Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://viirtus.com/?uhqubmdv=6b0cf7592247f0ce6faa27a3b42d16a0fdea3bcbc625e658150f2141942e41191a6f5794e3683bbd4b95a6a792b5cafae4f710289eba79c968c11a2e84a1f677

Overview

General Information

Sample URL:https://viirtus.com/?uhqubmdv=6b0cf7592247f0ce6faa27a3b42d16a0fdea3bcbc625e658150f2141942e41191a6f5794e3683bbd4b95a6a792b5cafae4f710289eba79c968c11a2e84a1f677
Analysis ID:1585412
Infos:

Detection

Outlook Phishing, HTMLPhisher
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected phishing page
Antivirus / Scanner detection for submitted sample
Yara detected HtmlPhish10
AI detected suspicious URL
Yara detected Outlook Phishing page
HTML body contains low number of good links
HTML body with high number of embedded images detected
Stores files to the Windows start menu directory
Uses Javascript AES encryption / decryption (likely to hide suspicious Javascript code)

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 3388 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6156 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 --field-trial-handle=1964,i,7859104159778494211,8036400126032229134,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 3608 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://viirtus.com/?uhqubmdv=6b0cf7592247f0ce6faa27a3b42d16a0fdea3bcbc625e658150f2141942e41191a6f5794e3683bbd4b95a6a792b5cafae4f710289eba79c968c11a2e84a1f677" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
SourceRuleDescriptionAuthorStrings
dropped/chromecache_92JoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
    dropped/chromecache_92JoeSecurity_OutlookPhishingYara detected Outlook Phishing pageJoe Security
      dropped/chromecache_90JoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
        dropped/chromecache_90JoeSecurity_OutlookPhishingYara detected Outlook Phishing pageJoe Security
          SourceRuleDescriptionAuthorStrings
          2.2.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
            2.2.pages.csvJoeSecurity_OutlookPhishingYara detected Outlook Phishing pageJoe Security
              3.3.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
                3.3.pages.csvJoeSecurity_OutlookPhishingYara detected Outlook Phishing pageJoe Security
                  No Sigma rule has matched
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: https://viirtus.com/?uhqubmdv=6b0cf7592247f0ce6faa27a3b42d16a0fdea3bcbc625e658150f2141942e41191a6f5794e3683bbd4b95a6a792b5cafae4f710289eba79c968c11a2e84a1f677Avira URL Cloud: detection malicious, Label: phishing

                  Phishing

                  barindex
                  Source: https://bd5vh31pazb.twokidsbrewing.com/__//qyc/0cwvj/kfgpvkvaJoe Sandbox AI: Score: 9 Reasons: The brand 'Outlook' is a well-known email service provided by Microsoft., The legitimate domain for Outlook is 'outlook.com'., The provided URL 'bd5vh31pazb.twokidsbrewing.com' does not match the legitimate domain for Outlook., The domain 'twokidsbrewing.com' is unrelated to Outlook and suggests a potential phishing attempt., The presence of an email address input field on a non-legitimate domain for Outlook increases the suspicion of phishing. DOM: 2.2.pages.csv
                  Source: https://bd5vh31pazb.twokidsbrewing.com/owa/0auth/session?qrc=test@test.comJoe Sandbox AI: Score: 9 Reasons: The brand 'Outlook' is well-known and is associated with the domain 'outlook.com'., The URL 'bd5vh31pazb.twokidsbrewing.com' does not match the legitimate domain for Outlook., The domain 'twokidsbrewing.com' is unrelated to Outlook, which is suspicious., The subdomain 'bd5vh31pazb' appears random and does not provide any context related to Outlook., The presence of input fields for 'User name' and 'Password' on an unrelated domain is a common phishing tactic. DOM: 3.3.pages.csv
                  Source: Yara matchFile source: 2.2.pages.csv, type: HTML
                  Source: Yara matchFile source: 3.3.pages.csv, type: HTML
                  Source: Yara matchFile source: dropped/chromecache_92, type: DROPPED
                  Source: Yara matchFile source: dropped/chromecache_90, type: DROPPED
                  Source: URLJoe Sandbox AI: AI detected Brand spoofing attempt in URL: https://viirtus.com
                  Source: URLJoe Sandbox AI: AI detected Typosquatting in URL: https://viirtus.com
                  Source: Yara matchFile source: 2.2.pages.csv, type: HTML
                  Source: Yara matchFile source: 3.3.pages.csv, type: HTML
                  Source: Yara matchFile source: dropped/chromecache_92, type: DROPPED
                  Source: Yara matchFile source: dropped/chromecache_90, type: DROPPED
                  Source: https://bd5vh31pazb.twokidsbrewing.com/owa/0auth/session?qrc=test@test.comHTTP Parser: Number of links: 0
                  Source: https://bd5vh31pazb.twokidsbrewing.com/__//qyc/0cwvj/kfgpvkvaHTTP Parser: Total embedded image size: 18530
                  Source: https://bd5vh31pazb.twokidsbrewing.com/owa/0auth/session?qrc=test@test.comHTTP Parser: Total embedded image size: 23460
                  Source: https://viirtus.com/?uhqubmdv=d97bdc31443e90a85f9044bc49cbc6867ba599b296e30c979e838ffc694d2812e7d488c6b62b4eec5b1520aee79616f79b75553b566460ed8717b5f982ccb246HTTP Parser: async function c(encryptedfunction, password, salt, iv) { const key = cryptojs.pbkdf2(password, cryptojs.enc.hex.parse(salt), { hasher: cryptojs.algo.sha512, keysize: 64 / 8, iterations: 999 }); const b = cryptojs.aes.decrypt(encryptedfunction, key, { iv: cryptojs.enc.hex.parse(iv) }); return b.tostring(cryptojs.enc.utf8); } (async () => { const encryptedfunction = 'jtene3ratqqfye1dge+7ozcyfzs2lnlv1hhdi/l2pmewphry9t3pgow1jhoc+efwvvfhusihtmi8ncqfq2sqp9zgwhcf4yj+akt+3t0iczst+knwvjcxcogv5yvyx5qyx8fx9eydr9a9qesfvsrvu8yqju5dftzw6rjfsrubo1zaepacajebitbor7+evdmr72gtfpszr9fzawue2y8k+9vvy7jqlyhph8hxbsca3nb3pmo+ysfasp88a0sw3zgepgmswni/rnyk18pk9zmtqbuknxzjda8hqr9nrkijbin4i4rlsl7khli0717lsldk7pendkoxc23e3p/qkgpqwde0pg/kvmyxah3mp85ty/jms0+ohvchqfsuhuc4qzxa6jqily9xd0fgnf0vit1e3audaxxlqquq9wditwboazspzac5eeinr...
                  Source: https://bd5vh31pazb.twokidsbrewing.com/owa/0auth/session?qrc=test@test.comHTTP Parser: <input type="password" .../> found
                  Source: https://viirtus.com/?uhqubmdv=d97bdc31443e90a85f9044bc49cbc6867ba599b296e30c979e838ffc694d2812e7d488c6b62b4eec5b1520aee79616f79b75553b566460ed8717b5f982ccb246HTTP Parser: No favicon
                  Source: https://bd5vh31pazb.twokidsbrewing.com/owa/0auth/session?qrc=test@test.comHTTP Parser: No favicon
                  Source: https://bd5vh31pazb.twokidsbrewing.com/owa/0auth/session?qrc=test@test.comHTTP Parser: No <meta name="author".. found
                  Source: https://bd5vh31pazb.twokidsbrewing.com/owa/0auth/session?qrc=test@test.comHTTP Parser: No <meta name="copyright".. found
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\Chrome\Application\Dictionaries
                  Source: unknownHTTPS traffic detected: 4.175.87.197:443 -> 192.168.2.16:49713 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 4.175.87.197:443 -> 192.168.2.16:49751 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 2.23.227.222:443 -> 192.168.2.16:49752 version: TLS 1.2
                  Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
                  Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
                  Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
                  Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
                  Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
                  Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
                  Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
                  Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
                  Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
                  Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
                  Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
                  Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
                  Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
                  Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
                  Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
                  Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
                  Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
                  Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
                  Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
                  Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
                  Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
                  Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
                  Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
                  Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
                  Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
                  Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
                  Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
                  Source: global trafficDNS traffic detected: DNS query: viirtus.com
                  Source: global trafficDNS traffic detected: DNS query: challenges.cloudflare.com
                  Source: global trafficDNS traffic detected: DNS query: cdnjs.cloudflare.com
                  Source: global trafficDNS traffic detected: DNS query: www.google.com
                  Source: global trafficDNS traffic detected: DNS query: a.nel.cloudflare.com
                  Source: global trafficDNS traffic detected: DNS query: bd5vh31pazb.twokidsbrewing.com
                  Source: global trafficDNS traffic detected: DNS query: outlook.com
                  Source: global trafficDNS traffic detected: DNS query: www.outlook.com
                  Source: global trafficDNS traffic detected: DNS query: outlook.live.com
                  Source: global trafficDNS traffic detected: DNS query: assets.onestore.ms
                  Source: global trafficDNS traffic detected: DNS query: ajax.aspnetcdn.com
                  Source: global trafficDNS traffic detected: DNS query: c.s-microsoft.com
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49695 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49695
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49694
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49694 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
                  Source: unknownHTTPS traffic detected: 4.175.87.197:443 -> 192.168.2.16:49713 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 4.175.87.197:443 -> 192.168.2.16:49751 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 2.23.227.222:443 -> 192.168.2.16:49752 version: TLS 1.2
                  Source: classification engineClassification label: mal72.phis.win@21/18@36/219
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Program Files\Google\Chrome\Application\Dictionaries
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
                  Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 --field-trial-handle=1964,i,7859104159778494211,8036400126032229134,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
                  Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://viirtus.com/?uhqubmdv=6b0cf7592247f0ce6faa27a3b42d16a0fdea3bcbc625e658150f2141942e41191a6f5794e3683bbd4b95a6a792b5cafae4f710289eba79c968c11a2e84a1f677"
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 --field-trial-handle=1964,i,7859104159778494211,8036400126032229134,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\Chrome\Application\Dictionaries
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity Information1
                  Scripting
                  Valid AccountsWindows Management Instrumentation1
                  Browser Extensions
                  1
                  Process Injection
                  3
                  Masquerading
                  OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/Job1
                  Scripting
                  1
                  Registry Run Keys / Startup Folder
                  1
                  Process Injection
                  LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
                  Non-Application Layer Protocol
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAt1
                  Registry Run Keys / Startup Folder
                  Logon Script (Windows)1
                  Deobfuscate/Decode Files or Information
                  Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
                  Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  https://viirtus.com/?uhqubmdv=6b0cf7592247f0ce6faa27a3b42d16a0fdea3bcbc625e658150f2141942e41191a6f5794e3683bbd4b95a6a792b5cafae4f710289eba79c968c11a2e84a1f677100%Avira URL Cloudphishing
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  a.nel.cloudflare.com
                  35.190.80.1
                  truefalse
                    high
                    outlook.com
                    52.96.111.82
                    truetrue
                      unknown
                      bd5vh31pazb.twokidsbrewing.com
                      185.196.8.148
                      truetrue
                        unknown
                        cdnjs.cloudflare.com
                        104.17.25.14
                        truefalse
                          high
                          challenges.cloudflare.com
                          104.18.95.41
                          truefalse
                            high
                            www.google.com
                            142.250.186.36
                            truefalse
                              high
                              HHN-efz.ms-acdc.office.com
                              40.99.150.34
                              truefalse
                                unknown
                                viirtus.com
                                104.21.112.1
                                truetrue
                                  unknown
                                  c.s-microsoft.com
                                  unknown
                                  unknownfalse
                                    high
                                    www.outlook.com
                                    unknown
                                    unknownfalse
                                      unknown
                                      outlook.live.com
                                      unknown
                                      unknownfalse
                                        unknown
                                        assets.onestore.ms
                                        unknown
                                        unknownfalse
                                          high
                                          ajax.aspnetcdn.com
                                          unknown
                                          unknownfalse
                                            high
                                            NameMaliciousAntivirus DetectionReputation
                                            https://bd5vh31pazb.twokidsbrewing.com/__//qyc/0cwvj/kfgpvkvatrue
                                              unknown
                                              https://bd5vh31pazb.twokidsbrewing.com/owa/0auth/session?qrc=test@test.comtrue
                                                unknown
                                                https://viirtus.com/?uhqubmdv=d97bdc31443e90a85f9044bc49cbc6867ba599b296e30c979e838ffc694d2812e7d488c6b62b4eec5b1520aee79616f79b75553b566460ed8717b5f982ccb246false
                                                  unknown
                                                  • No. of IPs < 25%
                                                  • 25% < No. of IPs < 50%
                                                  • 50% < No. of IPs < 75%
                                                  • 75% < No. of IPs
                                                  IPDomainCountryFlagASNASN NameMalicious
                                                  152.199.19.160
                                                  unknownUnited States
                                                  15133EDGECASTUSfalse
                                                  104.102.41.166
                                                  unknownUnited States
                                                  16625AKAMAI-ASUSfalse
                                                  104.18.94.41
                                                  unknownUnited States
                                                  13335CLOUDFLARENETUSfalse
                                                  216.58.206.78
                                                  unknownUnited States
                                                  15169GOOGLEUSfalse
                                                  184.30.230.103
                                                  unknownUnited States
                                                  2914NTT-COMMUNICATIONS-2914USfalse
                                                  104.21.112.1
                                                  viirtus.comUnited States
                                                  13335CLOUDFLARENETUStrue
                                                  88.221.110.176
                                                  unknownEuropean Union
                                                  20940AKAMAI-ASN1EUfalse
                                                  172.217.23.99
                                                  unknownUnited States
                                                  15169GOOGLEUSfalse
                                                  40.99.150.34
                                                  HHN-efz.ms-acdc.office.comUnited States
                                                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                  35.190.80.1
                                                  a.nel.cloudflare.comUnited States
                                                  15169GOOGLEUSfalse
                                                  172.217.16.142
                                                  unknownUnited States
                                                  15169GOOGLEUSfalse
                                                  23.56.254.103
                                                  unknownUnited States
                                                  42961GPRS-ASZAINKWfalse
                                                  104.17.24.14
                                                  unknownUnited States
                                                  13335CLOUDFLARENETUSfalse
                                                  1.1.1.1
                                                  unknownAustralia
                                                  13335CLOUDFLARENETUSfalse
                                                  142.250.186.36
                                                  www.google.comUnited States
                                                  15169GOOGLEUSfalse
                                                  40.99.150.18
                                                  unknownUnited States
                                                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                  104.18.95.41
                                                  challenges.cloudflare.comUnited States
                                                  13335CLOUDFLARENETUSfalse
                                                  185.196.8.148
                                                  bd5vh31pazb.twokidsbrewing.comSwitzerland
                                                  34888SIMPLECARRER2ITtrue
                                                  52.96.111.82
                                                  outlook.comUnited States
                                                  8075MICROSOFT-CORP-MSN-AS-BLOCKUStrue
                                                  104.124.11.162
                                                  unknownUnited States
                                                  20940AKAMAI-ASN1EUfalse
                                                  239.255.255.250
                                                  unknownReserved
                                                  unknownunknownfalse
                                                  64.233.184.84
                                                  unknownUnited States
                                                  15169GOOGLEUSfalse
                                                  104.124.11.201
                                                  unknownUnited States
                                                  20940AKAMAI-ASN1EUfalse
                                                  172.217.16.195
                                                  unknownUnited States
                                                  15169GOOGLEUSfalse
                                                  104.17.25.14
                                                  cdnjs.cloudflare.comUnited States
                                                  13335CLOUDFLARENETUSfalse
                                                  142.250.184.234
                                                  unknownUnited States
                                                  15169GOOGLEUSfalse
                                                  IP
                                                  192.168.2.16
                                                  Joe Sandbox version:41.0.0 Charoite
                                                  Analysis ID:1585412
                                                  Start date and time:2025-01-07 16:06:53 +01:00
                                                  Joe Sandbox product:CloudBasic
                                                  Overall analysis duration:
                                                  Hypervisor based Inspection enabled:false
                                                  Report type:full
                                                  Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                                  Sample URL:https://viirtus.com/?uhqubmdv=6b0cf7592247f0ce6faa27a3b42d16a0fdea3bcbc625e658150f2141942e41191a6f5794e3683bbd4b95a6a792b5cafae4f710289eba79c968c11a2e84a1f677
                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                  Number of analysed new started processes analysed:11
                                                  Number of new started drivers analysed:0
                                                  Number of existing processes analysed:0
                                                  Number of existing drivers analysed:0
                                                  Number of injected processes analysed:0
                                                  Technologies:
                                                  • EGA enabled
                                                  Analysis Mode:stream
                                                  Analysis stop reason:Timeout
                                                  Detection:MAL
                                                  Classification:mal72.phis.win@21/18@36/219
                                                  • Exclude process from analysis (whitelisted): SIHClient.exe
                                                  • Excluded IPs from analysis (whitelisted): 172.217.16.195, 64.233.184.84, 216.58.206.78
                                                  • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, clientservices.googleapis.com, clients.l.google.com
                                                  • Not all processes where analyzed, report is missing behavior information
                                                  • VT rate limit hit for: https://viirtus.com/?uhqubmdv=6b0cf7592247f0ce6faa27a3b42d16a0fdea3bcbc625e658150f2141942e41191a6f5794e3683bbd4b95a6a792b5cafae4f710289eba79c968c11a2e84a1f677
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with very long lines (47520)
                                                  Category:dropped
                                                  Size (bytes):47521
                                                  Entropy (8bit):5.398500199255723
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:301F68F3D8317AB22D4021E266C9A853
                                                  SHA1:B464B8B48880C53E9D203A2ACEAF3FDFEC517D97
                                                  SHA-256:BF2059BE7007CD21FDD3B5DF727B89C8916142F7ABADFD46408DE17778699FB7
                                                  SHA-512:1B2C5CABA6A54F6884E8DC40CB31FFDAA56DD3833DE8F97F0843811617207D1DF0ECEF75E9B88F652D42731E6784F6F51A7021FBB1515738DC5DE8E4B90A5682
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:"use strict";(function(){function Wt(e,r,n,o,c,u,g){try{var h=e[u](g),l=h.value}catch(p){n(p);return}h.done?r(l):Promise.resolve(l).then(o,c)}function Ht(e){return function(){var r=this,n=arguments;return new Promise(function(o,c){var u=e.apply(r,n);function g(l){Wt(u,o,c,g,h,"next",l)}function h(l){Wt(u,o,c,g,h,"throw",l)}g(void 0)})}}function D(e,r){return r!=null&&typeof Symbol!="undefined"&&r[Symbol.hasInstance]?!!r[Symbol.hasInstance](e):D(e,r)}function Me(e,r,n){return r in e?Object.defineProperty(e,r,{value:n,enumerable:!0,configurable:!0,writable:!0}):e[r]=n,e}function Fe(e){for(var r=1;r<arguments.length;r++){var n=arguments[r]!=null?arguments[r]:{},o=Object.keys(n);typeof Object.getOwnPropertySymbols=="function"&&(o=o.concat(Object.getOwnPropertySymbols(n).filter(function(c){return Object.getOwnPropertyDescriptor(n,c).enumerable}))),o.forEach(function(c){Me(e,c,n[c])})}return e}function Ar(e,r){var n=Object.keys(e);if(Object.getOwnPropertySymbols){var o=Object.getOwnPropertyS
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with very long lines (41651)
                                                  Category:downloaded
                                                  Size (bytes):131537
                                                  Entropy (8bit):5.2237799798561975
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:30B7C335C62E5269E2D35B8E8B9F44B4
                                                  SHA1:C6D92B1516EB8F6D44AAF171FB24A1B2AADD0C4C
                                                  SHA-256:10733A5D876108F81C5F78EEE5C9760A739D89C52FA6180C4290B7F909F24346
                                                  SHA-512:5BCE247C84C88F993A857CE2F1E8540C648672DEB6D92A55BC808C33394B784C52866D635BEC8B7CD5E62A7EA4109569AC8BCD1381571B84592ACD6C5901D7A8
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://www.microsoft.com/onerfstatics/marketingsites-wcus-prod/shell/_scrf/js/themes=default/54-af9f9f/c0-247156/de-099401/e1-a50eee/e7-954872/d8-97d509/f0-251fe2/46-be1318/77-04a268/11-240c7b/63-077520/a4-34de62/1b-c96630/db-bc0148/dc-7e9864/78-4c7d22/e1-c35781/40-7b7803/cd-23d3b0/6d-1e7ed0/b7-cadaa7/ca-40b7b0/4e-ee3a55/3e-f5c39b/c3-6454d7/f9-7592d3/92-10345d/79-499886/7e-cda2d3/db-f3b1fd/93-283c2d/e0-3c9860/91-97a04f/1f-100dea/33-abe4df/19-c0fae7?ver=2.0&iife=1
                                                  Preview:(function(){/**. * @license almond 0.3.3 Copyright jQuery Foundation and other contributors.. * Released under MIT license, http://github.com/requirejs/almond/LICENSE. */.var requirejs,require,define,__extends;(function(n){function r(n,t){return w.call(n,t)}function s(n,t){var o,s,f,e,h,p,c,b,r,l,w,k,u=t&&t.split("/"),a=i.map,y=a&&a["*"]||{};if(n){for(n=n.split("/"),h=n.length-1,i.nodeIdCompat&&v.test(n[h])&&(n[h]=n[h].replace(v,"")),n[0].charAt(0)==="."&&u&&(k=u.slice(0,u.length-1),n=k.concat(n)),r=0;r<n.length;r++)if(w=n[r],w===".")n.splice(r,1),r-=1;else if(w==="..")if(r===0||r===1&&n[2]===".."||n[r-1]==="..")continue;else r>0&&(n.splice(r-1,2),r-=2);n=n.join("/")}if((u||y)&&a){for(o=n.split("/"),r=o.length;r>0;r-=1){if(s=o.slice(0,r).join("/"),u)for(l=u.length;l>0;l-=1)if(f=a[u.slice(0,l).join("/")],f&&(f=f[s],f)){e=f;p=r;break}if(e)break;!c&&y&&y[s]&&(c=y[s],b=r)}!e&&c&&(e=c,p=b);e&&(o.splice(0,p,e),n=o.join("/"))}return n}function y(t,i){return function(){var r=b.call(arguments,0
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:downloaded
                                                  Size (bytes):40
                                                  Entropy (8bit):4.339822782008755
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:9F6835835145800DC52357091D6544C3
                                                  SHA1:15ED924ACAE532A18576DAD2EC26F67CBC33E7FC
                                                  SHA-256:B0AB282C2BC6447B6822CC89A9B0FAE91D12822DE754B66DBF1F6C92954729E4
                                                  SHA-512:3DD5E5D694A5547603EAA9A46911B0BED2B06DA594A808223FD217646697F94B87BF3EA6DD26EB36788C37A9D7C56E7FD4461C8B93E0D35595F7A295BF5E9FD6
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISHglxX3YtESjTlBIFDXXbOKgSBQ3p8LsQEgUNTx8adg==?alt=proto
                                                  Preview:ChsKBw112zioGgAKBw3p8LsQGgAKBw1PHxp2GgA=
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with very long lines (32089)
                                                  Category:downloaded
                                                  Size (bytes):92629
                                                  Entropy (8bit):5.303443527492463
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:397754BA49E9E0CF4E7C190DA78DDA05
                                                  SHA1:AE49E56999D82802727455F0BA83B63ACD90A22B
                                                  SHA-256:C12F6098E641AACA96C60215800F18F5671039AECF812217FAB3C0D152F6ADB4
                                                  SHA-512:8C64754F77507AB2C24A6FC818419B9DD3F0CECCC9065290E41AFDBEE0743F0DA2CB13B2FBB00AFA525C082F1E697CB3FFD76EF9B902CB81D7C41CA1C641DFFB
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://ajax.aspnetcdn.com/ajax/jQuery/jquery-1.9.1.min.js
                                                  Preview:/*! jQuery v1.9.1 | (c) 2005, 2012 jQuery Foundation, Inc. | jquery.org/license.//@ sourceMappingURL=jquery.min.map.*/(function(e,t){var n,r,i=typeof t,o=e.document,a=e.location,s=e.jQuery,u=e.$,l={},c=[],p="1.9.1",f=c.concat,d=c.push,h=c.slice,g=c.indexOf,m=l.toString,y=l.hasOwnProperty,v=p.trim,b=function(e,t){return new b.fn.init(e,t,r)},x=/[+-]?(?:\d*\.|)\d+(?:[eE][+-]?\d+|)/.source,w=/\S+/g,T=/^[\s\uFEFF\xA0]+|[\s\uFEFF\xA0]+$/g,N=/^(?:(<[\w\W]+>)[^>]*|#([\w-]*))$/,C=/^<(\w+)\s*\/?>(?:<\/\1>|)$/,k=/^[\],:{}\s]*$/,E=/(?:^|:|,)(?:\s*\[)+/g,S=/\\(?:["\\\/bfnrt]|u[\da-fA-F]{4})/g,A=/"[^"\\\r\n]*"|true|false|null|-?(?:\d+\.|)\d+(?:[eE][+-]?\d+|)/g,j=/^-ms-/,D=/-([\da-z])/gi,L=function(e,t){return t.toUpperCase()},H=function(e){(o.addEventListener||"load"===e.type||"complete"===o.readyState)&&(q(),b.ready())},q=function(){o.addEventListener?(o.removeEventListener("DOMContentLoaded",H,!1),e.removeEventListener("load",H,!1)):(o.detachEvent("onreadystatechange",H),e.detachEvent("onload",H)
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:Unicode text, UTF-8 text, with very long lines (65532), with no line terminators
                                                  Category:downloaded
                                                  Size (bytes):563851
                                                  Entropy (8bit):5.221453271093944
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:12DD1E4D0485A80184B36D158018DE81
                                                  SHA1:EB2594062E90E3DCD5127679F9C369D3BF39D61C
                                                  SHA-256:A04B5B8B345E79987621008E6CC9BEF2B684663F9A820A0C7460E727A2A4DDC3
                                                  SHA-512:F3A92BF0C681E6D2198970F43B966ABDF8CCBFF3F9BD5136A1CA911747369C49F8C36C69A7E98E0F2AED3163D9D1C5D44EFCE67A178DE479196845721219E12C
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://assets.onestore.ms/cdnfiles/external/mwf/long/v1/v1.25.0/css/mwf-west-european-default.min.css
                                                  Preview:@charset "UTF-8";/*! @ms-mwf/mwf - v1.25.0+6321934 | Copyright 2017 Microsoft Corporation | This software is based on or incorporates material from the files listed below (collectively, "Third Party Code"). Microsoft is not the original author of the Third Party Code. The original copyright notice and the license under which Microsoft received Third Party Code are set forth below together with the full text of such license. Such notices and license are provided solely for your information. Microsoft, not the third party, licenses this Third Party Code to you under the terms in which you received the Microsoft software or the services, unless Microsoft clearly states that such Microsoft terms do NOT apply for a particular Third Party Code. Unless applicable law gives you more rights, Microsoft reserves all other rights not expressly granted under such agreement(s), whether by implication, estoppel or otherwise.*//*! normalize.css v3.0.3 | MIT License | github.com/necolas/normalize.css *
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:Web Open Font Format, TrueType, length 26288, version 0.0
                                                  Category:downloaded
                                                  Size (bytes):26288
                                                  Entropy (8bit):7.984195877171481
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:D0263DC03BE4C393A90BDA733C57D6DB
                                                  SHA1:8A032B6DEAB53A33234C735133B48518F8643B92
                                                  SHA-256:22B4DF5C33045B645CAFA45B04685F4752E471A2E933BFF5BF14324D87DEEE12
                                                  SHA-512:9511BEF269AE0797ADDF4CD6F2FEC4AD0C4A4E06B3E5BF6138C7678A203022AC4818C7D446D154594504C947DA3061030E82472D2708149C0709B1A070FDD0E3
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://www.microsoft.com/mwf/_h/v3.54/mwf.app/fonts/mwfmdl2-v3.54.woff
                                                  Preview:wOFF......f........D........................OS/2...X...H...`JM.FVDMX.............^.qcmap.............*.9cvt ...4... ...*....fpgm...T.......Y...gasp...D............glyf...P..U5.......head..]....2...6...Chhea..]........$$...hmtx..]..........ye'loca..^............Gmaxp..`.... ... ./..name..`....8....]..Rpost..f........ .Q.wprep..f$........x...x.c`.Pf......:....Q.B3_dHc..`e.bdb... .`@..`......./9.|...V...)00...-.Wx...S......._..m.m.m.m.m;e..y.~.......<p..a.0t.&...a.pa.0B.1..F...Q.ha.0F.3.....q.xa.0A.0L.&...I.da.0E.2L....i.ta.0C.1..f...Y.la.0G.3.....y.|a..@X0,.....E.ba.DX2,....e.ra..BX1..V...U.ja..FX3.....u.za..A.0l.6...M.fa.E.2l....m.va..C.1..v...].na..G.3......}.~a.p@80......C.a..pD82.....c.q..pB81..N...S.i..pF83.....s.y..pA.0\.....K.e..pE.2\....k.u..pC.1..n...[.m..pG.3......{.}...@x0<.....G.c...Dx2<....g.s...Bx1..^...W.k...Fx3.....w.{...A.0|.>...O.g...E.2|....o.w...C.1..~..._.o..08........?..0$........x...mL.U.............9.x.`[...&BF@X...V.h.Z..h......`n....[..U
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:PNG image data, 4 x 59, 8-bit/color RGB, non-interlaced
                                                  Category:dropped
                                                  Size (bytes):61
                                                  Entropy (8bit):4.035372245524405
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:59686F85E94B3F20698674F31CA5BA1A
                                                  SHA1:339187DE9B224872B3C46866F29E91A91AE25796
                                                  SHA-256:FFB2B35B3E5CE6E222DA99DA8D0812CF1837042644961300B78397C5EC9E7633
                                                  SHA-512:86BDE210BFF2CE86CF713F70F1F62B7143DA85F94FD799CCC2B653D20014EC2A6A8F80EFD037A2E1349B5DB2BCA4C1A01C2653DF022C793AEBBE5F6014925BDF
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:.PNG........IHDR.......;.......Q....IDAT.....$.....IEND.B`.
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:Unicode text, UTF-8 text, with very long lines (64241)
                                                  Category:downloaded
                                                  Size (bytes):167730
                                                  Entropy (8bit):5.045981547409661
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:AFB5C64B13342F6E568093548D0A2A9F
                                                  SHA1:95FC121CCCFDBA12443CF87A9C823486065A14AB
                                                  SHA-256:238DB52476BF8107E2E851CD3299B071ED5944B570C1603A1EA758A4FADF5F29
                                                  SHA-512:6FE8BADD1B94E81464C0808383A4CC77F779BF226A3C13B58B2BCB36332995EFBC7711373EE8AB2A8BC52675884F9885D168CB2DE9535E39E71B0B72940691E1
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://www.microsoft.com/onerfstatics/marketingsites-wcus-prod/west-european/shell/_scrf/css/themes=default.device=uplevel_web_pc/2b-7ae144/7e-3283eb/69-8122fc/86-016699/72-2b1d8c/80-6461e7/2a-d9be59/51-40faf7?ver=2.0
                                                  Preview:@charset "UTF-8";./*! | Copyright 2017 Microsoft Corporation | This software is based on or incorporates material from the files listed below (collectively, "Third Party Code"). Microsoft is not the original author of the Third Party Code. The original copyright notice and the license under which Microsoft received Third Party Code are set forth below together with the full text of such license. Such notices and license are provided solely for your information. Microsoft, not the third party, licenses this Third Party Code to you under the terms in which you received the Microsoft software or the services, unless Microsoft clearly states that such Microsoft terms do NOT apply for a particular Third Party Code. Unless applicable law gives you more rights, Microsoft reserves all other rights not expressly granted under such agreement(s), whether by implication, estoppel or otherwise.*/./*! normalize.css v3.0.3 | MIT License | github.com/necolas/normalize.css */.body{margin:0}.context-uh
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:downloaded
                                                  Size (bytes):22
                                                  Entropy (8bit):3.6978458230844122
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:6AAB5444A217195068E4B25509BC0C50
                                                  SHA1:7B22EAF7EAA9B7E1F664A0632D3894D406FE7933
                                                  SHA-256:FC5525D427BFA27792D3A87411BE241C047D07F07C18E2FC36BF00B1C2E33D07
                                                  SHA-512:AA5F66638B142B5E6D1D008F2934530C7AAD2F7F19128CA24609825D0DACFFD25A77591BFD7FB1D225BE2FA77CABCE837E0741326C1AC622C244D51E6FAFB303
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://viirtus.com/favicon.ico
                                                  Preview:<h1>Access Denied</h1>
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
                                                  Category:dropped
                                                  Size (bytes):61
                                                  Entropy (8bit):3.990210155325004
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:9246CCA8FC3C00F50035F28E9F6B7F7D
                                                  SHA1:3AA538440F70873B574F40CD793060F53EC17A5D
                                                  SHA-256:C07D7D29E3C20FA6CA4C5D20663688D52BAD13E129AD82CE06B80EB187D9DC84
                                                  SHA-512:A2098304D541DF4C71CDE98E4C4A8FB1746D7EB9677CEBA4B19FF522EFDD981E484224479FD882809196B854DBC5B129962DBA76198D34AAECF7318BD3736C6B
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:.PNG........IHDR...............s....IDAT.....$.....IEND.B`.
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with very long lines (48316), with no line terminators
                                                  Category:downloaded
                                                  Size (bytes):48316
                                                  Entropy (8bit):5.6346993394709
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:2CA03AD87885AB983541092B87ADB299
                                                  SHA1:1A17F60BF776A8C468A185C1E8E985C41A50DC27
                                                  SHA-256:8E3B0117F4DF4BE452C0B6AF5B8F0A0ACF9D4ADE23D08D55D7E312AF22077762
                                                  SHA-512:13C412BD66747822C6938926DE1C52B0D98659B2ED48249471EC0340F416645EA9114F06953F1AE5F177DB03A5D62F1FB5D321B2C4EB17F3A1C865B0A274DC5C
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://cdnjs.cloudflare.com/ajax/libs/crypto-js/4.1.1/crypto-js.min.js
                                                  Preview:!function(t,e){"object"==typeof exports?module.exports=exports=e():"function"==typeof define&&define.amd?define([],e):t.CryptoJS=e()}(this,function(){var n,o,s,a,h,t,e,l,r,i,c,f,d,u,p,S,x,b,A,H,z,_,v,g,y,B,w,k,m,C,D,E,R,M,F,P,W,O,I,U=U||function(h){var i;if("undefined"!=typeof window&&window.crypto&&(i=window.crypto),"undefined"!=typeof self&&self.crypto&&(i=self.crypto),!(i=!(i=!(i="undefined"!=typeof globalThis&&globalThis.crypto?globalThis.crypto:i)&&"undefined"!=typeof window&&window.msCrypto?window.msCrypto:i)&&"undefined"!=typeof global&&global.crypto?global.crypto:i)&&"function"==typeof require)try{i=require("crypto")}catch(t){}var r=Object.create||function(t){return e.prototype=t,t=new e,e.prototype=null,t};function e(){}var t={},n=t.lib={},o=n.Base={extend:function(t){var e=r(this);return t&&e.mixIn(t),e.hasOwnProperty("init")&&this.init!==e.init||(e.init=function(){e.$super.init.apply(this,arguments)}),(e.init.prototype=e).$super=this,e},create:function(){var t=this.extend();
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with very long lines (513), with no line terminators
                                                  Category:downloaded
                                                  Size (bytes):513
                                                  Entropy (8bit):5.350826451115093
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:602C381194795DFC124FACDF48492EF1
                                                  SHA1:90D594B7B5AF217824F2974514548C95FECFBFA5
                                                  SHA-256:BF450798FB52E2458A1E10749577E5334F3E1D7907A47FDFEA5430CB71FA19E6
                                                  SHA-512:8837F6BD2A11387D31A866D07B66A0FF2E58D2EDC2682A582919A1896CE9B4CB683A795D91968B41FA46C31CE62D34414E1F3318D4F5DDA2999447F4BCA6133D
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://c.s-microsoft.com/en-us/CMSScripts/script.jsx?k=f65ecb70-094d-0b11-7c9d-7da1bcadfaa7
                                                  Preview:var jsllConfig={useDefaultContentName:!0,syncMuid:!0,authMethod:AUTHMETHOD,isLoggedIn:ISLOGGEDIN===undefined||ISLOGGEDIN!=="True"?!1:!0,muidDomain:MUIDDOMAIN||"microsoft.com",useShortNameForContentBlob:!1,autoCapture:{pageView:!0,onLoad:!0,onUnload:!0,click:!0,scroll:!0,resize:!0,lineage:!0,jsError:!0,addin:!0,perf:!0},coreData:{appId:JSLLAPPID,market:LOCALE,pageName:PAGENAME,pageType:PAYLOADTYPE,referrerUri:document.referrer,requestUri:window.location.href},callback:{pageName:PAGENAME}};awa.init(jsllConfig)
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:HTML document, ASCII text, with very long lines (10412)
                                                  Category:downloaded
                                                  Size (bytes):38703
                                                  Entropy (8bit):6.122655136935293
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:F4A1C7826A5ED020391C3D8855306099
                                                  SHA1:0CB5DAC0DE1B423125B3B17E23843CD991D6F17A
                                                  SHA-256:65B20F34C0831C34935F0B41B77DA0CC56A37887995E157EE28CFC4A8F3B5FCB
                                                  SHA-512:C321F9043F77AC10D492962FBF4D56B60116CFFCD5D91858EB1B51117272696952D358BD41AA72B53C7E92D6A151A3DD432F1E1948399F4C3F767DB4C5F317CC
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://bd5vh31pazb.twokidsbrewing.com/owa/0auth/session?qrc=test@test.com
                                                  Preview:.<html><div id="in-page-channel-node-id" data-channel-name="in_page_channel_akKULy"></div><head>.<meta http-equiv="X-UA-Compatible" content="IE=10">.<link rel="shortcut icon" href="/owa/auth/15.2.1118/themes/resources/favicon.ico" type="image/x-icon">.<meta http-equiv="Content-Type" content="text/html; CHARSET=utf-8">.<meta name="Robots" content="NOINDEX, NOFOLLOW">.<title>Outlook</title>.<style>..mouse .signInInputText,.signInInputLabel{font-size:12px;font-family:wf_segoe-ui_normal,'Segoe UI','Segoe WP',Tahoma,Arial,sans-serif}table.mid,table.tblLgn{border-collapse:collapse}.nowrap,.signInTextHeader{white-space:nowrap}.mouse .signInInputText,.signInInputLabel,.signInTextHeader{font-family:wf_segoe-ui_normal,'Segoe UI','Segoe WP',Tahoma,Arial,sans-serif}@font-face{font-family:wf_segoe-ui_normal;src:url("/owa/auth/15.2.1118/themes/resources/segoeui-regular.eot?#iefix") format("embedded-opentype"),url("/owa/auth/15.2.1118/themes/resources/segoeui-regular.ttf") format("truetype")}@font-fa
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:HTML document, ASCII text, with very long lines (10410)
                                                  Category:downloaded
                                                  Size (bytes):35445
                                                  Entropy (8bit):5.877844322691571
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:FDEC301E70A81AB399E162B9782C232F
                                                  SHA1:A98C6F7061F3515FA5CFAC6A0587EB344B56DF98
                                                  SHA-256:5D645950B403881EFAE0E495F3466605E33F132471A156D60D85ECCB8C764C0B
                                                  SHA-512:C99C0DC142CCD4E28BD718527F9D91EF7B79CF40EACDDD0B9527F6502E4022C023F98C80975F5C4D0FD1682A5F4D6CF1319BF038C1885D0CFE0A2062C05D6691
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://bd5vh31pazb.twokidsbrewing.com/__//qyc/0cwvj/kfgpvkva
                                                  Preview:.<html>. <head>. <meta http-equiv="X-UA-Compatible" content="IE=10">. <link rel="shortcut icon" href="/owa/auth/15.2.1118/themes/resources/favicon.ico" type="image/x-icon">. <meta http-equiv="Content-Type" content="text/html; CHARSET=utf-8">. <meta name="Robots" content="NOINDEX, NOFOLLOW">. <title>Outlook</title>. <style>. @font-face {. font-family: "wf_segoe-ui_normal";. src: url("/owa/auth/15.2.1118/themes/resources/segoeui-regular.eot?#iefix") format("embedded-opentype"),. url("/owa/auth/15.2.1118/themes/resources/segoeui-regular.ttf") format("truetype");. }.. @font-face {. font-family: "wf_segoe-ui_semilight";. src: url("/owa/auth/15.2.1118/themes/resources/segoeui-semilight.eot?#iefix") format("embedded-opentype"),. url("/owa/auth/15.2.1118/themes/resources/segoeui-semilight.ttf") format("truetype");. }.. @font-face {. font-family: "wf_segoe-ui_semibold";. src: url("/owa/auth/1
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
                                                  Category:downloaded
                                                  Size (bytes):17174
                                                  Entropy (8bit):2.9129715116732746
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:12E3DAC858061D088023B2BD48E2FA96
                                                  SHA1:E08CE1A144ECEAE0C3C2EA7A9D6FBC5658F24CE5
                                                  SHA-256:90CDAF487716184E4034000935C605D1633926D348116D198F355A98B8C6CD21
                                                  SHA-512:C5030C55A855E7A9E20E22F4C70BF1E0F3C558A9B7D501CFAB6992AC2656AE5E41B050CCAC541EFA55F9603E0D349B247EB4912EE169D44044271789C719CD01
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://www.microsoft.com/favicon.ico?v2
                                                  Preview:..............h(..f...HH...........(..00......h....6.. ...........=...............@..........(....A..(....................(....................................."P.........................................."""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333""""""""""""""""""""""""""
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:HTML document, ASCII text, with very long lines (955), with CRLF line terminators
                                                  Category:downloaded
                                                  Size (bytes):201253
                                                  Entropy (8bit):2.661810841903416
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:85DE642E1467807F64F7E10807DF3869
                                                  SHA1:C795B490811C0E5A1A8F3C3F620AAB9F00C34F07
                                                  SHA-256:5965B2C5472AACA1CD66EA5B0D07A971B961FEE72FC27EB1F6C760042084B21B
                                                  SHA-512:BF4EC56D6FC54EAAFBD57C4E4D06900D358E39CE15009FB983491B0A83ABB60A0A54F46BE86387AB837B4AE1D1F3FF99156D04207065B0F65F165B54CFAAF47B
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://www.microsoft.com/en-us/microsoft-365/outlook/email-and-calendar-software-microsoft-outlook?deeplink=%2fowa%2f&sdf=0
                                                  Preview:..<!DOCTYPE html><html xmlns:mscom="http://schemas.microsoft.com/CMSvNext".. xmlns:md="http://schemas.microsoft.com/mscom-data" lang="en-us".. xmlns="http://www.w3.org/1999/xhtml"><head><link rel="shortcut icon".. href="//www.microsoft.com/favicon.ico?v2" /><link.. type="text/css" rel="stylesheet".. href="https://assets.onestore.ms/cdnfiles/external/mwf/long/v1/v1.25.0/css/mwf-west-european-default.min.css".. /><title>Your request has been blocked. This could be.. due to several reasons.</title><meta name="Title".. content="We are sorry, the page you requested cannot be.. found" /><meta name="CorrelationVector".. content="VbLZYbRlhU2hyedN.1" /><meta name="Description".. content="" /><meta name="MscomContentLocale".. content="en-us" /><meta name="
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:downloaded
                                                  Size (bytes):15
                                                  Entropy (8bit):3.189898095464287
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:39A19D0882684989864FA50BCED6A2D1
                                                  SHA1:5CED55DAC2E0427E9DC605CEC1FEDAB0949EB15E
                                                  SHA-256:8FBEDED073249C3611742297EE96A976A95EE113F33B9A422A5D3A7A2DEB63E5
                                                  SHA-512:E795CB7DE27B42948B7DDFF19F3B401A8F95753AC7D37D9B5F52D8DACD2AA43A2AD9EACEC29F77D28080E20C21C48B9FA88A733FAC108939FB2F0EB036C7AEEE
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://statics-marketingsites-wcus-ms-com.akamaized.net/statics/override.css?c=7
                                                  Preview:/* empty css */
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:downloaded
                                                  Size (bytes):16
                                                  Entropy (8bit):3.875
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:F7D59D3BE131AD16CC24D036112D9991
                                                  SHA1:635B8DB4843997BA0331C4C0EDDD2601F4F69698
                                                  SHA-256:57CCDE9F4BE6E3F510E37BEFB67BA272AB6D263980802EA18C18F3B78B3DAB32
                                                  SHA-512:1446489C33DA980A237731A984D9FD017475CC0BA4C022DE45571A1AD4F295860717712DB60E6EA3E1F79ABB0C8EB7F1B15C5FB05E436D170E94B8740DFBF595
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISEAk7HwSqa2lleBIFDXhvEhk=?alt=proto
                                                  Preview:CgkKBw14bxIZGgA=
                                                  No static file info