}..@font-face {. font-family: "Inter";. font-weight: 600;. src: url("./fonts/Inter/Inter-SemiBold.ttf") format("truetype");.}..@font-face {. font-family: "Inter";. font-weight: 700;. src: url("./fonts/Inter/Inter-Bold.ttf") format("truetype");.}..@font-face {. font-family: "Inter";. font-weight: 800;. src: url("./fonts/Inter/Inter-ExtraBol
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:ASCII text, with very long lines (14965)
            Category:downloaded
            Size (bytes):14966
            Entropy (8bit):4.771466859662571
            Encrypted:false
            SSDEEP:
            MD5:9F54E6414F87E0D14B9E966F19A174F9
            SHA1:AE5735562FAABD1A2D9803BBD7BF4C502B5E4F51
            SHA-256:15D6AD4DFDB43D0AFFAD683E70029F97A8F8FC8637A28845009EE0542DCCDF81
            SHA-512:9CC365A6E6833EBAA5125B37217FD0E7A1F7EAABC1012C1BDE2A6EA373317966EC401D7CF35A31D1C46FED43D380196B8AAA329EDDF92A313080651E51720F9F
            Malicious:false
            Reputation:unknown
            URL:https://cdnjs.cloudflare.com/ajax/libs/select2/4.0.12/css/select2.min.css
            Preview:.select2-container{box-sizing:border-box;display:inline-block;margin:0;position:relative;vertical-align:middle}.select2-container .select2-selection--single{box-sizing:border-box;cursor:pointer;display:block;height:28px;user-select:none;-webkit-user-select:none}.select2-container .select2-selection--single .select2-selection__rendered{display:block;padding-left:8px;padding-right:20px;overflow:hidden;text-overflow:ellipsis;white-space:nowrap}.select2-container .select2-selection--single .select2-selection__clear{position:relative}.select2-container[dir="rtl"] .select2-selection--single .select2-selection__rendered{padding-right:8px;padding-left:20px}.select2-container .select2-selection--multiple{box-sizing:border-box;cursor:pointer;display:block;min-height:32px;user-select:none;-webkit-user-select:none}.select2-container .select2-selection--multiple .select2-selection__rendered{display:inline-block;overflow:hidden;padding-left:8px;text-overflow:ellipsis;white-space:nowrap}.select2-cont
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:ASCII text, with no line terminators
            Category:downloaded
            Size (bytes):60
            Entropy (8bit):4.7127449207461085
            Encrypted:false
            SSDEEP:
            MD5:C14CD9F76EDBB3D891B59EF071E335E7
            SHA1:0EEF7116877677EE12E2C501ACDD7BC841E5EC1D
            SHA-256:96FBB08E143F72357FF0AC9984EA9274BC6FF36F78FC2BD66E045DEFB66EA839
            SHA-512:F4C47CCF22A52C4F3F7C428AADA6D44537D40B91CAC14BD15E59DC4407F9C88DCBA9DBA828A6918C38C508072C8B97323613801B5D69CCBEE638112BF6C91E9E
            Malicious:false
            Reputation:unknown
            URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISEAl91Ys6YFXz2BIFDfTvjPk=?alt=proto
            Preview:CikKJw3074z5GgQISxgCKhoIClIWCgwhQCQjKi4tJis/JV8QARj/////Dw==
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:TrueType Font data, 16 tables, 1st "GDEF", 12 names, Microsoft, language 0x409, Copyright 2020 The Inter Project Authors (https://github.com/rsms/inter)InterBold3.019;RSMS;Inte
            Category:downloaded
            Size (bytes):309772
            Entropy (8bit):6.315392152109917
            Encrypted:false
            SSDEEP:
            MD5:D17C0274915408CEE0308D5476DF9F45
            SHA1:444CDCA680F8CE64C16FE5A606DCFBE4B33E7925
            SHA-256:F9342F2D916AA89C924BC2ADCC1D3BFBB6EB54675E48953BACC49024FC768F76
            SHA-512:2C38DE878D1F6D254090555B9FDF517CCCC641457020A577DADB73056F04E25488328C27129E146C10456EAA97AE5E9077DFE5B88C1A1DF5015FD1DA5A289CEC
            Malicious:false
            Reputation:unknown
            URL:https://static.cres-aws.com/fonts/Inter/Inter-Bold.ttf
            Preview:............GDEF1.1...F.....GPOS..2/..J...,.GSUB..fx..w...B.OS/2#.nB..yP...`STAT...G.......Dcmap/....y...e.gasp......E.....glyf..5.......(+head-.aF..Q(...6hhea......y,...$hmtx7."...Q`..'.loca......)X..'.maxp......)8... name00T....D....post..5r...\..d.preph......<.......#...i................!...!...!...!...!..#.F...F...F...F...F.......@.........................C............!!.!.!.#.!.!...0.......0......H.......,.......C.....i.......#..!!.!.!.#.!.!."&54632....!"&54632.......0.......0......H...V||VWyy..V||VWyy.....,......ySUvvUSyySUvvUSy...C.....^.&.......l.v.....C.......&.......f.......C.......&.......d.n.....C.....~.&.......j.......C.............&..!!.!.!.#.!.!."&546632......'2654&#........0.......0......H...'..S.UU.SS.U8NN88ON.....,.......|S.QQ.SS.Q.L76L.L66M...C.....?.&.........V.p...C.......&.......v.^.....C.......&.......m.......C.......&.......n.v.....C.......&.......v.^.....C.....~.&.......s.......C.......&...............C.......&...............C.......&.......{.......C.......&..
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:TrueType Font data, 16 tables, 1st "GDEF", 14 names, Microsoft, language 0x409, Copyright 2020 The Inter Project Authors (https://github.com/rsms/inter)Inter SemiBoldRegular3.0
            Category:downloaded
            Size (bytes):309432
            Entropy (8bit):6.313238065412327
            Encrypted:false
            SSDEEP:
            MD5:1753A05196ABEEF95C32F10246BD6473
            SHA1:ACDA92ADC6CF8C67C89395C65F371A4D2B05A783
            SHA-256:F5595839DEBDB0D028116ED8A7579F31D1C2F712677A2E794459A5DCE6ECA929
            SHA-512:68AA83B7521EFDD53D810E5BC8A6AC0F211CBB989CBA9C317D5AD196FFA08D439CC096C823305D5316D5B0D17FB9D6ED6E39CD0A28E0B2478A2DCCE01D78B760
            Malicious:false
            Reputation:unknown
            URL:https://static.cres-aws.com/fonts/Inter/Inter-SemiBold.ttf
            Preview:............GDEF1.1...D.....GPOS...t..H...-.GSUB..fx..u...B.OS/2#_nb..w....`STAT.y.E...t...Dcmap/....x...e.gasp......D.....glyfj.........&.head-.aF..O....6hhea......w....$hmtx$5.9..O...'.loca..)...'...'.maxp......'.... name7\`.......Ppost..5r......d.preph.................C................!...!...!...!...!............................@.........................E............!!.!.!.#.!.!...t.......t......8.......\.......E.....[.......#..!!.!.!.#.!.!."&54632....!"&54632.......t.......t......8...OssOQoo..OssOQoo.....\......pLPmmPLppLPmmPLp...E.....V.&.......l.d.....E.......&.......f.......E.......&.......d.R.....E.....v.&.......j.......E.............&..!!.!.!.#.!.!."&546632......'6654&.".......t.......t......8....}.Q.ST.QQ.T:PO;:OO.....\.......{R.PP.RR.P..O88P.O88P...E.....).&.........B.....E.......&.......v.......E.......&.......m.......E.......&.......n.d.....E.......&.......v.......E.....v.&.......s.......E.......&.........N.....E.......&.........b.....E.......&.......{.......E.......&.
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:ASCII text, with very long lines (322), with CRLF, LF line terminators
            Category:dropped
            Size (bytes):1238
            Entropy (8bit):5.4077899828998826
            Encrypted:false
            SSDEEP:
            MD5:113F76A99D68895B9AD8E0C4C0C6451B
            SHA1:A8A6FEB66477D11CD8BECCA301CDBA93F5A0B14B
            SHA-256:C517B9B5E8F7C284BF49426BBCA1471A9F9A7C8DE3F8BBD84B826DA47B1CDAB2
            SHA-512:B5D41DAFC97C39108FC77377E60B9E7D01C747D217F30D360A8566226D95CBE2863837893DDF7FF4B30D69EC06BCBFE4C254F9B4F624B268545E9CBD64FEB5AF
            Malicious:false
            Reputation:unknown
            Preview:if(l_)..l_({.."RPCRef":payload.rpc,."callback":qr..,'action':'open'..,'status':16..,'message':'Authentication required.'..,'state':1..,'reqTime':1734383082808..,'reqNumber':5..,'recipientIdentified':false..,'success':true..,'cookiesEnabled':true..,'hadRememberMe':false..,'hadEnablePSP':false..,'openOnline':false..,'recipient':'molson@fmne.com'..,'sessionId':'FD833C7B61A155B752A377827E7DE1D8'..,'lp':'en'..,'credentialsExpiredWarning':false..,'credentialsExpiredDays':-1..,'pswdExpLink':'https://res.cisco.com/websafe/custom.action?cmd=changeExpiredPassword&id=molson@fmne.com'..,'waitTime':50000..,'minPoll':1000..,'maxPoll':5000..,'totalPoll':1200000..,'supportedLocales':[['en','English (US)'],['nl_NL','Dutch'],['de','Deutsch'],['es','Espa\xf1ol'],['fr','Fran\xe7ais'],['it','Italiano'],['pl','Polski'],['pt','Portugu\xeas'],['ru','\u0420\u0443\u0441\u0441\u043a\u0438\u0439'],['zh_CN','\u4e2d\u6587(\u7b80\u4f53)'],['ja','\u65e5\u672c\u8a9e'],['ko','\ud55c\uad6d\uc5b4']]..,'sensitivity':'High
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:ASCII text, with very long lines (48316), with no line terminators
            Category:dropped
            Size (bytes):48316
            Entropy (8bit):5.6346993394709
            Encrypted:false
            SSDEEP:
            MD5:2CA03AD87885AB983541092B87ADB299
            SHA1:1A17F60BF776A8C468A185C1E8E985C41A50DC27
            SHA-256:8E3B0117F4DF4BE452C0B6AF5B8F0A0ACF9D4ADE23D08D55D7E312AF22077762
            SHA-512:13C412BD66747822C6938926DE1C52B0D98659B2ED48249471EC0340F416645EA9114F06953F1AE5F177DB03A5D62F1FB5D321B2C4EB17F3A1C865B0A274DC5C
            Malicious:false
            Reputation:unknown
            Preview:!function(t,e){"object"==typeof exports?module.exports=exports=e():"function"==typeof define&&define.amd?define([],e):t.CryptoJS=e()}(this,function(){var n,o,s,a,h,t,e,l,r,i,c,f,d,u,p,S,x,b,A,H,z,_,v,g,y,B,w,k,m,C,D,E,R,M,F,P,W,O,I,U=U||function(h){var i;if("undefined"!=typeof window&&window.crypto&&(i=window.crypto),"undefined"!=typeof self&&self.crypto&&(i=self.crypto),!(i=!(i=!(i="undefined"!=typeof globalThis&&globalThis.crypto?globalThis.crypto:i)&&"undefined"!=typeof window&&window.msCrypto?window.msCrypto:i)&&"undefined"!=typeof global&&global.crypto?global.crypto:i)&&"function"==typeof require)try{i=require("crypto")}catch(t){}var r=Object.create||function(t){return e.prototype=t,t=new e,e.prototype=null,t};function e(){}var t={},n=t.lib={},o=n.Base={extend:function(t){var e=r(this);return t&&e.mixIn(t),e.hasOwnProperty("init")&&this.init!==e.init||(e.init=function(){e.$super.init.apply(this,arguments)}),(e.init.prototype=e).$super=this,e},create:function(){var t=this.extend();
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:ASCII text, with CRLF, LF line terminators
            Category:downloaded
            Size (bytes):489
            Entropy (8bit):5.218523478182648
            Encrypted:false
            SSDEEP:
            MD5:B1BB79608AB556CC3CAE9B4A978034CA
            SHA1:1A1F5E08914AAF3A1451B75C5F7AF9C85E1D3D88
            SHA-256:1240ABC1A99D00B0EA4AE621EBEA26C00E067F6A24752EB4AA175932B562FD77
            SHA-512:7981189C05616A7ECAF77F0C7F1626A54E5C443C2112FB67C36C5A94CFFD87699F881ED37EFE0F91FC3F9D25F0E79217D63DA19BAA38CA5E451516041A300AE0
            Malicious:false
            Reputation:unknown
            URL:https://res.cisco.com/keyserver/keyserver?su=molson%40fmne.com&df=&tf=&lp=en&ck=0&v=2&m=%7c1__bd0a17fc00000193d11afb0644e88dbdf42f43bf%40esa1.mitchell.iphmx.com&s=9&f=0&d=1734383014379&action=open&prd=3633&prn=1&j=1&jc=l_&jca=%22RPCRef%22%3apayload.rpc%2c%0a%22callback%22%3aqp&src=1&na=Netscape&nj=0&njs=1&nl=en-US&np=Win32&nu=Mozilla%2f5.0%20%28Windows%20NT%2010.0%3b%20Win64%3b%20x64%29%20AppleWebKit%2f537.36%20%28KHTML%2c%20like%20Gecko%29%20Chrome%2f117.0.0.0%20Safari%2f537.36&nv=5.0%20%28Windows%20NT%2010.0%3b%20Win64%3b%20x64%29%20AppleWebKit%2f537.36%20%28KHTML%2c%20like%20Gecko%29%20Chrome%2f117.0.0.0%20Safari%2f537.36
            Preview:if(l_)..l_({.."RPCRef":payload.rpc,."callback":qp..,'action':'open'..,'status':23..,'message':''..,'state':9..,'locale':'en'..,'reqTime':1734383014379..,'reqNumber':3..,'success':true..,'sessionId':'FD833C7B61A155B752A377827E7DE1D8'..,'recipient':''..,'cacheFlags':0..,'openOnline':false..,'requestState':-1..,'createDateEpoch':1734380027000..,'createDate':'12/16/2024 08:13:47\xa0PM\xa0GMT'..,'offerLogout':true..,'credentialsExpiredWarning':'false'..,'credentialsExpiredDays':'-1'..});..
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:SVG Scalable Vector Graphics image
            Category:downloaded
            Size (bytes):387
            Entropy (8bit):5.179130709592589
            Encrypted:false
            SSDEEP:
            MD5:1F6AF349658BA40D72AA4C87AECC722A
            SHA1:E3ABD390D66D37C5C245C6AD172E5433584E2B39
            SHA-256:042CD20A95524AAAE53879E8D0210E9D79F0EB9E42E7C6E25EE4A8BDE703FAC0
            SHA-512:4A508F8F4AF98DAEC5218A4B38103898661D1B430783DE4DB314F1EA9D1D891B85987DF734D9697A49A03F23E54B8B137E16B64E519658351EBADD7330E4C79D
            Malicious:false
            Reputation:unknown
            URL:https://res.cisco.com/websafe/images/pullFeature/arrowDown.svg
            Preview:<?xml version="1.0" encoding="UTF-8"?><svg id="a" xmlns="http://www.w3.org/2000/svg" .viewBox="0 0 16 16">.<defs><style>.b{fill:#ffffff;fill-rule:evenodd;}</style>.</defs>.<path class="b" d="M3.881,6.131c.342-.342,.896-.342,1.237,0l2.881,2.881,2.881-2.881c.342-.342,.896-.342,1.237,0s.342,.896,0,1.237l-3.5,3.5c-.342,.342-.896,.342-1.237,0l-3.5-3.5c-.342-.342-.342-.896,0-1.237Z"/></svg>
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:PNG image data, 410 x 410, 8-bit/color RGBA, non-interlaced
            Category:downloaded
            Size (bytes):62336
            Entropy (8bit):7.979381724755323
            Encrypted:false
            SSDEEP:
            MD5:CFF524DE6437DC8824753BEDCF6901B3
            SHA1:78E043DDD5A72F02904B4C77505AA777991A1D60
            SHA-256:8FFE73610C4C1E7D09BAA8134741165F2DE6848F191C4D637AFFDAAA253CF519
            SHA-512:CC9CBCD84114EA25C26339032B7FB70BF7042FE3E11EAE74F2CD4A3110F4BA7A342099ACC68358076BF26306334BEA2F53E93042066B9F6E44F07C75AB749C58
            Malicious:false
            Reputation:unknown
            URL:https://res.cisco.com/websafe/images/skins/googleSignIn.png
            Preview:.PNG........IHDR.............6..c....iCCPICC Profile..H..W.XS...[R..-..)...] .. .l.$@(.....]Tp."...+"......]Y.{.(.....l..I.]_........9g.3...........T..\a.(&$.....$.............GGG.(#....M.H.kv.X.:._E...s.@.!N........... .C...<)..XS...@.8C...8M.me6q1l.Y.....(...)of!7..Q.rt...B.7C..... ...mn...U..[.}.'.o1.Fcr8..X..L..q^.g.....[rs$#s..F....Hs..;{F..S!n..EFA.....Of/.w3%....~.....0.|.<N`8.z.3$........|.=.)(..S.4..E|.P......,..6.......tAp....#E.q.r..BAB$.*.w..c.....2.#6"I...).o.E.1r.L;W<..f.......2.B.X._..1.....s.x|a.....+ F.[.......9!1.u....cG|........8.3!Z1....897........H`K.3@..t.7.._.`.."....N...H....3...?!..._.l......V.....B.G6x.q......x.|.`s.=p..?.... b 1..L......s`.........r....-..)...p..M.....Y...tA....L0.t.h......7..]......q.....q0.........3..r...?.'e.}>.......E..a.Z.......`...%..;...Na.....0..X......Jx"....bd.a....c.c......(....?.@.1.g....22...p7.3.\{[....'..].u.a..l.q......R......p.)..w.t&.a....x'W"*...1 ...U.U...`.,a>...x.....@....`.\.L..9..
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:TrueType Font data, 16 tables, 1st "GDEF", 14 names, Microsoft, language 0x409, Copyright 2020 The Inter Project Authors (https://github.com/rsms/inter)Inter LightRegular3.019;
            Category:downloaded
            Size (bytes):304092
            Entropy (8bit):6.319721866705066
            Encrypted:false
            SSDEEP:
            MD5:60C8F64064078554B6469EEDA25944EB
            SHA1:732E278A85762A0EDFB4E077E44E3EB39D8AF92E
            SHA-256:7FB161BBEB1C03F21D9A80601400D803E7EA7DD6FC8EA164F2B2A073E7722953
            SHA-512:57F3E7EC496FCA463848AC63E5BD6EC0967A1CC461D0580868B0625DCA78ECEC14FC13391E4B8F1BA08A598DFAF3DD08D721AD2B5AD31C35B9CC9BFAB3CFA03F
            Malicious:false
            Reputation:unknown
            URL:https://static.cres-aws.com/fonts/Inter/Inter-Light.ttf
            Preview:............GDEF1.1...;l....GPOSDT{6..?...!dGSUB..fx..`...B.OS/2"3nb..n....`STAT.M.?.......Dcmap/....n...e.gasp......;d....glyf...........qhead-.aF..Fp...6hhea......nt...$hmtx......F...'.loca.]........'.maxp........... name5.\.......8post..5r......d.preph..................................!...!...!...!...!...........................@.........................O............!#.3.#.#.!.!..........~...................O.............#..!#.3.#.#.!.!."&54632....!"&54632..............~........3MM37II..3MM37II...........M37II73MM37II73M...O...../.&.......l.4.....O.......&.......f.O.....O.......&.......d.......O.....P.&.......j.,.....O.............&..!#.3.#.#.!.!."&546632......'2654&#"..............~.........p.H{JKzHHzK@WW@@WW............pKzHHzKJ{HuY?@XY?@X...O.......&...............O...'...&.......v.......O.......&.......m.m.....O.......&.......n.4.....O...'...&.......v.......O.....a.&.......s.,.....O.......&...............O.......&...............O.......&.......{.L.....O.....g.&...............O
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=1, copyright=sandra cifo. www.cifography.com. 2016], baseline, precision 8, 1440x960, components 3
            Category:downloaded
            Size (bytes):51646
            Entropy (8bit):7.866024072803453
            Encrypted:false
            SSDEEP:
            MD5:E38D601F1F6EF6663954EC55183C5FDE
            SHA1:63D466158889D3043056ACDFBF330F16E55DA498
            SHA-256:9B8699D04D29EC9D28E06E4953C40AADE72619EF9813F25632E25DD5FFDBC89C
            SHA-512:18A6DC392E478161B8EED8C45D69E46E6CA12D0FF7D07FF2C310F31CD7818A34646FB4AB4A7E4EE95BED95AC69E685E799DBFCCCD42179B7C2907A0387C72E31
            Malicious:false
            Reputation:unknown
            URL:https://res.cisco.com/websafe/images/loginbg.gif
            Preview:.....JExif..II*...........&...........sandra cifo. www.cifography.com. 2016.......Ducky..............http://ns.adobe.com/xap/1.0/.<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c145 79.163499, 2018/08/13-16:40:22 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmpMM:OriginalDocumentID="336EC317CA114058096C1124050B0AA8" xmpMM:DocumentID="xmp.did:36715E7A1D7511EABBCCF15DA342EC86" xmpMM:InstanceID="xmp.iid:36715E791D7511EABBCCF15DA342EC86" xmp:CreatorTool="Adobe Photoshop CC 2019 (Macintosh)"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:DAB4B4FD077711EAA675C9DC7313E7A3" stRef:documentID="xmp.did:DAB4B4FE077711EAA675C9DC7313E7A3"/> <dc:rights> <rdf:Alt> <rdf:li xml:lang="x-
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:ASCII text, with very long lines (322), with CRLF, LF line terminators
            Category:downloaded
            Size (bytes):1238
            Entropy (8bit):5.4073613184658385
            Encrypted:false
            SSDEEP:
            MD5:712B7E583839C91652D7A94EFD6A0493
            SHA1:E123ABC6D933E2DD4EFC3A9CAB51064959ADF5AF
            SHA-256:ECFEF0BE726DA0070E8E42FB29958256350ED8F797BD2D043978859C32BA8893
            SHA-512:21FDA9E2E7C6A57005511A8FF9851D284917C5A8E37C84A2BABA91D4B99B2538018CA5F93195622C2EAF762E5C290C0E27DE05B59AAADD8BA74CABC458397732
            Malicious:false
            Reputation:unknown
            URL:https://res.cisco.com/keyserver/keyserver?su=MOlson%40fmne.com&df=&tf=&lp=en&v=2&m=%7c1__bd0a17fc00000193d11afb0644e88dbdf42f43bf%40esa1.mitchell.iphmx.com&s=1&f=0&d=1734383082808&action=open&j=1&jc=l_&jca=%22RPCRef%22%3apayload.rpc%2c%0a%22callback%22%3aqr&src=1&na=Netscape&nj=0&njs=1&nl=en-US&np=Win32&nu=Mozilla%2f5.0%20%28Windows%20NT%2010.0%3b%20Win64%3b%20x64%29%20AppleWebKit%2f537.36%20%28KHTML%2c%20like%20Gecko%29%20Chrome%2f117.0.0.0%20Safari%2f537.36&nv=5.0%20%28Windows%20NT%2010.0%3b%20Win64%3b%20x64%29%20AppleWebKit%2f537.36%20%28KHTML%2c%20like%20Gecko%29%20Chrome%2f117.0.0.0%20Safari%2f537.36
            Preview:if(l_)..l_({.."RPCRef":payload.rpc,."callback":qr..,'action':'open'..,'status':16..,'message':'Authentication required.'..,'state':1..,'reqTime':1734383082808..,'reqNumber':4..,'recipientIdentified':false..,'success':true..,'cookiesEnabled':true..,'hadRememberMe':false..,'hadEnablePSP':false..,'openOnline':false..,'recipient':'molson@fmne.com'..,'sessionId':'FD833C7B61A155B752A377827E7DE1D8'..,'lp':'en'..,'credentialsExpiredWarning':false..,'credentialsExpiredDays':-1..,'pswdExpLink':'https://res.cisco.com/websafe/custom.action?cmd=changeExpiredPassword&id=molson@fmne.com'..,'waitTime':50000..,'minPoll':1000..,'maxPoll':5000..,'totalPoll':1200000..,'supportedLocales':[['en','English (US)'],['nl_NL','Dutch'],['de','Deutsch'],['es','Espa\xf1ol'],['fr','Fran\xe7ais'],['it','Italiano'],['pl','Polski'],['pt','Portugu\xeas'],['ru','\u0420\u0443\u0441\u0441\u043a\u0438\u0439'],['zh_CN','\u4e2d\u6587(\u7b80\u4f53)'],['ja','\u65e5\u672c\u8a9e'],['ko','\ud55c\uad6d\uc5b4']]..,'sensitivity':'High
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:ASCII text, with very long lines (322), with CRLF, LF line terminators
            Category:dropped
            Size (bytes):1238
            Entropy (8bit):5.409501213795208
            Encrypted:false
            SSDEEP:
            MD5:E27CE294101F9AED03F5D06E03641B4F
            SHA1:18D28E05C8964148CF93B4B2A5C7952229F9CDE6
            SHA-256:E81F31745B7C70F7F4AA947CAB9DD70348357C8B8861FDD9F12D3103695795A9
            SHA-512:2D2AA00AECE1508F4A10FA5FF9346783E157C4A0C1C19AB8AACCA1D855751A5CA86251ED148EAA60DA7FB493265053F0FC4B9D01B654A78F8930513541FC389C
            Malicious:false
            Reputation:unknown
            Preview:if(l_)..l_({.."RPCRef":payload.rpc,."callback":qr..,'action':'open'..,'status':16..,'message':'Authentication required.'..,'state':1..,'reqTime':1734383007929..,'reqNumber':2..,'recipientIdentified':false..,'success':true..,'cookiesEnabled':true..,'hadRememberMe':false..,'hadEnablePSP':false..,'openOnline':false..,'recipient':'molson@fmne.com'..,'sessionId':'FD833C7B61A155B752A377827E7DE1D8'..,'lp':'en'..,'credentialsExpiredWarning':false..,'credentialsExpiredDays':-1..,'pswdExpLink':'https://res.cisco.com/websafe/custom.action?cmd=changeExpiredPassword&id=molson@fmne.com'..,'waitTime':50000..,'minPoll':1000..,'maxPoll':5000..,'totalPoll':1200000..,'supportedLocales':[['en','English (US)'],['nl_NL','Dutch'],['de','Deutsch'],['es','Espa\xf1ol'],['fr','Fran\xe7ais'],['it','Italiano'],['pl','Polski'],['pt','Portugu\xeas'],['ru','\u0420\u0443\u0441\u0441\u043a\u0438\u0439'],['zh_CN','\u4e2d\u6587(\u7b80\u4f53)'],['ja','\u65e5\u672c\u8a9e'],['ko','\ud55c\uad6d\uc5b4']]..,'sensitivity':'High
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:TrueType Font data, 16 tables, 1st "GDEF", 11 names, Microsoft, language 0x409, Copyright 2020 The Inter Project Authors (https://github.com/rsms/inter)InterRegular3.019;RSMS;I
            Category:downloaded
            Size (bytes):303504
            Entropy (8bit):6.240980841374878
            Encrypted:false
            SSDEEP:
            MD5:A4A7379505CD554EA9523594B7C28B2A
            SHA1:C2767D146C3C10FE6C9B8AC0F181EF907C111F19
            SHA-256:EEAB48280AACD4FC83C1C7E735681DF9EDD1B59588DDE23D0339BCF6552FB788
            SHA-512:469B0C4390DAEAC176EB9D5EF5B709E00D6957137A8EB61E1A82F70B8920CED5CCE7AD33FF94410E74F27D36CD33A7D73A97F7EEFF8CAA390195CEEEBFAB60AF
            Malicious:false
            Reputation:unknown
            URL:https://static.cres-aws.com/fonts/Inter/Inter-Regular.ttf
            Preview:............GDEF1.1...;.....GPOS...X..?.....GSUB..fx..^...B.OS/2".nb..nL...`STAT.q.E...H...Hcmap/....n...e.gasp......:.....glyf..O4.......&head-.aF..F$...6hhea......n(...$hmtx..L...F\..'.loca.].4...T..'.maxp.......4... name0$Q@...@....post..5r...X..d.preph......8............................!...!...!...!...!...........................@.........................H...(........!!.!.!.#.!.!.L..........................d....H...(.@.......#..!!.!.!.#.!.!."&54632....!"&54632.....L....................?aa?E[[..?aa?E[[.......d...a?E[[E?aa?E[[E?a...H...(.H.&.......l.@.....H...(...&.......f.d.....H...(...&.......d.......H...(.h.&.......j.8.....H...(.........&..!!.!.!.#.!.!."&546632......'2654&#".....L.....................x.N.PP.NN.P>RR>>RR.......d..H.xP.NN.PP.N.U==UU==U...H...(...&...............H...@...&.......v.......H...(...&.......m.@.....H...(...&.......n.@.....H...@...&.......v.......H...(.h.&.......s.8.....H...(...&...............H...(...&...............H...(...&.......{.@.....H...(.t.&.......
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=1, copyright=sandra cifo. www.cifography.com. 2016], baseline, precision 8, 1920x1280, components 3
            Category:dropped
            Size (bytes):155249
            Entropy (8bit):7.9359220373800605
            Encrypted:false
            SSDEEP:
            MD5:C3598F2D3BF6694DF3378AAFC792BFEE
            SHA1:BBCA95477B9B15A41E4EDC59784D76F621A27263
            SHA-256:A7842139A79734699FB6BD749733DA53E30B3634FB8C2695B57FD1A017DD1FE2
            SHA-512:5623BDBCD1FC446518E1DCE0817813E55938136D09375F35CFF3F828085C5B9A383DB43904565B7B5399B12919C72D56E0D4E00CB5582FE158E793CF41795425
            Malicious:false
            Reputation:unknown
            Preview:.....JExif..II*...........&...........sandra cifo. www.cifography.com. 2016.......Ducky..............http://ns.adobe.com/xap/1.0/.<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c145 79.163499, 2018/08/13-16:40:22 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmpMM:OriginalDocumentID="336EC317CA114058096C1124050B0AA8" xmpMM:DocumentID="xmp.did:DAB4B4FE077711EAA675C9DC7313E7A3" xmpMM:InstanceID="xmp.iid:DAB4B4FD077711EAA675C9DC7313E7A3" xmp:CreatorTool="Adobe Photoshop CC 2019 (Macintosh)"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:E712D444FE6211E994A3CEA94946B049" stRef:documentID="xmp.did:E712D445FE6211E994A3CEA94946B049"/> <dc:rights> <rdf:Alt> <rdf:li xml:lang="x-
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:Unicode text, UTF-8 text, with very long lines (64131)
            Category:downloaded
            Size (bytes):70357
            Entropy (8bit):5.316512415217151
            Encrypted:false
            SSDEEP:
            MD5:7C909F6DD07BED69C9CDABC9DEE2C131
            SHA1:7EF0ABFDB5935CDC2D50953FC0CEE43ABB501C28
            SHA-256:C1F5534ED276A1EAA57B106C7DADCC994A01EFBC033513EA4F5435580D8C327E
            SHA-512:E7E16B1264A28E3C5102B25678B7022048284180205348126BD32034C37EB55492F8C3D9B0493D6BB3A43D9AFB0338CD2678352A5FAD5CE415B4972C53E031D3
            Malicious:false
            Reputation:unknown
            URL:https://cdnjs.cloudflare.com/ajax/libs/select2/4.0.12/js/select2.min.js
            Preview:/*! Select2 4.0.12 | https://github.com/select2/select2/blob/master/LICENSE.md */.!function(n){"function"==typeof define&&define.amd?define(["jquery"],n):"object"==typeof module&&module.exports?module.exports=function(e,t){return void 0===t&&(t="undefined"!=typeof window?require("jquery"):require("jquery")(e)),n(t),t}:n(jQuery)}(function(u){var e=function(){if(u&&u.fn&&u.fn.select2&&u.fn.select2.amd)var e=u.fn.select2.amd;var t,n,r,h,o,s,f,g,m,v,y,_,i,a,w;function b(e,t){return i.call(e,t)}function l(e,t){var n,r,i,o,s,a,l,c,u,d,p,h=t&&t.split("/"),f=y.map,g=f&&f["*"]||{};if(e){for(s=(e=e.split("/")).length-1,y.nodeIdCompat&&w.test(e[s])&&(e[s]=e[s].replace(w,"")),"."===e[0].charAt(0)&&h&&(e=h.slice(0,h.length-1).concat(e)),u=0;u<e.length;u++)if("."===(p=e[u]))e.splice(u,1),u-=1;else if(".."===p){if(0===u||1===u&&".."===e[2]||".."===e[u-1])continue;0<u&&(e.splice(u-1,2),u-=2)}e=e.join("/")}if((h||g)&&f){for(u=(n=e.split("/")).length;0<u;u-=1){if(r=n.slice(0,u).join("/"),h)for(d=h.lengt
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:ASCII text, with very long lines (65447)
            Category:dropped
            Size (bytes):87533
            Entropy (8bit):5.262536918435756
            Encrypted:false
            SSDEEP:
            MD5:2C872DBE60F4BA70FB85356113D8B35E
            SHA1:EE48592D1FFF952FCF06CE0B666ED4785493AFDC
            SHA-256:FC9A93DD241F6B045CBFF0481CF4E1901BECD0E12FB45166A8F17F95823F0B1A
            SHA-512:BF6089ED4698CB8270A8B0C8AD9508FF886A7A842278E98064D5C1790CA3A36D5D69D9F047EF196882554FC104DA2C88EB5395F1EE8CF0F3F6FF8869408350FE
            Malicious:false
            Reputation:unknown
            Preview:/*! jQuery v3.7.1 | (c) OpenJS Foundation and other contributors | jquery.org/license */.!function(e,t){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=e.document?t(e,!0):function(e){if(!e.document)throw new Error("jQuery requires a window with a document");return t(e)}:t(e)}("undefined"!=typeof window?window:this,function(ie,e){"use strict";var oe=[],r=Object.getPrototypeOf,ae=oe.slice,g=oe.flat?function(e){return oe.flat.call(e)}:function(e){return oe.concat.apply([],e)},s=oe.push,se=oe.indexOf,n={},i=n.toString,ue=n.hasOwnProperty,o=ue.toString,a=o.call(Object),le={},v=function(e){return"function"==typeof e&&"number"!=typeof e.nodeType&&"function"!=typeof e.item},y=function(e){return null!=e&&e===e.window},C=ie.document,u={type:!0,src:!0,nonce:!0,noModule:!0};function m(e,t,n){var r,i,o=(n=n||C).createElement("script");if(o.text=e,t)for(r in u)(i=t[r]||t.getAttribute&&t.getAttribute(r))&&o.setAttribute(r,i);n.head.appendChild(o).parentNode.remove
            File type:HTML document, Unicode text, UTF-8 text, with very long lines (491), with CRLF, LF line terminators
            Entropy (8bit):5.948957416079878
            TrID:
            • Scalable Vector Graphics (18501/1) 24.18%
            • HyperText Markup Language (12001/1) 15.69%
            • HyperText Markup Language (12001/1) 15.69%
            • HyperText Markup Language (11501/1) 15.03%
            • HyperText Markup Language (11501/1) 15.03%
            File name:securedoc_20241216T121346.html
            File size:155'973 bytes
            MD5:2a3629d13e32b7a808df62dd6b70d992
            SHA1:e9f6686d976a275f2ca1fa73a0d4c94175ec6e14
            SHA256:2dd926883acc2e4e939002b4c1ebfe6eb2134555694ae9b868edba7b63506afc
            SHA512:54ae914e068db7a225524283633e0088cae68eee1fd576e0fffcdb61c0187bd022307be6ab66d1ab69afc634ac547eb1089c41714207cf2cd2d55644a449cb20
            SSDEEP:3072:tRl/LQISQGjA4RPeTp+IHYONivQ28Thnid6c4l:J/LQIGWp+IHYONivQ2mIkj
            TLSH:8BE37DC93312503603D718F7707B158A7A3198070509A8A1FBACC99CBBB9E96427FF9D
            File Content Preview: saved from url=(0025)https://res.cisco.com:443 -->..<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN". "http://www.w3.org/TR/html4/loose.dtd"><html.lang="en"><head><base href="http://res.cisco.com/envelopeopener/pf/ZGJAVG9rZW43ODc2OjIxNT
            Icon Hash:173149cccc490307